This paper offers a synthesis on computing identity and the experiences of women and minoritized populations in computing and computer science in higher education. Examining computing identity and its role in the computing experiences of minoritized undergraduates can help us better understand ways to engage and support women and minoritized individuals in the computing field thus increasing participation and persistence of these groups in computing. In this article, we present a review of research literature on computing identity within the experiences of women and minoritized undergraduate students in computing. The research questions guiding this work are: (1) What research literature exists about computing identity?, (2) According to existing literature, what are the experiences of women and racially minoritized undergraduates in computing (e.g., persons who identify as Black, Hispanic/Latinx, Indigenous people)?, and (3) What theoretical frameworks are used to guide existing computing identity literature? Emergent themes include the need to focus on exposure to computing, persistence, career expectations, and engagement. While there is no consensus on a computer identity framework, there is research guided by social cognitive career theory, social identity theory, and practice theory. We conclude that computing identity, including its multiple conceptualizations, offers multiple opportunities for informing and broadening participation of minoritized populations in computing. Future research should include further conceptual exploration of computing identity.
more »
« less
Disrupting a Cycle of Disciplinary Harm: Confronting Ghosts in Creative Computing Endeavors with Out of School Educators
In designing equity-oriented learning environments around computing, it is important to consider how educators are structurally set up to reinscribe injustice. This poster presents a study of six pre-service teachers that were supported to confront “disciplinary ghosts,” experiences of harm related to computing in order to heal and re-envision alternative possibilities. We use the hauntological processes from Yoon and Chen (2022) as the starting point of a design framework towards healing.
more »
« less
- Award ID(s):
- 2005764
- PAR ID:
- 10542563
- Publisher / Repository:
- International Society of the Learning Sciences
- Date Published:
- Page Range / eLocation ID:
- 2497 to 2498
- Format(s):
- Medium: X
- Location:
- Buffalo, NY
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
As technology increases in the global arena and the necessity for a more diverse group of individuals to fulfill engineering and computing roles increases, it is important to engage more students in computing majors and roles. Identity has proven to be an important lens through which researchers can better understand how to engage students in these fields. In particular, our framing for computing identity includes students’ self-perceptions about recognition, interest, and performance/competence. Using survey data, this study examines the computing identity of high achieving underserved students in computer science (CS), computer engineering (CE), and information technology (IT). For these students, we compare the constructs between men and women, computing fields, and freshmen and juniors/seniors. Based on preliminary data, results show that female participants had less of a computing identity than male students, specifically with respect to computing recognition and overall computing identity. Students in IT programs had less of an overall computing identity than students in CS and CE. Finally, freshmen were lower on their overall computing identities and specifically performance/competence beliefs and interest. These results suggest that even within computing programs, students differ in their computing identities. Furthermore, there are different constructs related to computing identity that vary for different subgroups of students. While these results are insightful, future work will compare the computing identities of high achieving underserved students with a larger population of computing students as well as strategies for building their computing identities.more » « less
-
As technology increases in the global arena and the necessity for a more diverse group of individuals to fulfill engineering and computing roles increases, it is important to engage more students in computing majors and roles. Identity has proven to be an important lens through which researchers can better understand how to engage students in these fields. In particular, our framing for computing identity includes students’ self-perceptions about recognition, interest, and performance/competence. Using survey data, this study examines the computing identity of high achieving underserved students in computer science (CS), computer engineering (CE), and information technology (IT). For these students, we compare the constructs between men and women, computing fields, and freshmen and juniors/seniors. Based on preliminary data, results show that female participants had less of a computing identity than male students, specifically with respect to computing recognition and overall computing identity. Students in IT programs had less of an overall computing identity than students in CS and CE. Finally, freshmen were lower on their overall computing identities and specifically performance/competence beliefs and interest. These results suggest that even within computing programs, students differ in their computing identities. Furthermore, there are different constructs related to computing identity that vary for different subgroups of students. While these results are insightful, future work will compare the computing identities of high achieving underserved students with a larger population of computing students as well as strategies for building their computing identities.more » « less
-
Zhang & Sherriff (Ed.)Efforts to broaden participation in computing have led to gender-focused interventions intended to increase the number of women in the field of computing. However, such efforts have failed to significantly increase the percentage of Black women in computing. For example, only 1% of the 28,884 bachelor\textquotesingle s degrees in computing were awarded to Black women in 2018. Moreover, too few empirical studies have intentionally explored the lived experiences of Black women, an often overlooked and understudied population in the computing ecosystem. In this paper, we introduce intersectionality - the complex overlap of socially constructed identities such as race, gender, class, sexuality, etc. - as a theoretical framework and springboard for exploring the lived experiences of Black women in computing. We interview 14 Black women in various stages of the computing ecosystem (undergraduate students, graduate students and early career professionals) to understand how intersectionality influences their ability to persist in computing. Preliminary findings from the analysis of the 14 interviews provides insights into how the interlocking systems of oppression (i.e., gendered racism) play out in computing education and negatively impact the recruitment and retention of Black women in the field of computing.more » « less
-
Computing systems are omnipresent; their sustainability has become crucial for our society. A key aspect of this sustainability is the ability of computing systems to cope with the continuous change they face, ranging from dynamic operating conditions, to changing goals, and technological progress. While we are able to engineer smart computing systems that autonomously deal with various types of changes, handling unanticipated changes requires system evolution, which remains in essence a human-centered process. This will eventually become unmanageable. To break through the status quo, we put forward an arguable opinion for the vision of self-evolving computing systems that are equipped with an evolutionary engine enabling them to evolve autonomously. Specifically, when a self-evolving computing systems detects conditions outside its operational domain, such as an anomaly or a new goal, it activates an evolutionary engine that runs online experiments to determine how the system needs to evolve to deal with the changes, thereby evolving its architecture. During this process the engine can integrate new computing elements that are provided by computing warehouses. These computing elements provide specifications and procedures enabling their automatic integration. We motivate the need for self-evolving computing systems in light of the state of the art, outline a conceptual architecture of self-evolving computing systems, and illustrate the architecture for a future smart city mobility system that needs to evolve continuously with changing conditions. To conclude, we highlight key research challenges to realize the vision of self-evolving computing systems.more » « less
An official website of the United States government

