Addressing gender imbalance in the IT industry: Kaylene O’Brien
- 10 July, 2012 14:50
To address the gender imbalance in IT, the industry needs to rid its “geeky kind of boy’s job” image and better promote the diversity of IT careers to attract women into the industry, said Kaylene O’Brien, a technology partner at Deloitte Consulting.
O’Brien was recently awarded ICT Victorian women of the year, and was recognised for broadening the professional base of IT across backgrounds, gender and cultures.
According to O’Brien, there is still a gender imbalance in the industry because “we’ve allowed a situation to occur where the image of what an IT careers means is way too narrow and isn’t representative of the breadth of the exciting and interesting sorts of careers”.
People that can be more business focussed in their role, or more creative are often the ones who succeed in an IT career, she said.
“People who do really well in their IT career are often entrepreneurial, they have great communication skills, and they are very people focussed. So the people who are quite successful aren’t that image at all.”
Lack of flexibility is another reason to why women may not be taking up or continuing a career in IT, according to O’Brien. “I also think that there is a role for employers to make sure that they are offering flexible career models,” she said.
“I think for similar reasons to why there is a lack of female representation at senior levels is that there is a lack of flexibility in the career models along the way. There are assumptions about the need for continuous employment. So for women, it disadvantages them when they need to take time out of the workforce…
“I also think that in particular for IT it’s exacerbated because at entry levels the proportion of women are so low as well so it tends to just worsen them the more senior they become around a gender balance issue.”
O’Brien said there’s still a “huge way to go” for the industry to become more gender balanced, but she is seeing a positive response from women in the industry, like herself, who volunteer their time to support and encourage other women to take IT up as a career.
“It’s also been really pleasing to see just how many young women that I work with that have also volunteered lots of their time, particularly around the Go Girl, Go for IT event that was held last month in Victoria” she said.
“There were lots of young volunteering women who were in their studies or recently completed their studies and they’ve seen firsthand when they’ve walked into a lecture theatre and realised that women make up less than 10 per cent of their student co-op.
“[So it’s] the willingness to volunteer their time to change the gender imbalance, to change the perceptions, and to make sure that IT careers is seen as incredibly attractive for women.”
Follow Rebecca Merrett on Twitter: @Rebecca_Merrett
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The SPARC Difference - Reduce Risks, Cut Costs, Power Innovation
- Building the Anytime, Anywhere Enterprise
- CIOs transformation to Business Innovator
- Analyst Paper - The Total Economic Impact To IBM WebSphere Application Server Migrating From An Open Source Environment
- Myths and Realities of “Top to Shop” in Manufacturing
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.