The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2010 vol.12)
pp: 24-31
Sharmistha Bagchi-Sen , State University of New York, Buffalo
H.R. Rao , State University of New York, Buffalo
Shambhu J. Upadhyaya , State University of New York, Buffalo
Sangmi Chai , Slippery Rock University
Although cybersecurity is considered a critical area of information technology, women continue to be underrepresented among its ranks. This study, which is the first of female cybersecurity professionals, examines the skills women need to succeed in the industry, as well as the nature of the barriers and challenges they face at all points in their careers. Using face-to-face interviews and paper-based questionnaires, the study explored the views of high-ranking female cybersecurity officers and gained insights into how the needs of women might better be addressed, whether they're starting out in the educational system or advancing to the board rooms of major corporations. As cybersecurity provides an increasing number of IT jobs and becomes central to managerial operations within companies, women's advancement to executive and managerial positions will be important both for gender equity and to meet the needs of the market.
cybersecurity, women professionals, IT skills, career advancement
Sharmistha Bagchi-Sen, H.R. Rao, Shambhu J. Upadhyaya, Sangmi Chai, "Women in Cybersecurity: A Study of Career Advancement", IT Professional, vol.12, no. 1, pp. 24-31, January/February 2010, doi:10.1109/MITP.2010.39
1. C.A. Heaton and E. McWhinney, "Women in Management: The Case of MBA Graduates," Women in Management Rev., vol. 14, no. 4, 1999, pp. 136–145.
2. S. Parasuraman, Y. Purohit, and V. Godshalk, "Work and Family Variables, Entrepreneurial Career Success, and Psychological Well-Being," J. Vocational Behavior, vol. 48, no. 3, 1996, pp. 275–300.
3. M.K. Ahuja, "Women in the Information Technology Profession: A Literature Review, Synthesis and Research Agenda," Euro. J. Information Systems, vol. 11, no. 1, 2002, pp. 20–34.
4. B.R. Ragins, "Antecedents of Diversified Mentoring Relationships," J. Vocational Behavior, vol. 51, no. 1, 1997, pp. 90–109.
5. D.J. Armstrong et al., "Advancement, Voluntary Turnover, and Women in IT: A Cognitive Study of Work–Family Conflict," Information &Management, vol. 44, no. 2, 2007, pp. 142–153.
6. M. Gamba and B.H. Kleiner, "The Old Boys' Network Today," Int'l J. Sociology and Social Policy, vol. 21, no. 8, 2001, pp. 101–108.
7. E.M. Trauth, J.L. Quesenberry, and A.J. Morgan, "Understanding the Under Representation of Women in IT: Toward a Theory of Individual Differences," Proc. SIGMIS Conf. Computer Personnel Research, ACM Press, 2004, pp. 114–119.
8. A. Sharma, "A Holistic Approach to Physical and IT Security," Security, Nov. 2006, c805be157db0f010VgnVCM100000f932a8c0 .
9. K.A. Frenkel, "Women and Computing," Comm. ACM, vol. 33, no. 11, 1990, pp. 34–46.
10. H. Dryburgh, "Underrepresentation of Girls and Women in Computer Science: Classification of 1990s Research," J. Educational Computing Research, vol. 23, no. 2, 2000, pp. 181–202.
11. K. Hartzel, "How Self-Efficacy and Gender Issues Affect Software Adoption and Use," Comm. ACM, vol. 46, no. 9, 2003, pp. 167–171.
12. D.F. Feeny, B.R. Edwards, and K.M. Simpson, "Understanding the CEO/CIO Relationship," MIS Quarterly, vol. 16, no. 4, 1992, pp. 435–448.
13. C. Cross and M. Linehan, "Barriers to Advancing Female Careers in the High-Tech Sector: Empirical Evidence from Ireland," Women in Management Rev., vol. 21, no. 1, 2006, pp. 28–39.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool