For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occ... more For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occupations have significant employment growth, above-average wages, and multiple career paths. If IT jobs are so desirable, then why are women not pursuing and staying in the profession? Not only are women under-represented in IT, they are not studying computer science in anticipation of filling future jobs. IT differs from other male-dominated occupations where women's participation is growing. The lack of women in IT has consequences to women's potential, the labor market, and the global economy. This study focuses on perceptions of bias, barriers, and leaving the IT profession. Survey questions center on job satisfaction and turnover intent, rather than directly on bias, stereotypes, and barriers.
Small businesses are becoming increasingly reliant on information technology, but are doing so in... more Small businesses are becoming increasingly reliant on information technology, but are doing so insecurely. Information security threats common to small businesses could have a large impact on the U.S. economy. Given the limited resources available to small businesses and the compelling need to address security issues, this study focuses on the challenge of providing information security awareness training for small businesses. Training is an effective, but underutilized countermeasure. Research questions include the following: 1. Identify information security awareness topics. 2. Identify free information security awareness training courses. 3. Identify additional free information security awareness training content. 4. Rapidly develop prototypes to make training resources readily and freely available. Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by ...
Information Security Awareness and Training for Small Businesses, May 4, 2013
"Small businesses are becoming increasingly reliant on information technology, but are doing so i... more "Small businesses are becoming increasingly reliant on information technology, but are doing so insecurely. Information security threats common to small businesses could have a large impact on the U.S. economy. Given the limited resources available to small businesses and the compelling need to address security issues, this study focuses on the challenge of providing information security awareness training for small businesses. Training is an effective, but underutilized countermeasure. Research questions include the following:
1. Identify information security awareness topics.
2. Identify free information security awareness training courses.
3. Identify additional free information security awareness training content.
4. Rapidly develop prototypes to make training resources readily and freely available.
Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by the Department of Defense, InfraGard, Microsoft, and the National Institute of Health were identified along with 298 additional free training resources in various formats. Results of the analysis were used to support the rapid prototyping of a Google web site and a printable workbook to share the free resources and were promoted through Facebook, Twitter, Google +, LinkedIn, email, and word-of-mouth. Management support, policy enforcement, frequent training opportunities, and communication of consequences are critical to training success."
The Lack of Women in IT: The Culture and the Barriers, Apr 13, 2007
For those seeking employment, jobs in the information technology (IT) realm are desirable. IT oc... more For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occupations have significant employment growth, above-average wages, and multiple career paths. If IT jobs are so desirable, then why are women not pursuing and staying in the profession? Not only are women under-represented in IT, they are not studying computer science in anticipation of filling future jobs. IT differs from other male-dominated occupations where women's participation is growing. The lack of women in IT has consequences to women's potential, the labor market, and the global economy. This study focuses on perceptions of bias, barriers, and leaving the IT profession. Survey questions center on job satisfaction and turnover intent, rather than directly on bias, stereotypes, and barriers.
For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occ... more For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occupations have significant employment growth, above-average wages, and multiple career paths. If IT jobs are so desirable, then why are women not pursuing and staying in the profession? Not only are women under-represented in IT, they are not studying computer science in anticipation of filling future jobs. IT differs from other male-dominated occupations where women's participation is growing. The lack of women in IT has consequences to women's potential, the labor market, and the global economy. This study focuses on perceptions of bias, barriers, and leaving the IT profession. Survey questions center on job satisfaction and turnover intent, rather than directly on bias, stereotypes, and barriers.
Small businesses are becoming increasingly reliant on information technology, but are doing so in... more Small businesses are becoming increasingly reliant on information technology, but are doing so insecurely. Information security threats common to small businesses could have a large impact on the U.S. economy. Given the limited resources available to small businesses and the compelling need to address security issues, this study focuses on the challenge of providing information security awareness training for small businesses. Training is an effective, but underutilized countermeasure. Research questions include the following: 1. Identify information security awareness topics. 2. Identify free information security awareness training courses. 3. Identify additional free information security awareness training content. 4. Rapidly develop prototypes to make training resources readily and freely available. Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by ...
Information Security Awareness and Training for Small Businesses, May 4, 2013
"Small businesses are becoming increasingly reliant on information technology, but are doing so i... more "Small businesses are becoming increasingly reliant on information technology, but are doing so insecurely. Information security threats common to small businesses could have a large impact on the U.S. economy. Given the limited resources available to small businesses and the compelling need to address security issues, this study focuses on the challenge of providing information security awareness training for small businesses. Training is an effective, but underutilized countermeasure. Research questions include the following:
1. Identify information security awareness topics.
2. Identify free information security awareness training courses.
3. Identify additional free information security awareness training content.
4. Rapidly develop prototypes to make training resources readily and freely available.
Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by the Department of Defense, InfraGard, Microsoft, and the National Institute of Health were identified along with 298 additional free training resources in various formats. Results of the analysis were used to support the rapid prototyping of a Google web site and a printable workbook to share the free resources and were promoted through Facebook, Twitter, Google +, LinkedIn, email, and word-of-mouth. Management support, policy enforcement, frequent training opportunities, and communication of consequences are critical to training success."
The Lack of Women in IT: The Culture and the Barriers, Apr 13, 2007
For those seeking employment, jobs in the information technology (IT) realm are desirable. IT oc... more For those seeking employment, jobs in the information technology (IT) realm are desirable. IT occupations have significant employment growth, above-average wages, and multiple career paths. If IT jobs are so desirable, then why are women not pursuing and staying in the profession? Not only are women under-represented in IT, they are not studying computer science in anticipation of filling future jobs. IT differs from other male-dominated occupations where women's participation is growing. The lack of women in IT has consequences to women's potential, the labor market, and the global economy. This study focuses on perceptions of bias, barriers, and leaving the IT profession. Survey questions center on job satisfaction and turnover intent, rather than directly on bias, stereotypes, and barriers.
Uploads
Papers by Robin Barraco
1. Identify information security awareness topics.
2. Identify free information security awareness training courses.
3. Identify additional free information security awareness training content.
4. Rapidly develop prototypes to make training resources readily and freely available.
Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by the Department of Defense, InfraGard, Microsoft, and the National Institute of Health were identified along with 298 additional free training resources in various formats. Results of the analysis were used to support the rapid prototyping of a Google web site and a printable workbook to share the free resources and were promoted through Facebook, Twitter, Google +, LinkedIn, email, and word-of-mouth. Management support, policy enforcement, frequent training opportunities, and communication of consequences are critical to training success."
1. Identify information security awareness topics.
2. Identify free information security awareness training courses.
3. Identify additional free information security awareness training content.
4. Rapidly develop prototypes to make training resources readily and freely available.
Formative research using quantitative and qualitative analysis through literary survey, questionnaire, and observation were employed in this study. Free training courses developed by the Department of Defense, InfraGard, Microsoft, and the National Institute of Health were identified along with 298 additional free training resources in various formats. Results of the analysis were used to support the rapid prototyping of a Google web site and a printable workbook to share the free resources and were promoted through Facebook, Twitter, Google +, LinkedIn, email, and word-of-mouth. Management support, policy enforcement, frequent training opportunities, and communication of consequences are critical to training success."