Cybersecurity is one of the fastest growing career fields, with the demand for qualified professionals growing at a rate 3.5 times faster than traditional information technology or computing-related jobs and 12 times faster than the overall job market. Women are largely underrepresented in the field, comprising a mere 11% of the global workforce. This qualitative study uses a modified grounded-theory methodology to explore factors influencing women’s perceptions of the field of cybersecurity. Interviews were conducted to gain an understanding of how female college students perceive the existing gender gap and to identify motivators or barriers of entry to the field. This study resulted in the development of a substantive theory depicting the core concept of finding her way and how women take action by seeking to relate, seeking reassurance, and seeking return. Findings from this research will be used to inform efforts to attract, train, and retain future generations of women in the cybersecurity profession and to aid in meeting the growing workforce needs.
|Advisor:||Bair, Richard P.|
|Commitee:||Rankin, Jennifer E., Voorhees, Courte|
|School:||Frostburg State University|
|School Location:||United States -- Maryland|
|Source:||DAI-A 79/09(E), Dissertation Abstracts International|
|Subjects:||Social research, Womens studies, Information Technology, Education, Occupational psychology|
|Keywords:||Barriers, Cybersecurity, Motivators, Underrepresentation, Women|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be