{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:09:56Z","timestamp":1771045796924,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,12]]},"DOI":"10.1145\/3641554.3701811","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T09:19:36Z","timestamp":1740043176000},"page":"1043-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving the Representation of Undergraduate Women in Cybersecurity: A Literature Review"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7382-4910","authenticated-orcid":false,"given":"Ena","family":"Selman-Housein","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0078-3653","authenticated-orcid":false,"given":"Brian","family":"Plancher","sequence":"additional","affiliation":[{"name":"Barnard College, Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1187\/cbe.16-12-0344"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI46756.2018.00116"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-020-00502-7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571785.3574129"},{"key":"e_1_3_2_1_5_1","volume-title":"Department of Labor","author":"Bureau of Labor Statistics, U.S.","year":"2023","unstructured":"Bureau of Labor Statistics, U.S. Department of Labor. 2023. Occupational Outlook Handbook, Information Security Analysts. https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm Visited on December 23, 2023."},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Computer Science, Engineering and Education Applications. Springer, 610--624","author":"Buriachok Volodymyr","year":"2019","unstructured":"Volodymyr Buriachok and Volodymyr Sokolov. 2019. Implementation of active learning in the master's program on cybersecurity. In International Conference on Computer Science, Engineering and Education Applications. Springer, 610--624."},{"key":"e_1_3_2_1_7_1","first-page":"71","article-title":"Making STEM equitable: An active learning approach to closing the achievement gap","volume":"5","author":"Burke Christian","year":"2020","unstructured":"Christian Burke, Richard Luu, Andy Lai, Valerie Hsiao, Elwin Cheung, Dustin Tamashiro, and Jared Ashcroft. 2020. Making STEM equitable: An active learning approach to closing the achievement gap. International Journal of Active Learning, Vol. 5, 2 (2020), 71--85.","journal-title":"International Journal of Active Learning"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 75--81","author":"Burrell Darrell Norman","year":"2018","unstructured":"Darrell Norman Burrell and Calvin Nobles. 2018. Recommendations to develop and hire more highly qualified women and minorities cybersecurity professionals. In International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 75--81."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231644.3231688"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159585"},{"key":"e_1_3_2_1_11_1","volume-title":"The Journal for the Colloquium for Information Systems Security Education (CISSE)","volume":"5","author":"Caelli Bill","year":"2018","unstructured":"Bill Caelli and Vicky Liu. 2018. Cybersecurity education at formal university level: An Australian perspective. In The Journal for the Colloquium for Information Systems Security Education (CISSE), Vol. 5. The Colloquium for Information Systems Security Education (CISSE), 1--18."},{"key":"e_1_3_2_1_12_1","volume-title":"Cultural stereotypes as gatekeepers: Increasing girls' interest in computer science and engineering by diversifying stereotypes. Frontiers in psychology","author":"Cheryan Sapna","year":"2015","unstructured":"Sapna Cheryan, Allison Master, and Andrew N Meltzoff. 2015. Cultural stereotypes as gatekeepers: Increasing girls' interest in computer science and engineering by diversifying stereotypes. Frontiers in psychology (2015), 49."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer , 1.","author":"Cheung Ronald S","year":"2011","unstructured":"Ronald S Cheung, Joseph P Cohen, Henry Z Lo, and Fabio Elia. 2011. Challenge based learning in cybersecurity education. In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer , 1."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004899"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125696"},{"key":"e_1_3_2_1_16_1","volume-title":"Design justice: Community-led practices to build the worlds we need","author":"Costanza-Chock Sasha","unstructured":"Sasha Costanza-Chock. 2020. Design justice: Community-led practices to build the worlds we need. The MIT Press."},{"key":"e_1_3_2_1_17_1","unstructured":"Makendra Latrice Crosby. 2023. The Underrepresentation of Black Females in Cybersecurity. (2023)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE56618.2022.9962399"},{"key":"e_1_3_2_1_19_1","unstructured":"Adrian Dabrowski Markus Kammerstetter Eduard Thamm Edgar Weippl and Wolfgang Kastner. 2015. Leveraging competitive gamification for sustainable fun and profit in security education. In 2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 15)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017713"},{"key":"e_1_3_2_1_21_1","volume-title":"Identifying Factors that Influence Undergraduate Women to Leave or Remain in Computer Science Majors. Ph.,D. Dissertation","author":"Davis Heather S","unstructured":"Heather S Davis. 2022. Identifying Factors that Influence Undergraduate Women to Leave or Remain in Computer Science Majors. Ph.,D. Dissertation. University of Nebraska at Omaha."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2022.3188195"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287403"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2024.3352439"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0266439"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3007225.3007235"},{"key":"e_1_3_2_1_27_1","volume-title":"Women hold 25 percent of cybersecurity jobs globally","author":"Freeze Di","year":"2022","unstructured":"Di Freeze. 2022. Women hold 25 percent of cybersecurity jobs globally in 2022. https:\/\/cybersecurityventures.com\/women-in-cybersecurity-report-2022\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603535"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344156"},{"key":"e_1_3_2_1_30_1","volume-title":"Geoffrey A Wright, Shayna Oh, Quincy Taylor, Megan Warren, and Kylie Johnson.","author":"Giboney Justin Scott","year":"2023","unstructured":"Justin Scott Giboney, Bonnie Brinton Anderson, Geoffrey A Wright, Shayna Oh, Quincy Taylor, Megan Warren, and Kylie Johnson. 2023. Barriers to a Cybersecurity Career: Analysis across Career Stage and Gender. Computers & Security (2023), 103316."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386363"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1495893"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287345"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016916"},{"key":"e_1_3_2_1_35_1","volume-title":"The underrepresentation of females in the United States cybersecurity workforce: a multiple-case study. Ph.,D. Dissertation","author":"James Sturhonda L","unstructured":"Sturhonda L James. 2019. The underrepresentation of females in the United States cybersecurity workforce: a multiple-case study. Ph.,D. Dissertation. Capella University."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159563"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017753"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121408"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3127992"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/153571.255960"},{"key":"e_1_3_2_1_41_1","volume-title":"Annual Conference on Education in Information Security (ACEIS).","author":"Locasto M","year":"2009","unstructured":"M Locasto and Sara Sinclair. 2009. An experience report on undergraduate cyber-security education and outreach. In Annual Conference on Education in Information Security (ACEIS)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844624"},{"key":"e_1_3_2_1_43_1","first-page":"3","article-title":"Introductory course improves retention, especially for women","volume":"6","author":"Mathis Saralyn Grenga","year":"2008","unstructured":"Saralyn Grenga Mathis. 2008. Introductory course improves retention, especially for women. Information Systems Education Journal, Vol. 6, 50 (2008), 3--8.","journal-title":"Information Systems Education Journal"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487054"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197110"},{"key":"e_1_3_2_1_46_1","first-page":"34","article-title":"Cybersecurity awareness among undergraduate students in Enugu Nigeria","volume":"5","author":"Onyema EM","year":"2021","unstructured":"EM Onyema, CD Edeh, US Gregory, VU Edmond, AC Charles, and NE Richard-Nnabu. 2021. Cybersecurity awareness among undergraduate students in Enugu Nigeria. Int J Inform Sec Privacy Digital Forensic, Vol. 5, 1 (2021), 34--42.","journal-title":"Int J Inform Sec Privacy Digital Forensic"},{"key":"e_1_3_2_1_47_1","volume-title":"Retention of Women in Computer Science: Why Women Persist in Their Computer Science Majors. Ph.,D. Dissertation","author":"Pantic Katarina","unstructured":"Katarina Pantic. 2020. Retention of Women in Computer Science: Why Women Persist in Their Computer Science Majors. Ph.,D. Dissertation. Utah State University."},{"key":"e_1_3_2_1_48_1","first-page":"3","article-title":"Toward a Student-Ready Cybersecurity Program: Findings from a Survey of STEM-Students","volume":"2022","author":"Pitman Lora","year":"2022","unstructured":"Lora Pitman, Brian K Payne, Tancy Vandecar-Burdin, and Lenora Thorbjornsen. 2022. Toward a Student-Ready Cybersecurity Program: Findings from a Survey of STEM-Students. Journal of Cybersecurity Education, Research and Practice, Vol. 2022, 2 (2022), 3.","journal-title":"Journal of Cybersecurity Education, Research and Practice"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceeding of the 44th ACM technical symposium on Computer science education. 439--444.","author":"Redmond Katie","unstructured":"Katie Redmond, Sarah Evans, and Mehran Sahami. 2013. A large-scale quantitative study of women in computer science at Stanford University. In Proceeding of the 44th ACM technical symposium on Computer science education. 439--444."},{"key":"e_1_3_2_1_50_1","volume-title":"Innovation through inclusion: The multicultural cybersecurity workforce. ISC2. https:\/\/www. isc2. org\/Innovation-Through-Inclusion-Report (accessed","author":"Reed Jason","year":"2022","unstructured":"Jason Reed and Jonathan Acosta-Rubio. 2018. Innovation through inclusion: The multicultural cybersecurity workforce. ISC2. https:\/\/www. isc2. org\/Innovation-Through-Inclusion-Report (accessed Apr. 23, 2022) (2018)."},{"key":"e_1_3_2_1_51_1","volume-title":"A CS1 course designed to address interests of women. Acm sigcse bulletin","author":"Rich Lauren","year":"2004","unstructured":"Lauren Rich, Heather Perry, and Mark Guzdial. 2004. A CS1 course designed to address interests of women. Acm sigcse bulletin, Vol. 36, 1 (2004), 190--194."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3219633"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2020.1798173"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322210"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/00221546.2016.1257306"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.2190\/NKPN-8B33-V7CY-L7W1"},{"key":"e_1_3_2_1_57_1","volume-title":"2016 USENIX Workshop on Advances in Security Education (ASE 16)","author":"Cliffe Schreuders Z","year":"2016","unstructured":"Z Cliffe Schreuders and Emlyn Butterfield. 2016. Gamification for teaching and learning computer security in higher education. In 2016 USENIX Workshop on Advances in Security Education (ASE 16)."},{"key":"e_1_3_2_1_58_1","volume-title":"Novel approach for cybersecurity workforce development: A course in secure design. In 2018 IEEE integrated STEM education conference (ISEC)","author":"Sharevski Filipo","unstructured":"Filipo Sharevski, Adam Trowbridge, and Jessica Westbrook. 2018. Novel approach for cybersecurity workforce development: A course in secure design. In 2018 IEEE integrated STEM education conference (ISEC). IEEE, 175--180."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543882.2543883"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766457"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352230"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274144"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808006.2808038"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. 194--199","author":"Vykopal Jan","year":"2018","unstructured":"Jan Vykopal, Milan Cermak, and Martin Lavstovivcka. 2018. Enhancing cybersecurity skills by creating serious games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. 194--199."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1916903117"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015063.3015089"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430803"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43020-7_3"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2527148.2527180"},{"key":"e_1_3_2_1_70_1","unstructured":"Sarah K. White. 2022. Women in Tech Statistics: The Hard Truths of an Uphill Battle. https:\/\/www.cio.com\/article\/201905\/women-in-tech-statistics-the-hard-truths-of-an-uphill-battle.html"},{"key":"e_1_3_2_1_71_1","unstructured":"WiCyS. 2024. Women in CyberSecurity (WiCyS). https:\/\/www.wicys.org"},{"key":"e_1_3_2_1_72_1","article-title":"Undergraduate research experience in cybersecurity for underrepresented students and students with limited research opportunities","volume":"19","author":"Yang Dazhi","year":"2019","unstructured":"Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, and Yibo Fan. 2019. Undergraduate research experience in cybersecurity for underrepresented students and students with limited research opportunities. Journal of STEM Education, Vol. 19, 5 (2019).","journal-title":"Journal of STEM Education"}],"event":{"name":"SIGCSE TS 2025: The 56th ACM Technical Symposium on Computer Science Education","location":"Pittsburgh PA USA","acronym":"SIGCSE TS 2025","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641554.3701811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T06:32:15Z","timestamp":1755757935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":72,"alternative-id":["10.1145\/3641554.3701811","10.1145\/3641554"],"URL":"https:\/\/doi.org\/10.1145\/3641554.3701811","relation":{},"subject":[],"published":{"date-parts":[[2025,2,12]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}