SlideShare a Scribd company logo
1 of 9
THE ROLE AND CHALLENGES OF WOMEN IN
CYBERSECURITY
BACKGROUNDAND OBJECTIVE OF THE STUDY
Despite the progress made, women in cybersecurity still face unique challenges. The gender
gap, unconscious bias, and workplace culture issues can discourage women from pursuing or
advancing in cybersecurity careers. The facts that cybersecurity is still a male-dominated
industry and women have historically been discouraged from pursuing careers in technically
demanding fields can create an intimidating environment for aspiring female professionals.
The present study aimed with following objectives:
 To study about women and cybersecurity.
 To concise the theoretical view in role and challenges of women in cybersecurity.
 To analyze various factors associated with study to draw matching conclusion for the study.
Literature Reviews
 Egete, D. et al. (2023) have explored from their study as women and ethnic
minorities have historically been underrepresented in the cybersecurity
industry. This paper provides a framework for discussing some of the skills
that are available to women and underrepresented groups and argues for the
necessity to solve this problem. Lastly, some suggestions to remediate this
pervasive issue are also provided.
 Ajgar, Amey & Ajgar, Yogita. (2022) have extracted from their study is
indicating metaverse is the future of the internet. He summarized in web 3.0
women have faced critical security issues and it’s necessary to improve
Metaverse and make it a safer technology for women.
 S, Kavitha. (2021) have summarized their study as the number of internet
users in India is increasing. This research study was an attempt to understand
to what extent women users are aware of threats in cyber-space; precautions
to be taken and legal protection available to them.
Materials and Methods Used
Simple random sampling method was used for the study.
150 women respondents from Nagapattinam district selected
at random basis. Frequency distribution analysis, Cross-table
analysis, Chi-square analysis, Likert Scale Analysis and
Weighted Average Analysis were used for the study.
Key Findings and Discussion
 Out of 150 women respondents the majority of the respondents i.e. 50 per cent of the
respondents are belongs to below 30 years age category, 78.70 per cent of the
respondents are married. And maximum of the respondents (34 per cent) are under
graduated, 48.70 per cent of the respondents are private employees. The majority i.e.
54 per cent of the respondents are falls under the family income category Rs. 20,001 –
Rs. 40,000 monthly. And 54 percent of the respondents are from semi-urban area.
 The majority of the respondents are affecting by lack of exposure and awareness on
cybersecurity except for the respondents who are majorities in post-graduation is
affected due to gender discriminations.
 There is significant relationship between marital status and educational qualification of
the respondents and challenging factors of cybersecurity among women and there is no
significant relationship between age, occupation, family income and residential
location of the respondents and challenging factors of cybersecurity among women.
 For all the statements asked related to present status of cybersecurity for
women under various dimensions the maximum of the respondents have
opined ‘strongly agree’ and ‘agree’. And the statement ‘inadequate
fascination, employing, and maintenance rehearses for women in
network protection’ have secured top mean score which indicated the
fascination, employment and maintenance for women is in sufficient.
 The maximum respondents given first rank for recommended
suggestion ‘organizations should implement flexible work schedules’
and the suggestion ‘focused investigation on women in cybersecurity,
encompassing data collection and dissemination on women in
cybersecurity metrics’ secured second rank and the suggestion
‘Advertisements promoting the employment of women in cybersecurity’
secured last i.e. fifteenth rank.
 On all the statements asked related to present status on the perception of
respondents about cybersecurity, the statements absence of mindfulness
on vocation valuable open doors in cyber safety, by and large, women
have significantly added to figuring science and innovation, however their
commitments are not really recognized, online protection contests used to
draw in graduates to online protection are custom fitted for men, male
digital experts know nothing about difficulties experienced by women;
more women are expected to increment mindfulness and inadequate
fascination, employing, and maintenance rehearses for women in cyber
protection are associated with marital status of the respondents.
Conclusion
 There is a severe lack of awareness among women about the cyber laws and what to do
further when a person becomes a victim of cybercrime. This leads to mental agony and
has many a times led to suicide attempts by victims too. So, awareness of cyber laws is
very important for women not just to avoid becoming a victim of such cybercrimes but
also reporting of cybercrimes. Another very important dimension is even today the
procedure after filing up of a cybercrime follows the very conventional methods of
investigation. Improving cybersecurity by the Government and other authorized
agencies and institutions is the need of the hour. Cyber patrolling, awareness, training
and capacity building of investigators can definitely help in curving the menace of
cybercrimes.
THANK YOU…!

More Related Content

Similar to Role and Challenges of the social science

Women in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapWomen in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapRebecca Ralston
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Adele Ramos
 
online community .pdf
online community .pdfonline community .pdf
online community .pdfmrryyym4
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdfJioAhuja
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Megan Bednar
 
International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)inventionjournals
 
International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)inventionjournals
 
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...Monica Bulger
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Impact of self esteem on undergraduates' attitude towards cybercrime.
Impact of self esteem on undergraduates' attitude towards cybercrime.Impact of self esteem on undergraduates' attitude towards cybercrime.
Impact of self esteem on undergraduates' attitude towards cybercrime.naheem nuhu
 
Interim Findings From The Youth Work And Social Networking Project
Interim Findings From The Youth Work And Social Networking ProjectInterim Findings From The Youth Work And Social Networking Project
Interim Findings From The Youth Work And Social Networking ProjectTim Davies
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyNicolette Reyhani
 
Research ProtocolRES724 Version 52University of Phoenix
Research ProtocolRES724 Version 52University of PhoenixResearch ProtocolRES724 Version 52University of Phoenix
Research ProtocolRES724 Version 52University of Phoenixmyrljjcpoarch
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential PosterJosue Ayala
 

Similar to Role and Challenges of the social science (20)

Breaking Gender-Barriers
Breaking Gender-BarriersBreaking Gender-Barriers
Breaking Gender-Barriers
 
EMDT_7
EMDT_7EMDT_7
EMDT_7
 
Women in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender GapWomen in Technology: Bridging the Gender Gap
Women in Technology: Bridging the Gender Gap
 
Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)Healthy relationships | Combating cyber bullying (Doc)
Healthy relationships | Combating cyber bullying (Doc)
 
ICA Presentation 2013
ICA Presentation 2013ICA Presentation 2013
ICA Presentation 2013
 
online community .pdf
online community .pdfonline community .pdf
online community .pdf
 
Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...Internet use and health information seeking behavior of adolescents in Mbarar...
Internet use and health information seeking behavior of adolescents in Mbarar...
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)
 
International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)International Journal of Humanities and Social Science Invention (IJHSSI)
International Journal of Humanities and Social Science Invention (IJHSSI)
 
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Impact of self esteem on undergraduates' attitude towards cybercrime.
Impact of self esteem on undergraduates' attitude towards cybercrime.Impact of self esteem on undergraduates' attitude towards cybercrime.
Impact of self esteem on undergraduates' attitude towards cybercrime.
 
Interim Findings From The Youth Work And Social Networking Project
Interim Findings From The Youth Work And Social Networking ProjectInterim Findings From The Youth Work And Social Networking Project
Interim Findings From The Youth Work And Social Networking Project
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Research ProtocolRES724 Version 52University of Phoenix
Research ProtocolRES724 Version 52University of PhoenixResearch ProtocolRES724 Version 52University of Phoenix
Research ProtocolRES724 Version 52University of Phoenix
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential Poster
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 

Recently uploaded

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 

Role and Challenges of the social science

  • 1. THE ROLE AND CHALLENGES OF WOMEN IN CYBERSECURITY
  • 2. BACKGROUNDAND OBJECTIVE OF THE STUDY Despite the progress made, women in cybersecurity still face unique challenges. The gender gap, unconscious bias, and workplace culture issues can discourage women from pursuing or advancing in cybersecurity careers. The facts that cybersecurity is still a male-dominated industry and women have historically been discouraged from pursuing careers in technically demanding fields can create an intimidating environment for aspiring female professionals. The present study aimed with following objectives:  To study about women and cybersecurity.  To concise the theoretical view in role and challenges of women in cybersecurity.  To analyze various factors associated with study to draw matching conclusion for the study.
  • 3. Literature Reviews  Egete, D. et al. (2023) have explored from their study as women and ethnic minorities have historically been underrepresented in the cybersecurity industry. This paper provides a framework for discussing some of the skills that are available to women and underrepresented groups and argues for the necessity to solve this problem. Lastly, some suggestions to remediate this pervasive issue are also provided.  Ajgar, Amey & Ajgar, Yogita. (2022) have extracted from their study is indicating metaverse is the future of the internet. He summarized in web 3.0 women have faced critical security issues and it’s necessary to improve Metaverse and make it a safer technology for women.  S, Kavitha. (2021) have summarized their study as the number of internet users in India is increasing. This research study was an attempt to understand to what extent women users are aware of threats in cyber-space; precautions to be taken and legal protection available to them.
  • 4. Materials and Methods Used Simple random sampling method was used for the study. 150 women respondents from Nagapattinam district selected at random basis. Frequency distribution analysis, Cross-table analysis, Chi-square analysis, Likert Scale Analysis and Weighted Average Analysis were used for the study.
  • 5. Key Findings and Discussion  Out of 150 women respondents the majority of the respondents i.e. 50 per cent of the respondents are belongs to below 30 years age category, 78.70 per cent of the respondents are married. And maximum of the respondents (34 per cent) are under graduated, 48.70 per cent of the respondents are private employees. The majority i.e. 54 per cent of the respondents are falls under the family income category Rs. 20,001 – Rs. 40,000 monthly. And 54 percent of the respondents are from semi-urban area.  The majority of the respondents are affecting by lack of exposure and awareness on cybersecurity except for the respondents who are majorities in post-graduation is affected due to gender discriminations.  There is significant relationship between marital status and educational qualification of the respondents and challenging factors of cybersecurity among women and there is no significant relationship between age, occupation, family income and residential location of the respondents and challenging factors of cybersecurity among women.
  • 6.  For all the statements asked related to present status of cybersecurity for women under various dimensions the maximum of the respondents have opined ‘strongly agree’ and ‘agree’. And the statement ‘inadequate fascination, employing, and maintenance rehearses for women in network protection’ have secured top mean score which indicated the fascination, employment and maintenance for women is in sufficient.  The maximum respondents given first rank for recommended suggestion ‘organizations should implement flexible work schedules’ and the suggestion ‘focused investigation on women in cybersecurity, encompassing data collection and dissemination on women in cybersecurity metrics’ secured second rank and the suggestion ‘Advertisements promoting the employment of women in cybersecurity’ secured last i.e. fifteenth rank.
  • 7.  On all the statements asked related to present status on the perception of respondents about cybersecurity, the statements absence of mindfulness on vocation valuable open doors in cyber safety, by and large, women have significantly added to figuring science and innovation, however their commitments are not really recognized, online protection contests used to draw in graduates to online protection are custom fitted for men, male digital experts know nothing about difficulties experienced by women; more women are expected to increment mindfulness and inadequate fascination, employing, and maintenance rehearses for women in cyber protection are associated with marital status of the respondents.
  • 8. Conclusion  There is a severe lack of awareness among women about the cyber laws and what to do further when a person becomes a victim of cybercrime. This leads to mental agony and has many a times led to suicide attempts by victims too. So, awareness of cyber laws is very important for women not just to avoid becoming a victim of such cybercrimes but also reporting of cybercrimes. Another very important dimension is even today the procedure after filing up of a cybercrime follows the very conventional methods of investigation. Improving cybersecurity by the Government and other authorized agencies and institutions is the need of the hour. Cyber patrolling, awareness, training and capacity building of investigators can definitely help in curving the menace of cybercrimes.