Frauke Fuhrmann’s research while affiliated with Technical University of Applied Sciences Wildau and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (25)


Does a Career in Information Security Appeal to Women? An empirical analysis of job ads, supplemented by job descriptions and narratives
  • Conference Paper
  • Full-text available

July 2019

·

80 Reads

·

1 Citation

F Fuhrmann

·

Information security is a fast-growing, forward-looking career offering women good opportunities to assert their position and shape the development of the field and the future alike. However, worldwide the proportion of women in information security is very low. Increasing the number of women would help address the anticipated labor shortage and integrate diverse perspectives and experiences. In preparation for the development of a gender-sensitive job profile in information security, we analyzed existing ads in the field with regard to gender-sensitive images and language as well as the preferences of women (and men) for certain job characteristics and skill sets. The analysis was complemented by insights derived from job descriptions and interviews with female and male experts working in information security. Although the job ads highlight important issues for women, there is still room for improvement if more women (and men) are to be attracted to the field.

Download

Sensitizing Pupils to Information Security through Game-Based Learning

November 2018

·

83 Reads

·

1 Citation

Digitization and the mobile devices, services, and opportunities that go with it are omnipresent in the life of adolescents. However, information security and data protection are seldom taught in schools. The paper presents an ongoing research and application project that aims to sensitize Year-Nine pu-pils and raise their awareness and sense of caution about handling sensitive information and their personal data as well as that of others. The development and implementation of this pilot action is based on research into computer science curricula and insights into the effectiveness of game-based learning as a teaching and learning method. The project develops and evaluates a learning station format with game-based scenarios addressing important information security issues that are relevant for the pupils and part of their daily life. The project contributes an innovative approach to how pupils can achieve information security and data protection awareness—a competence highly needed in a more and more digitized world.


Breaking Down Gender Stereotypes in the IT Security Occupation Field

August 2018

·

51 Reads

·

1 Citation

Information technology (IT) security, also referred to as cyber security, is a highly male domi-nated occupation field. Women only represent 11% of the security professionals worldwide. The gender-segregated occupation also manifests in a significantly higher number of high-level leadership positions held by men and gender pay gaps (Frost/Sullivan 2017). Increasing the number of women in IT security would have enormous economic and societal consequences. For example, the forecasted shortage of 1.8 million security employees by 2022 (Frost/Sullivan 2017) could be reduced. The diverse perspectives and skills, which wom-en contribute, could benefit the creation of innovative products and services to better reflect the diversity of society (Frost/Sullivan 2017, Ashcraft et al. 2016). Equal participation would ensure that women benefit from the attractive occupation field with high salaries and various possibilities to shape the future (Ashcraft et al. 2012). However, social and structural factors often deter girls from choosing the computing field (Ashcraft et al. 2012). These factors comprise an inappropriate design of computing (in)formal education that lacks relevant topics, possibilities for collaboration, and active learning. Fur-thermore, girls receive less support from parents and teachers to pursue an IT occupation and female role models are missing. In addition, inaccurate and stereotypical perceptions of IT occupations and their (male) employees fail to arouse interest. Computer professionals are thought of as geeks with little social interaction, working isolated in a darkened room (Ashcraft et al. 2012). To overcome these social and structural barriers, we will present the first results of the project “Gender-sensitive Study and Vocational Orientation for the Occupation Security Specialist”, started in September 2017 and sponsored by the Federal Ministry of Education and Research. The project aims at changing the stereotypical misconception of IT security occupations and at attracting girls to this innovative and future-oriented occupation field by developing, testing, and evaluating four measures. Firstly, we will design a gender-sensitive job profile that high-lights the diversity, versatile tasks, and the meaningful nature of the occupation. Secondly, by talking to women about their experience–enjoyment, challenges, etc.–in IT security, we will prepare portraits of diverse female role models in a book, in posters, and in videos. Thirdly, to get a clear impression of the IT security job, female students from different socioeconomic backgrounds will be invited to experience awareness-raising measures about information security–an important duty in IT security. We will design these game-based learning scenarios so that the scenarios incorporate digital activities of the daily life of girls, enable knowledge sharing, and productive collaboration. During this event students also learn more about the job profile, IT degree programmes and vocational trainings, and meet some of the role models. Fourthly, parents, teachers and other caregivers whose encouragement is important for girls are invited to informative events to learn about the job profile, pilot event and how to use the materials developed through the project.


How Can We Succeed in Attracting (Young) Women to the Promising Careers of Information Security and Computing? – A Project Testing an Experience-Driven Approach

August 2018

·

270 Reads

·

1 Citation

Information technology and digitization increasingly permeate all aspects of today’s society. Diverse perspectives and skills are needed to shape these changes in a secure and socially responsible manner. Computing, information security, and data protection are promising fields for working in this context. But how can we succeed in attracting more (young) women to these career paths and thus ensure that they play an equal part in shaping the future? The paper presents a project that sets out to raise the interest of girls and young women in the job of security specialist in particular, and computing degrees and vocational trainings in general, by means of four experience-driven measures: game-based learning scenarios to increase sensitization, the presentation of the occupational profiles of security experts as a means to enhance motivation, the setting up of role model portraits to make women working in infor-mation security more visible, and informative events for multipliers.


Methodological approach
Final handcrafted prototype of the project iBaMs
Fictitious Hasse diagrams of six user profiles (UP) and fourteen control panels (CP). Maximal elements among user profiles: UP1, UP2, UP3; maximal elements among the control panels: CP1, CP2, CP3, CP4
Visualization of all possible assignments with three user profiles (UP) and four control panels (CP)
Model solution of the matching process with three user profiles (UP) and four control panels (CP). From all UP, CP combinations (as visualized in Fig. 4) the three best ones (due to the Copeland index) were selected. These three pairs are (UP1, CP4), (UP2, CP1) and (UP3, CP4), where UPi and CPj (“vertices”) are connected by a line
How Can the Empowerment of Employees with Intellectual Disabilities Be Supported?

April 2018

·

127 Reads

·

5 Citations

Social Indicators Research

The project “Barrier-reduced Machines in Innovative Interaction” (iBaMs) was aimed at enabling employees with intellectual disabilities to extend their range of tasks and to increase their level of responsibility. This goal is to be achieved by an assistive accessible control panel for the operation of complex computer-controlled machines. Therefore, users’ needs and skills as well as design requirements had to be specified in the project. The result is a concept for an assistive control panel whose display interface can be tailor-made to individual needs. Furthermore, indicators for characterizing user profiles and control panels were identified, and a concept was developed of how control panels can be determined and matched to the needs and preferences of individual employees. The complexity in recognizing the requirements of people with intellectual disabilities in a digital world is mapped onto a complex interaction of two sets of indicators—namely social indicators and technical indicators describing control panels. Guidelines on how the results can be evaluated are presented using plausible but fictitious data.






Fig 1 Spiral of transformative interaction 
Scientific Knowledge of the Human Side of Information Security as a Basis for Sustainable Trainings in Organizational Practices

January 2018

·

313 Reads

·

21 Citations

Comprehensive digitization leads to new challenges because of cybercrime and related security countermeasures. There is no doubt that this will fundamentally affect our lives and is leading to an increase in the importance of information security (IS). However, technology solutions alone are not sufficient to ensure IS countermeasures. The human side of security is important to protect organizational assets like user information and systems. The paper illustrates these relationships in terms of information security awareness (ISA), examining its goals and the factors influencing it through the systematic analysis and review of scientific literature and the transfer of scientific knowledge for practical purposes. We reviewed the publications of leading academic journals in the field of IS over the past decade.


Citations (7)


... As there is still essential strategic incompetence in the organizations themselves, humans should not be called "the weakest link" in the security chain. Rather, sustainable awareness-raising and training for people should be created in the organizations [16]. ...

Reference:

Investigating Practices of Information Security Awareness: Perspectives from Government Entities in Libya
Scientific Knowledge of the Human Side of Information Security as a Basis for Sustainable Trainings in Organizational Practices

... All searches were limited to English, peer-reviewed journal articles only and in the span of ten years, from 2013 to 2022. The reason for the selection of this interval is due to the relatively slow growth of research and projects around technologies to support PwD, especially in workplace settings, despite the rapid technological innovation and development (Fuhrmann et al., 2018). Therefore, the authors decided to include a more Does the Provision of Assistive Technology Increase Disability Employment? | 183 extended period limitation instead of limiting the search to a shorter period (e.g., five years). ...

How Can the Empowerment of Employees with Intellectual Disabilities Be Supported?

Social Indicators Research

... When combined with reality-based learning methods and the exchange of experience, game-based teaching with touchable analog material to emotionalize security and motivate commitment should be a suitable instrument to promote ISA and to improve the knowledge associated with it [25]. However, to date empirical evidence of game-based learning is rare [26]: little is known about how games may influence the acquisition of twenty-first-century skills [27], and no consensus has been reached with respect to the real positive effect of game-based learning and its effectiveness in the various domains [27]. ...

Raising Awareness for Information Security in a Playful Way
Frauke Fuhrmann

·

·

Ernst-Peter Ehrlich

·

[...]

·

... Quizzes X X ⇥ Low Low # # # X X • Can only verify theoretical knowledge (Kruger and Kearney, 2006 Red-Team Exercises ⇥ X X High High G # X • Particularly study cybersecurity-teams (Scholl et al., 2017) Simulation Games X X High High G # G # X • Worst-case scenarios close to reality (Jalali et al., 2019) ...

Blind spot: Do you know the effectiveness of your information security awareness-raising program?

... We have developed the spiral of transformative interaction between an organization and its staff with regard to (IS) learning processes (see fig. 1 and [59]). The spiral shows the interaction between top-down specifications and individual bottom-up influences on the establishment of a future-oriented modern organizational security culture. ...

Analog – digital? Wie sich mithilfe analoger Methoden Bewusstsein für Informationssicherheit in der digitalen Welt fördern lässt

... Psychological research shows that in addition to the classical theoretical approach to knowledge trans-72 fer and the marketing-oriented approach of emotionalization, a systemic approach to team-based 73 communication is needed (see [12][13][14]). ISAT needs a "methodology 3.0": social participation in a com-74 municative team process is a key component in this third stage of emotionally based awareness-raising 75 activities [15]. This is because IS and IT are about more than technology [16]. ...

Information Security Awareness 3.0 for Job Beginners

... We started the requirement analysis by conducting semi-structured guided interviews with the specialized staff and the employees and by observing the users' activities in order to gain knowledge of the users and their working tasks, the working procedures, working context, and business processes (see Wiesner-Steiner et al. 2014). The interviews and observations took place in the rooms and shop-floors of CVJM-in the familiar environment of the participants-and lasted half an hour to 1 hour. ...

Preconditions and Design Requirements for Touch-Screen Control Panels for Mentally Disabled Persons Working with CNC Machines