{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:34:47Z","timestamp":1743266087538,"version":"3.37.3"},"reference-count":163,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T00:00:00Z","timestamp":1517270400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2018,11]]},"abstract":"Abstract<\/jats:title>In 2002, Manju Ahuja articulated the challenges women face in the information technology (IT) profession with the goal of developing a theoretical model of factors influencing career choice, career advancement, and career persistence for women in the IT profession. While Ahuja's work has been regularly cited in the IT workforce literature (citation count was around 120 using ISI Web of Science and around 425 using Google Scholar as of September 30, 2017), women continue to leave the IT profession at a disturbing rate. Using Ahuja's theoretical model as the foundation, this study asked women working in IT what workplace challenges they face. The findings from this study validate many of Ahuja's propositions and suggest an extended theoretical model that could be used to further explore the challenges women face at various career stages in the IT field. In addition, the extended theoretical model might be used to galvanize the discussion around developing a more inclusive IT work environment.<\/jats:p>","DOI":"10.1111\/isj.12185","type":"journal-article","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T09:46:39Z","timestamp":1517305599000},"page":"1082-1124","source":"Crossref","is-referenced-by-count":53,"title":["The advancement and persistence of women in the information technology profession: An extension of Ahuja's gendered theory of IT career stages"],"prefix":"10.1111","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8824-045X","authenticated-orcid":false,"given":"Deborah J.","family":"Armstrong","sequence":"first","affiliation":[{"name":"Business Analytics, Information Systems, and Supply Chain Florida State University Tallahassee Florida USA"}]},{"given":"Cynthia K.","family":"Riemenschneider","sequence":"additional","affiliation":[{"name":"Management Information Systems Baylor University Waco Texas USA"}]},{"given":"Laurie G.","family":"Giddens","sequence":"additional","affiliation":[{"name":"Computer Management and Information Systems Southern Illinois University Edwardsville Edwardsville Illinois USA"}]}],"member":"311","published-online":{"date-parts":[[2018,1,30]]},"reference":[{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-005X.2004.00139.x"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/2322093715576161"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840510615860"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.20234"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000417"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148778"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148691"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/sres.936"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2008100101"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-006-9049-4"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SERS.0000015550.92555.7e"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.1.127"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2012.03.006"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2009.00332.x"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00236"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-396-8.ch002"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.3.10"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"Armstrong D.J. &Riemenschneider C.K.(2014).The barriers facing women in the information technology profession: An exploratory investigation of Ahuja's model. In: Proceedings of the 52nd ACM Conference on Computers and People Research Singapore pp.85\u201396. Association for Computing Machinery.https:\/\/doi.org\/10.1145\/2599990.2600006","DOI":"10.1145\/2599990.2600006"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.11.005"},{"key":"e_1_2_7_22_1","first-page":"65","article-title":"Revisiting the barriers facing women in information systems","volume":"53","author":"Armstrong D. J.","year":"2012","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-007-1944-0"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0432.2012.00600.x"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148767"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593980_24"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840710839798"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1108\/17542411111116545"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2010.00713.x"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392790"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/0730888406296945"},{"volume-title":"The social construction of reality","year":"1966","author":"Berger P. L.","key":"e_1_2_7_32_1"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1086\/228350"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2000.3363315"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.48"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/smi.1059"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0278-4319(94)90032-9"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/19355181200700005"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0030389"},{"key":"e_1_2_7_40_1","unstructured":"Charette R.N.(2013).Is there a U.S. IT worker shortage?IEEE Spectrum. Retrieved fromhttp:\/\/spectrum.ieee.org\/riskfactor\/computing\/it\/is\u2010there\u2010a\u2010us\u2010it\u2010worker\u2010shortage"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/hrdq.21262"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.937460"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00414.x"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250110504"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/0095399712451885"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593841111137340"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orgdyn.2008.02.001"},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0432.2007.00348.x"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0891243298012003006"},{"volume-title":"Handbook of qualitative research","year":"2000","author":"Denzin N. K.","key":"e_1_2_7_50_1"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0192513X15584680"},{"key":"e_1_2_7_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/itdj.20031"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvb.2013.08.001"},{"key":"e_1_2_7_54_1","first-page":"155","article-title":"A comprehensive study of the perceptions and support structures of women engaged in IT\/IS careers","volume":"18","author":"Draus P.","year":"2014","journal-title":"International Journal of Management &. Information Systems"},{"key":"e_1_2_7_55_1","first-page":"160","article-title":"Male allies: Motivations and barriers for participating in diversity initiatives in the technology workplace","volume":"8","author":"Dubow W. M.","year":"2016","journal-title":"International Journal of Gender, Science and Technology"},{"key":"e_1_2_7_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0432.2010.00536.x"},{"key":"e_1_2_7_57_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.108.2.233"},{"key":"e_1_2_7_58_1","first-page":"1","article-title":"Supportive work\u2013family environments; implications for work\u2013family conflict and well\u2010being","volume":"25","author":"Fiksenbaum L. M.","year":"2013","journal-title":"The International Journal of Human Resource Management"},{"key":"e_1_2_7_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/1059601101263004"},{"key":"e_1_2_7_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017114.1017119"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00416"},{"key":"e_1_2_7_62_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2013.2"},{"key":"e_1_2_7_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843824.2843826"},{"key":"e_1_2_7_64_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SERS.0000023071.02856.89"},{"key":"e_1_2_7_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/itdj.20098"},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240601057254"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-016-0428-2"},{"key":"e_1_2_7_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341436"},{"key":"e_1_2_7_69_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000632"},{"key":"e_1_2_7_70_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983587"},{"key":"e_1_2_7_71_1","first-page":"22","article-title":"Stopping the exodus of women in science","volume":"86","author":"Hewlett S.","year":"2008","journal-title":"Harvard Business Review"},{"volume-title":"Athena factor 2.0: Accelerating female talent in science, engineering & technology","year":"2014","author":"Hewlett S. A.","key":"e_1_2_7_72_1"},{"key":"e_1_2_7_73_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-005X.2008.00202.x"},{"key":"e_1_2_7_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00294.x"},{"key":"e_1_2_7_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijintrel.2013.09.002"},{"key":"e_1_2_7_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iheduc.2012.02.001"},{"key":"e_1_2_7_77_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593849710166165"},{"key":"e_1_2_7_78_1","unstructured":"Joseph D. &Ang S. (2010).Threat of professional obsolescence and mobility intentions: The mediating role of coping strategies. In: Proceedings of the Americas Conference on Information Systems Lima Peru 527. Association for Information Systems."},{"key":"e_1_2_7_79_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0558"},{"key":"e_1_2_7_80_1","doi-asserted-by":"publisher","DOI":"10.2307\/41703462"},{"key":"e_1_2_7_81_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148807"},{"key":"e_1_2_7_82_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840710839815"},{"key":"e_1_2_7_83_1","first-page":"33","article-title":"From classroom to executive management\u2014Gender diversity in the information technology field","volume":"26","author":"Karanja E.","year":"2015","journal-title":"Journal of Information. Technology Management"},{"key":"e_1_2_7_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/0003122411400056"},{"key":"e_1_2_7_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/01900690903170303"},{"volume-title":"Mentoring at work: Developmental relationships in organizational life","year":"1985","author":"Kram K. E.","key":"e_1_2_7_86_1"},{"key":"e_1_2_7_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592401.1592406"},{"key":"e_1_2_7_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306312706063788"},{"volume-title":"Disparities in STEM employment by sex, race, and Hispanic origin","year":"2013","author":"Landivar L. C.","key":"e_1_2_7_89_1"},{"key":"e_1_2_7_90_1","doi-asserted-by":"publisher","DOI":"10.1108\/02640471011023441"},{"key":"e_1_2_7_91_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.3.221.16560"},{"key":"e_1_2_7_92_1","unstructured":"Lee P. Stewart D. &Calugar\u2010Pop C.(2016).Technology media & telecommunications predictions 2016 (predictions for the technology media and telecommunications (TMT) sectors). Deloitte. Retrieved fromhttps:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/Technology\u2010Media\u2010Telecommunications\/gx\u2010tmt\u2010prediction\u20102016\u2010full\u2010report.pdf"},{"key":"e_1_2_7_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9408-y"},{"key":"e_1_2_7_94_1","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v15i1.478"},{"key":"e_1_2_7_95_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03838"},{"key":"e_1_2_7_96_1","first-page":"7345","article-title":"Windows of (in) equality: Gender reflections in information technology","volume":"14","author":"Long E. L.","year":"2016","journal-title":"Gender and Behaviour"},{"key":"e_1_2_7_97_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872678904200605"},{"key":"e_1_2_7_98_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800410364740"},{"key":"e_1_2_7_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314215.1314229"},{"key":"e_1_2_7_100_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-005X.00059"},{"key":"e_1_2_7_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304310701268695"},{"key":"e_1_2_7_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.839967"},{"key":"e_1_2_7_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/0007-6813(85)90016-3"},{"key":"e_1_2_7_104_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250971"},{"key":"e_1_2_7_105_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781410601629"},{"key":"e_1_2_7_106_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006226129868"},{"key":"e_1_2_7_107_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206308318619"},{"key":"e_1_2_7_108_1","doi-asserted-by":"publisher","DOI":"10.1080\/00497870801917192"},{"key":"e_1_2_7_109_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000451"},{"key":"e_1_2_7_110_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03737"},{"key":"e_1_2_7_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/08985626.2012.637355"},{"key":"e_1_2_7_112_1","first-page":"16","article-title":"Female under\u2010representation in computing education and industry: A survey of issues and interventions","volume":"5","author":"Osunde J.","year":"2014","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_7_113_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.19"},{"key":"e_1_2_7_114_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00415.x"},{"key":"e_1_2_7_115_1","doi-asserted-by":"publisher","DOI":"10.1108\/00483481011007850"},{"key":"e_1_2_7_116_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468017307084739"},{"key":"e_1_2_7_117_1","first-page":"267","article-title":"Workplace spirituality and work\u2013life balance: A study among women executives of IT sector companies","volume":"6","author":"Paul M.","year":"2015","journal-title":"International Journal of Management & Behavioural Sciences"},{"key":"e_1_2_7_118_1","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-27242013000200013"},{"key":"e_1_2_7_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.08.027"},{"key":"e_1_2_7_120_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593841011087798"},{"key":"e_1_2_7_121_1","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2006040103"},{"key":"e_1_2_7_122_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijkm.2014100101"},{"key":"e_1_2_7_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2004.06.006"},{"key":"e_1_2_7_124_1","doi-asserted-by":"publisher","DOI":"10.2307\/256398"},{"key":"e_1_2_7_125_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.30"},{"key":"e_1_2_7_126_1","doi-asserted-by":"publisher","DOI":"10.1177\/0734371X07311703"},{"key":"e_1_2_7_127_1","doi-asserted-by":"publisher","DOI":"10.1177\/0275074007303136"},{"key":"e_1_2_7_128_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1314788111"},{"key":"e_1_2_7_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185335.1185345"},{"key":"e_1_2_7_130_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMP.2007.24286162"},{"key":"e_1_2_7_131_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.7"},{"key":"e_1_2_7_132_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.3.629"},{"key":"e_1_2_7_133_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2014.11645722"},{"key":"e_1_2_7_134_1","doi-asserted-by":"publisher","DOI":"10.1177\/1534484317690063"},{"key":"e_1_2_7_135_1","first-page":"142","article-title":"The effects of stereotype threat on MIS students: An initial investigation","volume":"50","author":"Serva M. A.","year":"2009","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_7_136_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-8583.2010.00152.x"},{"key":"e_1_2_7_137_1","first-page":"49","article-title":"Use of cognitive mapping techniques in information systems development","volume":"48","author":"Siau K.","year":"2008","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_7_138_1","doi-asserted-by":"publisher","DOI":"10.1080\/00497870801917028"},{"key":"e_1_2_7_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-014-1234-6"},{"key":"e_1_2_7_140_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2008010101"},{"key":"e_1_2_7_141_1","first-page":"29","article-title":"The impact of gender differences on job satisfaction, job turnover, and career experiences of information systems professionals","volume":"44","author":"Sumner M.","year":"2003","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_2_7_142_1","doi-asserted-by":"publisher","DOI":"10.1177\/031289620503000105"},{"key":"e_1_2_7_143_1","first-page":"139","article-title":"Degendered jobs? Organizational processes and gender segregated employment","volume":"17","author":"Tomaskovic\u2010Devey D.","year":"1999","journal-title":"Research in Social Stratification and Mobility"},{"key":"e_1_2_7_144_1","first-page":"N\/A","article-title":"Gender differences in the ICT profile of university students: A quantitative analysis","volume":"3","author":"Tondeur J.","year":"2016","journal-title":"Journal of Diversity and Gender Studies"},{"key":"e_1_2_7_145_1","doi-asserted-by":"publisher","DOI":"10.1108\/09534810610686076"},{"key":"e_1_2_7_146_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840210430552"},{"key":"e_1_2_7_147_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2013.08.003"},{"key":"e_1_2_7_148_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840610689859"},{"key":"e_1_2_7_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185335.1185340"},{"key":"e_1_2_7_150_1","first-page":"7","article-title":"Explaining the IT gender gap: Australian stories for the new millennium","volume":"35","author":"Trauth E. M.","year":"2003","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"e_1_2_7_151_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.31"},{"key":"e_1_2_7_152_1","doi-asserted-by":"publisher","DOI":"10.1108\/jices.2009.36407baa.001"},{"key":"e_1_2_7_153_1","doi-asserted-by":"publisher","DOI":"10.1177\/2329496515604636"},{"key":"e_1_2_7_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940294"},{"key":"e_1_2_7_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663339"},{"key":"e_1_2_7_156_1","unstructured":"Vassallo T. Levy E. Madansky M. Mickell H. Porter B. Leas M. &Oberweis J.(2015).Elephant in the Valley. Retrieved March 22 2017 fromhttps:\/\/www.elephantinthevalley.com\/"},{"key":"e_1_2_7_157_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.02"},{"key":"e_1_2_7_158_1","first-page":"205","article-title":"Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research","volume":"37","author":"Brocke J.","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_7_159_1","doi-asserted-by":"publisher","DOI":"10.28945\/291"},{"key":"e_1_2_7_160_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00412.x"},{"key":"e_1_2_7_161_1","first-page":"147","article-title":"Perhaps it's time for a fresh approach to ICT gender research?","volume":"37","author":"Webb P.","year":"2005","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"e_1_2_7_162_1","first-page":"25","article-title":"Workplace culture that hinders and assists the career development of women in information technology","volume":"25","author":"Wentling R. M.","year":"2009","journal-title":"Information Technology, Learning, and Performance Journal"},{"key":"e_1_2_7_163_1","doi-asserted-by":"publisher","DOI":"10.1108\/09649420710778718"},{"key":"e_1_2_7_164_1","first-page":"22","article-title":"The 5 biases pushing women out of STEM: Interaction","volume":"93","author":"Williams J.","year":"2015","journal-title":"Harvard Business Review"},{"key":"e_1_2_7_165_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12058"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12185","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T20:57:05Z","timestamp":1694379425000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,30]]},"references-count":163,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1111\/isj.12185"],"URL":"https:\/\/doi.org\/10.1111\/isj.12185","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"type":"print","value":"1350-1917"},{"type":"electronic","value":"1365-2575"}],"subject":[],"published":{"date-parts":[[2018,1,30]]}}}