{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:51:23Z","timestamp":1742964683679,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840777"},{"type":"electronic","value":"9783031840784"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84078-4_21","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:38Z","timestamp":1741806398000},"page":"301-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Gender Inclusivity Framework for the Cybersecurity Profession in Africa"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"da Veiga","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7191-8690","authenticated-orcid":false,"given":"Ivano","family":"Bongiovanni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"21_CR1","unstructured":"World Economic Forum: Accenture Global cybersecurity outlook 2022, Insight Report (2022). https:\/\/www3.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2022.pdf. Accessed 19 July 2024"},{"key":"21_CR2","unstructured":"Cybersecurity Ventures: Women in cybersecurity 2022 report (2022). https:\/\/cybersecurityventures.com\/wp-content\/uploads\/2022\/09\/Women-In-Cybersecurity-2022-Report-Final.pdf. Accessed 19 July 2024"},{"key":"21_CR3","unstructured":"(ISC)2: Cybersecurity Workforce Study. (ISC)2: Cybersecurity Workforce Study (2022). https:\/\/www.isc2.org\/\/-\/media\/ISC2\/Research\/2022-WorkForce-Study\/ISC2-Cybersecurity-Workforce-Study. Accessed 19 July 2024"},{"key":"21_CR4","unstructured":"Panhans D., Hoteit L., Yousuf S., et al.: Empowering Women to Work in Cybersecurity is a Win-Win (2022). https:\/\/www.bcg.com\/publications\/2022\/empowering-women-to-work-in-cybersecurity-is-a-win-win. Accessed 19 July 2024"},{"key":"21_CR5","unstructured":"Tetteh, H.: Horn of Africa: Using digital technologies to advance women, peace and security agenda. In: United Nations, African Renew (2023). https:\/\/www.un.org\/africarenewal\/magazine\/april-2023\/horn-africa-using-digital-technologies-advance-women-peace-and-security-agenda. Accessed 19 July 2024"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Chibanda, R., Kabanda, S.: Towards an African cybersecurity community of practice. In: EPiC Series in Computing, Proceedings of 43rd Conference of the South African Institute of Computer Scientists and Information Technologists, South Africa, pp. 1\u201314 (2022)","DOI":"10.29007\/cv1x"},{"key":"21_CR7","unstructured":"Collard, A., Oichoe, A.: Tomorrow\u2019s cyber heriones. https:\/\/www.knowbe4.com\/hubfs\/TomorrowsCyberHeroines.pdf. Accessed 15 Feb 2024"},{"key":"21_CR8","unstructured":"United Nations: International Women\u2019s Day: Innovation and technology for gender equality (2023). https:\/\/unric.org\/en\/international-womens-day-2023\/#:~:text=On. Accessed 19 July 2024"},{"key":"21_CR9","unstructured":"United Nations Office on Drugs and Crime (UNODC): Women in cyber a look inside (2022). https:\/\/www.unodc.org\/westandcentralafrica\/uploads\/documents\/Women_in_Cyber_-_Newsletter_-June_2022.pdf. Accessed 15 Feb 2024"},{"key":"21_CR10","unstructured":"African Union: The Digital Transformation Strategy for Africa (2020\u20132030). https:\/\/au.int\/sites\/default\/files\/documents\/38507-doc-dts-english.pdf. Accessed 19 July 2024"},{"key":"21_CR11","unstructured":"Worldometer: Africa population. In: Woldometer. https:\/\/www.worldometers.info\/world-population\/africa-population\/. Accessed 19 July 2024"},{"key":"21_CR12","unstructured":"Reed, J., Acosta-Rubio, J.: Innovation Through Inclusion: The Multicultural Cybersecurity Workforce (2018). https:\/\/www.isc2.org\/-\/media\/Files\/Research\/Innovation-Through-Inclusion-Report.ashx. Accessed 15 Feb 2024"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2021.3127992","volume":"55","author":"N Kshetri","year":"2022","unstructured":"Kshetri, N., Chhetri, M.: Gender asymmetry in cybersecurity: socioeconomic causes and consequences. Computer 55(2), 72\u201377 (2022)","journal-title":"Computer"},{"key":"21_CR14","unstructured":"Maigret, B.: Why women are underrepresented in cybersecurity. In: IoT Forum Africa (2023). https:\/\/www.itnewsafrica.com\/2022\/03\/why-women-are-underrepresented-in-cybersecurity\/. Accessed 19 July 2024"},{"key":"21_CR15","unstructured":"UNSW: Why we need gender diversity in cyber security. In: UNSW (2022). https:\/\/studyonline.unsw.edu.au\/blog\/gender-diversity-cyber-security. Accessed 19 July 2024"},{"key":"21_CR16","first-page":"5","volume":"1","author":"MJ Cobb","year":"2028","unstructured":"Cobb, M.J.: Plugging the skills gap: the vital role that women should play in cyber-security. Comput. Fraud Secur. 1, 5\u20138 (2028)","journal-title":"Comput. Fraud Secur."},{"key":"21_CR17","unstructured":"Deloitte: Cybersecurity and women: A call for diversity (2021). https:\/\/www.deloitte.com\/an\/en\/services\/risk-advisory\/blogs\/cybersecurity-and-women-a-call-for-diversity.html. Accessed 19 July 2024"},{"key":"21_CR18","unstructured":"Bongiovanni, I., Gale, M.: Women in Cyber (2023). https:\/\/business.uq.edu.au\/files\/97978\/women-in-cyber-exploring-the-barriers-report.pdf. Accessed 15 Feb 2024"},{"key":"21_CR19","unstructured":"James, S.L.: The Underrepresentation of Females in the United States Cybersecurity Workforce: A Multiple-case Study. Proquest Dissertations and Theses, Capella University (2019)"},{"key":"21_CR20","unstructured":"Foley, M., Dewey, L., Williamson, S., et al: Women in Cyber Security Literature Review (2017). https:\/\/www.homeaffairs.gov.au\/cyber-security-subsite\/files\/cyber-security-literature-review.pdf. Accessed 19 July 2024"},{"key":"21_CR21","unstructured":"Risse, L., Beamond, M., Hall, J., et al.: Women in Security Preliminary Insights Report (2022). https:\/\/www.rmit.edu.au\/content\/dam\/rmit\/au\/en\/research\/networks-centres-groups\/centre-for-cyber-security\/preliminary-insights-report.pdf. Accessed 15 Feb 2024"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Botha-Badenhorst, D., Veerasamy, N.: Examining barriers to entry: disparate gender representation in cybersecurity within sub-saharan africa. In: Moffett, S., Barrett, S., Reid, A. (eds) vol. 6, no. 1: Proceedings of the 6th International Conference on Gender Research, pp. 47\u201355. Academic Conferences International, United Kingdom (2023)","DOI":"10.34190\/icgr.6.1.1148"},{"issue":"2","key":"21_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"M Grant","year":"2019","unstructured":"Grant, M., Booth, A., Centre, S.: A typology of reviews: an analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 26(2), 91\u2013108 (2019)","journal-title":"Health Inf. Libr. J."},{"issue":"4","key":"21_CR24","doi-asserted-by":"publisher","first-page":"264","DOI":"10.7326\/0003-4819-151-4-200908180-00135","volume":"151","author":"D Moher","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting items for systematic reviews and meta-analyses: the prisma statement. Ann. Intern. Med. 151(4), 264\u2013270 (2009)","journal-title":"Ann. Intern. Med."},{"key":"21_CR25","unstructured":"Ili\u0107-Kosanovi\u0107, T., \u0160trbac, K.: Women in cyber security jobs. In: U\u0161iak, J., Koll\u00e1r, D (eds.) 15th Annual International Scientific Conference, pp. 90\u201397. Interpolis, Banska Bystrica, Slovakia (2022)"},{"key":"21_CR26","unstructured":"Wilkonson, S.: Ripping Off The Hoodie: Encouraging the Next Generation of STEM Girls. Independently Published (2020)"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Mountrouidou, X., Vosen, D., Kari, C., et al.: Securing the human: a review of literature on broadening diversity in cybersecurity education. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE, pp. 157\u2013176. Association for Computing Machinery (ACM), Aberdeen, Scotland (2019)","DOI":"10.1145\/3344429.3372507"},{"issue":"3","key":"21_CR28","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/ICS-05-2021-0067","volume":"30","author":"M Shan","year":"2022","unstructured":"Shan, M., Yang, J.: Investigating the accessibility and impacts of cybersecurity programs on high-school girls\u2019 long-term industry engagement. Inf. Comput. Secur. 30(3), 309\u2013323 (2022)","journal-title":"Inf. Comput. Secur."},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Smith, S., Taylor-Smith, E., Fabian, K., et al. Computing degree apprenticeships: an opportunity to address gender imbalance in the IT sector?. In: IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, pp. 1-8 (2020)","DOI":"10.1109\/FIE44824.2020.9274144"},{"key":"21_CR30","volume-title":"Human Behavior at Work","author":"JW Newstrom","year":"2011","unstructured":"Newstrom, J.W.: Human Behavior at Work. Thirteenth. McGraw-Hill, New York (2011)"},{"key":"21_CR31","volume-title":"Organisational Change and Development - An African Perspective","author":"R Viljoen","year":"2015","unstructured":"Viljoen, R.: Organisational Change and Development - An African Perspective. Knowres Publishing, Randburg, South Africa (2015)"},{"key":"21_CR32","volume-title":"ADKAR: A Model for Change in Business, Government and Our Community","author":"JM Hiatt","year":"2006","unstructured":"Hiatt, J.M.: ADKAR: A Model for Change in Business, Government and Our Community, 1st edn. Prosci Learning Centre Publications, Colorado, USA (2006)","edition":"1"},{"key":"21_CR33","unstructured":"United Nations Population Fund: Frequently asked questions about gender equality (2005). https:\/\/www.unfpa.org\/resources\/frequently-asked-questions-about-gender-equality#:~:text=Gender equity is the process. Accessed 9 Aug 2023"},{"key":"21_CR34","unstructured":"UNICEF Regional Office for South Asia: Gender equality: Glossary of terms and concepts (2017). https:\/\/www.unicef.org\/rosa\/media\/1761\/file\/Genderglossarytermsandconcepts.pdf. Accessed 19 July 2024"},{"key":"21_CR35","unstructured":"Elliott, J.: Requisite Organization: A Total System for Effective Managerial Organization and Managerial Leadership for the 21st Century. 2nd edn. Cason Hall, Arlington, VA (1998)"},{"key":"21_CR36","unstructured":"Statista: Global adult literacy rate from 2000 to 2020, by gender (2020). https:\/\/www.statista.com\/statistics\/1220131\/global-adult-literacy-rate-by-gender\/. Accessed 19 July 2024"},{"key":"21_CR37","unstructured":"Statista: The illiteracy rate among all adults in 2020. In: Statista (2020). https:\/\/www.statista.com\/statistics\/262886\/illiteracy-rates-by-world-regions\/. Accessed 19 July 2024"},{"key":"21_CR38","unstructured":"Statista: Adult literacy rate in Sub-Saharan Africa from 2000\u20132020, by gender. In: Stastista (2022). https:\/\/www.statista.com\/statistics\/1233102\/adult-literacy-rate-in-sub-saharan-africa\/. Accessed 19 July 2024"},{"key":"21_CR39","unstructured":"Statista, Internet usage in Africa - statistics & facts (2024). https:\/\/www.statista.com\/topics\/9813\/internet-usage-in-africa\/. Accessed 19 July 2024"},{"key":"21_CR40","doi-asserted-by":"crossref","unstructured":"Addison, C.: Housework and the correction of gender inequity. J. Afr. Thought 13(2), 289\u2013292 (2021)","DOI":"10.4102\/ink.v13i2.25"},{"key":"21_CR41","unstructured":"Robbins, S.P., Judge, T.A., Odendaal, A., Roodt G.: Organisational Behaviour: Global and Southern African Perspectives. 3rd edn. Pearson, Cape Town (2013)"},{"issue":"1","key":"21_CR42","first-page":"1","volume":"25","author":"AI Al-Alawi","year":"2023","unstructured":"Al-Alawi, A.I., Al-Khaja, N.A., Mehrotra, A.A.: Women in cybersecurity: a study of the digital banking sector in Bahrain. J. Int. Women\u2019s Stud. 25(1), 1\u201329 (2023)","journal-title":"J. Int. Women\u2019s Stud."},{"key":"21_CR43","unstructured":"Saunders, M., Lewis, P., Thornhill, A.: Research Methods for Business Students, 7th edn. Pearson, Harlow (2016)"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84078-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:59Z","timestamp":1741806419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84078-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840777","9783031840784"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84078-4_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}