Theorizing Gender and Information Technology Research

Author(s):  
Eileen M. Trauth

A fundamental consideration when attempting to understand the complex factors leading to the underrepresentation of women in IT is the choice and use of theory. Theories about women and their relationships to information technology and the IT profession guide the conceptualization of the research problem, the methods of data collection, the basis for analysis, and the conclusions that are drawn. However, a criticism of gender and IT research is that the topic of gender and IT is currently undertheorized (Adam, Howcroft, & Richardson, 2001, 2004). This undertheorization takes on several different forms. First, there are cases in which there is no theory in evidence to guide the conceptualization of the research project or to inform the data collection and analysis. Rather, the focus is typically on compiling and representing statistical data regarding the differences between men and women with respect to technology adoption, use or involvement in the IT profession. This form of undertheorization can be labeled pre-theoretical research. Second, other research, while not explicitly articulating a particular theory, nevertheless, is guided by a theory-in-use. For example, quite often a theory of inherent differences between males’ and females’ relationships to IT is used implicitly to guide data collection and analysis. This form of undertheorization can be labeled implicit-theoretical research. This approach is considered to be a type of undertheorization in that the lack of explicit discussion of a theory makes it difficult for others to discuss, challenge or extend the research. Finally, the body of research that reflects explicit theory-in-use has been shown to have gaps in the theoretical landscape (Trauth, 2002). That is, an argument has been made that current theories about gender and IT do not fully account for the variation in men’s and women’s relationships to information technology and the IT field. This form of undertheorization can be labeled insufficient-theoretical research. It is this third condition that is addressed in this article: the need for new theoretical insights to guide our effort to understand the underrepresentation of women in the IT profession.

2009 ◽  
pp. 2309-2315 ◽  
Author(s):  
Eileen M. Trauth

A fundamental consideration when attempting to understand the complex factors leading to the underrepresentation of women in IT is the choice and use of theory. Theories about women and their relationships to information technology and the IT profession guide the conceptualization of the research problem, the methods of data collection, the basis for analysis, and the conclusions that are drawn. However, a criticism of gender and IT research is that the topic of gender and IT is currently undertheorized (Adam, Howcroft, & Richardson, 2001, 2004). This undertheorization takes on several different forms. First, there are cases in which there is no theory in evidence to guide the conceptualization of the research project or to inform the data collection and analysis. Rather, the focus is typically on compiling and representing statistical data regarding the differences between men and women with respect to technology adoption, use or involvement in the IT profession. This form of undertheorization can be labeled pre-theoretical research. Second, other research, while not explicitly articulating a particular theory, nevertheless, is guided by a theory-in-use. For example, quite often a theory of inherent differences between males’ and females’ relationships to IT is used implicitly to guide data collection and analysis. This form of undertheorization can be labeled implicit-theoretical research. This approach is considered to be a type of undertheorization in that the lack of explicit discussion of a theory makes it difficult for others to discuss, challenge or extend the research. Finally, the body of research that reflects explicit theory-in-use has been shown to have gaps in the theoretical landscape (Trauth, 2002). That is, an argument has been made that current theories about gender and IT do not fully account for the variation in men’s and women’s relationships to information technology and the IT field. This form of undertheorization can be labeled insufficient-theoretical research. It is this third condition that is addressed in this article: the need for new theoretical insights to guide our effort to understand the underrepresentation of women in the IT profession.


2011 ◽  
pp. 1991-1998
Author(s):  
Amy B. Woszczynski ◽  
Janette Moody

The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low and declining. Researchers have recognized the problem and have investigated the many reasons for low participation of women in IT-related fields. Researchers have proposed various interventions to fill the pipeline and retain women in computing. In this chapter, we provide an overview of the current state of women in IT. We focus on girls and women at various life stages, from early education to the IT workplace. We also provide a discussion of the various methods and appropriate interventions that may be employed to encourage women to become empowered users of technology worldwide. We use a broad definition of IT, which includes computer science (CS), computer engineering, information systems (IS), information technology (IT), and related professional fields. By examining research from multiple technologyrelated fields, we gain a clearer picture of the many ways that women may participate in IT. Recent research on gender and IT has used an interdisciplinary approach, which has greatly expanded our potential for understanding why women decide not to pursue IT-related fields and how to implement appropriate interventions. Researchers from topics as diverse as IS, psychology, social sciences, education, and feminism, have taken a distinctive approach to understanding why women are not better represented in the IT workplace. We believe this broad, interdisciplinary approach has great potential to understand motivations for women pursuing IT-related careers. As Trauth & Niederman (2006, p. 8) said, “…the IT profession is challenged with meeting the demand to enlarge the IT workforce by recruiting and retaining personnel from historically underrepresented groups.” This chapter looks at women in IT, shedding light on one historically underrepresented group.


The concept of sales peak performance (SPP) and the locus of control (LOC) amongst business to business (B2B) sales professionals was the pretext for this research. There were many different concepts and theories considered during the development and conceptualisation of this book. This study acknowledges the use of these theories and concepts in supporting the quest to solve the research problem under investigation. This chapter discusses the major findings in relation to these theories and examines their implications. The discussion is developed in the form of arguments and recommendations. This chapter pulls together the cogent aims and objectives of this research and addresses the primary question surrounding sales peak performance. This research has used both primary and secondary sources during the data collection and analysis process. This chapter will use the results from both the quantitative and qualitative data analyses when formulating this discourse.


2015 ◽  
Vol 9 (3) ◽  
pp. 193-215
Author(s):  
Rodolfo Vergel

Este artículo aborda la emergencia de formas de pensamiento algebraico en estudiantes jóvenes y muestra evidencias sobre su evolución. En la primera parte se expone el problema, investigado a partir de la forma en que surgen y evolucionan nuevas relaciones entre el cuerpo, la percepción y el inicio del uso de símbolos a medida que los estudiantes participan en actividades sobre generalización de patrones. La segunda parte presenta algunos constructos analíticos de la teoría de la objetivación. En la tercera se expone la metodología, destacando la recolección de los datos y su análisis. En el resto del trabajo se discuten algunos resultados que alimentan reflexiones sobre el desarrollo del pensamiento algebraico.Generalization of patterns and forms of early algebraic thinkingThis paper addresses the emergence of algebraic thinking forms in young students and we show evidences of their evolution. First, we present the research problem, it is tackled from the way in which new relationships between the body, perception and initiation of use of symbols are emerged and evolved while students participate in activities about generalization of patterns. In the second part, we show some analytical constructs on the theory of objectification. In the third part, we present methodology, highlighting data collection and their analysis. Finally, we discuss some results that feed reflections on the development of algebraic thinking.Handle: http://hdl.handle.net/10481/34991WOS-ESCINº de citas en WOS (2017): 1 (Citas de 2º orden, 1)


Author(s):  
Amy B. Woszczynski ◽  
Janette Moody

The role of women in technology-related fields began with promising contributions from pioneers like Grace Hopper. In recent years, women have moved away from information technology (IT) fields, and the number of women selecting IT majors in universities continues to decline. Likewise, the number of women employed in the IT workforce remains low and declining. Researchers have recognized the problem and have investigated the many reasons for low participation of women in IT-related fields. Researchers have proposed various interventions to fill the pipeline and retain women in computing. In this chapter, we provide an overview of the current state of women in IT. We focus on girls and women at various life stages, from early education to the IT workplace. We also provide a discussion of the various methods and appropriate interventions that may be employed to encourage women to become empowered users of technology worldwide. We use a broad definition of IT, which includes computer science (CS), computer engineering, information systems (IS), information technology (IT), and related professional fields. By examining research from multiple technologyrelated fields, we gain a clearer picture of the many ways that women may participate in IT. Recent research on gender and IT has used an interdisciplinary approach, which has greatly expanded our potential for understanding why women decide not to pursue IT-related fields and how to implement appropriate interventions. Researchers from topics as diverse as IS, psychology, social sciences, education, and feminism, have taken a distinctive approach to understanding why women are not better represented in the IT workplace. We believe this broad, interdisciplinary approach has great potential to understand motivations for women pursuing IT-related careers. As Trauth & Niederman (2006, p. 8) said, “…the IT profession is challenged with meeting the demand to enlarge the IT workforce by recruiting and retaining personnel from historically underrepresented groups.” This chapter looks at women in IT, shedding light on one historically underrepresented group.


2009 ◽  
pp. 1753-1760
Author(s):  
Haiyan Huang

The underrepresentation of women in the information technology (IT) sector has been widely studied in the contexts of western countries such as North American and Western European countries. These studies indicate that the underrepresentation of women in the IT sector is unveiled in multiple perspectives, including IT access, the development, adoption and use of IT, IT education, and the IT workforce in general and within the IT workforce structure itself (e.g., different levels of IT positions) (Cooper & Weaver, 2003; Gürer & Camp, 2002; Hartzel, 2003; Klein, Jiang & Tesch, 2002; Margolis & Fisher, 2002; Rommes, 2002; Trauth, 2002; von Hellens, Neilsen, & Beekhuyzen, 2001; Webster, 1996). Why is it important to study issues related to gender and information technology? First, it is argued that the information technology sector should value and leverage all kinds of diversity (including gender diversity as one dimension) to enhance productivity, to facilitate IT innovation, and to develop IT for a wide variety of people (Avgerou, 2002; Roberts, 2003; Trauth, Huang, Morgan, Quesenberry, & Yeo, 2006). Second, it is also argued that women’s underrepresentation in and exclusion from information technology can be attributed to power and socio-cultural reproduction of inequality through technology development and use, and the historically socialconstruction of technology fields as “masculine” domains, which result in a gendered digital divide (Cockburn, 1985; Kvasny & Trauth, 2002; Kvasny & Truex, 2001; Wajcman, 1991, 2004; Woodfield, 2000). Ignorance or failure to address issues related to gender and IT will further marginalize women’s participation in future economic and social development, and will endanger social equality and social welfare in general (Kvasny & Trauth, 2002). A significant trend of the contemporary information technology industry is towards globalization, which is manifested through a variety of established practices such as IT offshore outsourcing, global software development, and innovation through global R&D (research & design) collaboration (Sahay, Nicholson, & Krishna, 2003; Walsham, 2000, 2001, 2002). Such a globalization trend of the IT industry and market has put forward new challenges to gender and IT research, to incorporate the cross-cultural dimension. Similar to the rationale for studying gender and IT in developed countries (leveraging diversity and improving social inclusion), Hafkin and Taggart (2001) argued that it is imperative to examine the cultural factors while studying gender and IT in developing countries


Author(s):  
Haiyan Huang

The underrepresentation of women in the information technology (IT) sector has been widely studied in the contexts of western countries such as North American and Western European countries. These studies indicate that the underrepresentation of women in the IT sector is unveiled in multiple perspectives, including IT access, the development, adoption and use of IT, IT education, and the IT workforce in general and within the IT workforce structure itself (e.g., different levels of IT positions) (Cooper & Weaver, 2003; Gürer & Camp, 2002; Hartzel, 2003; Klein, Jiang & Tesch, 2002; Margolis & Fisher, 2002; Rommes, 2002; Trauth, 2002; von Hellens, Neilsen, & Beekhuyzen, 2001; Webster, 1996). Why is it important to study issues related to gender and information technology? First, it is argued that the information technology sector should value and leverage all kinds of diversity (including gender diversity as one dimension) to enhance productivity, to facilitate IT innovation, and to develop IT for a wide variety of people (Avgerou, 2002; Roberts, 2003; Trauth, Huang, Morgan, Quesenberry, & Yeo, 2006). Second, it is also argued that women’s underrepresentation in and exclusion from information technology can be attributed to power and socio-cultural reproduction of inequality through technology development and use, and the historically social-construction of technology fields as “masculine” domains, which result in a gendered digital divide (Cockburn, 1985; Kvasny & Trauth, 2002; Kvasny & Truex, 2001; Wajcman, 1991, 2004; Woodfield, 2000). Ignorance or failure to address issues related to gender and IT will further marginalize women’s participation in future economic and social development, and will endanger social equality and social welfare in general (Kvasny & Trauth, 2002). A significant trend of the contemporary information technology industry is towards globalization, which is manifested through a variety of established practices such as IT offshore outsourcing, global software development, and innovation through global R&D (research & design) collaboration (Sahay, Nicholson, & Krishna, 2003; Walsham, 2000, 2001, 2002). Such a globalization trend of the IT industry and market has put forward new challenges to gender and IT research, to incorporate the cross-cultural dimension. Similar to the rationale for studying gender and IT in developed countries (leveraging diversity and improving social inclusion), Hafkin and Taggart (2001) argued that it is imperative to examine the cultural factors while studying gender and IT in developing countries. Although the research on the cross-cultural dimension of gender relations with information technology is limited, Galpin (2002) pointed out that the underrepresentation of women in IT seems to be a worldwide phenomenon indicated by statistics. Galpin (2002) also pointed out that there is a wide range of participation in IT by women, which is influenced by complex cultural and societal factors that are different from country to country. Models related to gender relations to IT developed in certain socio-cultural contexts may not be applicable to others (Clarke & Teague, 1994a; El Louadi & Everard, 2005; Mukhopadhyay, 1996, 2004). In addition to the importance of studying gender and IT within a specific cultural context, there is another perspective of the cross-cultural dimension of gender and IT: the increasingly diversified global IT workforce as a result of the IT skill shortage, global IT outsourcing, and other global IT collaborations. For example, under the pressure of the skill shortage of the IT workforce in America, the IT institutions and industry turn to the global intellectual pool for recruiting talented international students and skilled IT workers through F-1 and H1-B visas (National Research Council, 2001). According to the 2005 ITAA (Information Technology Association of America) report, the representation of Asian IT workers in the IT workforce doubled the number of Asian worker in the overall workforce in America (ITAA, 2005). Globally, an increasing number of countries have a maturing IT sector, which enables them to enter the global IT outsourcing market or to engage in globally distributed collaborative software work through virtual environment (Trauth et al., 2005). The mobility and cultural diversity of the global IT workforce will add more complexity to articulate their gender relations to IT since individuals may have different cultural backgrounds and experiences. Therefore, it is important for scholars and practitioners to explore the cross-cultural dimension of gender and IT to understand how the nuances of different cultural influences shape women’s relations with IT, to build knowledge with respect to the plural perspective of gender and IT research, and to prepare future global IT workforce. In this article, I first articulate the theoretical underpinnings of cross-cultural dimension of gender and IT research, then review some current studies related to this research area, and finally discuss some future research agendas.


Author(s):  
Borut Werber

This chapter presents the results of an investigation conducted in Slovenia from November 1999 until January 2000, focusing on some basic computer security problems and use of information technology (IT) and information systems (IS) in 122 small Slovenian businesses. The average number of total employees was 5.7, including the owner of the small business. In some countries, businesses of this size are also called ‘very small businesses.’ According to that, this chapter is dedicated to small business owners/managers or those dealing with small businesses. In the first section I present the main reason for this research and discuss some previous research dealing with small business use of IT and computer security practice. In the following section I define small business and the methodology that I used for data collection and analysis. The results were based on interviews given by the owners or managers of these companies. In the results section the overall purpose of this study is presented. The aim of the research was to assess why some Slovene small businesses do not use IT, how IT and IS are used in small businesses, what kind of security measures are used, how many and what kind of problems they had with computer hardware and software, and how they managed to solve those problems. I compare the results with some similar research in other countries.


Author(s):  
Achmad Reza Viyanto ◽  
Okhran Steve Latuihamallo ◽  
Franky Mangihut Tua ◽  
Anderes Gui ◽  
Suryanto Suryanto

The purpose of this study is to identify and quantify risks that may occur any time in the application of information technology in a company, as well as to provide information on the risks associated with the security of information technology system of the company. The methods used are: data collection and analysis techniques. Data collection includes: literature and field studies, in which the field study is conducted by interview and observation. Analytical technique used in the measurement of risk is OCTAVE-S. The results found the risks associated with security management, contingency planning, vulnerability management, as well as design and security architecture. It iscocluded from this this study that there are still a lot of risks that can threaten companies such as lack of contingency and disaster recovery plan.


Sign in / Sign up

Export Citation Format

Share Document