{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:35:53Z","timestamp":1772847353839,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,7]]},"DOI":"10.1109\/ictas59620.2024.10507137","type":"proceedings-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T17:39:17Z","timestamp":1714066757000},"page":"144-149","source":"Crossref","is-referenced-by-count":7,"title":["Cyber security skills development in South Africa: Addressing the Gender Gap in the Industry"],"prefix":"10.1109","author":[{"given":"Tebogo Motlatso","family":"Ramonyai","sequence":"first","affiliation":[{"name":"University of Johannesburg,Academy of Computer Science &amp; Software Engineering,Cape Town,South Africa"}]},{"given":"Noluntu","family":"Mpekoa","sequence":"additional","affiliation":[{"name":"University of Johannesburg,Academy of Computer Science &amp; Software Engineering,Cape Town,South Africa"}]},{"given":"Sheethal","family":"Tom","sequence":"additional","affiliation":[{"name":"IIE Varsity College,School of Information Technology,Cape Town,South Africa"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23962\/10539\/32213"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2466-4.ch063"},{"key":"ref3","article-title":"ITWeb TV: Appalling gender gap persists in SA cyber security sector","volume-title":"ITWEB AFRICA","author":"Malinga","year":"2023"},{"key":"ref4","first-page":"216","article-title":"Cyberlaws privacy and data ownership","volume-title":"WSIS Forum 2017 Forum Track Outcomes, ITU","author":"Ronchi"},{"key":"ref5","article-title":"The State of Cybersecurity in South Africa","volume-title":"Doctoral dissertation","author":"Sekgololo","year":"2021"},{"key":"ref6","article-title":"Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens","year":"2018","journal-title":"Cybersecurity Workforce Study"},{"key":"ref7","article-title":"Representation of Women in Cybersecurity Remains Stagnant, Despite Recent Efforts to Balance the Scales","volume-title":"Security Intelligence","author":"Ricciuto","year":"2017"},{"key":"ref8","volume-title":"Beyond 11%: A study into why women are not entering cybersecurity","year":"2017"},{"issue":"1","key":"ref9","first-page":"25","article-title":"Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression","volume":"9","author":"Peacock","year":"2017","journal-title":"Int. J. Gender Sci. Technol."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4102\/ajcd.v3i1.36"},{"key":"ref11","first-page":"1","article-title":"Social costs of the COVID-19 pandemic","author":"Pereznieto","year":"2021","journal-title":"The Independent Panel for Pandemic Preparedness and Response"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2308\/HORIZONS-2020-034"},{"key":"ref13","article-title":"Gender inequality and its impact on economic growth: a study of the relationship between gender inequality in employment, education and growth in South Africa","volume-title":"Doctoral dissertation","author":"Ruiters","year":"2018"},{"key":"ref14","article-title":"Cybersecurity Capability and Capacity Building for South Africa. In This Changes Everything\u2013ICT and Climate Change: What Can We Do?","volume-title":"13th IFIP TC 9 International Conference on Human Choice and Computers.HCC13 2018","author":"Jansen van Vuuren"},{"key":"ref15","volume-title":"Diversity matters","author":"Hunt","year":"2015"},{"key":"ref16","article-title":"Having more female leaders may boost companies\u2019 share price performance, Credit Suisse says","volume-title":"CNBC","author":"Taylor","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2021.114523"},{"key":"ref18","volume-title":"The coding manual for qualitative researchers","author":"Salda\u00f1a","year":"2021"},{"key":"ref19","article-title":"WIIT works to empower and support girls and women to progress their careers in the IT space","volume-title":"WIIT","year":"2021"},{"key":"ref20","article-title":"Women in Cyber Mentorship Programme","volume-title":"ITU","year":"2023"},{"key":"ref21","article-title":"CyberGirls","volume-title":"cybersafefoundation","year":"2023"},{"key":"ref22","article-title":"Women Techsters","volume-title":"Tech4Dev","year":"2022"},{"key":"ref23","article-title":"Women in Cyber","year":"2022","journal-title":"UNODC, WCAfrica"},{"key":"ref24","article-title":"STEMEd for Girls","volume-title":"AAUW","year":"2023"},{"key":"ref25","article-title":"CybHER: Women & Girls in Cyber Security","volume-title":"CybHER","author":"Schultz","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/9781119643395.ch21"}],"event":{"name":"2024 Conference on Information Communications Technology and Society (ICTAS)","location":"Durban, South Africa","start":{"date-parts":[[2024,3,7]]},"end":{"date-parts":[[2024,3,8]]}},"container-title":["2024 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10507104\/10507105\/10507137.pdf?arnumber=10507137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:26:14Z","timestamp":1714760774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10507137\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ictas59620.2024.10507137","relation":{},"subject":[],"published":{"date-parts":[[2024,3,7]]}}}