Very Few UK Girls Took Computing A-level

A worrying statistic for the tech industry was revealed in freshly-released A-level data, only 9.8% of those completing a computing course were girls.

It comes amid a storm in Silicon Valley over the number of women employed in the tech industry.Experts agree that the world faces a digital skills shortage and that a more even gender balance is crucial. One industry body worried that too few boys were also choosing the subject.

"Today's announcement that nearly 7,600 students in England took A-level computing means it's not going to be party time in the IT world for a long time to come," said Bill Mitchell, director of education at the IT Chartered Institute, BCS.

He said that it fell well short of the 40,000 level that "we should be seeing".

A recent survey of 1,000 university students conducted by audit firm KPMG suggested that only 37% of young women were confident they had the tech skills needed by today's employers. A total of 73% said that they had not considered a graduate job in technology.

Aidan Brennan, KPMG's head of digital transformation, said: "The issue here isn't around competency - far from it - but rather how businesses understand the underlying capability of an individual and how to unlock it.

"I think this research highlights the work that needs to be done to show the next generation that when it comes to a career in tech, gender isn't part of the equation.

"Competition for jobs is tough and we know that female job seekers can be less likely to apply for a role than their male counterparts if they don't feel they already possess every prerequisite the job demands."

Anne-Marie Imafidon MBE, who founded the charity Stemettes to persuade more girls to pursue careers in Science, Technology Engineering and Maths has her own view about the low number of girls taking A-level computing. "Girls often don't want to be the only one in the class so they tend not to pick the subject when it is an option," she said.

"Also, it's often not even an option in a lot of schools so it's an uphill battle but fortunately, a lot of computer science courses take A-level maths students, so there is a very viable route for girls into the course itself and related courses."

BBC: 

You Might Aslo Read:

GCHQ Wants Teenage Girls To Join The Cybersecurity Fight:

Female Role Models & The Early Days Of Computing:

Room At The Top For Women In Tech:

« 4 Steps Toward A GDPR Compliance Audit
Android Apps With Spy Software »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

GoPlus Security

GoPlus Security

GoPlus is working as the "security infrastructure" for web3, by providing open, permissionless, user-driven Security Services.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.