{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:45:07Z","timestamp":1772822707329,"version":"3.50.1"},"publisher-location":"Cham","reference-count":76,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168474","type":"print"},{"value":"9783032168481","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16848-1_32","type":"book-chapter","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:06:41Z","timestamp":1772802401000},"page":"425-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridging the Cybersecurity Gender Disparity Gap in Botswana"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1571-6266","authenticated-orcid":false,"given":"Leirwang Lily","family":"Molatlhegi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"Da Veiga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0545-3688","authenticated-orcid":false,"given":"Sunet","family":"Eybers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","unstructured":"Millar, K., Shires, J., Tropina, T.: Gender approaches to cybersecurity\u202f: design , defence and response. Geneva United Nations Inst. Disarm. Res., pp. 1\u201381 (2021). https:\/\/doi.org\/10.37559\/GEN\/21\/01","DOI":"10.37559\/GEN\/21\/01"},{"key":"32_CR2","unstructured":"Osborne, C.: Women Cybersecurity 2022 report. Cybersecurity Ventur., pp. 1\u201321 (2022)"},{"key":"32_CR3","doi-asserted-by":"publisher","unstructured":"Kshetri, N., Chhetri, M.: Gender Asymmetry in Cybersecurity: Socioeconomic Causes and Consequences. Computer (Long. Beach. Calif)., 55(February), 72\u201377 (2022). https:\/\/doi.org\/10.1109\/MC.2021.3127992","DOI":"10.1109\/MC.2021.3127992"},{"key":"32_CR4","unstructured":"Sofie, R., Toft, E.: The Impact of Gender Equality in the Cybersecurity Sector. Univ. Agder, pp. 1\u201369 (2023)"},{"key":"32_CR5","doi-asserted-by":"publisher","unstructured":"Yao, D., Bertino, E.: CCS 2017: Women in Cyber Security (CyberW) Workshop - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2631\u20132632 (2017). https:\/\/doi.org\/10.1145\/3133956.3137041","DOI":"10.1145\/3133956.3137041"},{"key":"32_CR6","doi-asserted-by":"publisher","unstructured":"Ramonyai, T.M., Mpekoa, N., Tom, S.: Cyber security skills development in south africa: addressing the gender gap in the industry. 2024 Conf. Inf. Commun. Technol. Soc. ICTAS 2024 - Proc., pp. 144\u2013149 (2024). https:\/\/doi.org\/10.1109\/ICTAS59620.2024.10507137","DOI":"10.1109\/ICTAS59620.2024.10507137"},{"issue":"2022","key":"32_CR7","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.procs.2023.01.379","volume":"219","author":"S Sarefo","year":"2023","unstructured":"Sarefo, S., Dawson, M., Banyatsang, M.: An exploratory analysis of the cybersecurity threat landscape for Botswana. Procedia Comput. Sci. 219(2022), 1012\u20131022 (2023). https:\/\/doi.org\/10.1016\/j.procs.2023.01.379","journal-title":"Procedia Comput. Sci."},{"key":"32_CR8","unstructured":"Panhans, D., et al.: Empowering Women to Work in Cybersecurity is a Win-Win, pp. 1\u201319 (2022). https:\/\/www.bcg.com\/publications\/2022\/empowering-women-to-work-in-cybersecurity-is-a-win-win"},{"key":"32_CR9","unstructured":"Peacock, D., Irons, A.: Gender inequalities in cybersecurity: exploring the gender gap in opportunities and progression. Int. J. Gender, Sci. Technol. 9(1), 25\u201344 (2018)"},{"issue":"3","key":"32_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.48009\/3_iis_2023_108","volume":"24","author":"K Lingelbach","year":"2023","unstructured":"Lingelbach, K.: A study of female cybersecurity professionals. Issues Inf. Syst. 24(3), 83\u201396 (2023). https:\/\/doi.org\/10.48009\/3_iis_2023_108","journal-title":"Issues Inf. Syst."},{"key":"32_CR11","unstructured":"Berr\u00edos, N., Cruz, A.: Increasing the participation of young women in cybersecurity. Electr. Comput. Eng. Comput. Sci. Dep. Abstr., pp. 1\u20136 (2019)"},{"key":"32_CR12","unstructured":"ISC2. Cybersecurity Workforce Study. Forrester Res., pp. 1\u201386 (2022). www.isc2.org\/research"},{"key":"32_CR13","unstructured":"Foley, M., et al.: Women in cyber security literature review. Public Serv. Res. Gr., pp. 1\u201336 (2017)"},{"issue":"102080","key":"32_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.102080","volume":"100","author":"S Furnell","year":"2021","unstructured":"Furnell, S.: The cybersecurity workforce and skills. Comput. Secur. 100(102080), 1\u20137 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102080","journal-title":"Comput. Secur."},{"issue":"4","key":"32_CR15","first-page":"361","volume":"3","author":"E Botlhale","year":"2020","unstructured":"Botlhale, E.: Gender equality in Botswana: an unfulfilled agenda. Int. J. Gend. Stud. Dev. Soc. 3(4), 361\u2013374 (2020)","journal-title":"Int. J. Gend. Stud. Dev. Soc."},{"key":"32_CR16","unstructured":"Serianu Limited. Cyber security skills gap. Africa Cyber Immers. Cent., pp. 1\u201380 (2018)"},{"issue":"2","key":"32_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.11591\/edulearn.v14i2.15312","volume":"14","author":"AW Mogwe","year":"2020","unstructured":"Mogwe, A.W., Balotlegi, P.A.: Barriers of information communiction technology ( ICT ) adoption in Botswanas\u2019 primary education. J. Educ. Learing 14(2), 217\u2013226 (2020). https:\/\/doi.org\/10.11591\/edulearn.v14i2.15312","journal-title":"J. Educ. Learing"},{"issue":"1","key":"32_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/1364557032000119616","volume":"8","author":"H Arksey","year":"2005","unstructured":"Arksey, H., O\u2019Malley, L.: Scoping studies: towards a methodological framework. Int. J. Soc. Res. Methodol. Theory Pract. 8(1), 19\u201332 (2005). https:\/\/doi.org\/10.1080\/1364557032000119616","journal-title":"Int. J. Soc. Res. Methodol. Theory Pract."},{"issue":"2","key":"32_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"MJ Grant","year":"2009","unstructured":"Grant, M.J., Booth, A.: A typology of reviews: an analysis of 14 review types and associated methodologies. Health Info. Libr. J. 26(2), 91\u2013108 (2009). https:\/\/doi.org\/10.1111\/j.1471-1842.2009.00848.x","journal-title":"Health Info. Libr. J."},{"issue":"12","key":"32_CR20","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1016\/j.jclinepi.2014.03.013","volume":"67","author":"HL Colquhoun","year":"2014","unstructured":"Colquhoun, H.L., et al.: Scoping reviews: time for clarity in definition, methods, and reporting. J. Clin. Epidemiol. 67(12), 1291\u20131294 (2014). https:\/\/doi.org\/10.1016\/j.jclinepi.2014.03.013","journal-title":"J. Clin. Epidemiol."},{"key":"32_CR21","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.jclinepi.2020.10.009","volume":"130","author":"H Khalil","year":"2021","unstructured":"Khalil, H., et al.: Conducting high quality scoping reviews-challenges and solutions. J. Clin. Epidemiol. 130, 156\u2013160 (2021). https:\/\/doi.org\/10.1016\/j.jclinepi.2020.10.009","journal-title":"J. Clin. Epidemiol."},{"issue":"1","key":"32_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/cbo9780511814563.003","volume":"5","author":"D Levac","year":"2010","unstructured":"Levac, D., Colquhoun, H., O\u2019Brien, K.: Scoping studies: advancing the methodology. Implement. Sci. 5(1), 1\u20139 (2010). https:\/\/doi.org\/10.1017\/cbo9780511814563.003","journal-title":"Implement. Sci."},{"key":"32_CR23","doi-asserted-by":"publisher","unstructured":"Tricco, A.C., et al.: A scoping review of rapid review methods. BMC Med. 13(1) (2015). https:\/\/doi.org\/10.1186\/s12916-015-0465-6","DOI":"10.1186\/s12916-015-0465-6"},{"issue":"5","key":"32_CR24","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.ijsu.2010.02.007","volume":"8","author":"D Moher","year":"2010","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Int. J. Surg. 8(5), 336\u2013341 (2010). https:\/\/doi.org\/10.1016\/j.ijsu.2010.02.007","journal-title":"Int. J. Surg."},{"key":"32_CR25","doi-asserted-by":"publisher","unstructured":"Almeida, F.: Computers & Security Comparative analysis of EU-based cybersecurity skills frameworks. Comput. Secur. 151(104329), 1\u201310 (2025). https:\/\/doi.org\/10.1016\/j.cose.2025.104329.","DOI":"10.1016\/j.cose.2025.104329"},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.5688\/ajpe7113","volume":"84","author":"AJ Kleinheksel","year":"2020","unstructured":"Kleinheksel, A.J., Rockich-winston, N., Tawfik, H., Wyatt, T.R.: Qualitative research in pharmacy education demystifying content analysis. Am. J. Pharm. Educ. 84(1), 127\u2013137 (2020). https:\/\/doi.org\/10.5688\/ajpe7113","journal-title":"Am. J. Pharm. Educ."},{"issue":"3","key":"32_CR27","first-page":"1","volume":"20","author":"M Vaismoradi","year":"2019","unstructured":"Vaismoradi, M., Snelgrove, S.: Theme in qualitative content analysis and thematic analysis. ForumQualitative Soc. Res. 20(3), 1\u201314 (2019)","journal-title":"ForumQualitative Soc. Res."},{"issue":"2","key":"32_CR28","doi-asserted-by":"publisher","first-page":"127","DOI":"10.2478\/bsaft-2023-0014","volume":"28","author":"DN Burrell","year":"2023","unstructured":"Burrell, D.N., Mcandrew, I.: Addressing bio-cybersecurity workforce employee shortages in biotechnology and health science sectors in the U.S. Sci. Bull. 28(2), 127\u2013141 (2023). https:\/\/doi.org\/10.2478\/bsaft-2023-0014","journal-title":"Sci. Bull."},{"key":"32_CR29","doi-asserted-by":"publisher","unstructured":"Shumba, R., et al.: Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. ITiCSE-WGR 2013 - Proc. ACM Conf. Innov. Technol. Comput. Sci. Educ., pp. 1\u201313 (2013). https:\/\/doi.org\/10.1145\/2543882.2543883","DOI":"10.1145\/2543882.2543883"},{"key":"32_CR30","doi-asserted-by":"publisher","unstructured":"Maraj, A., Sutherland, C., Butler, W.: Studying the challenges and factors encouraging girls in cybersecurity\u202f: a case study. Fulbright Scholarsh. Progr., pp. 1\u201311 (2021). https:\/\/doi.org\/10.34190\/EWS.21.004","DOI":"10.34190\/EWS.21.004"},{"key":"32_CR31","first-page":"577","volume":"555","author":"WR Poster","year":"2018","unstructured":"Poster, W.R.: Cybersecurity needs women. Macmillan Publ. Limited 555, 577\u2013581 (2018)","journal-title":"Macmillan Publ. Limited"},{"key":"32_CR32","first-page":"1","volume":"2","author":"JO Esin","year":"2020","unstructured":"Esin, J.O.: A call for concern\u202f: the unbalanced representation of minorities and women in cybersecurity profession. J. Women Minor. Technol. 2, 1\u201311 (2020)","journal-title":"J. Women Minor. Technol."},{"issue":"September","key":"32_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2020.02204","volume":"11","author":"S Gonz\u00e1lez-P\u00e9rez","year":"2020","unstructured":"Gonz\u00e1lez-P\u00e9rez, S., Mateos de Cabo, R., S\u00e1inz, M.: Girls in STEM: is it a female role-model thing? Front. Psychol. 11(September), 1\u201321 (2020). https:\/\/doi.org\/10.3389\/fpsyg.2020.02204","journal-title":"Front. Psychol."},{"issue":"3","key":"32_CR34","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1108\/ICS-05-2021-0067","volume":"30","author":"M Shan","year":"2022","unstructured":"Shan, M., Yang, J.: Investigating the accessibility and impacts of cybersecurity programs on high-school girls\u2019 long-term industry engagement. Inf. Comput. Secur. 30(3), 309\u2013323 (2022). https:\/\/doi.org\/10.1108\/ICS-05-2021-0067","journal-title":"Inf. Comput. Secur."},{"key":"32_CR35","unstructured":"Brown, D., Pytlak, A.: Why gender matters in international cyber security. Women\u2019s Int. Leag. Peace Free. 1(April), pp. 1\u201328 (2020). www.wilpf.org"},{"key":"32_CR36","doi-asserted-by":"publisher","unstructured":"Richardson, K., Burrell, D.N., Nobles, C., Wright, J.B., Ferreras-Perez, J., Aridi, A.S.: Women in information technology and cybersecurity in healthcare. Handb. Res. Cybersecurity Risk Contemp. Bus. Syst., no. April, pp. 365\u2013380 (2023). https:\/\/doi.org\/10.4018\/978-1-6684-7207-1.ch019","DOI":"10.4018\/978-1-6684-7207-1.ch019"},{"key":"32_CR37","doi-asserted-by":"publisher","unstructured":"Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., Briggs, P.: Exploring age and gender differences in ICT cybersecurity behavior. Hum. Behav. Emerg. Technol., no. October, pp. 1\u201310 (2022). https:\/\/doi.org\/10.1155\/2022\/2693080","DOI":"10.1155\/2022\/2693080"},{"issue":"3","key":"32_CR38","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1108\/ICS-08-2021-0129","volume":"30","author":"A Withanaarachchi","year":"2022","unstructured":"Withanaarachchi, A., Vithana, N.: Female underrepresentation in the cybersecurity workforce \u2013 a study on cybersecurity professionals in Sri Lanka. Inf. Comput. Secur. 30(3), 402\u2013421 (2022). https:\/\/doi.org\/10.1108\/ICS-08-2021-0129","journal-title":"Inf. Comput. Secur."},{"key":"32_CR39","unstructured":"Lihammer, S., Hagman, L.: Investigating gender disparity within cyber security. KTH R. Inst. Technol., pp. 1\u2013101 (2021)"},{"key":"32_CR40","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Human Behav. 69, 437\u2013443 (2017). https:\/\/doi.org\/10.1016\/j.chb.2016.12.040","journal-title":"Comput. Human Behav."},{"key":"32_CR41","doi-asserted-by":"crossref","unstructured":"Bagchi-sen, S., Rao, H.R., Upadhyaya, S.J.: Women in cybersecurity\u202f: a study of career advancement. IEEE, no. February, pp. 1\u20138 (2010)","DOI":"10.1109\/MITP.2010.39"},{"key":"32_CR42","unstructured":"Lingelbach, K.: Perceptions of Female Cybersecurity Professionals toward Factors that Encourage Females to the Cybersecurity Field - Qualitative (2018)"},{"key":"32_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2023.103316","volume":"132","author":"JS Giboney","year":"2023","unstructured":"Giboney, J.S., et al.: Barriers to a cybersecurity career: analysis across career stage and gender. Comput. Secur. 132, 1\u201312 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103316","journal-title":"Comput. Secur."},{"key":"32_CR44","doi-asserted-by":"publisher","unstructured":"Corneliussen, H.G.: What brings women to cybersecurity?: a qualitative study of women\u2019s pathways to cybersecurity in Norway. ACM Int. Conf. Proceeding Ser., no. November, pp. 10\u201312 (2020). https:\/\/doi.org\/10.1145\/3424954.3424965","DOI":"10.1145\/3424954.3424965"},{"key":"32_CR45","unstructured":"Ili\u0107-Kosanovi\u0107, T., \u0160trbac, K.: Women in cyber security jobs. 15th Annu. Int. Sci. Conf., pp. 90\u201397 (2022)"},{"issue":"4","key":"32_CR46","doi-asserted-by":"publisher","first-page":"110","DOI":"10.48009\/4_iis_2023_109","volume":"24","author":"SR Terrell","year":"2023","unstructured":"Terrell, S.R., Lingelbach, K.: Validating prior research: a qualitative study of the career perspectives and experiences of female cybersecurity professionals. Issues Inf. Syst. 24(4), 110\u2013114 (2023). https:\/\/doi.org\/10.48009\/4_iis_2023_109","journal-title":"Issues Inf. Syst."},{"issue":"2","key":"32_CR47","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/IJCRE.2021070105","volume":"3","author":"R Beveridge","year":"2021","unstructured":"Beveridge, R.: Addressing the gender gap in the cybersecurity workforce. Int. J. Cyber Res. Educ. 3(2), 54\u201361 (2021). https:\/\/doi.org\/10.4018\/IJCRE.2021070105","journal-title":"Int. J. Cyber Res. Educ."},{"key":"32_CR48","unstructured":"World Economic Forum, \u201cGlobal cybersecurity outlook 2022,\u201d INSIGHT Rep., pp. 1\u201336 (2022). https:\/\/www3.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2022.pdf"},{"key":"32_CR49","doi-asserted-by":"publisher","unstructured":"Chaparro Osman, M., Namukasa, M., Ficke, C., Piasecki, I., OConnor, T., Carroll, M.: Understanding how to diversify the cybersecurity workforce: a qualitative analysis. J. Cybersecurity Educ. Res. Pract. 2(4), pp. 1\u201312 (2023). https:\/\/doi.org\/10.32727\/8.2023.23","DOI":"10.32727\/8.2023.23"},{"key":"32_CR50","unstructured":"Zlatolas, L.N., Burmicky, J., Welzer, T.: Recruiting women into cybersecurity. WomenEncourage, pp. 1\u20132 (2023). http:\/\/arxiv.org\/abs\/2301.12000"},{"issue":"1","key":"32_CR51","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1108\/ICS-03-2023-0042","volume":"32","author":"M Dev","year":"2023","unstructured":"Dev, M., Saha, D.: Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation. Inf. Comput. Secur. 32(1), 74\u201392 (2023). https:\/\/doi.org\/10.1108\/ICS-03-2023-0042","journal-title":"Inf. Comput. Secur."},{"key":"32_CR52","doi-asserted-by":"publisher","unstructured":"Balut, C., Heller, R.S., Wash, T.: Closing the gap\u202f: a department of defense ( DoD ) conference on re-entry for women veterans into cybersecurity careers. J. Tech. Eng. 2(1), 38\u201347 (2022). https:\/\/doi.org\/10.24840\/2795-4005","DOI":"10.24840\/2795-4005"},{"key":"32_CR53","doi-asserted-by":"crossref","unstructured":"Botha-badenhorst, D., Veerasamy, N.: Examining barriers to entry\u202f: disparate gender representation in cybersecurity within Sub-Saharan Africa. 6th Int. Conf. Gend. Res., pp. 47\u201356 (2023)","DOI":"10.34190\/icgr.6.1.1148"},{"issue":"1","key":"32_CR54","doi-asserted-by":"publisher","first-page":"280","DOI":"10.48009\/1_iis_2023_124","volume":"24","author":"N Bromall","year":"2023","unstructured":"Bromall, N., Slonka, K., Draus, P., Mishra, S.: Factors and experiences that prepare students for a cyber career: a gender-based study. Issues Inf. Syst. 24(1), 280\u2013290 (2023). https:\/\/doi.org\/10.48009\/1_iis_2023_124","journal-title":"Issues Inf. Syst."},{"issue":"5","key":"32_CR55","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1111\/isj.12327","volume":"31","author":"Y Suseno","year":"2021","unstructured":"Suseno, Y., Abbott, L.: Women entrepreneurs\u2019 digital social innovation: linking gender, entrepreneurship, social innovation and information systems. Inf. Syst. J. 31(5), 717\u2013744 (2021). https:\/\/doi.org\/10.1111\/isj.12327","journal-title":"Inf. Syst. J."},{"key":"32_CR56","doi-asserted-by":"publisher","unstructured":"Thuraisingham, B.: Keynote: why a Cyber Security career for a woman?. CyberW 2017 - Proc. 2017 Work. Women Cyber Secur. co-located with CCS 2017, vol. 2017-Janua, pp. 1\u20133 (2017). https:\/\/doi.org\/10.1145\/3139531.3139532","DOI":"10.1145\/3139531.3139532"},{"key":"32_CR57","unstructured":"Al-alawi, A.I.: A study of the digital banking sector in. J. Int. Women\u2019s Stud. Women Cybersecurity 25(1), 1\u201321 (2023)"},{"key":"32_CR58","unstructured":"Weingarten, E., Garcia, M.: Decrypting the cybersecurity gender gap. New Am., no. November, pp. 1\u201325 (2015). https:\/\/www.jstor.org\/stable\/resrep10470"},{"key":"32_CR59","unstructured":"Sundiatu Dixon-Fyle, S.P., Hunt, V., Dolan, K.: Diversity wins!. McKinsey, pp. 1\u201356 (2020)"},{"issue":"2","key":"32_CR60","first-page":"1","volume":"1","author":"A Aljuaid","year":"2023","unstructured":"Aljuaid, A., Liu, X.M.: Sociocultural barriers for female participation in STEM\u202f: a case of saudi women in cybersecurity sociocultural barriers for female participation in STEM\u202f: a case of Saudi Women. J. Cybersecurity Educ. Res. Pract. 1(2), 1\u201313 (2023)","journal-title":"J. Cybersecurity Educ. Res. Pract."},{"issue":"7\u20138","key":"32_CR61","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11199-021-01224-7","volume":"85","author":"AA Rogers","year":"2021","unstructured":"Rogers, A.A., Boyack, M.K., Cook, R.E., Allen, E.: School connectedness and STEM orientation in adolescent girls: the role of perceived gender discrimination and implicit gender-science stereotypes. Sex Roles 85(7\u20138), 405\u2013421 (2021). https:\/\/doi.org\/10.1007\/s11199-021-01224-7","journal-title":"Sex Roles"},{"key":"32_CR62","doi-asserted-by":"publisher","unstructured":"Turner, R., M\u2019Manga, A.: Requirements for a platform that improves the number of young women entering cybersecurity. 35th Br. HCI Conf. Towar. a Human-Centred Digit. Soc. HCI 2022, pp. 1\u20134 (2022). https:\/\/doi.org\/10.14236\/ewic\/HCI2022.41","DOI":"10.14236\/ewic\/HCI2022.41"},{"key":"32_CR63","doi-asserted-by":"publisher","unstructured":"Datta, P., Panda, S.N., Bajaj, S.: Data analysis of cyber security for women in Haryana. ICRITO 2020 - IEEE 8th Int. Conf. Reliab. Infocom Technol. Optim. (Trends Futur. Dir., pp. 763\u2013767 (2020). https:\/\/doi.org\/10.1109\/ICRITO48877.2020.9197788","DOI":"10.1109\/ICRITO48877.2020.9197788"},{"key":"32_CR64","unstructured":"Dallaway, E.: Closing the gender gap in retina. Retin. Today, pp. 1\u201311 (2020)"},{"issue":"1","key":"32_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4102\/AC.V23I1.1173","volume":"23","author":"SE Nene","year":"2023","unstructured":"Nene, S.E., Hewitt, L.M.: Implementing artificial intelligence in South African public hospitals: a conceptual framework. Acta Commer. 23(1), 1\u20136 (2023). https:\/\/doi.org\/10.4102\/AC.V23I1.1173","journal-title":"Acta Commer."},{"issue":"2","key":"32_CR66","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/14703297.2013.809011","volume":"52","author":"J Berman","year":"2015","unstructured":"Berman, J., Smyth, R.: Conceptual frameworks in the doctoral research process: a pedagogical model. Innov. Educ. Teach. Int. 52(2), 125\u2013136 (2015). https:\/\/doi.org\/10.1080\/14703297.2013.809011","journal-title":"Innov. Educ. Teach. Int."},{"issue":"1","key":"32_CR67","doi-asserted-by":"publisher","first-page":"126","DOI":"10.18546\/LRE.18.1.09","volume":"18","author":"E Gregory","year":"2020","unstructured":"Gregory, E.: Methodological challenges for the qualitative researcher: the use of a conceptual framework within a qualitative case study. London Rev. Educ. 18(1), 126\u2013141 (2020). https:\/\/doi.org\/10.18546\/LRE.18.1.09","journal-title":"London Rev. Educ."},{"issue":"2","key":"32_CR68","doi-asserted-by":"publisher","first-page":"8","DOI":"10.7748\/nr.23.2.8.s3","volume":"23","author":"W Durham","year":"2015","unstructured":"Durham, W., Sykes, C., Piper, S., Stokes, P.: Conceptual frameworks and terminology in doctoral nursing research. Nurse Res. 23(2), 8\u201312 (2015). https:\/\/doi.org\/10.7748\/nr.23.2.8.s3","journal-title":"Nurse Res."},{"issue":"1","key":"32_CR69","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1080\/09589236.2021.2004539","volume":"31","author":"H Peterson","year":"2022","unstructured":"Peterson, H., Jordansson, B.: Gender mainstreaming in Swedish academia: translating policy into practice. J. Gend. Stud. 31(1), 87\u2013100 (2022). https:\/\/doi.org\/10.1080\/09589236.2021.2004539","journal-title":"J. Gend. Stud."},{"key":"32_CR70","unstructured":"Derbyshire, H., Nadja, D., Ahluwalia, K.: Untangling gender mainstreaming\u202f: a theory of change based on experience and reflection. Gend. Dev. Netw., pp. 1\u201321 (2015)"},{"issue":"2","key":"32_CR71","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1177\/1350506816632560","volume":"24","author":"A Alonso","year":"2017","unstructured":"Alonso, A.: Who learns what from whom? Implementing gender mainstreaming in multi-level settings. Eur. J. Women\u2019s Stud. 24(2), 174\u2013188 (2017). https:\/\/doi.org\/10.1177\/1350506816632560","journal-title":"Eur. J. Women\u2019s Stud."},{"issue":"7","key":"32_CR72","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1002\/jid.3753","volume":"35","author":"FY Su","year":"2023","unstructured":"Su, F.Y., Yang, W.Y.: Gender-focused or gender mainstreaming programmes? The gender dimension of international aid. J. Int. Dev. 35(7), 1874\u20131891 (2023). https:\/\/doi.org\/10.1002\/jid.3753","journal-title":"J. Int. Dev."},{"issue":"6","key":"32_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/dpr.12718","volume":"41","author":"R Smith","year":"2023","unstructured":"Smith, R., Mdee, A., Sallu, S.: How gender mainstreaming plays out in Tanzania\u2019s climate-smart agricultural policy: isomorphic mimicry of international discourse. Dev. Policy Rev. 41(6), 1\u201325 (2023). https:\/\/doi.org\/10.1111\/dpr.12718","journal-title":"Dev. Policy Rev."},{"issue":"1","key":"32_CR74","first-page":"61","volume":"16","author":"TL Adepoju","year":"2022","unstructured":"Adepoju, T.L.: Management strategies and policy initiatives for bridging gender gap in science and technology education in Nigerian higher institutions of learning. Bulg. J. Sci. Educ. Policy 16(1), 61\u201392 (2022)","journal-title":"Bulg. J. Sci. Educ. Policy"},{"issue":"2","key":"32_CR75","doi-asserted-by":"publisher","first-page":"166","DOI":"10.18196\/jgp.102103","volume":"10","author":"MA Hidayahtulloh","year":"2019","unstructured":"Hidayahtulloh, M.A., Hutami, A.N.: Collaborative governance in gender mainstreaming policy In Yogyakarta City. J. Stud. Pemerintah. 10(2), 166\u2013182 (2019). https:\/\/doi.org\/10.18196\/jgp.102103","journal-title":"J. Stud. Pemerintah."},{"issue":"1","key":"32_CR76","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1177\/0956247816662573","volume":"29","author":"CON Moser","year":"2017","unstructured":"Moser, C.O.N.: Gender transformation in a new global urban agenda: challenges for Habitat III and beyond. Environ. Urban. 29(1), 221\u2013236 (2017). https:\/\/doi.org\/10.1177\/0956247816662573","journal-title":"Environ. Urban."}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16848-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:06:47Z","timestamp":1772802407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16848-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168474","9783032168481"],"references-count":76,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16848-1_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cartagena de Indias","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}