{"id":"https://openalex.org/W2047992157","doi":"https://doi.org/10.1145/1055973.1055981","title":"Opportunities for women in IT security","display_name":"Opportunities for women in IT security","publication_year":2005,"publication_date":"2005-04-14","ids":{"openalex":"https://openalex.org/W2047992157","doi":"https://doi.org/10.1145/1055973.1055981","mag":"2047992157"},"language":"en","primary_location":{"id":"doi:10.1145/1055973.1055981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1055973.1055981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035566507","display_name":"Martha Myers","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Martha Myers","raw_affiliation_strings":["Kennesaw State University, Kennesaw, GA","Kennesaw State University, Kennesaw, Ga"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, Kennesaw, GA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Kennesaw State University, Kennesaw, Ga","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091478825","display_name":"Amy B. Woszczynski","orcid":"https://orcid.org/0009-0000-5873-8743"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amy Woszczynski","raw_affiliation_strings":["Kennesaw State University, Kennesaw, GA","Kennesaw State University, Kennesaw, Ga"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, Kennesaw, GA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Kennesaw State University, Kennesaw, Ga","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063754688","display_name":"Sherri Shade","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherri Shade","raw_affiliation_strings":["Kennesaw State University, Kennesaw, GA","Kennesaw State University, Kennesaw, Ga"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, Kennesaw, GA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Kennesaw State University, Kennesaw, Ga","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035566507"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":1.1362,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81478861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"36","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12515","display_name":"Gender and Technology in Education","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3318","display_name":"Gender Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12515","display_name":"Gender and Technology in Education","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3318","display_name":"Gender Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13034","display_name":"Information Systems Education and Curriculum Development","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11499","display_name":"ICT Impact and Policies","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6644412279129028},{"id":"https://openalex.org/keywords/career-path","display_name":"Career path","score":0.6010352373123169},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5759062170982361},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5662141442298889},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.5456479787826538},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.5032269358634949},{"id":"https://openalex.org/keywords/focus-group","display_name":"Focus group","score":0.4986259937286377},{"id":"https://openalex.org/keywords/phase","display_name":"Phase (matter)","score":0.4423687756061554},{"id":"https://openalex.org/keywords/critical-security-studies","display_name":"Critical security studies","score":0.4147379696369171},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3053768277168274},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.27784693241119385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2500482201576233},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23187130689620972},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22023499011993408},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20759129524230957},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19508051872253418},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.16155663132667542},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.1394621729850769},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.10813790559768677},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.09846487641334534},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.09298467636108398}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6644412279129028},{"id":"https://openalex.org/C3019433489","wikidata":"https://www.wikidata.org/wiki/Q741939","display_name":"Career path","level":2,"score":0.6010352373123169},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5759062170982361},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5662141442298889},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.5456479787826538},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5032269358634949},{"id":"https://openalex.org/C56995899","wikidata":"https://www.wikidata.org/wiki/Q1126687","display_name":"Focus group","level":2,"score":0.4986259937286377},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.4423687756061554},{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.4147379696369171},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3053768277168274},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.27784693241119385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2500482201576233},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23187130689620972},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22023499011993408},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20759129524230957},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19508051872253418},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.16155663132667542},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.1394621729850769},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.10813790559768677},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.09846487641334534},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.09298467636108398},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1055973.1055981","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1055973.1055981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W99611766","https://openalex.org/W1026558016","https://openalex.org/W1484858204","https://openalex.org/W1515157494","https://openalex.org/W1531356916","https://openalex.org/W1604712184","https://openalex.org/W2000625389","https://openalex.org/W2017495586","https://openalex.org/W2018192943","https://openalex.org/W2030370904","https://openalex.org/W2030768171","https://openalex.org/W2045388689","https://openalex.org/W2047558204","https://openalex.org/W2060539687","https://openalex.org/W2078459668","https://openalex.org/W2135946775","https://openalex.org/W2503477500","https://openalex.org/W2808566157","https://openalex.org/W2946445892","https://openalex.org/W4365145169"],"related_works":["https://openalex.org/W2259665829","https://openalex.org/W99102149","https://openalex.org/W2983231372","https://openalex.org/W819262676","https://openalex.org/W2412384517","https://openalex.org/W2323915031","https://openalex.org/W4285326231","https://openalex.org/W2188959920","https://openalex.org/W2735300712","https://openalex.org/W2353221811"],"abstract_inverted_index":{"Much":[0],"prior":[1],"research":[2],"has":[3],"examined":[4],"the":[5,10,21,28,96,109,121,135],"dearth":[6],"of":[7,15,30,46,75,108,156,162],"women":[8,24,79,117,142],"in":[9,25,43,63,95,118,129,154],"IT":[11,26,65,83,97,131,152],"industry.":[12],"The":[13,86],"purpose":[14],"this":[16],"study":[17,45,110],"is":[18,111],"to":[19,52,112,164],"examine":[20],"questions":[22],"surrounding":[23],"within":[27],"context":[29],"Information":[31],"Security":[32],"and":[33,124,143,158],"Assurance.":[34],"This":[35],"research-in-progress":[36],"report":[37],"describes":[38],"results":[39],"from":[40],"one":[41],"phase":[42,88],"a":[44,47,72,101],"relatively":[48],"new":[49],"career":[50,66],"path":[51],"see":[53],"if":[54],"there":[55],"are":[56,81,147],"female-friendly":[57],"opportunities":[58,125,140],"that":[59],"have":[60],"not":[61,116],"existed":[62],"previous":[64],"paths.":[67],"Research":[68],"methodology":[69],"focuses":[70],"on":[71,91],"qualitative":[73],"analysis":[74],"in-depth":[76],"interviews":[77,92],"with":[78,93],"who":[80],"self-described":[82],"security":[84,98,119,136,166],"professionals.":[85],"next":[87],"will":[89],"focus":[90],"men":[94],"field":[99],"as":[100,126],"basis":[102],"for":[103,141,151],"comparison.":[104],"A":[105],"primary":[106],"goal":[107],"determine":[113],"whether":[114],"or":[115],"face":[120],"same":[122],"challenges":[123],"they":[127],"do":[128],"other":[130],"fields.":[132],"Further,":[133],"does":[134],"area":[137],"offer":[138],"equivalent":[139],"men?":[144],"Finally,":[145],"implications":[146],"explored,":[148],"including":[149],"those":[150],"educators":[153],"terms":[155],"recruiting":[157],"retaining":[159],"diverse":[160],"groups":[161],"students":[163],"pursue":[165],"related":[167],"careers.":[168]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
