{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:24Z","timestamp":1763467824869,"version":"3.41.2"},"reference-count":78,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T00:00:00Z","timestamp":1195516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11,20]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This article aims to investigate prototypes of excellent performance in IT consulting and to examine the gender typing of the critical attributes used in prototyping.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Exploratory qualitative data were collected from focus group sessions and interviews of employees of a large international IT consulting firm. Responses were coded according to the gender typing of elicited attributes and content analysis was used to examine responses across stakeholders and levels.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The picture that emerged of a \u201ctop performer\u201d covered a variety of skills and attributes, and overall was somewhat masculine\u2010typed. An employee's own characterization of excellent performance in his\/her own job level was not necessarily congruent with other stakeholders' perceptions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Data were collected from only one US\u2010based company and client perceptions were not directly assessed. Future research is needed to establish how prototypes impact performance evaluations and employee outcomes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>List of top performer attributes suggests ways in which IS\/IT curricula could be improved, and also will be useful for recruitment and development of top performers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper goes beyond identifying necessary skill sets to examine what \u201cexcellence\u201d means to various stakeholders. It suggests it may be critical to understand how employees match up, or not, to this prototype.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593840710839815","type":"journal-article","created":{"date-parts":[[2007,11,24]],"date-time":"2007-11-24T07:01:49Z","timestamp":1195887709000},"page":"400-424","source":"Crossref","is-referenced-by-count":32,"title":["What it takes to succeed in information technology consulting"],"prefix":"10.1108","volume":"20","author":[{"given":"K.D.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Kristine M.","family":"Kuhn","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012920333145000_b1","doi-asserted-by":"crossref","unstructured":"Aday, M. and Kaiser, K. (2006), \u201cFactors influencing girls' choice of information technology careers\u201d, in Trauth, E. (Ed.), Encyclopedia of Gender and Information Technology, Idea Group, Hershey, PA.","DOI":"10.4018\/978-1-59140-815-4.ch044"},{"key":"key2022012920333145000_b2","doi-asserted-by":"crossref","unstructured":"Abdolmohammadi, M.J., Searfoss, D.G. and Shanteau, J. (2004), \u201cAn investigation of the attributes of top industry audit specialists\u201d, Behavioral Research in Accounting, Vol. 16, pp. 1\u201017.","DOI":"10.2308\/bria.2004.16.1.1"},{"key":"key2022012920333145000_b3","doi-asserted-by":"crossref","unstructured":"Agars, M. (2004), \u201cReconsidering the impacts of gender sterotypes on the advancement of women in organizations\u201d, Psychology of Women Quarterly, Vol. 28, pp. 103\u201011.","DOI":"10.1111\/j.1471-6402.2004.00127.x"},{"key":"key2022012920333145000_b4","doi-asserted-by":"crossref","unstructured":"Ahuja, M. (2002), \u201cWomen in the information technology profession: a literature review, synthesis and research agenda\u201d, European Journal of Information Systems, Vol. 11 No. 1, pp. 20\u201034.","DOI":"10.1057\/palgrave.ejis.3000417"},{"key":"key2022012920333145000_b5","doi-asserted-by":"crossref","unstructured":"Atwater, L.E., Brett, J.F., Waldman, D., DiMare, L. and Hayden, M.V. (2004), \u201cMen's and women's perceptions of the gender typing of management subroles\u201d, Sex Roles, Vol. 50, pp. 191\u20109.","DOI":"10.1023\/B:SERS.0000015551.78544.35"},{"key":"key2022012920333145000_b6","doi-asserted-by":"crossref","unstructured":"Barnes\u2010Farrell, J.L., Heureux\u2010Barrett, T.J. and Conway, J.M. (1991), \u201cImpact of gender\u2010related job features on the accurate evaluation of performance information\u201d, Organizational Behavior and Human Decision Processes, Vol. 48, pp. 23\u201035.","DOI":"10.1016\/0749-5978(91)90003-C"},{"key":"key2022012920333145000_b7","doi-asserted-by":"crossref","unstructured":"Basselier, G., Reich, B.H. and Benbasat, I. (2001), \u201cInformation technology competence of business managers: a definition and research model\u201d, Journal of Management Information Systems, Vol. 17 No. 4, pp. 159\u201082.","DOI":"10.1080\/07421222.2001.11045660"},{"key":"key2022012920333145000_b8","doi-asserted-by":"crossref","unstructured":"Bassellier, G., Benbasat, I. and Reich, B.H. (2003), \u201cDevelopment of measures of IT competence in business managers\u201d, Information Systems Research, Vol. 14 No. 4, pp. 317\u201036.","DOI":"10.1287\/isre.14.4.317.24899"},{"key":"key2022012920333145000_b9","unstructured":"Bem, S. (1981), Bem Sex\u2010Role Inventory, Consulting Psychologists Press, Redwood City, CA."},{"key":"key2022012920333145000_b10","doi-asserted-by":"crossref","unstructured":"Bloodstein, O. and Grossman, M. (1981), \u201cEarly stutterings: some aspects of their form and distribution\u201d, Journal of Speech and Hearing Research, Vol. 24, pp. 298\u2010302.","DOI":"10.1044\/jshr.2402.298"},{"key":"key2022012920333145000_b11","doi-asserted-by":"crossref","unstructured":"Bowen, C.C., Swim, J.K. and Jacobs, R.R. (2000), \u201cEvaluating gender biases on actual job performance of real people: a meta\u2010analysis\u201d, Journal of Applied Social Psychology, Vol. 30, pp. 2194\u2010215.","DOI":"10.1111\/j.1559-1816.2000.tb02432.x"},{"key":"key2022012920333145000_b12","doi-asserted-by":"crossref","unstructured":"Brenner, O.C., Tomkiewicz, J. and Schein, V.E. (1989), \u201cThe relationship between sex role stereotypes and requisite\u201d, Academy of Management Journal, Vol. 32 No. 3, pp. 662\u20109.","DOI":"10.5465\/256439"},{"key":"key2022012920333145000_b13","unstructured":"Brown, P. (2004), \u201cStill a ways to go\u201d, InformationWeek."},{"key":"key2022012920333145000_b14","unstructured":"Campbell, D. and Johnson, S. (2001), \u201cComparing syntactic complexity in medical and non\u2010medical corpora\u201d, paper presented at the AMIA Annul Fall Symposium, Washington, DC."},{"key":"key2022012920333145000_b15","unstructured":"Cappelli, P. (2000), \u201cIs there a shortage of information technology workers?\u201d War for Technical Talent Project, available at: www.programmersguild.org\/wharton.doc."},{"key":"key2022012920333145000_b16","doi-asserted-by":"crossref","unstructured":"Cejka, M.A. and Eagly, A. (1999), \u201cGender\u2010stereotypic images of occupations correspond to the sex segregation of employment\u201d, Personality and Social Psychology Bulletin, Vol. 25 No. 4, pp. 413\u201023.","DOI":"10.1177\/0146167299025004002"},{"key":"key2022012920333145000_b17","unstructured":"Cockburn, C. (1985), Machinery of Dominance: Women, Men and Technical Know\u2010How, Pluto Press, London."},{"key":"key2022012920333145000_b18","doi-asserted-by":"crossref","unstructured":"Costa, P.J., Terracciano, A. and McCrae, R.R. (2001), \u201cGender differences in personality traits across cultures: robust and surprising findings\u201d, Journal of Personality & Social Psychology, Vol. 81 No. 2, pp. 322\u201031.","DOI":"10.1037\/0022-3514.81.2.322"},{"key":"key2022012920333145000_b19","unstructured":"Council of Economic Advisers (2000), Opportunities and Gender Pay Equity in New Economy Occupations. Available at: clinton3.nara.gov\/WH\/EOP\/CEA\/html\/whitepapers.html."},{"key":"key2022012920333145000_b20","doi-asserted-by":"crossref","unstructured":"Davison, H.K. and Burke, M.J. (2000), \u201cSex discrimination in simulated employment contexts: a meta\u2010analytic investigation\u201d, Journal of Vocational Behavior, Vol. 56 No. 2, pp. 225\u201048.","DOI":"10.1006\/jvbe.1999.1711"},{"key":"key2022012920333145000_b21","doi-asserted-by":"crossref","unstructured":"Diekman, A.B. and Eagly, A.H. (2000), \u201cStereotypes as dynamic constructs: women and men of the past, present, and future\u201d, Personality and Social Psychology Bulletin, Vol. 26 No. 10, pp. 1171\u201088.","DOI":"10.1177\/0146167200262001"},{"key":"key2022012920333145000_b22","doi-asserted-by":"crossref","unstructured":"Eagly, A. and Karau, S. (2002), \u201cRole congruity theory of prejudice toward female leaders\u201d, Psychological Review, Vol. 109 No. 3, pp. 573\u201098.","DOI":"10.1037\/0033-295X.109.3.573"},{"key":"key2022012920333145000_b23","doi-asserted-by":"crossref","unstructured":"Eagly, A., Karau, S. and Makhinani, M. (1995), \u201cGender and the effectiveness of leader: a meta analysis\u201d, Psychological Bulletin, Vol. 117, pp. 125\u201045.","DOI":"10.1037\/0033-2909.117.1.125"},{"key":"key2022012920333145000_b24","doi-asserted-by":"crossref","unstructured":"Eagly, H. and Wood, W. (1991), \u201cExplaining sex differences in social behavior: a meta\u2010analytic perspective\u201d, Personality and Social Psychology Bulletin, Vol. 17, pp. 306\u201015.","DOI":"10.1177\/0146167291173011"},{"key":"key2022012920333145000_b25","doi-asserted-by":"crossref","unstructured":"Ely, R.J. (1994), \u201cThe effects of organizational demographics and social identity and relationships among professional women\u201d, Administrative Science Quarterly, Vol. 39, pp. 203\u201038.","DOI":"10.2307\/2393234"},{"key":"key2022012920333145000_b26","doi-asserted-by":"crossref","unstructured":"Feldman, J.M. (1981), \u201cBeyond attribution theory: cognitive processes in performance appraisal\u201d, Journal of Applied Psychology, Vol. 66, pp. 127\u201048.","DOI":"10.1037\/0021-9010.66.2.127"},{"key":"key2022012920333145000_b27","unstructured":"Fiske, S. and Taylor, S. (1991), Social Cognition, McGraw\u2010Hill, New York, NY."},{"key":"key2022012920333145000_b28","doi-asserted-by":"crossref","unstructured":"Gallivan, M.J., Truex, D.P. and Kvasny, L. (2004), \u201cChanging patterns in IT skill sets 1988\u20102003: a content analysis of classified advertising\u201d, DATA BASE for Advances in Information Systems, Vol. 35, pp. 64\u201085.","DOI":"10.1145\/1017114.1017121"},{"key":"key2022012920333145000_b29","doi-asserted-by":"crossref","unstructured":"Greening, T. (1999), \u201cGender stereotyping in a computer science course\u201d, ACM SIGCSE Bulletin, Vol. 31 No. 1, pp. 203\u20107.","DOI":"10.1145\/384266.299756"},{"key":"key2022012920333145000_b30","unstructured":"Gutek, B.A. (1985), Sex and the Workplace: Impact of Sexual Behavior and Harassment on Women, Men and Organizations, Jossey\u2010Bass, San Francisco, CA."},{"key":"key2022012920333145000_b31","unstructured":"Hacker, S. (1990), Doing it the Hard Way: Investigations of Gender and Technology, Unwin Hyman, Boston, MA."},{"key":"key2022012920333145000_b32","doi-asserted-by":"crossref","unstructured":"Hazzan, O. and Levy, D. (2006), \u201cWomen, hi\u2010tech and the family\u2010career conflict\u201d, in Trauth, E. (Ed.), Encyclopedia of Gender and Information Technology, Idea Group, Hershey, PA, pp. 7\u201012.","DOI":"10.4018\/978-1-59140-815-4.ch204"},{"key":"key2022012920333145000_b33","unstructured":"Hogan, K. (2001), \u201cWhy IT hates women (and the women who stay anyway)\u201d, CIO Magazine."},{"key":"key2022012920333145000_b34","doi-asserted-by":"crossref","unstructured":"Hosada, J. and Stone, D. (2000), \u201cCurrent gender stereotypes and their evaluative content\u201d, Perceptual and Motor Skills, Vol. 90, pp. 1283\u201094.","DOI":"10.2466\/pms.2000.90.3c.1283"},{"key":"key2022012920333145000_b35","doi-asserted-by":"crossref","unstructured":"Hull, R.P. and Umansky, P. (1997), \u201cAn examination of gender stereotyping as an explanation for vertical job segregation in public accounting\u201d, Accounting, Organizations and Society, Vol. 22 No. 6, pp. 507\u201028.","DOI":"10.1016\/S0361-3682(96)00028-1"},{"key":"key2022012920333145000_b36","doi-asserted-by":"crossref","unstructured":"Hunter, G. (1993), \u201cA strategy for identifying \u2018excellent\u2019 systems analysts\u201d, The Journal of Strategic Information Systems, Vol. 2 No. 1, pp. 15\u201026.","DOI":"10.1016\/0963-8687(93)90019-7"},{"key":"key2022012920333145000_b37","doi-asserted-by":"crossref","unstructured":"Hunter, G. (1994), \u201c\u2018Excellent\u2019 system analysts: key audience perceptions\u201d, Computer Personnel, April, pp. 15\u201031.","DOI":"10.1145\/181883.181885"},{"key":"key2022012920333145000_b38","doi-asserted-by":"crossref","unstructured":"Hunter, G. and Beck, J. (1996a), \u201cA cross\u2010cultural comparison of \u2018excellent\u2019 systems analysts\u201d, Information Systems Journal, Vol. 6 No. 4, pp. 261\u201081.","DOI":"10.1111\/j.1365-2575.1996.tb00018.x"},{"key":"key2022012920333145000_b39","doi-asserted-by":"crossref","unstructured":"Hunter, G. and Beck, J. (1996b), \u201c\u2018Excellent\u2019 systems analysts: the Singapore context\u201d, Asia\u2010Pacific Journal of Management, Vol. 13 No. 2, pp. 25\u201046.","DOI":"10.1007\/BF01733815"},{"key":"key2022012920333145000_b40","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Baroudi, J. (1995), \u201cThe impact of job performance evaluations on career advancement prospects: an examination of gender differences in the IS workplace\u201d, MIS Quarterly, Vol. 19 No. 1, pp. 107\u201023.","DOI":"10.2307\/249713"},{"key":"key2022012920333145000_b41","doi-asserted-by":"crossref","unstructured":"Kennison, S. (1999), \u201cAmerican English usage frequencies for noun phrase and tensed sentence complement\u2010taking verbs\u201d, Journal of Psycholinguistic Research, Vol. 28 No. 2.","DOI":"10.1023\/A:1023210309050"},{"key":"key2022012920333145000_b42","doi-asserted-by":"crossref","unstructured":"Kidder, D. and Parks, J. (2001), \u201cThe good soldier: who is s(he)?\u201d, Journal of Organizational Behavior, Vol. 22 No. 8, pp. 939\u201059.","DOI":"10.1002\/job.119"},{"key":"key2022012920333145000_b43","unstructured":"King, J. (2004), \u201cCareer watch\u201d, Computerworld, May 10."},{"key":"key2022012920333145000_b44","doi-asserted-by":"crossref","unstructured":"Konrad, A.M., Ritchie, J.E., Lieb, P. and Corrigall, E. (2000), \u201cSex differences and similarities in job attribute preferences: a meta\u2010analysis\u201d, Psychological Bulletin, Vol. 126, pp. 593\u2010641.","DOI":"10.1037\/0033-2909.126.4.593"},{"key":"key2022012920333145000_b45","unstructured":"Krotz, J. (2006), \u201cDo women make better managers?\u201d Microsoft\u2010Small Business Center, available at: www.microsoft.com\/smallbusiness\/resources\/management\/leadership\u2010training.mspx."},{"key":"key2022012920333145000_b46","doi-asserted-by":"crossref","unstructured":"Lee, D., Trauth, E. and Farwell, D. (1995), \u201cCritical skills and knowledge requirements of IS professionals: a joint academic and industry investigation\u201d, MIS Quarterly, Vol. 19 No. 3, pp. 313\u201038.","DOI":"10.2307\/249598"},{"key":"key2022012920333145000_b47","doi-asserted-by":"crossref","unstructured":"Lenton, A.P., Blair, I.V. and Hastie, R. (2001), \u201cIllusions of gender: stereotypes evoke false memories\u201d, Journal of Experimental Social Psychology, Vol. 37 No. 1, pp. 3\u201014.","DOI":"10.1006\/jesp.2000.1426"},{"key":"key2022012920333145000_b48","unstructured":"Litecky, C.R., Arnett, K.P. and Prabhakar, B. (2004), \u201cThe paradox of soft skills versus technical skills in hiring\u201d, Journal of Computer Information Systems, Vol. 44, pp. 69\u201076."},{"key":"key2022012920333145000_b49","unstructured":"Margolis, J. and Fisher, A. (2003), Unlocking the Clubhouse: Women in Computing, MIT Press, Cambridge, MA."},{"key":"key2022012920333145000_b50","unstructured":"Margolis, J., Fisher, A. and Miller, F. (1998), Geek Mythology, available at: www.cs.cmu.edu\/ \u223c\u2009gendergap\/working.html."},{"key":"key2022012920333145000_b51","doi-asserted-by":"crossref","unstructured":"Maurer, T.J. and Taylor, M.A. (1994), \u201cIs sex by itself enough? An exploration of gender bias issues in performance appraisal\u201d, Organizational Behavior and Human Decision Processes, Vol. 60, pp. 231\u201051.","DOI":"10.1006\/obhd.1994.1082"},{"key":"key2022012920333145000_b52","unstructured":"Millar, J. and Jagger, N. (2001), Women in ITEC Courses and Careers, Science Policy Research Unit\/Institute of Employment Studies, Brighton."},{"key":"key2022012920333145000_b53","doi-asserted-by":"crossref","unstructured":"Miller, L., Wood, T.A., Halligan, J., Keller, L., Hutchinson\u2010Pike, C., Kornbrot, D. and de Lotz, J. (2000), \u201cSaying \u2018welcome\u2019 is not enough: women, information systems and equity in work\u201d, Career Development International, Vol. 5 No. 7, pp. 379\u201089.","DOI":"10.1108\/13620430010379939"},{"key":"key2022012920333145000_b54","unstructured":"Murray, F. (1993), \u201cA separate reality: science, technology and maculinity\u201d, in Green, E., Owen, J. and Pain, D. (Eds), Gendered By Design: Information Technology and Office Systems, Taylor & Francis, London, pp. 64\u201081."},{"key":"key2022012920333145000_b55","doi-asserted-by":"crossref","unstructured":"Panteli, A., Stack, J., Atkinson, M. and Ramsay, H. (1999), \u201cThe status of women in the UK IT industry: an empirical study\u201d, European Journal of Information Systems, Vol. 8 No. 3, pp. 170\u201082.","DOI":"10.1057\/palgrave.ejis.3000326"},{"key":"key2022012920333145000_b56","doi-asserted-by":"crossref","unstructured":"Powell, G.N., Butterfield, D.A. and Parent, J.D. (2002), \u201cGender and managerial stereotypes: have the times changed?\u201d, Journal of Management, Vol. 28, pp. 177\u201093.","DOI":"10.1177\/014920630202800203"},{"key":"key2022012920333145000_b57","unstructured":"Robinson, G.D. (2005), Three Keys to a More Profitable Business in 2006, Fort Worth Business, Fort Worth, TX."},{"key":"key2022012920333145000_b58","unstructured":"Schein, V.E. (1994), \u201cManagerial sex typing: a persistent and pervasive barrier to women's opportunities\u201d, in Davidson, M.J. and Burker, R.J. (Eds), Women in Management: Current Research Issues, Chapman, London, pp. 41\u201052."},{"key":"key2022012920333145000_b59","unstructured":"Solomon, M. (2000), \u201cWomen face \u2018slow climb\u2019\u201d, Computerworld."},{"key":"key2022012920333145000_b60","doi-asserted-by":"crossref","unstructured":"Spencer, J. and Helmreich, R. (1980), \u201cMasculine instrumentality and feminine expresiveness: their relationships with sex role attitudes and behaviors\u201d, Psychology of Women Quarterly, Vol. 5, pp. 147\u201063.","DOI":"10.1111\/j.1471-6402.1980.tb00951.x"},{"key":"key2022012920333145000_b61","doi-asserted-by":"crossref","unstructured":"Spencer, S.J., Steele, C.M. and Quinn, D.M. (1999), \u201cStereotype threat and women's Math performance\u201d, Journal of Experimental Social Psychology, Vol. 35, pp. 4\u201028.","DOI":"10.1006\/jesp.1998.1373"},{"key":"key2022012920333145000_b62","unstructured":"Stephan, P.E. and Levin, S.G. (2001), \u201cRetention and recruitment of women and minorities in the IT workforce\u201d, paper presented at the ITWF Conference Report, Boulder, CO."},{"key":"key2022012920333145000_b63","doi-asserted-by":"crossref","unstructured":"Stitt\u2010Gohdes, W., Lambrecht, J. and Redmann, D. (2002), \u201cThe critical\u2010incident technique in job behavior research\u201d, Journal of Vocational Education Research, Vol. 25 No. 1.","DOI":"10.5328\/JVER25.1.63"},{"key":"key2022012920333145000_b64","doi-asserted-by":"crossref","unstructured":"Tan, H.T. and Libby, R. (1999), \u201cOrganizational levels and perceived importance of attributes for superior audit performance\u201d, Abacus, Vol. 35, pp. 77\u201090.","DOI":"10.1111\/1467-6281.00035"},{"key":"key2022012920333145000_b65","doi-asserted-by":"crossref","unstructured":"Todd, P., Mckeen, J. and Gallupe, B. (1995), \u201cThe evolution of IS job skills: a content analysis of IS job advertisements from 1970 to 1990\u201d, MIS Quarterly, Vol. 19 No. 1, pp. 1\u201026.","DOI":"10.2307\/249709"},{"key":"key2022012920333145000_b66","unstructured":"Trauth, E. (2000), The Culture of an Information Economy: Influences and Impacts in the Republic of Ireland, Kluwer Academic Publishers, Boston, MA."},{"key":"key2022012920333145000_b67","doi-asserted-by":"crossref","unstructured":"Trauth, E. (2002), \u201cOdd girl out: an individual differences perspective on women in the IT profession\u201d, Information Technology & People, Vol. 15 No. 2, pp. 98\u2010109.","DOI":"10.1108\/09593840210430552"},{"key":"key2022012920333145000_b68","doi-asserted-by":"crossref","unstructured":"Trauth, E., Farwell, D. and Lee, D. (1993), \u201cThe IS expectation gap: industry expectations versus academic preparation (in application)\u201d, MIS Quarterly, Vol. 17 No. 3, pp. 293\u2010307.","DOI":"10.2307\/249773"},{"key":"key2022012920333145000_b69","unstructured":"Trauth, E.M., Nielsen, S.H. and von Hellens, L.A. (2003), \u201cExplaining the IT gender gap: Australian stories for the New Millennium\u201d, Journal of Research and Practice in Information Technology, Vol. 35 No. 1, pp. 7\u201020."},{"key":"key2022012920333145000_b70","doi-asserted-by":"crossref","unstructured":"Trauth, E.M., Quesenberry, J. and Huang, H. (2006), \u201cCross\u2010cultural influences on women in the IT workforce\u201d, in Shayo, C., Kaiser, K. and Ryan, T. (Eds), Proceedings of the ACM SIGMIS Computer Personnel Research Conference, ACM Press, Claremont, CA, pp. 12\u201019.","DOI":"10.1145\/1125170.1125178"},{"key":"key2022012920333145000_b71","doi-asserted-by":"crossref","unstructured":"Trauth, E., Quesenberry, J. and Morgan, A. (2004), \u201cUnderstanding the under representation of women in IT: toward a theory of individual differences\u201d, Special Interest Group on Computer Personnel Research Annual Conference archive, Proceedings of the 2004 SIGMIS Conference on Computer Personnel Research, pp. 114\u2010119.","DOI":"10.1145\/982372.982400"},{"key":"key2022012920333145000_b72","unstructured":"Vaas, L. (2000), \u201cHow to beat the odds\u201d, EWeek, Vol. 17, p. 61."},{"key":"key2022012920333145000_b73","unstructured":"Vitello, J. (1997), \u201cHard facts on soft skills\u201d, ComputerWorld, October 13."},{"key":"key2022012920333145000_b74","unstructured":"Wajcman, J. (1991), Feminism Confronts Technology, Polity Press, Cambridge."},{"key":"key2022012920333145000_b75","doi-asserted-by":"crossref","unstructured":"Watson, H., Young, D., Miranda, S., Robichaux, B. and Seerley, R. (1990), \u201cRequisite skills for new hires\u201d, Database, Spring, pp. 20\u20109.","DOI":"10.1145\/95367.95374"},{"key":"key2022012920333145000_b76","doi-asserted-by":"crossref","unstructured":"Weber, R. (1990), Basic Content Analysis, 2nd ed., Sage, Newbury Park, CA.","DOI":"10.4135\/9781412983488"},{"key":"key2022012920333145000_b77","doi-asserted-by":"crossref","unstructured":"Willemsen, T.M. (2002), \u201cGender typing of the successful manager \u2013 a stereotype reconsidered\u201d, Sex Roles, Vol. 46 Nos 11\u201012, pp. 385\u201091.","DOI":"10.1023\/A:1020409429645"},{"key":"key2022012920333145000_b78","doi-asserted-by":"crossref","unstructured":"Woodfield, R. (2002), \u201cWoman and information systems development: not just a pretty (inter)face?\u201d, Information Technology & People, Vol. 15 No. 2, pp. 119\u201038.","DOI":"10.1108\/09593840210430561"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593840710839815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840710839815\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840710839815\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:53Z","timestamp":1753403813000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/20\/4\/400-424\/175612"}},"subtitle":["Exploring the gender typing of critical attributes"],"short-title":[],"issued":{"date-parts":[[2007,11,20]]},"references-count":78,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,11,20]]}},"alternative-id":["10.1108\/09593840710839815"],"URL":"https:\/\/doi.org\/10.1108\/09593840710839815","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2007,11,20]]}}}