skip to main content
10.1145/3424954.3424965acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
poster

What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway

Published:12 January 2021Publication History

ABSTRACT

The proportion of women in information technology (IT) work is low, however, the growing field of cybersecurity attracts even fewer women. This paper reports from a study exploring what motivates women to enter IT in general and cybersecurity in particular, with the aim of developing strategies to recruit women to these fields. The analysis builds on in-depth interviews with 24 female students and researchers at universities, 12 in cybersecurity and 12 in other IT disciplines. There are some similarities between the two groups, like the lack of knowledge about any IT disciplines, leaving gender stereotypes to lead their images of IT. There are also differences: a wider set of interests and disciplines motivate women to choose cybersecurity. The women find it easier to identify with cybersecurity, seeing it as a field concerning "everybody", different from core fields of IT. IT is still an important gateway and gender stereotypes about IT are a challenge for recruiting women to IT as well as cybersecurity.

References

  1. EUROSTAT. ICT specialists in employment - Statistics Explained. https://ec.europa.eu/eurostat/statistics-explained/index.php/ICT_specialists_in_employment(2019).Google ScholarGoogle Scholar
  2. SO. The Norwegian Universities and Colleges Admission Service R@(Samordna opptak). https://www.samordnaopptak.no/info/om/sokertall/; 2020.Google ScholarGoogle Scholar
  3. Corneliussen HG. "Dette har jeg aldri gjort før, så dette er jeg sikkert skikkelig flink på" -- Rapport om kvinner i IKT og IKT-sikkerhet: VF-rapport 8/2020 (2020).Google ScholarGoogle Scholar
  4. Frieze C, Quesenberry JL. Cracking the Digital Ceiling: Women in Computing around the World: Cambridge University Press (2019).Google ScholarGoogle ScholarCross RefCross Ref
  5. Master A, Cheryan S, Meltzoff AN. Computing whether she belongs: Stereotypes undermine girls' interest and sense of belonging in computer science. Journal of Educational Psychology;108(3):424 2016.Google ScholarGoogle Scholar
  6. Faulkner W. Doing gender in engineering workplace cultures. II. Gender in/authenticity and the in/visibility paradox. Engineering Studies;1(3):169--89 2009.Google ScholarGoogle Scholar
  7. Grover S, Pea R, Cooper S, editors. Remedying misperceptions of computer science among middle school students. Proceedings of the 45th ACM technical symposium on Computer science education; 2014: ACM.Google ScholarGoogle Scholar
  8. Jethwani MM, Memon N, Seo W, Richer A. "I Can Actually Be a Super Sleuth": Promising Practices for Engaging Adolescent Girls in Cybersecurity Education. Journal of Educational Computing Research;55(1):3--25 2016 2017/03/01.Google ScholarGoogle Scholar
  9. Denning P, McGettrick A. Re-centering Computer Science - Position Paper for ICER06 2006.Google ScholarGoogle Scholar
  10. Cheryan S, Master A, Meltzoff AN. Cultural stereotypes as gatekeepers: increasing girls' interest in computer science and engineering by diversifying stereotypes. Frontiers in psychology;6 2015.Google ScholarGoogle Scholar
  11. Corneliussen HG, Seddighi G, Dralega CA. Women's Experience of Role Models in IT: Landmark women, substitutes, and supporters. In: Helgesen Ø, Nesset E, Mustafa G, Rice P, Glavee-Geo R, editors. Modeller: Fjordantologien 2019: Universitetsforlaget (2019).Google ScholarGoogle ScholarCross RefCross Ref
  12. D'Hondt K. Women in Cybersecurity: Harvard University (2016).Google ScholarGoogle Scholar
  13. Peacock D, Irons A. Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression. International Journal of Gender, Science and Technology;9(1):25--44 2017.Google ScholarGoogle Scholar
  14. Reed J, Zhong Y, Terwoerds L, Brocaglia J. The 2017 Global Information Security Workforce Study: Women in Cybersecurity. Frost & Sullivan, Santa Clara 2017.Google ScholarGoogle Scholar
  15. Shumba R, Ferguson-Boucher K, Sweedyk E, Taylor C, Franklin G, Turner C, et al., editors. Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports; 2013: ACM.Google ScholarGoogle Scholar
  16. Cockburn C. The circuit of technology: gender, identity and power. In: Silverstone R, Hirsch E, editors. Consuming Technologies: Media and Information in Domestic Spaces. pp. 32--47. London: Routledge (1992).Google ScholarGoogle ScholarCross RefCross Ref
  17. Trauth EA, Quesenberry JL. Gender and the information technology workforce: issues of theory and practice. Managing IT professionals in the Internet age. pp. 18--36: IGI Global (2007).Google ScholarGoogle Scholar
  18. Charmaz K. Constructing grounded theory: A practical guide through qualitative research. London: Sage Publications Ltd (2006).Google ScholarGoogle Scholar

Index Terms

  1. What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
          November 2020
          72 pages
          ISBN:9781450375993
          DOI:10.1145/3424954

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 January 2021

          Check for updates

          Qualifiers

          • poster
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader