skip to main content
10.1145/2543882.2543883acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation

Published: 29 June 2013 Publication History

Abstract

This paper presents the work done by the ACM ITiCSE, 2013 Conference Working Group (WG) on Cybersecurity, Women and Minorities: How to Succeed in the Career! The ITiCSE 2013 conference was held July 1-3, 2013, in Canterbury, United Kingdom. The overall goal of the WG was to conduct a preliminary investigation into the reasons behind the lack of women and minorities within the field of Cybersecurity. This is not just an issue of academic or research interest, but is important in ensuring that a greater number of women and minorities progress through a full career in Cybersecurity. There are currently no statistics available on the numbers of women and minorities either currently enrolled in or graduated from these programs. There is a need to explore the full range of factors that influence women and minority's decisions not to consider a career in Cybersecurity.

References

[1]
AAAS, Broadening Participation in Computing (BPC) Program,http://php.aaas.org/programs/centers/capacity/07_ Engagement/07_BPCProgram.php, August 6, 2013
[2]
ACM-W Supporting, Celebrating, and Advocating Women in Computing., http://women.acm.org/regional
[3]
ACM-W Supporting, Celebrating, and Advocating Women in Computing http://women.acm.org/
[4]
ACSA, Scholarship for Women, Retrieved October 14, 2013, from:, http://www.acsac.org/acsa/scholarship.html
[5]
Advanced Technological Education Centers. Retrieved July 28, 2013 from ATE Centers: http://atecenters.org/#t-slidefour
[6]
Agile Security Forum, Robert P. Abbott, http://www.agilesecurityforum.com/biosS/BioAbbottRobert.htm, August 6, 2013.
[7]
Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. Women in cybersecurity: A study of career advancement. IT Professional Magazine, 12(1), 24--31.
[8]
Bishop, M., Frincke, D.A., Information Assurance Education: A Work In Progress. Retrieved October 14, 2013, from:, http://dl.acm.org/citation.cfm?id=1477059.1477289
[9]
Blum, L and Frieze, C. In a more balanced CS environment, similarity is the difference and CS is the winner, Computing Research News, 17(3). See: http://www.cra.org/CRN/articles/may05/blum.frieze.html.
[10]
Brito, H., Reverse Engineering Challenge, https://www.mandiant.com/blog/interview-halvar-flakecarrie-jung-reverse-engineering-challenge-women/, August 6, 2013.
[11]
Camp, T. The incredible shrinking pipeline, Communications of the ACM 40(10), pp.103--110. See: http://www.mines.edu/fs_home/tcamp/cacm/paper.html.
[12]
Chabrow, E. Information Security Analysts Jobless Rate: Zilch. Retrieved on 14 June, 2013 from Govinfo Security: http://www.govinfosecurity.com/information-securityanalysts-jobless-rate-zilch-a-3499
[13]
CISSE, Colloquium for Information Security Education, http://www.cisse.info/, August 6, 2013.
[14]
Comptia The IT Industry Association. Retrieved on July 28, 2013 from Comptia: http://www.comptia.org/membership/communities/women/a
[15]
Cooper S.et al, Towards Information Assurance Curricular Guidelines, retrieved October 14, 2013 from http://dl.acm.org/citation.cfm?id=1971681.1971686
[16]
Cooper S. et. al, An Exploration of the Current State of Information Assurance Education, retrieved October 14,2013 from: http://wit_program
[17]
CRA-W2, Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W), 2013, Retrieved July 28, 2013: http://cra-w.org/about-craw/all-projects
[18]
CRA-W, Broadening Participation inComputing Research and Education Report of a Workshop October 20-21, 2004, http://archive.cra.org/Activities/workshops/broadening.participation/broadening.participation.pdf, 2004.
[19]
CyberCorps: Scholarship for Service. Retrieved July 28, 2013 from CyberCorps: https://www.sfs.opm.gov
[20]
CyberPatriot Competition: Retrieved July 28, 2013 from CyberPatriot Competition: http://www.uscyberpatriot.org/CP5/Training.aspx
[21]
CyberWatch, 2013 CyberWatch. (2013, May 1). Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http://www.edtechpolicy.org/cyberk12/c3workforcecareers.html
[22]
Cyberwatch West. Pacific Rim Regional Cyberdefense Competition: Post Survey. Ontario, CA: Unpublished.
[23]
Dampier, D., Kelly, K., & Carr, K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference, Starkville, MS.
[24]
Dark, M. Defining a Curriculum Framework in Information Assurance and Security, Cerias Technical Report, 2002-68, Cerias, Purdue University, 2002.
[25]
DEFCON, DEFCON Hacker Convention, Retrieved July 16, 2013, from http://www.defcon.org/, August 6, 2013.
[26]
DOD, Department of Defense IA Portal, https://www.fbo.gov/?s=opportunity&mode=form&id=42f11e50f13b4a866f7a4b58f156a76b&tab=core&_cview=1, August 6, 2013.
[27]
Finkle.J. and Randewich.N. Retrieved July 16, 2013, from Reuters,US. http://www.reuters.com/article/2012/06/13/usmedia-tech-summit-symantec-idUSBRE85B1E220120613
[28]
Fisher, A., Margolis, J. and Miller, F. Undergraduate women in CS: experience, motivation and culture, SIGCSE'97 Proceedings of the twenty-eighth SIGCSE technical symposium on CS education, 1997.
[29]
Fung, B.You Call This an Army? The Terrifying Shortage of U.S Cyber warriors. Retrieved on July 22, 2013 from the National Journal: http://www.nationaljournal.com/tech/you-call-this-anarmy-the-terrifying-shortage-of-u-s-cyberwarriors-20130225
[30]
GB, Can more women in IT bridge skills gap? Retrieved on July 21, 2013 from The Potsdam eGovernment Competence Center: http://www.ifg.cc/index.php?option=com_content&task=view&id=43911
[31]
Global Women Leadership, Retrieved July 16, 2013, from http://www.globalwomenln.org/.
[32]
Gosler, J. "Cyber warrior Shortage Threatens U.S. Security," Retrieved July 19,2012, from National Radio: http://www.npr.org/templates/story/story.php?storyId=128574055.
[33]
Grace Hopper, Grace Hopper Celebration of Women in Computing, http://gracehopper.org/2013/, August 6, 2013
[34]
Hamilton J.A, Owor R.S., Dajani K., Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=1565799.1565813
[35]
Huffington Post United Kingdom, UK Lacking IT Experts to Prevent Attacks: Retrieved July 22, 2013 from: http://www.huffingtonpost.co.uk/2013/02/11/uk-lacking-itexperts-to-prevent-cyber-attacks_n_2663143.html
[36]
IDC Survey, 2006 Retrieved from July 28, 2013 from ISC2: http://www.isc2.org/uploadedFiles/Industry_Resources/wfs_gov.pdf
[37]
Infosecurity, (ISC)2 kicks off Women in Security mentoring program. Retrieved on June 20, 2013, from Infosecurity, UK. http://www.infosecurity magazine.com/view/33102/isc-kicks-off-women-insecurity-mentoring-program/
[38]
Infragard, https://www.infragard.org/, August 6, 2013.
[39]
ISC2 Foundation, Women in Security Scholarships, Retrieved on October 29, 2013 from: https://www.isc2cares.org/scholarships/womensscholarship/
[40]
ISSA, http://www.issa.org/, August 6, 2013.
[41]
Kiesler, S., Zubrow, D., & Moses, A. M. Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion.Human- Computer Interaction, 1, 77--104
[42]
Lance C., et al Information assurance education in two- and four-year institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=2078856.2078860
[43]
LPFI, Level Playing Field Institute, Dissecting the Data 2012: Examining STEM Opportunities and Outcomes for Underrepresented Students in California http://www.lpfi.org/sites/default/files/dissecting_the_data_2012_final.pdf
[44]
Lewis, J.J. "Ada Lovelace, Mathematician, Computer Pioneer," Retrieved July 28, 2013 from About.com: http://womenshistory.about.com/cs/sciencemath1/a/bio_lovelace.htm
[45]
Maisel, M. "Meet Grace Hopper," Retrieved July 28, 2013 from About.com: http://gracehopper.org/2009/about/about-grace-hopper/
[46]
Maller, T. Half the Homeland -- Mobilizing Women for Cybersecurity. Retrieved on July 25 from Blogs of War. http://blogsofwar.com/2013/05/28/tara-maller-half-thehomeland-mobilizing-women-for-cybersecurity/
[47]
Margolis, J. Stuck in the Shallow End: Education, Race, and Computing. The MIT Press. (2008)
[48]
Margolis & Fisher Jane Margolis, Allan Fischer, Unlocking the Clubhouse: Women in Computing, MIT Press, 2003.
[49]
Milgram, D. The CalWomenTech Project: Using Surveys to Inform Retention Strategies of Female Technology Students. Conference Proceedings of 2010 NAMEPA/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5). Austin: Women in Engineering ProActive Network (WEPAN).
[50]
Michie, S. & Nelson, D. L. (2006). Barriers women face in information technology careers: Self-efficacy, passion and gender biases. Women in Management Review, 21(1),10--27.
[51]
NCWIT, National Center for Women and Information Technology, http://www.ncwit.org/, August 6, 2013.
[52]
National Collegiate Cyber Defense Competition, Retrieved on July 28, 2013 from National CCDE: http://www.nationalccdc.org/.
[53]
National Cyberleague, (2013, May). About Us: The National Cyberleague. Retrieved on July 29, 2013 from National Cyber League (NCL): http://www.nationalcyberleague.org/about.shtml
[54]
NICCS, National Initiative for Cybersecurity Careers and Studies. Retrieved on July 28, 2013 from NICCS: http://niccs.us-cert.gov/
[55]
NSF1, National Scienhttp://www.nsf.gov/awardsearch/showAward?AWD_ ID=1241541&HistoricalAwards=falsece Foundation. (2012, August). Award Abstract #1241541 . Retrieved from Awards:
[56]
NSF2, National Science Foundation, Statistics http://www.nsf.gov/statistics/nsf08321/pdf/tab28.pdf
[57]
NSF3, National Science Foundation: Retrieved on July 28, 2013 from US National Science Foundation: http://www.nsf.gov/statistics/seind06/toc.htm
[58]
NSF4, National Science Foundation. (2012, October). CyberCorps: Scholarship for Service (SFS). Retrieved from Program Announcements & Information nsf12585:http://www.nsf.gov/pubs/2012/nsf12585/nsf12585.htm
[59]
NSA, Centers for Academic Excellence, http://www.nsa.gov/ia/academic_outreach/nat_cae/, August 6, 2013.
[60]
NCES-1, National Center for Education Statistics, http://nces.ed.gov/fastfacts/display.asp?id=72
[61]
Online Educa Berlin, Interview with Baroness Neville-Jones, http://www.onlineeduca.com/OEB_Newsportal/cyber-security/, August 6, 2013.
[62]
Personal communication with Working Group member, Dr. Claude Turner, BSU Faculty, July 3, 2013.
[63]
Paruchuri, V. Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May 2013), 17--23.
[64]
Security Watch, Security Certification List, http://bhconsulting.ie/securitywatch/?p=104, August 6, 2013.
[65]
Suby, M. The 2013 (ISC)2 Global Information Security Workforce Study, Frost and Sullivan Market Survey, February 2013.
[66]
Taulbee, Computing Research Association 2013 Taulbee Report http://cra.org/govaffairs/blog/2013/03/taulbeereport/
[67]
U.S. Department of Homeland Security. Retrieved on July 28, 2013 from U.S. Department of Homeland Security: http://www.dhs.gov/interweb/assetlibrary/National_Cyberspace_Strategy.pdf
[68]
University of Maryland, Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on October 28, 2013 from:http://cyber.umd.edu/education/reu
[69]
Warwick, A. Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on July 23, 2013 from: http://www.computerweekly.com/news/2240178584/RSA-2013-Cyber-security-skills-shortage-needs-urgentattention-says-DoHS, February 26,2013.
[70]
Ware, W. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security, Rand Report R609-1, The RAND Corporation, Santa Monica, CA (Feb. 1970)
[71]
Whatcom Community College. Whatcom Community College receives 500K grant for cyber-security. Retrieved July 28, 2013 from The Bellingham Business Journal: http://bbjtoday.com/blog/whatcom-community-collegereceives-500k-grant-forcybersecurity/18103#.Uc88wfm1GSo
[72]
Whatcom Community College. Cyber Camps Year 1 Evaluation Report. Bellingham: Unpublished. 2012
[73]
Women In Cybersecurity. Women in Cyberscurity Conference. Retrieved October 28, 2013 from: http://www.csc.tntech.edu/wicys/
[74]
Witi, Women in Technology, Retrieved July 28, 2013 from: http://www.witi.com/
[75]
WSCJ, Womens Society of Cyberjutsu,Retrieved July 28, 2013 from: http://womenscyberjutsu.com/
[76]
Zakaria, T. Cybersecurity mainly male domain, geek image deters girls Retrieved July 28, 2013 from: Reuters Canada: http://ca.reuters.com/article/idCATRE79Q5SX20111027

Cited By

View all
  • (2025)Improving the Representation of Undergraduate Women in Cybersecurity: A Literature ReviewProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701811(1043-1049)Online publication date: 12-Feb-2025
  • (2024)Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity WorkforceInternational Journal of Human–Computer Interaction10.1080/10447318.2024.231434941:2(1364-1380)Online publication date: 20-Feb-2024
  • (2023)Unequal Culture of Women and Minorities in Cybersecurity DomainBritish Journal of Computer, Networking and Information Technology10.52589/BJCNIT-Q1MZPVWZ6:1(11-19)Online publication date: 5-Sep-2023
  • Show More Cited By

Index Terms

  1. Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ITiCSE -WGR '13: Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports
      June 2013
      80 pages
      ISBN:9781450326650
      DOI:10.1145/2543882
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 29 June 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. CS education
      2. computer security education
      3. cybersecurity
      4. women and minorities

      Qualifiers

      • Research-article

      Conference

      ITiCSE '13
      Sponsor:
      ITiCSE '13: Innovation and Technology in Computer Science Education conference 2013
      June 29 - July 3, 2013
      England, Canterbury, United Kingdom

      Acceptance Rates

      ITiCSE -WGR '13 Paper Acceptance Rate 4 of 4 submissions, 100%;
      Overall Acceptance Rate 552 of 1,613 submissions, 34%

      Upcoming Conference

      ITiCSE '25
      Innovation and Technology in Computer Science Education
      June 27 - July 2, 2025
      Nijmegen , Netherlands

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)90
      • Downloads (Last 6 weeks)12
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Improving the Representation of Undergraduate Women in Cybersecurity: A Literature ReviewProceedings of the 56th ACM Technical Symposium on Computer Science Education V. 110.1145/3641554.3701811(1043-1049)Online publication date: 12-Feb-2025
      • (2024)Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity WorkforceInternational Journal of Human–Computer Interaction10.1080/10447318.2024.231434941:2(1364-1380)Online publication date: 20-Feb-2024
      • (2023)Unequal Culture of Women and Minorities in Cybersecurity DomainBritish Journal of Computer, Networking and Information Technology10.52589/BJCNIT-Q1MZPVWZ6:1(11-19)Online publication date: 5-Sep-2023
      • (2023)Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job DynamicsJournal of Applied Security Research10.1080/19361610.2023.2277513(1-23)Online publication date: 20-Nov-2023
      • (2023)Protection, expertise and domination: cyber masculinity in practiceComputers & Security10.1016/j.cose.2023.103408(103408)Online publication date: Aug-2023
      • (2022)Online Calling Cards and Professional Profiles in Cybersecurity From Social MediaResearch Anthology on Advancements in Cybersecurity Education10.4018/978-1-6684-3554-0.ch008(157-195)Online publication date: 2022
      • (2022)Using a comic book to engage students in a cryptology and cybersecurity curriculumJournal of Research on Technology in Education10.1080/15391523.2022.215072656:4(373-391)Online publication date: 6-Dec-2022
      • (2021)Cybersecurity Advocates: Force Multipliers in Security Behavior ChangeIEEE Security & Privacy10.1109/MSEC.2021.307740519:4(54-59)Online publication date: Jul-2021
      • (2021)Increasing Cybersecurity Career Interest through Playable Case StudiesTechTrends10.1007/s11528-021-00585-w65:4(496-510)Online publication date: 8-Feb-2021
      • (2020)Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital GamesSimulation & Gaming10.1177/1046878120933312(104687812093331)Online publication date: 19-Jun-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media