641
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Requirements for a Platform that Improves the Number of Young Women Entering Cybersecurity

      Published
      proceedings-article
      ,
      35th International BCS Human-Computer Interaction Conference (HCI2022)
      Towards a Human-Centred Digital Society
      July 11th to 13th, 2022
      Women in cybersecurity, Role models, Inspiring girls
      Bookmark

            Abstract

            The cybersecurity workforce is male-dominated, where females only make 11% of the cybersecurity workforce. There is, therefore, a need to encourage females to enter cybersecurity to promote a diverse and multiskilled workforce. The research aimed at promoting this by testing the hypothesis that increasing the visibility of female cybersecurity roles models would inspire young females to consider careers in cybersecurity, subsequently, the research also aimed to identify the requirements for a platform that will provide single-point access to the role model’s career stories and related motivational features.

            Content

            Author and article information

            Contributors
            Conference
            July 2022
            July 2022
            : 1-4
            Affiliations
            [0001]Department of Computing and Informatics

            Bournemouth University

            Fern Barrow, Poole

            Dorset, BH12 5BB

            UK
            Article
            10.14236/ewic/HCI2022.41
            990109b0-5676-4caf-a292-e0464e6fa8e2
            © Turner et al. Published by BCS Learning & Development. Proceedings of the 35th British HCI and Doctoral Consortium 2022, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            35th International BCS Human-Computer Interaction Conference
            HCI2022
            35
            Keele, Staffordshire
            July 11th to 13th, 2022
            Electronic Workshops in Computing (eWiC)
            Towards a Human-Centred Digital Society
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2022.41
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Inspiring girls,Women in cybersecurity,Role models

            REFERENCES

            1. Berr´ıos, N. (2019). Increasing the Participation of Young Women in Cybersecurity. Computer Science;.

            2. Boe, J. and R. Woods (2018). Parents’ Influence on Infants’ Gender-Typed Toy Preferences. Sex Roles 79(5-6), 358–373.

            3. Braun, V. and V. Clarke (2006). Using thematic analysis in psychology. Qualitative Research in Psychology 3(2), 77–101.

            4. Cortez, M. (2017). Most Young Women Have Never Considered a Career in Cybersecurity.

            5. Dampier, D., K. Kelly, and K. Carr (2012). Increasing participation of women in cyber security. In ASEESE Regional Conference, Starkville, MS.

            6. Lockwood, P. (2006). “Someone Like Me can be Successful”: Do College Students Need Same-Gender Role Models? Psychology of Women Quarterly 30(1), 36–46.

            7. Lucka, N. S., F. Caldieraro, and M. T. Zanini (2021). The influence of gender stereotyping and issue advocacy on consumer sentiment. Marketing Intelligence & Planning 39(6), 777–791.

            8. Matheus, C. C. and E. Quinn (2017). Gender based occupational stereotypes: New behaviors, old attitudes. In 2017 IEEE Women in Engineering (WIE) Forum USA East, Baltimore, MD, pp. 1–6. IEEE.

            9. Peacock, D. and A. Irons (2017). Gender Inequality in Cybersecurity: Exploring the Gender Gap in Opportunities and Progression. International Journal of Gender, Science and Technology 9(1), 25–44.

            10. Quimby, J. L. and A. M. Santis (2006). The Influence of Role Models on Women’s Career Choices. The Career Development Quarterly 54(4), 297–306.

            11. Rowland, P., A. Podhradsky, and S. Plucker (2018). CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path. In The 51st Hawaii International Conference on System Sciences.

            Comments

            Comment on this article