References: [1] Liu, Y., Cannell, J. C., Coffman, J. H. (2020). Gannon University Hackathon: A Combination of Virtual and Onsite Education Event to Recruit High-School Students within Cybersecurity Major. In 2020 IEEE Frontiers in Education Conference (FIE), 1- 4. [2] Schmidt, L. (2015). Perspective on 2015 DoD cyber strategy. Rand Corp Santa Monica CA. [3] Francis, K. A. and Wendy, G. (2016). The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security. Information Security Education Journal Volume 8 Number 2 38 December 2021 [4] Etzioni, A. (2011). Cybersecurity in the private sector. Issues in Science and Technology 28.1, 58-62. [5] Hiller, J. S. and Roberta, S. R. (2013). The challenge and imperative of private sector cybersecurity: An international comparison. Computer Law & Security Review 29.3, 236-245. [6] Farwell, J. P. (2012). Industry’s vital role in national cyber security. Strategic Studies Quarterly 6.4, 10-41. [7] Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International Affairs 92.1, 43-62. [8] Burrell, D. N. (2020). An Exploration of the Cybersecurity Workforce Shortage. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications. IGI Global, 1072-1081. [9] Ambrosin, M. et al. (2018). Security and privacy analysis of national science foundation future internet architectures. IEEE Communications Surveys & Tutorials 20.2, 1418-1442. [10] Kallberg, J. and Thuraisingham, J. (2012). Towards cyber operations-The new role of academic cyber security research and education. In 2012 IEEE International Conference on Intelligence and Security Informatics, 132-134. [11] Kallberg, J. (2013). Cyber Operations–Bridging from Concept to Cyber Superiority. Joint Forces Quarterly 68. [12] Raj, R. K. and Parrish, A. (2018). Toward standards in undergraduate cybersecurity education in 2018. Computer 51.2, 72-75. [13] Briscoe, G. (2014). Digital innovation: The hackathon phenomenon. [14] Trainer, E. H., et al. (2016). How to hackathon: Socio-technical tradeoffs in brief, intensive collocation. The proceedings of the 19th ACM conference on computer-supported cooperative work & social computing. [15] White, G. B., Dwayne, W., and Keith, H. (2010). The CyberPatriot national high school cyber defense competition. IEEE Security & Privacy 8.5, 59-61. [16] Manson, D., Curl, S., and Carlin, A. (2012). CyberPatriot: Exploring university-high school partnerships. Communications of the IIMA 12.1, 6. [17] Creutzburg, R. (2018). Cybersecurity and Forensic Challenges-A Bibliographic Review. Electronic Imaging 2018.6, 100-1. [18] Gordon, L. A., Loeb, M. P., Lucyshyn, W. (2014). Cybersecurity Investments in the Private Sector: The Role of Governments. Georgetown Journal of International Affairs, 79–88. http://www.jstor.org/stable/43773651 [19] Brennan, J. (2020). Civic Hackathons for Youth. National Civic Review, 108 (4) 55–64. https://www.jstor.org/stable/10.32543/ naticivirevi.108.4.0055 [20] Briscoe, G. (2014). Digital innovation: The hackathon phenomenon. |