1. Cybersecurity education: evolution of the discipline and analysis of master programs;Cabaj;Comput. Secur.,2021
2. D. Paul (1988, November 9). Was science-fiction novel germ of a computer virus?. Los Angeles Times, G1.
3. DiGiovanni, F.C. (2018). Permeable socialization flow and hacker code switching practice: a metacognitive, situated approach [Ed.D., University of Pennsylvania]. In ProQuest Dissertations and Theses.
4. Diversity, Equity, and Inclusion in Cybersecurity. (2021). Aspen Tech Policy Hub. https://www.aspeninstitute.org/publications/dei-in-cybersecurity/.
5. Little Brother;Doctorow,2008