ABSTRACT
This paper presents the work done by the ACM ITiCSE, 2013 Conference Working Group (WG) on Cybersecurity, Women and Minorities: How to Succeed in the Career! The ITiCSE 2013 conference was held July 1-3, 2013, in Canterbury, United Kingdom. The overall goal of the WG was to conduct a preliminary investigation into the reasons behind the lack of women and minorities within the field of Cybersecurity. This is not just an issue of academic or research interest, but is important in ensuring that a greater number of women and minorities progress through a full career in Cybersecurity. There are currently no statistics available on the numbers of women and minorities either currently enrolled in or graduated from these programs. There is a need to explore the full range of factors that influence women and minority's decisions not to consider a career in Cybersecurity.
- AAAS, Broadening Participation in Computing (BPC) Program,http://php.aaas.org/programs/centers/capacity/07_ Engagement/07_BPCProgram.php, August 6, 2013Google Scholar
- ACM-W Supporting, Celebrating, and Advocating Women in Computing., http://women.acm.org/regionalGoogle Scholar
- ACM-W Supporting, Celebrating, and Advocating Women in Computing http://women.acm.org/Google Scholar
- ACSA, Scholarship for Women, Retrieved October 14, 2013, from:, http://www.acsac.org/acsa/scholarship.htmlGoogle Scholar
- Advanced Technological Education Centers. Retrieved July 28, 2013 from ATE Centers: http://atecenters.org/#t-slidefourGoogle Scholar
- Agile Security Forum, Robert P. Abbott, http://www.agilesecurityforum.com/biosS/BioAbbottRobert.htm, August 6, 2013.Google Scholar
- Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. Women in cybersecurity: A study of career advancement. IT Professional Magazine, 12(1), 24--31. doi:http://dx.doi.org/10.1109/MITP.2010.39 Google ScholarDigital Library
- Bishop, M., Frincke, D.A., Information Assurance Education: A Work In Progress. Retrieved October 14, 2013, from:, http://dl.acm.org/citation.cfm?id=1477059.1477289 Google ScholarDigital Library
- Blum, L and Frieze, C. In a more balanced CS environment, similarity is the difference and CS is the winner, Computing Research News, 17(3). See: http://www.cra.org/CRN/articles/may05/blum.frieze.html.Google Scholar
- Brito, H., Reverse Engineering Challenge, https://www.mandiant.com/blog/interview-halvar-flakecarrie-jung-reverse-engineering-challenge-women/, August 6, 2013.Google Scholar
- Camp, T. The incredible shrinking pipeline, Communications of the ACM 40(10), pp.103--110. See: http://www.mines.edu/fs_home/tcamp/cacm/paper.html. Google ScholarDigital Library
- Chabrow, E. Information Security Analysts Jobless Rate: Zilch. Retrieved on 14 June, 2013 from Govinfo Security: http://www.govinfosecurity.com/information-securityanalysts-jobless-rate-zilch-a-3499Google Scholar
- CISSE, Colloquium for Information Security Education, http://www.cisse.info/, August 6, 2013.Google Scholar
- Comptia The IT Industry Association. Retrieved on July 28, 2013 from Comptia: http://www.comptia.org/membership/communities/women/aGoogle Scholar
- Cooper S.et al, Towards Information Assurance Curricular Guidelines, retrieved October 14, 2013 from http://dl.acm.org/citation.cfm?id=1971681.1971686Google Scholar
- Cooper S. et. al, An Exploration of the Current State of Information Assurance Education, retrieved October 14,2013 from: http://wit_programGoogle Scholar
- CRA-W2, Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W), 2013, Retrieved July 28, 2013: http://cra-w.org/about-craw/all-projectsGoogle Scholar
- CRA-W, Broadening Participation inComputing Research and Education Report of a Workshop October 20-21, 2004, http://archive.cra.org/Activities/workshops/broadening.participation/broadening.participation.pdf, 2004.Google Scholar
- CyberCorps: Scholarship for Service. Retrieved July 28, 2013 from CyberCorps: https://www.sfs.opm.govGoogle Scholar
- CyberPatriot Competition: Retrieved July 28, 2013 from CyberPatriot Competition: http://www.uscyberpatriot.org/CP5/Training.aspxGoogle Scholar
- CyberWatch, 2013 CyberWatch. (2013, May 1). Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http://www.edtechpolicy.org/cyberk12/c3workforcecareers.htmlGoogle Scholar
- Cyberwatch West. Pacific Rim Regional Cyberdefense Competition: Post Survey. Ontario, CA: Unpublished.Google Scholar
- Dampier, D., Kelly, K., & Carr, K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference, Starkville, MS.Google Scholar
- Dark, M. Defining a Curriculum Framework in Information Assurance and Security, Cerias Technical Report, 2002-68, Cerias, Purdue University, 2002.Google Scholar
- DEFCON, DEFCON Hacker Convention, Retrieved July 16, 2013, from http://www.defcon.org/, August 6, 2013.Google Scholar
- DOD, Department of Defense IA Portal, https://www.fbo.gov/?s=opportunity&mode=form&id=42f11e50f13b4a866f7a4b58f156a76b&tab=core&_cview=1, August 6, 2013.Google Scholar
- Finkle.J. and Randewich.N. Retrieved July 16, 2013, from Reuters,US. http://www.reuters.com/article/2012/06/13/usmedia-tech-summit-symantec-idUSBRE85B1E220120613Google Scholar
- Fisher, A., Margolis, J. and Miller, F. Undergraduate women in CS: experience, motivation and culture, SIGCSE'97 Proceedings of the twenty-eighth SIGCSE technical symposium on CS education, 1997. Google ScholarDigital Library
- Fung, B.You Call This an Army? The Terrifying Shortage of U.S Cyber warriors. Retrieved on July 22, 2013 from the National Journal: http://www.nationaljournal.com/tech/you-call-this-anarmy-the-terrifying-shortage-of-u-s-cyberwarriors-20130225Google Scholar
- GB, Can more women in IT bridge skills gap? Retrieved on July 21, 2013 from The Potsdam eGovernment Competence Center: http://www.ifg.cc/index.php?option=com_content&task=view&id=43911Google Scholar
- Global Women Leadership, Retrieved July 16, 2013, from http://www.globalwomenln.org/.Google Scholar
- Gosler, J. "Cyber warrior Shortage Threatens U.S. Security," Retrieved July 19,2012, from National Radio: http://www.npr.org/templates/story/story.php?storyId=128574055.Google Scholar
- Grace Hopper, Grace Hopper Celebration of Women in Computing, http://gracehopper.org/2013/, August 6, 2013Google Scholar
- Hamilton J.A, Owor R.S., Dajani K., Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=1565799.1565813Google Scholar
- Huffington Post United Kingdom, UK Lacking IT Experts to Prevent Attacks: Retrieved July 22, 2013 from: http://www.huffingtonpost.co.uk/2013/02/11/uk-lacking-itexperts-to-prevent-cyber-attacks_n_2663143.htmlGoogle Scholar
- IDC Survey, 2006 Retrieved from July 28, 2013 from ISC2: http://www.isc2.org/uploadedFiles/Industry_Resources/wfs_gov.pdfGoogle Scholar
- Infosecurity, (ISC)2 kicks off Women in Security mentoring program. Retrieved on June 20, 2013, from Infosecurity, UK. http://www.infosecurity magazine.com/view/33102/isc-kicks-off-women-insecurity-mentoring-program/Google Scholar
- Infragard, https://www.infragard.org/, August 6, 2013.Google Scholar
- ISC2 Foundation, Women in Security Scholarships, Retrieved on October 29, 2013 from: https://www.isc2cares.org/scholarships/womensscholarship/Google Scholar
- ISSA, http://www.issa.org/, August 6, 2013.Google Scholar
- Kiesler, S., Zubrow, D., & Moses, A. M. Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion.Human- Computer Interaction, 1, 77--104 Google ScholarDigital Library
- Lance C., et al Information assurance education in two- and four-year institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=2078856.2078860Google Scholar
- LPFI, Level Playing Field Institute, Dissecting the Data 2012: Examining STEM Opportunities and Outcomes for Underrepresented Students in California http://www.lpfi.org/sites/default/files/dissecting_the_data_2012_final.pdfGoogle Scholar
- Lewis, J.J. "Ada Lovelace, Mathematician, Computer Pioneer," Retrieved July 28, 2013 from About.com: http://womenshistory.about.com/cs/sciencemath1/a/bio_lovelace.htmGoogle Scholar
- Maisel, M. "Meet Grace Hopper," Retrieved July 28, 2013 from About.com: http://gracehopper.org/2009/about/about-grace-hopper/Google Scholar
- Maller, T. Half the Homeland -- Mobilizing Women for Cybersecurity. Retrieved on July 25 from Blogs of War. http://blogsofwar.com/2013/05/28/tara-maller-half-thehomeland-mobilizing-women-for-cybersecurity/Google Scholar
- Margolis, J. Stuck in the Shallow End: Education, Race, and Computing. The MIT Press. (2008) Google ScholarDigital Library
- Margolis & Fisher Jane Margolis, Allan Fischer, Unlocking the Clubhouse: Women in Computing, MIT Press, 2003.Google Scholar
- Milgram, D. The CalWomenTech Project: Using Surveys to Inform Retention Strategies of Female Technology Students. Conference Proceedings of 2010 NAMEPA/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5). Austin: Women in Engineering ProActive Network (WEPAN).Google Scholar
- Michie, S. & Nelson, D. L. (2006). Barriers women face in information technology careers: Self-efficacy, passion and gender biases. Women in Management Review, 21(1),10--27.Google ScholarCross Ref
- NCWIT, National Center for Women and Information Technology, http://www.ncwit.org/, August 6, 2013.Google Scholar
- National Collegiate Cyber Defense Competition, Retrieved on July 28, 2013 from National CCDE: http://www.nationalccdc.org/.Google Scholar
- National Cyberleague, (2013, May). About Us: The National Cyberleague. Retrieved on July 29, 2013 from National Cyber League (NCL): http://www.nationalcyberleague.org/about.shtmlGoogle Scholar
- NICCS, National Initiative for Cybersecurity Careers and Studies. Retrieved on July 28, 2013 from NICCS: http://niccs.us-cert.gov/Google Scholar
- NSF1, National Scienhttp://www.nsf.gov/awardsearch/showAward?AWD_ ID=1241541&HistoricalAwards=falsece Foundation. (2012, August). Award Abstract #1241541 . Retrieved from Awards:Google Scholar
- NSF2, National Science Foundation, Statistics http://www.nsf.gov/statistics/nsf08321/pdf/tab28.pdfGoogle Scholar
- NSF3, National Science Foundation: Retrieved on July 28, 2013 from US National Science Foundation: http://www.nsf.gov/statistics/seind06/toc.htmGoogle Scholar
- NSF4, National Science Foundation. (2012, October). CyberCorps: Scholarship for Service (SFS). Retrieved from Program Announcements & Information nsf12585:http://www.nsf.gov/pubs/2012/nsf12585/nsf12585.htmGoogle Scholar
- NSA, Centers for Academic Excellence, http://www.nsa.gov/ia/academic_outreach/nat_cae/, August 6, 2013.Google Scholar
- NCES-1, National Center for Education Statistics, http://nces.ed.gov/fastfacts/display.asp?id=72Google Scholar
- Online Educa Berlin, Interview with Baroness Neville-Jones, http://www.onlineeduca.com/OEB_Newsportal/cyber-security/, August 6, 2013.Google Scholar
- Personal communication with Working Group member, Dr. Claude Turner, BSU Faculty, July 3, 2013.Google Scholar
- Paruchuri, V. Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May 2013), 17--23. Google ScholarDigital Library
- Security Watch, Security Certification List, http://bhconsulting.ie/securitywatch/?p=104, August 6, 2013.Google Scholar
- Suby, M. The 2013 (ISC)2 Global Information Security Workforce Study, Frost and Sullivan Market Survey, February 2013.Google Scholar
- Taulbee, Computing Research Association 2013 Taulbee Report http://cra.org/govaffairs/blog/2013/03/taulbeereport/Google Scholar
- U.S. Department of Homeland Security. Retrieved on July 28, 2013 from U.S. Department of Homeland Security: http://www.dhs.gov/interweb/assetlibrary/National_Cyberspace_Strategy.pdfGoogle Scholar
- University of Maryland, Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on October 28, 2013 from:http://cyber.umd.edu/education/reuGoogle Scholar
- Warwick, A. Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on July 23, 2013 from: http://www.computerweekly.com/news/2240178584/RSA-2013-Cyber-security-skills-shortage-needs-urgentattention-says-DoHS, February 26,2013.Google Scholar
- Ware, W. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security, Rand Report R609-1, The RAND Corporation, Santa Monica, CA (Feb. 1970)Google Scholar
- Whatcom Community College. Whatcom Community College receives 500K grant for cyber-security. Retrieved July 28, 2013 from The Bellingham Business Journal: http://bbjtoday.com/blog/whatcom-community-collegereceives-500k-grant-forcybersecurity/18103#.Uc88wfm1GSoGoogle Scholar
- Whatcom Community College. Cyber Camps Year 1 Evaluation Report. Bellingham: Unpublished. 2012Google Scholar
- Women In Cybersecurity. Women in Cyberscurity Conference. Retrieved October 28, 2013 from: http://www.csc.tntech.edu/wicys/Google Scholar
- Witi, Women in Technology, Retrieved July 28, 2013 from: http://www.witi.com/Google Scholar
- WSCJ, Womens Society of Cyberjutsu,Retrieved July 28, 2013 from: http://womenscyberjutsu.com/Google Scholar
- Zakaria, T. Cybersecurity mainly male domain, geek image deters girls Retrieved July 28, 2013 from: Reuters Canada: http://ca.reuters.com/article/idCATRE79Q5SX20111027Google Scholar
Index Terms
- Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation
Recommendations
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway
EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity ConferenceThe proportion of women in information technology (IT) work is low, however, the growing field of cybersecurity attracts even fewer women. This paper reports from a study exploring what motivates women to enter IT in general and cybersecurity in ...
Game based Cybersecurity Training for High School Students
SIGCSE '18: Proceedings of the 49th ACM Technical Symposium on Computer Science EducationCybersecurity is critical to the national infrastructure, federal and local government, military, industry, and personal privacy. To defend the U.S. against the cyber threats, a significant demand for skilled cybersecurity workforce is predicted in ...
Black Women Speak: Examining Power, Privilege, and Identity in CS Education
Despite the increasing number of women receiving bachelor’s degrees in computing (i.e., Computer Science, Computer Engineering, Information Technology, etc.), a closer look reveals that the percentage of Black women in computing has significantly dropped ...
Comments