Gender Diversity In The Technology Sector

There is still a major gender gap when it comes to women working in technology in Britain and the tech sector is still playing catch-up when it comes to the fair representation of many different groups, including genders, ethnicities, and those of varying socio-economic backgrounds. 

Only one-in-six of tech specialists in the UK are women, compared with 47% of the entire workforce, and fewer than one-in-ten of these women are in leadership positions. While 57% of occupations in the workforce are held by women, in the science, tech, engineering or maths industries, that figure stands at a very low and static 14%. 

However, the tide is turning. Organisations are slowly starting to recognise the benefits of employing more women in the technology sector. 

But now a high number of women are applying for computing degrees in 2024, which shows that some progress is being made to cut the gender diversity gap in UK tech, according to new research.  In total, there were 18,880 applications from female students to study the subject at university this year, marking a 10% increase on the year previous.

Analysis of UCAS university applications by BCS, the Chartered Institute for IT, found there were 17,140 applications made, which the organisation said highlights the increased appetite among female students to pursue careers in the technology sector. "More and more young women understand that taking a computing degree can help them change the world, and that is shown by these UCAS application figures," said BCS president Gillian Arnold.

While male applicants still outnumber females in computer science by over 4.1 to 1, this year, the gap has closed slightly from the 4.4 to 1 ratio at the same stage in the application cycle in 2023, BCS found.

Overall, STEM subjects are increasing in popularity, with applications to study computing from all young people rising by 7% to a total of 99,710. Meanwhile, applications for mathematics courses were up by 11%, engineering rose by 10%, and physical sciences by 8%. More than one-in-five applications (21%) came from non-UK students, a slight decrease from the 23% recorded in 2023/24.

An interesting fact about women in tech is that the language used in a job ad as well as specific benefits aimed at women are both vital in making women to want to apply for a role. 

A survey revealed that 63% of women said they’d look for a job which offered flexibility and working from home. 
Having a flexible working policy and allowing hybrid working has become one of the most important factors for many candidates, not just women, since the COVID-19 pandemic which changed how we value our work/life balance.

One big barrier, according to industry body Tech Talent Charter, is the fact that women tend to shoulder more than their fair load of caring responsibilities, with 40% of women citing the problem as their main reason for leaving the tech industry.

Computing is now the seventh most popular subject for UK 18-year-old applicants, BCS found and this is the sixth consecutive year of growth for computing course applications amongst students of this age group. This year’s figure is 70% higher than in 2019, and 113% higher for women.

Women InTech    |   Women In Tech   |  ITPro     |      TechUK   |   esendex    |      Redafaire     |   Airswift 

Image: christina@wocintechchat.com

You Might Also Read: 

One Third Of Cyber Criminals Are Women:

DIRECTORY OF SUPPLIERS - Women & Minorities in Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware: The True Cost To Business
Wireless Security In Smart Homes Is Vulnerable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.