Atnaujinkite slapukų nuostatas

El. knyga: Reconfiguring the Firewall: Recruiting Women to Information Technology across Cultures and Continents [Taylor & Francis e-book]

Edited by , Edited by (Virginia Tech, USA), Edited by
  • Formatas: 288 pages
  • Išleidimo metai: 19-Apr-2007
  • Leidėjas: A K Peters
  • ISBN-13: 9780429065200
  • Taylor & Francis e-book
  • Kaina: 101,56 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 145,08 €
  • Sutaupote 30%
  • Formatas: 288 pages
  • Išleidimo metai: 19-Apr-2007
  • Leidėjas: A K Peters
  • ISBN-13: 9780429065200
The challenge of recruiting women into majors and careers in information technology is internationally recognized. The economic implications for women are also significant if they are not prepared for a career in one of the fastest growing and financially rewarding fields. This book uncovers the factors that influence womens' interest in and choice of IT as a career field, and how this varies across cultures and regions. The results of the studies are both illuminating and prescriptive for designing and implementing sucessful programs that cross the secondary, post-secondary, and professional settings, and establishing an agenda of critical areas for future research about women and information technology.

Factors that influence the decision by girls and young women to enter computer based fields are explored in 11 papers from a July-August 2005 conference sponsored by the National Science Foundation and big computer companies eager for female employees who will accept 70% of the pay their male colleagues receive. Scholars of computer science and related fields consider secondary and post-secondary school, and information technology careers. Annotation ©2007 Book News, Inc., Portland, OR (booknews.com)
Acknowledgments vii
Part I: Introduction
Sizing Up the Information Technology Firewall
3
Carol J. Burger, Elizabeth G. Creamer, and Peggy S. Meszaros
1. Predicting Women's Interest in and Choice of a Career in Information Technology: A Statistical Model
15
Elizabeth G. Creamer, Soyoung Lee, and Peggy S. Meszaros
Part II: The Secondary School Level
Revisiting Culture, Time, and Information Processing Factors in Connecting to Girls' Interest and Choice of an Information Technology Career at the Secondary Level
41
Peggy S. Meszaros and Jane Butler Kahle
2. Changing the High School Culture to Promote Interest in Information Technology Careers among High-Achieving Girls
51
Ann Howe, Sarah Berenson, and Mladen Vouk
3. Examining Time as a Factor in Young Women's Information Technology Career Decisions
65
Sarah Berenson, Laurie Williams, Joan Michael, and Mladen Vouk
4. Information Processing and Information Technology Career Interest and Choice among High School Students
77
Peggy S. Meszaros, Soyoung Lee, and Anne Laughlin
Part III: The Post-Secondary Level
Considering Individual, Social, and Cultural Factors in the Construction of Women's Interest and Persistence in Information Technology at the Post-Secondary Level
99
Elizabeth G. Creamer and Lesley H. Parker
5. A Cultural Perspective on Gender Diversity in Computing
109
Lenore Blum, Carol Frieze, Orit Hazzan, and M. Bernardine Dias
6. Sociopolitical Factors and Female Students' Choice of Information Technology Careers: A South African Perspective
135
Cecille Marsh
7. Women's Entry to Graduate Study in Computer Science and Computer Engineering in the United States
147
J. McGrath Cohoon and Holly Lord
8. Women's Interest in Information Technology: The Fun Factor
161
Bettina Bair and Miranda Marcus
Part IV: Information Technology Careers
Women and Information Technology Careers
179
Carol J. Burger and William Aspray
9. Women on the Edge of Change: Employees in United States Information Technology Companies
191
Sarah Kuhn and Paula Rayman
10. Multiple Pathways toward Gender Equity in the United States Information Technology Workforce
211
Paula G. Leventuran
11. Barriers to Women in Science: A Cautionary Tale for the Information Technology Community
239
Lesley Warner and Judith Wooller
Part V: Conclusion
Refocusing Our Lens to Reconfigure the Firewall
253
Peggy S. Meszaros, Elizabeth G. Creamer, Carol J. Burger, and Anne Laughlin
Appendix A 261
Appendix B 263
Appendix C 267
Contributors 269
Index 273


Carol J. Burger, Elizabeth G. Creamer, Peggy S. Meszaros