{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:39:11Z","timestamp":1756463951404,"version":"3.41.2"},"reference-count":48,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to present results of interviews with Australian students in junior, middle and senior secondary\u2010school. It also aims to provide a current insight into the declining diversity of the information technology (IT) student cohort that is not captured in the existing literature. Educational psychology theories of self\u2010efficacy shed light on the development of like and dislike towards aspects of IT, it also seeks to consider the career choice decision\u2010making theories and models to understand the cost\u2010benefit dimensions of career choice in young people in the twenty\u2010first century. Socio\u2010cultural factors that condition young women for their expected role in society also apply to career choice and build a theoretical framework for the research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Qualitative research methodology of semi\u2010structured focus group interviews were conducted with students of both genders from three different year levels. The interviews were analysed using a meta matrix approach aligned with themes suggested in the literature.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>This research found that IT rarely entered their schematic repertoire of possible future careers, a schematic repertoire strongly influenced by parental opinion and habitus at all stages of education. While it would appear that there is a deficit in student knowledge of what an IT career involves beyond that of the most stereotypical portrayal of a programmer, this deficit of knowledge is evident in both genders. While it would appear that there is a deficit in student knowledge of what an IT career involves beyond that of the most stereotypical portrayal of a programmer, this deficit of knowledge is evident in both genders. This research found a pattern of factors specific to Information Technology that encouraged some males to choose this career path and a pattern of inhibiting factors that had a stronger negative impact on young women than young men.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>It is apparent from this study that the lack of women in IT is not necessarily a gender issue, but an issue embedded in the image of the IT discipline, an image of lower status than most other professional careers. It is apparent from this study that the lack of women in IT is not necessarily a gender issue, but an issue embedded in the image of the IT discipline, an image of lower status than most other professional careers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A positive implication is that there is little differentiation between the genders in IT use, despite greater confidence in technical ability residing with males.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>A lack of diversity in a workforce is detrimental to creativity and future design. IT professionals, industry and academics need to work together to engender greater interest in this discipline and increase their focus on parents of students.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper adds to current theory by suggesting that parents remain the primary influencers to student career and course choices. A second important contribution to current theory is the perpetuation of the poor image that students hold of the IT profession.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593841211254330","type":"journal-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T09:03:56Z","timestamp":1390554236000},"page":"281-299","source":"Crossref","is-referenced-by-count":16,"title":["Sequential attrition of secondary school student interest in IT courses and careers"],"prefix":"10.1108","volume":"25","author":[{"given":"Catherine","family":"Lang","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021120181638100_b1","doi-asserted-by":"crossref","unstructured":"Adya, M. and Kaiser, K. (2005), \u201cEarly determinants of women in the IT workforce: a model of girls\u2019 career choices\u201d, Information Technology & People, Vol. 18 No. 3, pp. 230\u201059.","DOI":"10.1108\/09593840510615860"},{"key":"key2022021120181638100_b2","doi-asserted-by":"crossref","unstructured":"Anderson, P. (1998), \u201cChoice: can we choose it?\u201d, in Radford, J. (Ed.), Gender and Choice in Education and Occupation, Routledge, London, pp. 141\u201061.","DOI":"10.4324\/9780203443118_chapter_7"},{"key":"key2022021120181638100_b3","unstructured":"Bandura, A. (1997), Self\u2010Efficacy: The Exercise of Control, W.H. Freeman & Company, New York, NY."},{"key":"key2022021120181638100_b4","doi-asserted-by":"crossref","unstructured":"Barker, L.J. and Aspray, W. (2006), \u201cThe state of research on girls and IT\u201d, in Aspray, J.M.C.a.W. (Ed.), Women and Information Technology: Research on Underrepresentation, MIT Press, Cambridge, pp. 3\u201054.","DOI":"10.7551\/mitpress\/9780262033459.003.0001"},{"key":"key2022021120181638100_b5","unstructured":"Blum, L. and Frieze, C. (2003), \u201cAs the culture of computing evolves, similarity can be the difference\u201d, available at: www.cs.washington.edu (accessed 28 January 2010)."},{"key":"key2022021120181638100_b6","doi-asserted-by":"crossref","unstructured":"Bruckman, A., Biggers, M., Ericson, B., McKlin, T., Dimond, J., DiSalvo, B., Hewner, M., Ni, L. and Yardi, S. (2009), \u201c\u2018Georgia computes!\u2019: improving the computing education pipeline\u201d, Proceedings of the 40th ACM Technical Symposium on Computer Science Education, Vol. 41 No. 1, pp. 86\u201090.","DOI":"10.1145\/1539024.1508899"},{"key":"key2022021120181638100_b7","doi-asserted-by":"crossref","unstructured":"Charles, M. and Bradley, K. (2006), \u201cA matter of degrees: female underrepresentation in computer science programs cross\u2010nationally\u201d, in Aspray, J.M.C.a.W. (Ed.), Women and Information Technology, MIT Press, Cambridge, MA, pp. 183\u2010203.","DOI":"10.7551\/mitpress\/9780262033459.003.0006"},{"key":"key2022021120181638100_b8","doi-asserted-by":"crossref","unstructured":"Cohoon, J.M. and Aspray, W. (2006), \u201cA critical review of the research on women's participation in postsecondary computing education\u201d, in Aspray, J.M.C.a.W. (Ed.), Women and Information Technology: Research on Underrepresentation, The MIT Press, Cambridge, pp. 137\u201080.","DOI":"10.7551\/mitpress\/9780262033459.003.0005"},{"key":"key2022021120181638100_b900","unstructured":"Clements, D. (2002), \u201cWhat are the theories behind computer technology gender gap?\u201d, in VOANews.com, Voice of America, Washington."},{"key":"key2022021120181638100_b9","doi-asserted-by":"crossref","unstructured":"Craig, A., Lang, C. and Fisher, J. (2008), \u201cTwenty years of girls into computing days: has it been worth the effort?\u201d, Journal of Information Technology Education, Vol. 7, pp. 339\u201053.","DOI":"10.28945\/193"},{"key":"key2022021120181638100_b10","unstructured":"Creamer, E. and Meszaros, P. (2009), \u201cGender differences in factors that promote an interest in IT among high school and early and late college students\u201d, Americas Conference on Information Systems (AMCIS), San Francisco, CA, 6\u20109 August."},{"key":"key2022021120181638100_b11","doi-asserted-by":"crossref","unstructured":"Durndell, A. and Thomson, K. (1997), \u201cGender and computing: a decade of change?\u201d, Computers and Education, Vol. 28 No. 1, pp. 1\u20109.","DOI":"10.1016\/S0360-1315(96)00034-6"},{"key":"key2022021120181638100_b12","doi-asserted-by":"crossref","unstructured":"Durndell, A., Glissov, P. and Siann, G. (1995), \u201cGender and computing: persisting differences\u201d, Educational Research, Vol. 37 No. 3, pp. 219\u201027.","DOI":"10.1080\/0013188950370301"},{"key":"key2022021120181638100_b13","unstructured":"Eisenhardt, K.M. (2002), \u201cBuilding theories from case study research\u201d, The Qualitative Researcher's Companion, in Huberman, A.M. and Miles, M.B. (Eds), Sage Publications Inc, California, pp. 5\u201035."},{"key":"key2022021120181638100_b14","unstructured":"Furger, R. (1998), Does Jane Compute? Preserving our Daughters\u2019 Place in the Cyber Revolution, Warner Books Inc, New York, NY."},{"key":"key2022021120181638100_b15","unstructured":"Gherardi, S. and Turner, B. (2002), \u201cReal men don\u2019t collect soft data\u201d, The Qualitative Researcher's Companion, in Huberman, A.M. and Miles, M.B. (Eds), Sage Publications Inc, California, pp. 81\u2010100."},{"key":"key2022021120181638100_b16","unstructured":"Gibbs, A. (1997), \u201cFocus groups\u201d, available at: www.soc.surrey.ac.uk\/sru\/SRU19.html (accessed 21 January 2004)."},{"key":"key2022021120181638100_b17","doi-asserted-by":"crossref","unstructured":"Hodkinson, P. and Sparkes, A.C. (1997), \u201cCareership: a sociological theory of career decision making\u201d, British Journal of Sociology of Education, Vol. 18 No. 1, pp. 29\u201044.","DOI":"10.1080\/0142569970180102"},{"key":"key2022021120181638100_b18","unstructured":"Hofstede, G. and Hofstede, G.J. (2005), Cultures and Organizations: Software of the Mind: Intercultural Cooperation and its Importance for Survival, McGraw\u2010Hill, London."},{"key":"key2022021120181638100_b19","unstructured":"Hossler, D., Schmit, J. and Vesper, N. (1999), Going to College: How Social, Economic, and Educational Factors Influence the Decisions Students Make, The John Hopkins University Press, Baltimore, MD."},{"key":"key2022021120181638100_b20","doi-asserted-by":"crossref","unstructured":"Huff, C. (2002), \u201c\u2018Gender, software design, and occupational equity\u2019, inroads: paving the way towards excellence in computing education. Women and computing\u201d, SIGCSE Bulletin, Vol. 34 No. 2, pp. 112\u20105.","DOI":"10.1145\/543812.543842"},{"key":"key2022021120181638100_b21","unstructured":"Jewell, H. and Maltby, J.R. (2001), \u201cFemale involvement in information technology degrees: perception, expectation and enrolment\u201d, ACIS 2001, Southern Cross University, Coffs Harbour, 5\u20107 December."},{"key":"key2022021120181638100_b22","unstructured":"Lancy, D.F. (1993), Qualitative Research in Education, An Introduction to the Major Traditions, Longman Publishing Group, New York, NY."},{"key":"key2022021120181638100_b23","unstructured":"Lang, C. (1999), \u201cFactors accounting for the gender imbalance in computing degree enrolments\u201d, thesis, Monash University, Clayton, pp. 1\u2010132."},{"key":"key2022021120181638100_b24","unstructured":"Lang, C. (2010), Why IT Rarely Enters Students\u2019 Schematic Repertoire of Future Careers, A Gendered Analysis of Student Course and Career Choices Related to IT in the 21st Century. VDM Verlag Dr. Muller Aktiengesellschaft & Co. KG, Saarbrucken, 26\u201030 June."},{"key":"key2022021120181638100_b25","unstructured":"Lang, C., Egan, M.A. and Peters, J. (2009), Multi\u2010Level International Programs Working to Change Perceptions about IT Courses and Careers, Grace Hopper Celebration of Women in Computing, Anita Borg Institute for Women and Technology, Tucson, AZ."},{"key":"key2022021120181638100_b26","doi-asserted-by":"crossref","unstructured":"Lang, C., Craig, A., Fisher, J. and Forgasz, H. (2010), \u201cCreating digital divas \u2013 scaffolding perception change through secondary school and university alliances\u201d, The 15th Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara.","DOI":"10.1145\/1822090.1822103"},{"key":"key2022021120181638100_b27","doi-asserted-by":"crossref","unstructured":"Leslie, L.L., McClure, G.T. and Oaxaca, R. (1998), \u201cWomen and minorities in science and engineering: a life sequence analysis\u201d, Journal of Higher Education, Vol. 69 No. 3, pp. 239\u201077.","DOI":"10.2307\/2649188"},{"key":"key2022021120181638100_b28","unstructured":"Lewis, M. (1995), \u201cFocus group interviews in qualitative research: a review of the literature\u201d, available at: www2\/\/fhs.usyd.edu.au\/arow\/arer\/0002.htm (accessed 21 January 2004)."},{"key":"key2022021120181638100_b29","unstructured":"Mackenzie, J. (1998), \u201cGroup\u2010interviewing of pupils \u2013 one experience\u201d, available at: www.scre.ac.uk\/tpr\/observations\/obs10\/obs10mackenzie.htm (accessed 21 January 2004)."},{"key":"key2022021120181638100_b30","unstructured":"Margolis, J. and Fisher, A. (2002), Unlocking the Clubhouse: Women in Computing, The MIT Press, Cambridge, MA."},{"key":"key2022021120181638100_b31","unstructured":"Maxwell, J.A. (2002), \u201cUnderstanding and validity in qualitative research\u201d, The Qualitative Researcher's Companion, in Huberman, A.M.a.M. and Matthew B. (Eds), Sage Publications Inc, California, pp. 37\u201064."},{"key":"key2022021120181638100_b32","unstructured":"Miles, M.B. and Huberman, A.M. (1994), Qualitative Data Analysis: An Expanded Sourcebook, Sage Publications Inc, California."},{"key":"key2022021120181638100_b33","unstructured":"MMV (2001), Reality Bytes: An In Depth Analysis of Attitudes about Technology and Career Skills, State Government, Melbourne, Vic, p. 64."},{"key":"key2022021120181638100_b901","unstructured":"MMV (2010), 2010 ICT Skills Snapshot: The State of ICT Skills in Victoria, Melbourne, available at: www.mmv.vic.gov.au (accessed 26 April 2012)."},{"key":"key2022021120181638100_b34","unstructured":"Pajares, F. (2002), \u201cSelf\u2010efficacy beliefs in academic contexts: an outline\u201d, available at: www.emory.edu\/EDUCATION\/mfp\/effpage.htmlweb (accessed 8 February 2002)."},{"key":"key2022021120181638100_b35","doi-asserted-by":"crossref","unstructured":"Rayman, P. and Brett, B. (1995), \u201cWomen science majors: what makes a difference in persistence after graduation?\u201d, Journal of Higher Education, Vol. 66 No. 4, pp. 388\u2010415.","DOI":"10.2307\/2943794"},{"key":"key2022021120181638100_b36","unstructured":"Schofield, J.W. (2002), \u201cIncreasing the generalizability of qualitative research\u201d, in Huberman, A.M. and Miles, M.B. (Eds), The Qualitative Researcher's Companion, Sage Publications Inc, California, pp. 171\u201093."},{"key":"key2022021120181638100_b37","doi-asserted-by":"crossref","unstructured":"Siann, G. and Callaghan, M. (2001), \u201cChoices and barriers: factors influencing women's choice of higher education in science, engineering and technology\u201d, Journal of Further and Higher Education (UK), Vol. 25 No. 1, pp. 85\u201095.","DOI":"10.1080\/03098770020030524"},{"key":"key2022021120181638100_b902","unstructured":"Stewart Millar, M. (1998), Cracking the gender code: who rules the wired world? in McAuley, B., Women's issues publishing program, Pluto Press, Ontario, Toronto, p. 230."},{"key":"key2022021120181638100_b38","unstructured":"Strauss, A. and Corbin, J. (1998), Basics of Qualitative Research, SAGE Publications Inc, Thousand Oaks, CA."},{"key":"key2022021120181638100_b39","doi-asserted-by":"crossref","unstructured":"Trauth, E.M. (2002), \u201cOdd girl out: an individual differences perspective on women in the IT profession\u201d, Information Technology & People, Vol. 15 No. 2, pp. 98\u2010118.","DOI":"10.1108\/09593840210430552"},{"key":"key2022021120181638100_b40","unstructured":"Trauth, E.M. (2011), \u201cWhat can we learn from gender research? Seven lessons for business research methods\u201d, The Electronic Journal of Business research Methods, Vol. 9 No. 1, pp. 1\u20109."},{"key":"key2022021120181638100_b41","unstructured":"VCAA (2010), \u201cSection 2: satisfactory completion of VCE units\u201d, available at: www.vcaa.vic.edu.au\/vcaa\/vce\/statistics\/2010\/statssect2.html (accessed 8 April 2010)."},{"key":"key2022021120181638100_b42","unstructured":"von Hellens, L., Nielsen, S., Greenhill, A. and Pringle, R. (1997), \u201cGender and cultural influences in IT education\u201d, Pacific Asia Conference on Information Systems (PACIS), Brisbane, 1\u20105 April."},{"key":"key2022021120181638100_b43","doi-asserted-by":"crossref","unstructured":"Wajcman, J. (2000), \u201cReflections on gender and technology studies: in what state is the art?\u201d, Social Studies of Science, Vol. 30 No. 3, pp. 447\u201064.","DOI":"10.1177\/030631200030003005"},{"key":"key2022021120181638100_b44","unstructured":"Wiersma, W. (1995), Research methods in Education: An introduction, Allyn and Bacon, MA."},{"key":"key2022021120181638100_b45","doi-asserted-by":"crossref","unstructured":"Wigfield, A. and Eccles, J. (2000), \u201cExpectancy\u2010value theory of achievement motivation\u201d, Contemporary Educational Psychology, Vol. 25 No. 1, pp. 68\u201081.","DOI":"10.1006\/ceps.1999.1015"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593841211254330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841211254330\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841211254330\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:37:14Z","timestamp":1753403834000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/25\/3\/281-299\/187576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,8,17]]}},"alternative-id":["10.1108\/09593841211254330"],"URL":"https:\/\/doi.org\/10.1108\/09593841211254330","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2012,8,17]]}}}