197,515 research outputs found

    Technical Interviews: Another Barrier to Broadening Participation in Computing?

    Get PDF
    What does it take to obtain a computing position in the industry? Although anecdotal reports state that ``hiring is broken,\u27\u27 empirical evidence is necessary to identify the flaws in the existing system. The goal of this dissertation was to understand what expectations companies have for job seekers in computing, and to explore students\u27 experiences with technical interviews and their pathways to job attainment. In particular, this work considered how hiring practices may impact populations already underrepresented in computing such as women, Black/African American students, and Hispanic/Latinx students. It also sought to understand how minoritized populations leverage their own inherent capital to overcome obstacles throughout the process. The theoretical frameworks of community cultural wealth, social cognitive career theory, identity theory, and intersectionality guided the studies, to answer the following research questions: 1) What does the hiring process in computing look like from both the applicant and industry perspective?; 2) How do cultural experiences impact technical interview preparation?; 3) How do technical interviews, and other professional and cultural experiences impact computing identity?; and 4) How do students describe their experiences with the hiring process in computing? To address these questions, a variety of methods were employed, beginning with a systematic literature review. This was followed by an explanatory sequential mixed-methods design that utilized a survey, statistical analysis, and semi-structured interviews. Discursive phenomenography was also the methodology chosen which shaped the qualitative inquiry. The findings illustrated the unique experiences and support mechanisms students from different gender, racial, and ethnic backgrounds utilize to succeed in hiring. These results not only serve to inform students, educators, and administrators how to best prepare for technical interviews, but also present a call to action for industry to change hiring and workplace practices that limit diversity. Suggestions and guidelines are given to enable a hiring process that can still achieve its target of finding qualified employees, but that does so in a manner more inclusive to all job seekers

    Is change on the horizon for Maori and Pacifica female high school students when it comes to ICT?

    Get PDF
    This paper explores some of the factors that discourage the participation of Māori and Pacific girls in ICT in New Zealand. Despite many ICT job opportunities, there has been a steady decrease in the percentage of girls, especial Māori and Pacific girls entering into ICT study, and pursuing ICT careers. This study used a modified version of the conceptual framework designed by Bernhardt (2014) based on the 'STEMcell' model. The STEMcell framework was used to explores the factors that discourage participation in ICT through such concepts as cultural, social, structural and social IT that contribute to the likelihood of student’s career choice in ICT. An online questionnaire gathered data from year 11 students studying at high schools within Wellington, New Zealand. The findings indicated that Pacific girl’s more than Māori girls reported that their family members were seen as role models, which could impact on their future career choices. The statistical results also show that stereotypes are still alive in both Māori and Pacific year 11 student’s perceptions and that both Pacific and Māori girls from year 11 are unlikely to follow a career in ICT. Currently, the number of Māori and Pacific girls enrolling in ICT subjects at secondary school is still substantially below that for boys and, until changes are made, Māori and Pacific girls going into the industry will be in the minority

    e-ESAS: Evolution of a Participatory Design-based Solution for Breast Cancer (BC) Patients in Rural Bangladesh

    Get PDF
    Healthcare facility is scarce for rural women in the developing world. The situation is worse for patients who are suffering from diseases that require long-term feedback-oriented monitoring such as breast cancer. Lack of motivation to go to the health centers on patients’ side due to sociocultural barriers, financial restrictions and transportation hazards results in inadequate data for proper assessment. Fortunately, mobile phones have penetrated the masses even in rural communities of the developing countries. In this scenario, a mobile phone-based remote symptom monitoring system (RSMS) with inspirational videos can serve the purpose of both patients and doctors. Here, we present the findings of our field study conducted on 39 breast cancer patients in rural Bangladesh. Based on the results of extensive field studies, we have categorized the challenges faced by patients in different phases of the treatment process. As a solution, we have designed, developed and deployed e-ESAS—the first mobile-based RSMS in rural context. Along with the detail need assessment of such a system, we describe the evolution of e-ESAS and the deployment results. We have included the unique and useful design lessons that we learned as e-ESAS evolved through participatory design process. The findings show how e-ESAS addresses several challenges faced by patients and doctors and positively impact their lives

    The women in IT (WINIT) final report

    Get PDF
    The Women in IT (WINIT) project was funded by the European Social Fund (ESF) from March 2004 until April 2006 under HE ESF Objective 3: Research into equal opportunities in the labour market. Specifically the project came under Policy Field 2, Measure 2: Gender discrimination in employment. The project was run in the Information Systems Institute of the University of Salford. One of the Research Associates has an information systems (IS) background, the other has a background in sociology. We begin this report with an overview of the current situation with regards women in the UK IT sector. Whilst gender is only recently being recognised as an issue within the mainstream IS academic community, thirty years of female under-representation in the ICT field in more general terms has received more attention from academics, industry and government agencies alike. Numerous research projects and centres (such as the UK Resource Centre for Women in Science, Engineering and Technology) exist to tackle the under-representation of women in SET careers, although the figures for women’s participation in the ICT sector remain disheartening, with current estimates standing at around 15% (EOC 2004). Various innovative initiatives, such as e-Skills’ Computer Clubs for Girls, appear to have had little impact on these low female participation rates. Additionally, these and other initiatives have been interpreted as a means to fill the skills gap and ‘make up the numbers’ to boost the UK economy (French and Richardson 2005), resulting in ‘add more women and stir’ solutions to the ‘problem’ of gender in relation to inclusion in IS and ICT (Henwood 1996). Given that there have been decades of equal opportunity and related policies as well as many government initiatives designed to address the gender imbalance in IT employment patterns, sex segregation in IT occupations and pay and progression disparity in the IT sector (including the latest initiative- a one million pound DTI funded gender and SET project), we could be forgiven for assuming that these initiatives have had a beneficial effect on the position and number of women in the IT workforce, and that even if we have not yet achieved gender equity, we can surely argue that there are positive moves in the right direction. Although we do not wish to make definitive claims about the success or failure of specific initiatives, our research, backed up by recent major surveys, paints a picture that remains far from rosy. Indeed a recent comparative survey of the IT workforce in Germany, Holland and the UK indicates that women are haemorrhaging out of the UK IT workforce (Platman and Taylor 2004). From a high point of 100,892 women in the UK IT workforce in 1999, Platman and Taylor (ibid., 8) report a drop to 53,759 by 2003. As the IT industry was moving into recession anyway, the number of men in the industry has also declined, but by nothing like as much, so the figures for women are stark. When it comes to number crunching who is employed in the UK IT sector and when trying to make historical comparisons, the first obstacle is defining the sector itself. Studies vary quite substantially in the number of IT workers quoted suggesting there is quite a bit of variation in what is taken to be an IT job. The IT industry has experienced considerable expansion over the past twenty years. In spring 2003 in Britain, it was estimated that almost 900,000 people worked in ICT firms, and there were over 1 million ICT workers, filling ICT roles in any sector (e-Skills UK, 2003). This growth has resulted in talk of a ‘skills shortage’ requiring the ‘maximization’ of the workforce to its full potential: ‘You don’t just need pale, male, stale guys in the boardroom but a diversity of views’ (Stone 2004). In spring 2003 the Equal Opportunities Commission estimated there to be 151,000 women working in ICT occupations compared with 834,000 men (clearly using a different, much wider job definition from that of Platman and Taylor (2004)) , whilst in the childcare sector, there were less than 10,000 men working in these occupations, compared with 297,000 women (EOC 2004). It is estimated that the overall proportion of women working in ICT occupations is 15% (EOC 2004). In the UK, Office of National Statistics (ONS) statistics indicate that women accounted for 30% of IT operations technicians, but a mere 15% of ICT Managers and only 11% of IT strategy and planning professionals (EOC 2004). Although women are making inroads into technical and senior professions there remains a ‘feminisation’ of lower level jobs, with a female majority in operator and clerical roles and a female minority in technical and managerial roles (APC 2004).

    Does gender matter in online learning?

    Get PDF
    It is generally noted that computing is gendered, with women opting out of IT. Will the impact of online learning change this? Some researchers claim that women are disadvantaged in online courses. Others argue that we need a ‘women‐friendly cyber‐classroom’. Yet our experience is that the women achieve better results than the men; it is loner males that are disadvantaged by distance learning. We argue that online courses need to be people‐friendly so that no learners are disadvantaged

    Cyber security education is as essential as “The Three R’s”

    Get PDF
    Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use. That being so, it is important to ensure that all South Africans know how to secure their smart devices. This requires a high level of security awareness and knowledge. As yet, there is no formal curriculum addressing cyber security in South African schools. Indeed, it seems to be left to Universities to teach cyber security principles, and they currently only do this when students take computing-related courses. The outcome of this approach is that only a very small percentage of South Africans, i.e. those who take computing courses at University, are made aware of cyber security risks and know how to take precautions. Moreover, because this group is overwhelmingly male, this educational strategy disproportionately leaves young female South Africans vulnerable to cyber attacks. We thus contend that cyber security ought to be taught as children learn the essential “3 Rs” – delivering requisite skills at University level does not adequately prepare young South Africans for a world where cyber security is an essential skill. Starting to provide awareness and knowledge at primary school, and embedding it across the curriculum would, in addition to ensuring that people have the skills when they need them, also remove the current gender imbalance in cyber security awareness

    The Case for Improving U.S. Computer Science Education

    Get PDF
    Despite the growing use of computers and software in every facet of our economy, not until recently has computer science education begun to gain traction in American school systems. The current focus on improving science, technology, engineering, and mathematics (STEM) education in the U.S. school system has disregarded differences within STEM fields. Indeed, the most important STEM field for a modern economy is not only one that is not represented by its own initial in "STEM" but also the field with the fewest number of high school students taking its classes and by far has the most room for improvement—computer science

    "Mothers as Candy Wrappers": Critical Infrastructure Supporting the Transition into Motherhood

    Get PDF
    Copyright © ACM. The transition into motherhood is a complicated and often unsupported major life disruption. To alleviate mental health issues and to support identity re-negotiation, mothers are increasingly turning to online mothers\u27 groups, particularly private and secret Facebook groups; these can provide a complex system of social, emotional, and practical support for new mothers. In this paper we present findings from an exploratory interview study of how new mothers create, find, use, and participate in ICTs, specifically online mothers\u27 groups, to combat the lack of formal support systems by developing substitute networks. Utilizing a framework of critical infrastructures, we found that these online substitute networks were created by women, for women, in an effort to fill much needed social, political, and medical gaps that fail to see \u27woman and mother\u27 as a whole being, rather than simply as a \u27discarded candy wrapper\u27. Our study contributes to the growing literature on ICT use by mothers for supporting and negotiating new identities, by illustrating how these infrastructures can be re-designed and appropriated in use, for critical utilization
    • 

    corecore