Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Feminist, Gender, and Sexuality Studies

Selected Works

2014

Diversity

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Diversity In Times Of Austerity: Documenting Resistance In The Academy, David Moscowitz, Terri Jett, Terri Carney, Tamara Leech, Ann M. Savage Dec 2014

Diversity In Times Of Austerity: Documenting Resistance In The Academy, David Moscowitz, Terri Jett, Terri Carney, Tamara Leech, Ann M. Savage

Terri M. Carney

What happens to feminism in the university is parallel to what happens to feminism in other venues under economic restructuring: while the impoverished nation is forced to cut social services and thereby send women back to the hierarchy of the family, the academy likewise reduces its footprint in interdisciplinary structures and contains academic feminists back to the hierarchy of departments and disciplines. When the family and the department become powerful arbiters of cultural values, women and feminist academics by and large suffer: they either accept a diminished role or are pushed to compete in a system they recognize as antithetical …


A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade Jun 2014

A Call To Is Educators To Respond To The Voices Of Women In Information Security, Amy B. Woszczynski, Sherri Shade

Sherri Shade

Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine …