Women in ICT: exploring professional Identity on an executive masters program.
暂无分享,去创建一个
[1] Tracy Camp,et al. Now what?: action items from social science research to bridge the gender gap in computing research , 2014, CSOC.
[2] Juliet Webster,et al. Understanding Women’s Presence in ICT: the Life Course Perspective , 2011 .
[3] G. Kunda. Engineering Culture: Control and Commitment in a High-Tech Corporation , 1993 .
[4] Mats Alvesson,et al. Managing Managerial Identities: Organizational Fragmentation, Discourse and Identity Struggle , 2003 .
[5] H. Gunz,et al. Hired professional to hired gun: An identity theory approach to understanding the ethical behaviour of professionals in non-professional organizations , 2007 .
[6] Janice A. Gasker,et al. Everyone has a Shining Side , 2001 .
[7] Knowledge Management for a Postmodern Workforce : Rethinking Leadership Styles in the Public Sector , 2008 .
[8] Richard T. Watson,et al. Information systems leadership , 2006, IEEE Transactions on Engineering Management.
[9] Eddie Norman,et al. Losing the plot , 2008 .
[10] P. Burke,et al. The Past, Present, and Future of an Identity Theory* , 2000 .
[11] T. Misa. Gender Codes: Why Women Are Leaving Computing , 2010 .
[12] Knut Holtan Sørensen,et al. Towards a Feminized Technology? Gendered Values in the Construction of Technology , 1992 .
[13] V. Sweitzer,et al. Towards a Theory of Doctoral Student Professional Identity Development: A Developmental Networks Approach , 2008 .
[14] Pam Grossman,et al. Becoming a Professional: Experimenting with Possible Selves in Professional Preparation , 2008 .
[15] Scott D. Wright,et al. The role of mentors in the career development of young professionals. , 1987 .
[16] J Mcgrath Cohoon,et al. Recruiting and retaining women in undergraduate computing majors , 2002, SGCS.
[18] H. Bussell. Qualitative Methods and Analysis in Organizational Research: A Practical Guide , 2000 .
[19] Herminia Ibarra,et al. Identity work and play , 2010 .
[20] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[21] Michael A. Hogg,et al. A Social Identity Theory of Leadership , 2001 .
[22] Carol Frieze,et al. From difference to diversity: including women in the changing face of computing , 2013, SIGCSE '13.
[23] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[24] Dora Scholarios,et al. Revisiting Technical Workers: Professional and Organizational Identities in the Software Industry , 2006 .
[25] J. Rockart. The changing role of the information systems executive : a critical success factors perspective , 1982 .
[26] Monica C. Higgins,et al. Developmental networks and professional identity: a longitudinal study , 2005 .
[27] N. King. Doing Template Analysis , 2012 .
[28] D. S. Derue,et al. Who will Lead and Who will Follow? a Social Process of Leadership Identity Construction in Organizations , 2010 .
[29] Jane Stout,et al. Girls and Women in Science, Technology, Engineering, and Mathematics , 2014 .
[30] Sabine Hotho,et al. Professional identity – product of structure, product of choice , 2008 .
[31] Sally Fincher,et al. Using Narrative Methodology , 2012 .
[32] Val Singh,et al. Constructing a professional identity: how young female managers use role models , 2006 .
[33] Rhiannon Bury. She’s Geeky: The Performance of Identity among Women Working in IT , 2011 .
[34] H. Ibarra. Provisional Selves: Experimenting with Image and Identity in Professional Adaptation , 1999 .
[35] H. Markus,et al. Possible Selves , 2001 .
[36] Cynthia K. Riemenschneider,et al. IT professional identity: needs, perceptions, and belonging , 2011, Eur. J. Inf. Syst..