dc.contributor.author | Lugo, Ricardo Gregorio | |
dc.contributor.author | Firth-Clark, Andrea | |
dc.contributor.author | Knox, Benjamin James | |
dc.contributor.author | Jøsok, Øyvind | |
dc.contributor.author | Helkala, Kirsi Marjaana | |
dc.contributor.author | Sütterlin, Stefan | |
dc.date.accessioned | 2020-04-14T10:58:13Z | |
dc.date.available | 2020-04-14T10:58:13Z | |
dc.date.created | 2019-02-19T07:29:12Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Lecture Notes in Computer Science. 2019, 11580 LNAI 563-572. | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://hdl.handle.net/11250/2650959 | |
dc.description.abstract | Rapid technological developments and definition of the cyber domain as a battlefield has challenged the cognitive attributes of its operators. In order to meet these demands, higher education programs in STEM (science, technology, engineering, and mathematics) need to recruit suited. Recruitment to STEM studies focuses on increasing the amount of females in these studies, and factors involving retention also needs to be understood. This research focused on assessing the educational setting of Norwegian Defense Cyber Academy and its factors in promoting female student retention in their computer engineering program, and profiling female officer cadets to see if any differences in personality, cognitions, and behaviours strategies exist between male and female cadets. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer | en_US |
dc.title | Cognitive Profiles and Education of Female Cyber Defence Operators | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | acceptedVersion | en_US |
dc.source.pagenumber | 563-572 | en_US |
dc.source.volume | 11580 LNAI | en_US |
dc.source.journal | Lecture Notes in Computer Science | en_US |
dc.identifier.doi | 10.1007/978-3-030-22419-6_40 | |
dc.identifier.cristin | 1678555 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article. Locked until 20.6.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-22419-6_40 | en_US |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |