1,768 research outputs found
Informatics in the Future: Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015
Big data; Computing ethics; Women in computing; Research ethic
Australian interventions for women in computing : are we evaluating?
There are many reasons why the gender imbalance in computing should be of concern to the profession. Over the last 20 years there have been many intervention programs which attempt to redress this situation and encourage more women into computing. To determine whether an intervention program has made a difference requires evaluation. Program evaluation is the careful collecting of information about a program so that those responsible can make informed decisions regarding the programs. This multi-case study investigation into 14 major programs conducted in Australia shows that many projects are not evaluated due to a lack of time, expertise and money. Without dissemination of detailed evaluations it is not possible to work out which intervention programs should be replicated and which should be modified or abandoned
What\u27s Grad School All About?
PDF of a powerpoint presentation from the Capital region Celebration of Women in Computing (CAPWIC) Conference in Harrisonburg, Virginia, February 27, 2015. Also available on Slideshare.https://digitalcommons.odu.edu/computerscience_presentations/1030/thumbnail.jp
Telling Stories with Web Archives
PDF of a powerpoint presentation from the Southeast Women in Computing Conference in Lake Guntersville State Park, Alabama, November 16, 2013. Also available on Slideshare.https://digitalcommons.odu.edu/computerscience_presentations/1036/thumbnail.jp
“You Sound Like a Good Program Manager”: An Analysis of Gender in Women’s Computing Life Histories
Through the eyes of professional women in computing, we can better understand the impact of workplace structures, higher education pathways, and the particular closed nature of the tech industry. This study of women’s life histories contributes to the work of in-depth qualitative examinations of CS learning contexts and psychological studies investigating phenomena such stereotype threat which contextualize the experience of women in computing environments. Drawing inspiration from Margolis and Fisher’s work drawing the “blueprints” of the “boy’s clubhouse” of computing education [20], as well as McDermott and Webber’s analysis of when math learning occurs [22], we ask when, where, and how is gender being invoked and created, as a way to unpack the places, events, and interactions that shape women’s participation in the Silicon Valley workforce. This qualitative analysis of 13 life history interviews with professional women in computing shows that gender becomes salient for women in public settings, particularly in early adulthood when women enter male-dominated classrooms, teams, and workplaces that foster “brogramming” culture. CS educators, hiring managers, and recruiters all need to be aware that the effects of gender go beyond just including more women in classrooms and on teams. The learning environment, incentives for participation, and the goal of diversity all need to be better aligned in order to foster an equitable workforce
Is Stack Overflow Overflowing With Questions and Tags
Programming question and answer (Q & A) websites, such as Quora, Stack
Overflow, and Yahoo! Answer etc. helps us to understand the programming
concepts easily and quickly in a way that has been tested and applied by many
software developers. Stack Overflow is one of the most frequently used
programming Q\&A website where the questions and answers posted are presently
analyzed manually, which requires a huge amount of time and resource. To save
the effort, we present a topic modeling based technique to analyze the words of
the original texts to discover the themes that run through them. We also
propose a method to automate the process of reviewing the quality of questions
on Stack Overflow dataset in order to avoid ballooning the stack overflow with
insignificant questions. The proposed method also recommends the appropriate
tags for the new post, which averts the creation of unnecessary tags on Stack
Overflow.Comment: 11 pages, 7 figures, 3 tables Presented at Third International
Symposium on Women in Computing and Informatics (WCI-2015
CODE4her Spring 2018
CODE4her is a mentorship program with a goal of sparking interest in computer science organized by the BGSU Women in Computing (BGWIC) student organization. Participation is open to middle school girls (grades 5-8), and participants are paired with BGWIC members who serve as mentors
Is That Twitter Hashtag Worth Reading
Online social media such as Twitter, Facebook, Wikis and Linkedin have made a
great impact on the way we consume information in our day to day life. Now it
has become increasingly important that we come across appropriate content from
the social media to avoid information explosion. In case of Twitter, popular
information can be tracked using hashtags. Studying the characteristics of
tweets containing hashtags becomes important for a number of tasks, such as
breaking news detection, personalized message recommendation, friends
recommendation, and sentiment analysis among others.
In this paper, we have analyzed Twitter data based on trending hashtags,
which is widely used nowadays. We have used event based hashtags to know users'
thoughts on those events and to decide whether the rest of the users might find
it interesting or not. We have used topic modeling, which reveals the hidden
thematic structure of the documents (tweets in this case) in addition to
sentiment analysis in exploring and summarizing the content of the documents. A
technique to find the interestingness of event based twitter hashtag and the
associated sentiment has been proposed. The proposed technique helps twitter
follower to read, relevant and interesting hashtag.Comment: 10 pages, 6 figures, Presented at the Third International Symposium
on Women in Computing and Informatics (WCI-2015
- …