The incredible shrinking pipeline
Communications of the ACM
People who make a difference: mentors and role models
ACM SIGCSE Bulletin - Women and Computing
ACM SIGCSE Bulletin - Women and Computing
An interpretive study of software risk management perspectives
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Gender differences in computer science students
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
CS girls rock: sparking interest in computer science and debunking the stereotypes
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
Programming languages and gender
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
Hacking into Hacking: Gender and the Hacker Phenomenon
ACM SIGCAS Computers and Society
Cross-cultural influences on women in the IT workforce
Proceedings of the 2006 ACM SIGMIS CPR conference on computer personnel research: Forty four years of computer personnel research: achievements, challenges & the future
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Welcome to the ISA club! Strategies for recruiting and retaining women in ISA
2009 Information Security Curriculum Development Conference
Embracing intersectionality in gender and IT career choice research
Proceedings of the 50th annual conference on Computers and People Research
Hi-index | 0.00 |
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the questions surrounding women in IT within the context of Information Security and Assurance. This research-in-progress report describes results from one phase in a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described IT security professionals. The next phase will focus on interviews with men in the IT security field as a basis for comparison. A primary goal of the study is to determine whether or not women in security face the same challenges and opportunities as they do in other IT fields. Further, does the security area offer equivalent opportunities for women and men? Finally, implications are explored, including those for IT educators in terms of recruiting and retaining diverse groups of students to pursue security related careers.