skip to main content
10.1145/2543882.2543883acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation

Published:29 June 2013Publication History

ABSTRACT

This paper presents the work done by the ACM ITiCSE, 2013 Conference Working Group (WG) on Cybersecurity, Women and Minorities: How to Succeed in the Career! The ITiCSE 2013 conference was held July 1-3, 2013, in Canterbury, United Kingdom. The overall goal of the WG was to conduct a preliminary investigation into the reasons behind the lack of women and minorities within the field of Cybersecurity. This is not just an issue of academic or research interest, but is important in ensuring that a greater number of women and minorities progress through a full career in Cybersecurity. There are currently no statistics available on the numbers of women and minorities either currently enrolled in or graduated from these programs. There is a need to explore the full range of factors that influence women and minority's decisions not to consider a career in Cybersecurity.

References

  1. AAAS, Broadening Participation in Computing (BPC) Program,http://php.aaas.org/programs/centers/capacity/07_ Engagement/07_BPCProgram.php, August 6, 2013Google ScholarGoogle Scholar
  2. ACM-W Supporting, Celebrating, and Advocating Women in Computing., http://women.acm.org/regionalGoogle ScholarGoogle Scholar
  3. ACM-W Supporting, Celebrating, and Advocating Women in Computing http://women.acm.org/Google ScholarGoogle Scholar
  4. ACSA, Scholarship for Women, Retrieved October 14, 2013, from:, http://www.acsac.org/acsa/scholarship.htmlGoogle ScholarGoogle Scholar
  5. Advanced Technological Education Centers. Retrieved July 28, 2013 from ATE Centers: http://atecenters.org/#t-slidefourGoogle ScholarGoogle Scholar
  6. Agile Security Forum, Robert P. Abbott, http://www.agilesecurityforum.com/biosS/BioAbbottRobert.htm, August 6, 2013.Google ScholarGoogle Scholar
  7. Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. Women in cybersecurity: A study of career advancement. IT Professional Magazine, 12(1), 24--31. doi:http://dx.doi.org/10.1109/MITP.2010.39 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bishop, M., Frincke, D.A., Information Assurance Education: A Work In Progress. Retrieved October 14, 2013, from:, http://dl.acm.org/citation.cfm?id=1477059.1477289 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Blum, L and Frieze, C. In a more balanced CS environment, similarity is the difference and CS is the winner, Computing Research News, 17(3). See: http://www.cra.org/CRN/articles/may05/blum.frieze.html.Google ScholarGoogle Scholar
  10. Brito, H., Reverse Engineering Challenge, https://www.mandiant.com/blog/interview-halvar-flakecarrie-jung-reverse-engineering-challenge-women/, August 6, 2013.Google ScholarGoogle Scholar
  11. Camp, T. The incredible shrinking pipeline, Communications of the ACM 40(10), pp.103--110. See: http://www.mines.edu/fs_home/tcamp/cacm/paper.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Chabrow, E. Information Security Analysts Jobless Rate: Zilch. Retrieved on 14 June, 2013 from Govinfo Security: http://www.govinfosecurity.com/information-securityanalysts-jobless-rate-zilch-a-3499Google ScholarGoogle Scholar
  13. CISSE, Colloquium for Information Security Education, http://www.cisse.info/, August 6, 2013.Google ScholarGoogle Scholar
  14. Comptia The IT Industry Association. Retrieved on July 28, 2013 from Comptia: http://www.comptia.org/membership/communities/women/aGoogle ScholarGoogle Scholar
  15. Cooper S.et al, Towards Information Assurance Curricular Guidelines, retrieved October 14, 2013 from http://dl.acm.org/citation.cfm?id=1971681.1971686Google ScholarGoogle Scholar
  16. Cooper S. et. al, An Exploration of the Current State of Information Assurance Education, retrieved October 14,2013 from: http://wit_programGoogle ScholarGoogle Scholar
  17. CRA-W2, Computer Research Association's Committee on the Status of Women in Computing Research (CRA-W), 2013, Retrieved July 28, 2013: http://cra-w.org/about-craw/all-projectsGoogle ScholarGoogle Scholar
  18. CRA-W, Broadening Participation inComputing Research and Education Report of a Workshop October 20-21, 2004, http://archive.cra.org/Activities/workshops/broadening.participation/broadening.participation.pdf, 2004.Google ScholarGoogle Scholar
  19. CyberCorps: Scholarship for Service. Retrieved July 28, 2013 from CyberCorps: https://www.sfs.opm.govGoogle ScholarGoogle Scholar
  20. CyberPatriot Competition: Retrieved July 28, 2013 from CyberPatriot Competition: http://www.uscyberpatriot.org/CP5/Training.aspxGoogle ScholarGoogle Scholar
  21. CyberWatch, 2013 CyberWatch. (2013, May 1). Cool Careers in CyberSecurity Workshops . Retrieved from CyberWatch: http://www.edtechpolicy.org/cyberk12/c3workforcecareers.htmlGoogle ScholarGoogle Scholar
  22. Cyberwatch West. Pacific Rim Regional Cyberdefense Competition: Post Survey. Ontario, CA: Unpublished.Google ScholarGoogle Scholar
  23. Dampier, D., Kelly, K., & Carr, K. Increasing Participation of Women in Cyber Security. ASEE-SE Regional Conference, Starkville, MS.Google ScholarGoogle Scholar
  24. Dark, M. Defining a Curriculum Framework in Information Assurance and Security, Cerias Technical Report, 2002-68, Cerias, Purdue University, 2002.Google ScholarGoogle Scholar
  25. DEFCON, DEFCON Hacker Convention, Retrieved July 16, 2013, from http://www.defcon.org/, August 6, 2013.Google ScholarGoogle Scholar
  26. DOD, Department of Defense IA Portal, https://www.fbo.gov/?s=opportunity&mode=form&id=42f11e50f13b4a866f7a4b58f156a76b&tab=core&_cview=1, August 6, 2013.Google ScholarGoogle Scholar
  27. Finkle.J. and Randewich.N. Retrieved July 16, 2013, from Reuters,US. http://www.reuters.com/article/2012/06/13/usmedia-tech-summit-symantec-idUSBRE85B1E220120613Google ScholarGoogle Scholar
  28. Fisher, A., Margolis, J. and Miller, F. Undergraduate women in CS: experience, motivation and culture, SIGCSE'97 Proceedings of the twenty-eighth SIGCSE technical symposium on CS education, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Fung, B.You Call This an Army? The Terrifying Shortage of U.S Cyber warriors. Retrieved on July 22, 2013 from the National Journal: http://www.nationaljournal.com/tech/you-call-this-anarmy-the-terrifying-shortage-of-u-s-cyberwarriors-20130225Google ScholarGoogle Scholar
  30. GB, Can more women in IT bridge skills gap? Retrieved on July 21, 2013 from The Potsdam eGovernment Competence Center: http://www.ifg.cc/index.php?option=com_content&task=view&id=43911Google ScholarGoogle Scholar
  31. Global Women Leadership, Retrieved July 16, 2013, from http://www.globalwomenln.org/.Google ScholarGoogle Scholar
  32. Gosler, J. "Cyber warrior Shortage Threatens U.S. Security," Retrieved July 19,2012, from National Radio: http://www.npr.org/templates/story/story.php?storyId=128574055.Google ScholarGoogle Scholar
  33. Grace Hopper, Grace Hopper Celebration of Women in Computing, http://gracehopper.org/2013/, August 6, 2013Google ScholarGoogle Scholar
  34. Hamilton J.A, Owor R.S., Dajani K., Building Information Assurance Education Partnerships with Minority Institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=1565799.1565813Google ScholarGoogle Scholar
  35. Huffington Post United Kingdom, UK Lacking IT Experts to Prevent Attacks: Retrieved July 22, 2013 from: http://www.huffingtonpost.co.uk/2013/02/11/uk-lacking-itexperts-to-prevent-cyber-attacks_n_2663143.htmlGoogle ScholarGoogle Scholar
  36. IDC Survey, 2006 Retrieved from July 28, 2013 from ISC2: http://www.isc2.org/uploadedFiles/Industry_Resources/wfs_gov.pdfGoogle ScholarGoogle Scholar
  37. Infosecurity, (ISC)2 kicks off Women in Security mentoring program. Retrieved on June 20, 2013, from Infosecurity, UK. http://www.infosecurity magazine.com/view/33102/isc-kicks-off-women-insecurity-mentoring-program/Google ScholarGoogle Scholar
  38. Infragard, https://www.infragard.org/, August 6, 2013.Google ScholarGoogle Scholar
  39. ISC2 Foundation, Women in Security Scholarships, Retrieved on October 29, 2013 from: https://www.isc2cares.org/scholarships/womensscholarship/Google ScholarGoogle Scholar
  40. ISSA, http://www.issa.org/, August 6, 2013.Google ScholarGoogle Scholar
  41. Kiesler, S., Zubrow, D., & Moses, A. M. Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion.Human- Computer Interaction, 1, 77--104 Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lance C., et al Information assurance education in two- and four-year institutions. Retrieved on October 14, 2013 from: http://dl.acm.org/citation.cfm?id=2078856.2078860Google ScholarGoogle Scholar
  43. LPFI, Level Playing Field Institute, Dissecting the Data 2012: Examining STEM Opportunities and Outcomes for Underrepresented Students in California http://www.lpfi.org/sites/default/files/dissecting_the_data_2012_final.pdfGoogle ScholarGoogle Scholar
  44. Lewis, J.J. "Ada Lovelace, Mathematician, Computer Pioneer," Retrieved July 28, 2013 from About.com: http://womenshistory.about.com/cs/sciencemath1/a/bio_lovelace.htmGoogle ScholarGoogle Scholar
  45. Maisel, M. "Meet Grace Hopper," Retrieved July 28, 2013 from About.com: http://gracehopper.org/2009/about/about-grace-hopper/Google ScholarGoogle Scholar
  46. Maller, T. Half the Homeland -- Mobilizing Women for Cybersecurity. Retrieved on July 25 from Blogs of War. http://blogsofwar.com/2013/05/28/tara-maller-half-thehomeland-mobilizing-women-for-cybersecurity/Google ScholarGoogle Scholar
  47. Margolis, J. Stuck in the Shallow End: Education, Race, and Computing. The MIT Press. (2008) Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Margolis & Fisher Jane Margolis, Allan Fischer, Unlocking the Clubhouse: Women in Computing, MIT Press, 2003.Google ScholarGoogle Scholar
  49. Milgram, D. The CalWomenTech Project: Using Surveys to Inform Retention Strategies of Female Technology Students. Conference Proceedings of 2010 NAMEPA/WEPAN 4th Joint Conference Setting Sail for the Future: Leveraging Diversity for a Stronger Crew. (pp. 1--5). Austin: Women in Engineering ProActive Network (WEPAN).Google ScholarGoogle Scholar
  50. Michie, S. & Nelson, D. L. (2006). Barriers women face in information technology careers: Self-efficacy, passion and gender biases. Women in Management Review, 21(1),10--27.Google ScholarGoogle ScholarCross RefCross Ref
  51. NCWIT, National Center for Women and Information Technology, http://www.ncwit.org/, August 6, 2013.Google ScholarGoogle Scholar
  52. National Collegiate Cyber Defense Competition, Retrieved on July 28, 2013 from National CCDE: http://www.nationalccdc.org/.Google ScholarGoogle Scholar
  53. National Cyberleague, (2013, May). About Us: The National Cyberleague. Retrieved on July 29, 2013 from National Cyber League (NCL): http://www.nationalcyberleague.org/about.shtmlGoogle ScholarGoogle Scholar
  54. NICCS, National Initiative for Cybersecurity Careers and Studies. Retrieved on July 28, 2013 from NICCS: http://niccs.us-cert.gov/Google ScholarGoogle Scholar
  55. NSF1, National Scienhttp://www.nsf.gov/awardsearch/showAward?AWD_ ID=1241541&HistoricalAwards=falsece Foundation. (2012, August). Award Abstract #1241541 . Retrieved from Awards:Google ScholarGoogle Scholar
  56. NSF2, National Science Foundation, Statistics http://www.nsf.gov/statistics/nsf08321/pdf/tab28.pdfGoogle ScholarGoogle Scholar
  57. NSF3, National Science Foundation: Retrieved on July 28, 2013 from US National Science Foundation: http://www.nsf.gov/statistics/seind06/toc.htmGoogle ScholarGoogle Scholar
  58. NSF4, National Science Foundation. (2012, October). CyberCorps: Scholarship for Service (SFS). Retrieved from Program Announcements & Information nsf12585:http://www.nsf.gov/pubs/2012/nsf12585/nsf12585.htmGoogle ScholarGoogle Scholar
  59. NSA, Centers for Academic Excellence, http://www.nsa.gov/ia/academic_outreach/nat_cae/, August 6, 2013.Google ScholarGoogle Scholar
  60. NCES-1, National Center for Education Statistics, http://nces.ed.gov/fastfacts/display.asp?id=72Google ScholarGoogle Scholar
  61. Online Educa Berlin, Interview with Baroness Neville-Jones, http://www.onlineeduca.com/OEB_Newsportal/cyber-security/, August 6, 2013.Google ScholarGoogle Scholar
  62. Personal communication with Working Group member, Dr. Claude Turner, BSU Faculty, July 3, 2013.Google ScholarGoogle Scholar
  63. Paruchuri, V. Enhancing CS awareness among K-12 students in central Arkansas. J. Comput. Sci. Coll. 28, 5 (May 2013), 17--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Security Watch, Security Certification List, http://bhconsulting.ie/securitywatch/?p=104, August 6, 2013.Google ScholarGoogle Scholar
  65. Suby, M. The 2013 (ISC)2 Global Information Security Workforce Study, Frost and Sullivan Market Survey, February 2013.Google ScholarGoogle Scholar
  66. Taulbee, Computing Research Association 2013 Taulbee Report http://cra.org/govaffairs/blog/2013/03/taulbeereport/Google ScholarGoogle Scholar
  67. U.S. Department of Homeland Security. Retrieved on July 28, 2013 from U.S. Department of Homeland Security: http://www.dhs.gov/interweb/assetlibrary/National_Cyberspace_Strategy.pdfGoogle ScholarGoogle Scholar
  68. University of Maryland, Research Experience for Undergraduates (REU) Cybersecurity Scholars Program : Retrieved on October 28, 2013 from:http://cyber.umd.edu/education/reuGoogle ScholarGoogle Scholar
  69. Warwick, A. Cybersecurity Skills Shortage need urgent attention, says DoHS: Retrieved on July 23, 2013 from: http://www.computerweekly.com/news/2240178584/RSA-2013-Cyber-security-skills-shortage-needs-urgentattention-says-DoHS, February 26,2013.Google ScholarGoogle Scholar
  70. Ware, W. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security, Rand Report R609-1, The RAND Corporation, Santa Monica, CA (Feb. 1970)Google ScholarGoogle Scholar
  71. Whatcom Community College. Whatcom Community College receives 500K grant for cyber-security. Retrieved July 28, 2013 from The Bellingham Business Journal: http://bbjtoday.com/blog/whatcom-community-collegereceives-500k-grant-forcybersecurity/18103#.Uc88wfm1GSoGoogle ScholarGoogle Scholar
  72. Whatcom Community College. Cyber Camps Year 1 Evaluation Report. Bellingham: Unpublished. 2012Google ScholarGoogle Scholar
  73. Women In Cybersecurity. Women in Cyberscurity Conference. Retrieved October 28, 2013 from: http://www.csc.tntech.edu/wicys/Google ScholarGoogle Scholar
  74. Witi, Women in Technology, Retrieved July 28, 2013 from: http://www.witi.com/Google ScholarGoogle Scholar
  75. WSCJ, Womens Society of Cyberjutsu,Retrieved July 28, 2013 from: http://womenscyberjutsu.com/Google ScholarGoogle Scholar
  76. Zakaria, T. Cybersecurity mainly male domain, geek image deters girls Retrieved July 28, 2013 from: Reuters Canada: http://ca.reuters.com/article/idCATRE79Q5SX20111027Google ScholarGoogle Scholar

Index Terms

  1. Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ITiCSE -WGR '13: Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports
        June 2013
        80 pages
        ISBN:9781450326650
        DOI:10.1145/2543882

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 June 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ITiCSE -WGR '13 Paper Acceptance Rate4of4submissions,100%Overall Acceptance Rate552of1,613submissions,34%

        Upcoming Conference

        ITiCSE 2024

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader