skip to main content
10.1145/1055973.1055981acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
Article

Opportunities for women in IT security

Published: 14 April 2005 Publication History

Abstract

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the questions surrounding women in IT within the context of Information Security and Assurance. This research-in-progress report describes results from one phase in a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described IT security professionals. The next phase will focus on interviews with men in the IT security field as a basis for comparison. A primary goal of the study is to determine whether or not women in security face the same challenges and opportunities as they do in other IT fields. Further, does the security area offer equivalent opportunities for women and men? Finally, implications are explored, including those for IT educators in terms of recruiting and retaining diverse groups of students to pursue security related careers.

References

[1]
Women Luminaries. 2004, Tech Target.
[2]
Trauth, E.M., Odd Girl Out: The Individual Differences Perspective on Women in the IT Profession. Information Technology & People, 2002. 15(2): p. 99--117.
[3]
Friedman, M., Women take to internet while avoiding IT. Computing Canada, 2000. 26(18): p. 9.
[4]
Beyer, S., Rynes, Kristina, Perrault, Julie, Hay, Kelly, & Haller, Susan. Gender differences in computer science students. in ACM SIGCSE. 2003. Reno, NV.
[5]
Crews, T., & Butterfield, Jeff, Improving the learning environment in beginning programming classes: An experiment in gender equity. Journal of Information Systems Education, 2003. 14(1): p. 69--75.
[6]
Igbaria, M., Baroudi, J. J., The Impact of Job Performance Evaluations on Career Advancement Prospects: An Examination of Gender Differences in the IS Workplace. MIS Quarterly, 1995. 19(1).
[7]
Graham, S., & Latulipe, Celine. CS girls rock: Sparking interest in computer science and debunking the stereotypes. in 34th SIGCSE Technical Symposium on Computer Science Education. 2003: ACM SIGCSE.
[8]
Gallivan, M., Examining IT PRofesional's Adaptation to Technological Change: The Influence of Gender and Personal Attributes. The DATA BASE for Advances in Information Systems, 2004. 35(3): p. 28--49.
[9]
Frieze, C., & Blum, Lenore, Building an effective computer science student organization: The Carnegie Mellon Women@SCS action plan. Inroads, SIGCSE Bulletin, 2002. 34(2): p. 74--78.
[10]
Beise, C., M. Myers,N. Chevli-Saroq, L. VanBrackle, An Examination of Age, Race, and Sex as Predictors of Success in the First Programming Course. Journal of Informatics Education and Research, 2003.
[11]
Woszczynski, A., Myers, M., Beise, C., Moody, J. Diversity within the Ranks: How Ethnicity Affects Choices in IT. in Tenth Americas Conference on Information Systems (AMCIS). 2004. New York, NY.
[12]
Bentsen, C., Why women hate IT, in CIO Magazine. 2000.
[13]
Dattero, R. and Galup, S. D., Programming Languages and Gender. Communications of the ACM, 2004. 47(1): p. 99--102.
[14]
Adam, A.E., Hacking into Hacking: Gender and the Hacker Phenomenon. ACM SIGCAS Computers and Society, 2004. 32(7).
[15]
Camp, T., The incredible shrinking pipeline. Communications of the ACM, 1997. 40(10): p. 103--110.
[16]
Gephart, R., Paradigms and Research Methods. Academy of Management Research Methods Forum, 1999. 4.
[17]
Padayachee, K. An Interpretive Study of Software Risk Management Perspectives. in SAICSIT. 2002.
[18]
Margolis, J. and A. Fisher, Unlocking the Clubhouse: Women in Computing. 2002, Cambridge, MA: MIT Press.
[19]
Townsend, G.C., People who make a difference: Mentors and role models. inroads, SIGCSE Bulletin, 2002. 34(2): p. 57--61.
[20]
von Hellens, L., Nielsen, Sue H., Beekhuyzen, Jenine, An Exploration of Dualisms in Female Perceptions of IT Work. Journal of Information Technology Education, 2004. 3: p. 103--116.
[21]
Brocaglia, J., Executive Women's Forum. 2004.

Cited By

View all
  • (2012)Embracing intersectionality in gender and IT career choice researchProceedings of the 50th annual conference on Computers and People Research10.1145/2214091.2214141(199-212)Online publication date: 31-May-2012
  • (2009)Welcome to the ISA club! Strategies for recruiting and retaining women in ISA2009 Information Security Curriculum Development Conference10.1145/1940976.1940986(37-40)Online publication date: 25-Sep-2009
  • (2006)Contextual integrationProceedings of the 3rd annual conference on Information security curriculum development10.1145/1231047.1231054(30-40)Online publication date: 22-Sep-2006
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMIS CPR '05: Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research
April 2005
166 pages
ISBN:1595930116
DOI:10.1145/1055973
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 April 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IT career
  2. assurance
  3. diversity
  4. security
  5. women in IT

Qualifiers

  • Article

Conference

SIGMIS-CPR05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 300 of 480 submissions, 63%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2012)Embracing intersectionality in gender and IT career choice researchProceedings of the 50th annual conference on Computers and People Research10.1145/2214091.2214141(199-212)Online publication date: 31-May-2012
  • (2009)Welcome to the ISA club! Strategies for recruiting and retaining women in ISA2009 Information Security Curriculum Development Conference10.1145/1940976.1940986(37-40)Online publication date: 25-Sep-2009
  • (2006)Contextual integrationProceedings of the 3rd annual conference on Information security curriculum development10.1145/1231047.1231054(30-40)Online publication date: 22-Sep-2006
  • (2006)Cross-cultural influences on women in the IT workforceProceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future10.1145/1125170.1125178(12-19)Online publication date: 13-Apr-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media