Literaturnachweis - Detailanzeige
Autor/inn/en | Woszczynski, Amy B.; Shade, Sherri |
---|---|
Titel | A Call to IS Educators to Respond to the Voices of Women in Information Security |
Quelle | In: Journal of Information Systems Education, 21 (2010) 2, S.223-231 (9 Seiten)
PDF als Volltext |
Sprache | englisch |
Dokumenttyp | gedruckt; online; Zeitschriftenaufsatz |
ISSN | 1055-3096 |
Schlagwörter | Females; Computer Security; Gender Bias; Disproportionate Representation; Gender Issues; Mentors; Motivation; Work Environment; Role of Education; Computer Science Education; Information Technology; Interviews; Questionnaires; Equal Opportunities (Jobs); Career Choice; Recruitment; Labor Turnover; Employee Attitudes; Education Work Relationship Weibliches Geschlecht; Computervirus; Computersicherheit; Geschlechterstereotyp; Geschlechterfrage; psychologische; Motivation (psychologisch); Arbeitsmilieu; Bildungsauftrag; Computer science lessons; Informatikunterricht; Informationstechnologie; Interviewing; Interviewtechnik; Fragebogen; Equal opportunity; Equal opportunities; Job; Jobs; Chancengleichheit; Beruf; Recruiting; Rekrutierung; Arbeitnehmerinteresse |
Abstract | Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine what IS educators can do to help educate a new generation of students who are diverse, confident, and excited about the real-world aspects of an information security degree. Suggestions for improving the representation of women in information security and their ultimate perception of the field include better recruiting and retention strategies, development of mentors, and changes in presentation of the information security field. (Contains 1 table.) (As Provided). |
Anmerkungen | Journal of Information Systems Education (JISE). c/o Al Harris, JISE Editor Emeritus, Department of Computer Information Systems, Walker College of Business, Appalachian State University, Boone, NC 28608. Tel: 828-262-6180; Fax: 828-262-6190; e-mail: editor@jise.org; Web site: http://www.jise.org |
Erfasst von | ERIC (Education Resources Information Center), Washington, DC |
Update | 2017/4/10 |