Reconfiguring the firewall: recruiting women to information by Carol J. Burger, Elizabeth G. Creamer, Peggy S. Meszaros PDF

By Carol J. Burger, Elizabeth G. Creamer, Peggy S. Meszaros

ISBN-10: 1439864993

ISBN-13: 9781439864999

ISBN-10: 1568813147

ISBN-13: 9781568813141

This entire quantity addresses the worldwide problem of recruiting women and girls into majors and careers in info know-how. The reviews are either illuminating and prescriptive for designing and imposing intervention courses. a vital instrument for school college and advisors who enforce actions and courses designed to advertise the luck of girls in technology and engineering, in addition to those that fund those courses, educational researchers, K-12 educators, and IT execs devoted to a various team, this assortment contains contributions by way of best researchers and IT execs, together with William Aspray, Bettina Bair, Sarah Berenson, Lenore Blum, Carol J. Burger, Elizabeth G. Creamer, J. McGrath Cohoon, M. Bernardine Dias, Carol Frieze, Orit Hazzan, Ann Howe, Jane Butler Kahle, Sarah Kuhn, Anne Laughlin, Soyoung Lee, Paula G. Leventman, Holly Lord, Miranda Marcus, Cecille Marsh, Peggy S. Meszaros, Joan Michael, Lesley H. Parker, Paula Rayman, Mladen Vouk, Lesley Warner, Laurie Williams, and Judith Wooller.

Show description

Read or Download Reconfiguring the firewall: recruiting women to information technology across cultures and continents PDF

Similar women books

Political Women and American Democracy by Christina Wolbrecht, Karen Beckwith, Lisa Baldez PDF

What can we learn about ladies, politics, and democracy within the usa? The final thirty years have witnessed a impressive raise in women's participation in American politics and an explosion of analysis on girl political actors, and the changes effected by way of them, in the course of the related interval.

Treasures: The Stories Women Tell About the Things They Keep - download pdf or read online

It is a publication approximately reminiscence & which means. those texts deliver to mild the reflections & tales that girls have developed round the gadgets they've got valuable, which some time past could have been deemed unimportant. those items comprise each one woman's lifestyles event & act as a origin for her values & for the improvement of her personality.

Download e-book for kindle: The Tie That Bound Us: The Women of John Brown’s Family and by Bonnie Laughlin-Schultz

John Brown used to be fiercely dedicated to the militant abolitionist reason, a campaign that culminated in Brown's raid at the Federal armory at Harpers Ferry in 1859 and his next execution. much less renowned is his devotion to his relations, they usually to him. of Brown’s sons have been killed at Harpers Ferry, however the dedication of his spouse and daughters usually is going unacknowledged.

Additional resources for Reconfiguring the firewall: recruiting women to information technology across cultures and continents

Sample text

After agreeing on the coding scheme, we returned to the transcripts, coding them separately once again and meeting on several occasions to establish a level of agreement about the coding of the transcripts. As a final step in coding, we entered the data in the qualitative software, ATLAS TI. After that, we dealt with both the original coded transcripts and a printout that summarized responses to all of the key variables in the study. Variables that Influence Women’s Interest in and Choice of an IT Career The following section of the chapter describes key findings, including gender differences, for each of the key variables in the model.

We do not call this variable “selfauthorship” because we have not been able to measure all three dimensions of self-authorship (the intrapersonal, interpersonal, and epistemological dimensions) adequately. We have not been able to achieve satisfactory levels of reliability to include questionnaire items pertaining to the epistemological dimension in our measure. Women scored significantly higher on the variable, decision orientation, than did men, underscoring the influence of others on women’s career choices.

2006). Self-authorship as a framework for understanding life decision-making among college women in Korea. Manuscript submitted for publication. Dryburgh, H. (2000). Underrepresentation of girls and women in computer science: Classification of 1990s research. Journal of Educational Computing Research, 23(2), 181–202. Fassinger, R. E. (1990). Causal models of career choice in two samples of college women. Journal of Vocational Behavior, 36, 225–248. Felsman, D. , & Blustein, D. L. (1999). The role of peer relatedness in late adolescent career development.

Download PDF sample

Reconfiguring the firewall: recruiting women to information technology across cultures and continents by Carol J. Burger, Elizabeth G. Creamer, Peggy S. Meszaros


by James
4.2

Rated 5.00 of 5 – based on 6 votes