ABSTRACT
The proportion of women in information technology (IT) work is low, however, the growing field of cybersecurity attracts even fewer women. This paper reports from a study exploring what motivates women to enter IT in general and cybersecurity in particular, with the aim of developing strategies to recruit women to these fields. The analysis builds on in-depth interviews with 24 female students and researchers at universities, 12 in cybersecurity and 12 in other IT disciplines. There are some similarities between the two groups, like the lack of knowledge about any IT disciplines, leaving gender stereotypes to lead their images of IT. There are also differences: a wider set of interests and disciplines motivate women to choose cybersecurity. The women find it easier to identify with cybersecurity, seeing it as a field concerning "everybody", different from core fields of IT. IT is still an important gateway and gender stereotypes about IT are a challenge for recruiting women to IT as well as cybersecurity.
- EUROSTAT. ICT specialists in employment - Statistics Explained. https://ec.europa.eu/eurostat/statistics-explained/index.php/ICT_specialists_in_employment(2019).Google Scholar
- SO. The Norwegian Universities and Colleges Admission Service R@(Samordna opptak). https://www.samordnaopptak.no/info/om/sokertall/; 2020.Google Scholar
- Corneliussen HG. "Dette har jeg aldri gjort før, så dette er jeg sikkert skikkelig flink på" -- Rapport om kvinner i IKT og IKT-sikkerhet: VF-rapport 8/2020 (2020).Google Scholar
- Frieze C, Quesenberry JL. Cracking the Digital Ceiling: Women in Computing around the World: Cambridge University Press (2019).Google Scholar
Cross Ref
- Master A, Cheryan S, Meltzoff AN. Computing whether she belongs: Stereotypes undermine girls' interest and sense of belonging in computer science. Journal of Educational Psychology;108(3):424 2016.Google Scholar
- Faulkner W. Doing gender in engineering workplace cultures. II. Gender in/authenticity and the in/visibility paradox. Engineering Studies;1(3):169--89 2009.Google Scholar
- Grover S, Pea R, Cooper S, editors. Remedying misperceptions of computer science among middle school students. Proceedings of the 45th ACM technical symposium on Computer science education; 2014: ACM.Google Scholar
- Jethwani MM, Memon N, Seo W, Richer A. "I Can Actually Be a Super Sleuth": Promising Practices for Engaging Adolescent Girls in Cybersecurity Education. Journal of Educational Computing Research;55(1):3--25 2016 2017/03/01.Google Scholar
- Denning P, McGettrick A. Re-centering Computer Science - Position Paper for ICER06 2006.Google Scholar
- Cheryan S, Master A, Meltzoff AN. Cultural stereotypes as gatekeepers: increasing girls' interest in computer science and engineering by diversifying stereotypes. Frontiers in psychology;6 2015.Google Scholar
- Corneliussen HG, Seddighi G, Dralega CA. Women's Experience of Role Models in IT: Landmark women, substitutes, and supporters. In: Helgesen Ø, Nesset E, Mustafa G, Rice P, Glavee-Geo R, editors. Modeller: Fjordantologien 2019: Universitetsforlaget (2019).Google Scholar
Cross Ref
- D'Hondt K. Women in Cybersecurity: Harvard University (2016).Google Scholar
- Peacock D, Irons A. Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression. International Journal of Gender, Science and Technology;9(1):25--44 2017.Google Scholar
- Reed J, Zhong Y, Terwoerds L, Brocaglia J. The 2017 Global Information Security Workforce Study: Women in Cybersecurity. Frost & Sullivan, Santa Clara 2017.Google Scholar
- Shumba R, Ferguson-Boucher K, Sweedyk E, Taylor C, Franklin G, Turner C, et al., editors. Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports; 2013: ACM.Google Scholar
- Cockburn C. The circuit of technology: gender, identity and power. In: Silverstone R, Hirsch E, editors. Consuming Technologies: Media and Information in Domestic Spaces. pp. 32--47. London: Routledge (1992).Google Scholar
Cross Ref
- Trauth EA, Quesenberry JL. Gender and the information technology workforce: issues of theory and practice. Managing IT professionals in the Internet age. pp. 18--36: IGI Global (2007).Google Scholar
- Charmaz K. Constructing grounded theory: A practical guide through qualitative research. London: Sage Publications Ltd (2006).Google Scholar
Index Terms
What Brings Women to Cybersecurity?: A Qualitative Study of Women's Pathways to Cybersecurity in Norway
Recommendations
Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation
ITiCSE -WGR '13: Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reportsThis paper presents the work done by the ACM ITiCSE, 2013 Conference Working Group (WG) on Cybersecurity, Women and Minorities: How to Succeed in the Career! The ITiCSE 2013 conference was held July 1-3, 2013, in Canterbury, United Kingdom. The overall ...
Recruitment is never enough: retention of women and minorities in the IT workplace
SIGMIS CPR '04: Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environmentWomen, as well as African Americans, Hispanic Americans and Native Americans are represented in the information technology (IT) workforce in percentages that are far lower than their percentages in the population as a whole. While recruiting efforts are ...
Feminism! What Is It Good For? The Role of Feminism and Political Self-Efficacy in Women’s Online Political Participation
Despite initial hopes for more egalitarian access to democracy, research has shown that political participation on the Internet remains as stratified as its offline counterpart. Gender is among the characteristics affecting an individual’s degree of ...





Comments