Reconfiguring the Firewall Recruiting Women to Information Technology across Cultures and Continents 1st Edition by Carol Burger, Elizabeth Creamer, Peggy Meszaros – Ebook PDF Instant Download/Delivery: 1568813147, 9781568813141
Full download Reconfiguring the Firewall Recruiting Women to Information Technology across Cultures and Continents 1st Edition after payment
Product details:
ISBN 10: 1568813147
ISBN 13: 9781568813141
Author: Carol J. Burger, Elizabeth G. Creamer, Peggy S. Meszaros
This comprehensive volume addresses the global challenge of recruiting girls and women into majors and careers in information technology. The studies are both illuminating and prescriptive for designing and implementing intervention programs. An essential tool for college faculty and advisors who implement activities and programs designed to promot
Reconfiguring the Firewall Recruiting Women to Information Technology across Cultures and Continents 1st Table of contents:
Part I: Introduction
Sizing up the Information Technology Firewall
Goals and Audience for this Book
What Is IT?
Challenges in Recruiting Women to IT
Understanding Factors that Predict Women’s Interest in IT
Organization of the Book
The Secondary School Level
The Post-Secondary Level
IT Careers
References
Notes
1. Predicting Women’s Interest in and Choice of a Career in Information Technology: A Statistical Model
Abstract
Introduction
Summary of Key Findings
Kiaya: The Next Generation IT Worker
Theoretical Framework
Methods
Research Participants and Data Collection
Measurements
Data Analysis
Variables that Influence Women’s Interest in and Choice of an IT Career
Variable 1: Race
Variable 2: Parental Support
Variable 3: Computer Use
Variable 4: Positive Attitudes about the Attributes of IT Workers
Variable 5: Information Orientation
Conclusion
Directions for Future Research
Implications for Practice
Acknowledgments
References
Part II: The Secondary School Level
Revisiting Culture, Time, and Information Processing Factors in Connecting to Girls’ Interest and Choice of an Information Technology Career at the Secondary Level
Old Themes, New Responses
Summary of the Chapters in this Section
Research to Practice in Secondary Settings
Strategies for Recruiting K–12 Females to High Tech Careers
Future Research
Conclusion
References
2. Changing the High School Culture to Promote Interest in Information Technology Careers among High-Achieving Girls
Abstract
Introduction
Background
Girls Entering Seventh or Eighth Grade
Findings
Summary of Middle School Girls
Girls in High School
Findings
Summary of High School Girls
Factors in High School Culture
Discussion
Conclusions
Acknowledgments
References
3. Examining Time as a Factor in Young Women’s Information Technology Career Decisions
Abstract
Introduction
Girls on Track
Women and Information Technology
Agile Development and Pair Programming
Focus and Problem
Data Collection and Analysis
The Evidence
Discussion
Acknowledgments
References
4. Information Processing and Information Technology Career Interest and Choice among High School Students
Abstract
Introduction
Related Literature
Methods
Discussion
Acknowledgments
References
Part III: The Post-Secondary Level
Considering Individual, Social, and Cultural Factors in the Construction of Women’s Interest and Persistence In Information Technology at the PostSecondary Level
Section Themes
Summary of the Chapters in this Section
Converting Research to Practice in the Post-Secondary Settings
Conclusions
References
5. A Cultural Perspective on Gender Diversity in Computing
Abstract
Introduction
Culture and Gender: The Dynamics and Distinctions
Case Studies: Western Cultures
Case Study 1: Undergraduate CS at Carnegie Mellon University
Case Study 2: Agile Software Development
Case Studies: Eastern Cultures
Case Study 3: Israeli High School Advanced Placement CS Classes
Case Study 4: Undergraduate CS at Carnegie Mellon-Qatar
Conclusion
Acknowledgments
References
Notes
6. Sociopolitical Factors and Female Students’ Choice of Information Technology Careers: A South African Perspective
Abstract
Introduction
Socioeconomic Context of Black African Women
Political Empowerment of Black African Women
Methods
Characteristics of the Respondents
Findings
Socioeconomic Factors
Attitudes toward Gender Roles in Computing
Discussion
Conclusion
References
7. Women’s Entry to Graduate Study in Computer Science and Computer Engineering in the United States
Abstract
Research Objective and Theoretical Perspective
Research Methods
Findings
Program Choice
Recruitment and Admission Practices
Discussion and Conclusions
Acknowledgments
References
8. Women’s Interest in Information Technology: The Fun Factor
Abstract
Introduction
What’s Important to a Student’s Choice of Career?
Seeking Interesting and Fun Work
Lacking Valid Information about Opportunities in IT
Portable and in Demand
Not for Loners
Challenging and Creative
Makes Lives Easier and More Enjoyable
The Fun Factor: Discussion
Show that IT Careers Are Fun
References
Notes
Part IV: Information Technology Careers
Women and Information Technology Careers
Implications for Recruitment to IT Careers
Implications for Retention in IT Careers
Future Research Directions
References
Notes
9. Women on the Edge of Change: Employees in United States Information Technology Companies
Abstract
Introduction
Methods
Work and Family
Work Hours, Stress, Sleep
Flexibility
Women and Mothers at Work
Creating Security in an Insecure World
Skills as a Source of Security
Social Capital as a Source of Security
Attracting, Recruiting, and Retaining Women in IT
Many Pathways to IT Work
Motivation
Women, IT, and the Future of Work
Support Employees’ Ability to Work and Have a Life
Build Security and Social Capital by Creating and Enhancing Networks
Change Perceptions or Change the Reality
Acknowledgments
References
Notes
10. Multiple Pathways toward Gender Equity in the United States Information Technology Workforce
Abstract
Introduction
Multiple Pathways Perspective
Methods
Sample Demographics
Multiple Pathways to IT Careers: Typology and Analysis
Traditional Pathway
Career Profile of a Female in the Traditional Pathway
Transitional Pathway
Career Profile of a Female in the Transitional Pathway
Self-Directed Pathway
Career Profile of a Female in the Self-Directed Pathway
Pathways and Experience Level in IT Skill Set Areas
Pathways and Job Tasks
Pathways and Salary
Pathways and Job Satisfaction
Experiencing IT Careers
Success and Satisfaction
Gender and Career Development
Technical and Supervisory Responsibilities
Mentoring
Networking
Keeping Skills Current
Tough Times: Layoffs, Mergers, Downsizing, Outsourcing
Layoffs
Layoff Criteria
Impact of Layoffs on Information Technology Careers
Impact of Tough Times on People Not Laid Off
Outsourcing
Conclusions and Implications
Acknowledgments
References
Notes
11. Barriers to Women in Science: A Cautionary Tale for the Information Technology Community
Abstract
Introduction
The Decade 1986–1996
Into the New Millennium 1998–2004
2004–2005
Case Study Findings
Life/Work Balance
Institutional Culture
Discussion
Conclusions
References
Part V: Conclusion
Refocusing Our Lens to Reconfigure the Firewall
Recommendations for Parents and High School Teachers
Recommendations for College Faculty and Advisors
Recommendations for IT Professionals
Future Directions
Research about Policy and Potential Funding Priorities
Agenda for Future Research about IT
Conclusion
Reprising Carla
Notes
Appendix A Material for Chapter 1, “Predicting Women’s Interest in and Choice of a Career in Information Technology: A Statistical Model”
Appendix B Material for Chapter 1, “Predicting Women’s Interest in and Choice of a Career in Information Technology: A Statistical Model”
Appendix C Material for Chapter 7, “Women’s Entry to Graduate Study in Computer Science and Computer Engineering in the United States”
People also search for Reconfiguring the Firewall Recruiting Women to Information Technology across Cultures and Continents 1st:
information technology and computers
9 types of technology
7 technological resources
7 types of technology
Tags:
Carol Burger,Elizabeth Creamer,Peggy Meszaros,Reconfiguring,Firewall