Examining the Impact of Cyberattacks on Women's Digital Security: Challenges and Solutions
DOI:
https://doi.org/10.59535/jsh.v3i1.341Keywords:
Digital Security, Cybersecurity, Gender-sensitive Policies, Educational Programs, Women’s ParticipationAbstract
This study investigates the challenges faced by women in maintaining digital security amid rising cyberattacks and examines the effectiveness of gender-sensitive policies and educational programs aimed at improving women’s cybersecurity. As cyber threats increasingly target women, understanding their unique vulnerabilities and the role of specific protective measures is crucial. The research utilizes a quantitative approach with a structured questionnaire distributed to 150 participants across four faculties of an online university, including Medical, Economics, Education, and Computer Science. The data collected were analyzed to assess perceptions of digital security challenges, the effectiveness of gender-sensitive policies, and the importance of educational programs in enhancing women’s participation in cybersecurity. Results indicate that while gender-sensitive policies are viewed as somewhat effective, there is significant support for targeted educational programs to increase women’s involvement in cybersecurity. The findings highlight the need for more refined policies and better educational initiatives to address women’s unique digital security needs effectively. The study underscores the importance of implementing comprehensive strategies to improve women’s cybersecurity and promote their active participation in the sector.
Downloads
References
. Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. (2010). Women in cybersecurity: A study of career advancement. IT professional, 12(1), 24-31. https://ieeexplore.ieee.org/abstract/document/5403174/
. Berríos, N. (2019). Increasing the participation of young women in cybersecurity. Computer Science;. https://prcrepository.org/handle/20.500.12475/311
. Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), 2693080. https://uia.brage.unit.no/uia-xmlui/handle/11250/3080480
. Dampier, D., Kelly, K., & Carr, K. (2012). Increasing participation of women in cyber security. In ASEE-SE Regional Conference, Starkville, MS. http://se.asee.org/proceedings/ASEE2012/Papers/FP2012dam133_520
. Datta, P., Panda, S. N., & Bajaj, S. (2020, June). Data analysis of cyber security for women in haryana. In 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 763-767). IEEE. https://ieeexplore.ieee.org/abstract/document/9197788/
. Egete DEle BAshishie D(2023)Unequal Culture of Women and Minorities in Cybersecurity DomainBritish Journal of Computer, Networking and Information Technology10.52589/BJCNIT-Q1MZPVWZ6:1(11-19)Online publication date: 5-Sep-2023. https://doi.org/10.52589/BJCNIT-Q1MZPVWZ
. Fazil, A. W., Hakimi, M., Sajid, S., Quchi, M. M., & Khaliqyar, K. Q. (2023). Enhancing Internet Safety and Cybersecurity Awareness among Secondary and High School Students in Afghanistan: A Case Study of Badakhshan Province. American Journal of Education and Technology, 2(4), 50-61. https://doi.org/10.54536/ajet.v2i4.2248
. Hakimi, M., Quchi, M. M., Hasas, A., & Fazil, A. W. (2024). The Transformative Power of Information and Communication Technology in Empowering Women in Afghanistan. Journal of Social Science Utilizing Technology, 2(1), 275-287. https://doi.org/10.70177/jssut.v2i1.702
. Hakimi, M., Sazish, B., Rastagari, M. A., & Shahidzay, K. (2023). Artificial Intelligence for Social Media Safety and Security: A Systematic Literature Review. Studies in Media, Journalism and Communications, 1(1), 10-21. https://doi.org/10.32996/smjc.2023.1.1.2x
. Hakimi, M., Shahidzay, A. K., Fazil, A. W., Khaliqyar, K. Q., & Quchi, M. M. (2023). Strengthening Resilience to Safeguard Women from Social Engineering Attacks in Afghanistan. Cognizance Journal of Multidisciplinary Studies (CJMS), 3(12), 88-97.
. Peacock, D., & Irons, A. (2017). Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression. International Journal of Gender, Science and Technology, 9(1), 25-44. https://genderandset.open.ac.uk/index.php/genderandset/article/view/449
. Poster, W. R. (2018). Cybersecurity needs women. https://www.nature.com/articles/d41586-018-03327-w
. Rowland, P., Podhradsky, A., & Plucker, S. (2018). Cybher: A method for empowering, motivating, educating and anchoring girls to a cybersecurity career path. http://hdl.handle.net/10125/50358
. Shumba, R., Ferguson-Boucher, K., Sweedyk, E., Taylor, C., Franklin, G., Turner, C., ... & Hall, L. (2013, June). Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. In Proceedings of the ITiCSE working group reports conference on Innovation and technology in computer science education-working group reports (pp. 1-14). https://doi.org/10.1145/2543882.2543883
. Toft, R. S. E., & Eikaas, T. C. (2023). The Impact of Gender Equality in the Cybersecurity Sector (Master's thesis, University of Agder). https://uia.brage.unit.no/uia-xmlui/handle/11250/3080480
. Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R's”. Heliyon, 5(12). https://www.cell.com/heliyon/fulltext/S2405-8440(19)36514-4
. Zahout, M. (2017). Women in Cybersecurity. McCloy Fellowship on Global Trends. https://www.acgusa.org/wp-content/uploads/2017/08/McCloyFellowhip_Report-Zahout.
Tamanna Quraishi, Nargis Hakimi, Musawer Hakimi, Maleena Safi, Fazila Akrami, Mursal Akrami, Khatera Akrami, & Zahra Nejrabi. (2024). Exploring the Enhancement of Educational Systems through Information and Communication Technology: An Investigative Study. Journal of Social and Humanities, 2(1), 21–30. https://doi.org/10.59535/jsh.v2i1.218
Barge Gul Khalili, Tamanna Quraishi, & Sahar Fazil. (2024). The Influence of social media on Human and Social Communications: A Sociological Study. Journal of Social and Humanities, 2(1), 40–48. https://doi.org/10.59535/jsh.v2i1.246
Risnandar, H., Maruapey, M. H., Iskandar, A. B., & Wahyudin, C. (2024). Effectiveness of Implementing the Government’s Internal Control System in the District. Socio-Economic and Humanistic Aspects for Township and Industry, 2(4), 489–503. https://doi.org/10.59535/sehati.v2i4.339
Tamanna Quraishi, Manila Hakimi, Samira Yashar, Qadria Jan Akhundzada, Shakiba Mosazada, & Somaya Azimi. (2024). The Role of Technologies on Women Entrepreneurship: A Case Study of Online University. Socio-Economic and Humanistic Aspects for Township and Industry, 2(1), 140–151. https://doi.org/10.59535/sehati.v2i1.237
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Freshtah Fazel, Sonia Arsalan, Madina Ahmadi, Zainab Bahaduri, Tamanna Quraishi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Most read articles by the same author(s)
- Barge Gul Khalili, Tamanna Quraishi, Sahar Fazil, The Influence of social media on Human and Social Communications: A Sociological Study , Journal of Social and Humanities: Vol. 2 No. 1 (2024): October-Maret
- Tamanna Quraishi, Nargis Hakimi, Musawer Hakimi, Maleena Safi, Fazila Akrami, Mursal Akrami, Khatera Akrami, Zahra Nejrabi, Exploring the Enhancement of Educational Systems through Information and Communication Technology: An Investigative Study , Journal of Social and Humanities: Vol. 2 No. 1 (2024): October-Maret