Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the all-in-one-wp-security-and-firewall domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/securityacademy/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the polylang domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/securityacademy/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/securityacademy/public_html/wp-includes/functions.php:6114) in /home/securityacademy/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":883,"date":"2022-02-03T12:11:16","date_gmt":"2022-02-03T11:11:16","guid":{"rendered":"https:\/\/securityacademy.rs\/?p=883"},"modified":"2023-01-16T19:40:48","modified_gmt":"2023-01-16T18:40:48","slug":"izazovan-polozaj-zena-u-stem-oblastima-i-it-sektoru","status":"publish","type":"post","link":"https:\/\/securityacademy.rs\/2022\/02\/03\/izazovan-polozaj-zena-u-stem-oblastima-i-it-sektoru\/","title":{"rendered":"Izazovan polo\u017eaj \u017eena u STEM oblastima i IT sektoru"},"content":{"rendered":"

 <\/p>\n

Pitanje \u017eena u cyber security oblasti mo\u017ee se posmatrati iz vi\u0161e uglova, ali je najupitniji onaj koji je na jednoj me\u0111unarodnoj konferenciji predstavila preduzetnica i influenserka D\u017eej Frakland. I tako, pola veka posle Margaret Hamilton koja je napisala kod za Apollo Lunar Mission, na cyber konferenciji pri\u010damo o tome kako \u017eena i majka (to je valjda obavezno) mora da jasno ka\u017ee \u0161ta \u017eeli, da se ne pla\u0161i izazova, da ka\u017ee \u201eda\u201c i iza\u0111e iz zone komfora i da dozvoli da je neko vodi za ruku. Kako za ruku, kad bi trebalo da su joj obe zauzete mi\u0161em, ploterom ili tastaturom, a ne varja\u010dom i mobilnim telefonom, nemamo pojma.<\/p>\n

Polo\u017eaj \u017eena u IT sektoru mnogo je bolji u odnosu na polo\u017eaj \u017eena u drugim privrednim oblastima, ali to ne zna\u010di da su ravnopravne s mu\u0161karcima. Iako \u010dine skoro polovinu radne snage u Srbiji (prema podacima Saveta za regionalnu saradnju \u017eene u STEM oblasti – matematike, in\u017eenjerstva, tehnologije i nauke \u00a0– \u010dine 43 posto), \u017eene u IT sektoru manje su pla\u0107ene od mu\u0161karaca (za 23 posto, da budemo precizni) i te\u017ee idu na upravlja\u010dke pozicije; i dalje se posmatraju kao budu\u0107e nositeljke porodi\u010dnog tereta, s ograni\u010denjima radi odsustva zbog nege deteta, iako odavno skoro svi radimo online i te se razlike, zahvaljuju\u0107i koroni, sve br\u017ee bri\u0161u. Polna perspektiva platformskog rada i dalje je nedovoljno prou\u010davana tema, a u kontekstu Srbije i veoma va\u017ena jer je ova zemlja me\u0111u vodec\u0301im zemljama sveta po broju platformskih radnika na 1.000 stanovnika. S druge strane, \u017eene se zaista u porodici i dru\u0161tvu u\u010de da biraju poslove vezane za javni sektor, jer su tamo plate manje, ali sigurnije, a mogu\u0107nost napredovanja nije va\u017ena jer plate nisu odlu\u010duju\u0107i faktor. S tre\u0107e strane, one neo\u010dekivane, pandemija nam je ukinula klasi\u010dno radno vreme i \u017eene su sve svesnije toga da je pro\u0161lo vreme rada \u201cod 9 do 17\u201d, te je princip \u201csedi i \u0107uti\u201d ostao u skladi\u0161tu istorije. Ovaj trend vi\u0111en je na celom Zapadnom Balkanu, ali se razlikuju u du\u017eini koraka kojima idu napred.<\/p>\n

Kada se govori o osve\u0161\u0107ivanju \u017eena i njihovom osna\u017eivanju za rad u IT sektoru, treba krenuti \u2013 od mu\u0161karaca. Oni, naime, moraju da nau\u010de da su \u017eene s njima u ravnopravnoj utakmici, da je njihov doprinos razvoju podjednako veliki i da su oni ti koji se kroz radionice i psihoanalize moraju uve\u017ebati da koleginice posmatraju kroz nau\u010dnu, a ne sociolo\u0161ku ili, daleko bilo, seksualnu prizmu. Drugi faktor je podr\u0161ka dr\u017eave, a tre\u0107i\u00a0 – saradnja struke i nauke s jedne strane, i medija i konsultanata za komunikaciju, koji \u0107e na pravi na\u010din \u201cprevesti\u201d jezik IT-jevaca u onaj koji razumeju obi\u010dni gra\u0111ani. Tako \u0107e se podi\u0107i nivo op\u0161te digitalne kompetencije, pove\u0107ati \u0161ansa da se prihvati stvarnost u kojoj je IKT sektor postao osnova op\u0161teg obrazovanja, a time i preraspodeliti radna snaga, posebno \u017eenska, u sektor koji se sna\u017eno razvija. S komunikacijom sti\u017ee i me\u0111usobno razumevanje, a da bi se to postiglo, potrebno je obu\u010diti medijske radnike osnovnoj kompjuterskoj pismenosti, uz obuku od osnovne \u0161kole, ali i ubediti IKT sektor da se otvori prema javnosti, kako bi postao vidljiviji. Ovo je posebno izazovno za cyber security sektor koji po prirodi mora da \u010duva podatke, ali je zato va\u017eno obu\u010diti medije kako da na pravi na\u010din postavljaju pitanja i prenesu glavne zna\u010dajke svake teme ponaosob.<\/p>\n","protected":false},"excerpt":{"rendered":"

  Pitanje \u017eena u cyber security oblasti mo\u017ee se posmatrati iz vi\u0161e uglova, ali je najupitniji onaj koji je na jednoj me\u0111unarodnoj konferenciji predstavila preduzetnica i influenserka D\u017eej Frakland. I tako, pola veka posle Margaret Hamilton koja je napisala kod za Apollo Lunar Mission, na cyber konferenciji pri\u010damo o tome kako \u017eena i majka (to […]<\/p>\n","protected":false},"author":1,"featured_media":604,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87],"tags":[],"class_list":["post-883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":1,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"predecessor-version":[{"id":884,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/posts\/883\/revisions\/884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/media\/604"}],"wp:attachment":[{"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityacademy.rs\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}