Popular Theories

Popular Theories

DOI: 10.4018/978-1-4666-5860-8.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The issue of women in IT has attracted voluminous research with many theories framing discussions, such as Essentialist Theory, Social Construction Theory, Individual Differences Theory, Structuration Theory, Theory of Reasoned Action, and their resulting Gender Modelling, Leaky Pipeline, Life Course Approach, Critical Mass, and Dualism Models. Key theories are critically examined in this chapter, and it is concluded that not only have no real world benefits ensued, but in some cases the theories themselves may be part of the problem by negatively framing expectations. However, the years of research should not be wasted: rather, the tools of #SocialIT, such as hackfests, should be applied to gain deeper and wider understanding. The new STEMcell Model is most similar to the Life Course approach and within-gender variants of Gender Theory. However, it goes further to identify an individual's interests and talents as more drivers in themselves than something passively shaped by society. External influences and barriers do exist but need to be considered in the context of the individual, not the other way around, and those barriers will be swept away by the tools and effects of #SocialIT.
Chapter Preview

[We see that] science is eminently perfectible, and that each theory has constantly to give way to a fresh one. – Jules Verne, A Journey to the Centre of the Earth (Goodreads, 2013)

Top

Introduction

Without a doubt the topic of attraction, promotion and retention of females in technology has and continues to attract voluminous research over the past decades. von Hellens, Trauth & Fisher (2012) note “Accompanying the increase in volume and visibility of gender and ICT research has come a broadening of the methods used in the conduct of this research. While the 1990s introduced the use of interpretive epistemology for the conduct of gender and ICT research, the 2000s have witnessed the introduction of critical theory into gender and ICT research.”

Essentialist Theory, Social Construction Theory, Individual Differences Theory, Structuration Theory, Theory of Reasoned Action and their resulting Gender Modelling, Leaky Pipeline, Life Course Approach, Critical Mass Models and Dualism Models have all been used over time to frame researchers’ discussions regarding the lack and decline of females in technology studies and careers. In Chapter Three: A New Approach, we discussed the importance in the #SocialIT era of greater engagement between researchers and the wider community. Perhaps we can express the problem in #SocialEra terms as these topics are not “trending on Twitter” and as such are almost invisible to that community.

More specifically, the frequently changing technology landscape makes it difficult for a traditionally developed and distributed research framework to keep up with the rate of change and incorporate the current influencing factors. Technology and industry game changers are introduced that impact the relevancy of a modelled theory. We are in an era where “trending” and following the latest technology craze is fast becoming not only the norm, but the main source of information for society.

There is some discussion in the literature about a disconnect between researchers, their publications and the mainstream public. Of particular interest here is the disconnect between the frameworks and models proposed in the literature and the people who design and implement intervention programs.

The following comments from personal interviews reflect this disconnect:

  • 1.

    “My feeling is that there could and should be much closer relationships amongst all people involved, and engender a spirit of co-operation. Ideas should be shared and people assisted and encouraged to run/adopt programs. There are too many individual groups running programs in isolation from other groups but sharing the same aims. This leads to duplication of effort (i.e. wasted time and money), replication, and competition for funding which is in short supply. I haven’t seen strong on-going relationships with researchers so their valuable information is not leveraged when new initiatives are developed.” – Madeleine Sanders; co-founder of Women are IT (Victoria, South Australia, Western Australia) founding board member Australian Women in IT, Science and Engineering (AWISE) (personal communication, August 12, 2013).

  • 2.

    “I have found Researchers are statistically driven which is necessary for the activists and advocates however there has often been a dis-connect because the advocates and activist are normally at the Coal Face and have a more complete picture.” – Barbara Tobin; industry participant, ex President of Women in Technology (WiT) (Qld), ex Chair of Australian Women in IT, Science and Engineering (AWISE) (personal communication, August 5, 2013).

This disconnect is described as being in both directions: “the lack of research on the theoretical grounding of the interventions … [and] design not being conducted based on being informed by the theoretical understanding of ‘the problem’ instead of unscientific impressions about the causes” (von Hellens, Trauth & Fisher, 2012). Trauth (2011) explains, “The problem is that there is insufficient scholarly knowledge of the factors that account for women’s under representation in the IT field. Further, there is insufficient theoretical understanding of these factors. What we have, instead, is a situation in which generally well intentioned people identify and theorize factors in an ad hoc fashion. That is, since everyone experiences gender, it is commonly thought that rigorous data-driven interventions are unnecessary. This has contributed to a lack of theoretically-informed interventions to address the gender imbalance.”

Complete Chapter List

Search this Book:
Reset