skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on July 14, 2026

Title: Implications of Disability Definition, Determination, and Data Collection
Demographic data on disability is being collected more and more by computing organizations. However, the meaning of that data can vary drastically depending on the ways that disability is defined (e.g., disabling conditions versus functional limitations) and determined (e.g., by experts or self-reported). In this paper we analyze the varying definitions and determinations of disability and how data about disability is collected by different organizations. We discuss issues associated with certain ways of collecting disability data and offer ways that disability data can be used to inform action towards more inclusive computing education.  more » « less
Award ID(s):
2417014
PAR ID:
10627640
Author(s) / Creator(s):
; ;
Publisher / Repository:
Proceedings of the 2025 Conference on Research on Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT 2025)
Date Published:
ISSN:
xxxx-xxxx
ISBN:
979-8-4007-0626-4
Page Range / eLocation ID:
65-71
Format(s):
Medium: X
Location:
https://dl.acm.org/doi/10.1145/3704637.3734735
Sponsoring Org:
National Science Foundation
More Like this
  1. There are two strategic and longstanding questions about cyber risk that organizations largely have been unable to answer: What is an organization's estimated risk exposure and how does its security compare with peers? Answering both requires industry-wide data on security posture, incidents, and losses that, until recently, have been too sensitive for organizations to share. Now, privacy enhancing technologies (PETs) such as cryptographic computing can enable the secure computation of aggregate cyber risk metrics from a peer group of organizations while leaving sensitive input data undisclosed. As these new aggregate data become available, analysts need ways to integrate them into cyber risk models that can produce more reliable risk assessments and allow comparison to a peer group. This paper proposes a new framework for benchmarking cyber posture against peers and estimating cyber risk within specific economic sectors using the new variables emerging from secure computations. We introduce a new top-line variable called the Defense Gap Index representing the weighted security gap between an organization and its peers that can be used to forecast an organization's own security risk based on historical industry data. We apply this approach in a specific sector using data collected from 25 large firms, in partnership with an industry ISAO, to build an industry risk model and provide tools back to participants to estimate their own risk exposure and privately compare their security posture with their peers. 
    more » « less
  2. There has been considerable investment in pre-college educational interventions for all areas of STEM (including computer science). The goal of many of these initiatives is to engage and interest students early in their educational career. In this study, a systematic literature review was undertaken to determine the demographic and program data collected and reported for the field of computing education and for other STEM disciplines for activities that were not designed as part of the formal in-class curriculum (e.g., outreach activities). A comparison-contrast analysis of the resulting 342 articles found similarities and key differences in the reporting of this data as well as overarching characteristics of missing or incomplete reporting across disciplines. Authors from both fields reported equally well in the four categories studied: information about evaluation, participant gender, participant race and/or ethnicity, and activity demographics. However, the computing education articles were more likely to have clearly stated research questions and comparative analysis based on demographic characteristics. They were less likely to include the number of participants in the study, participant age/grade level, socioeconomic status, disability information, location of intervention, and instructor demographics. Through this analysis, it was determined that reporting can be improved across all disciplines to improve the quantity of data needed to replicate studies and to provide complete data sets that provide for the comparison of collected data. 
    more » « less
  3. Disabled people continue to be significantly underrepresented and marginalized in engineering. Current reports indicate that approximately 26 percent of US adults have some form of disability. Yet only 6 percent of undergraduate students enrolled in engineering programs belong to this group. Several barriers have been identified that discourage and even prohibit people with disabilities from participating in engineering including arduous accommodations processes, lack of institutional support, and negative peer, staff, and faculty attitudes. These barriers are perpetuated and reinforced by a variety of ableist sociocultural norms and definitions that rely on popularized tropes and medicalized models that influence the ways this group experiences school to become engineers. In this paper, we seek to contribute to conversations that shape understanding of disability identity and the ways it is conceptualized in engineering programs. We revisit interview data from an ongoing grounded theory exploration of professional identity formation of undergraduate civil engineering students who identify as having one or more disabilities. Through our qualitative analysis, we identified overarching themes that contribute to understanding of how participants define and integrate disability identity to form professional identities and the ways they reshape and contribute to the civil engineering field through this lens. Emergent themes include experiencing/considering disability identity as a fluid experience, as a characteristic that ‘sets you apart’, and as a medicalized symptom or condition. Findings from this work can be used by engineering educators and administrators to inform more effective academic and personal support structures to destigmatize disability and promote the participation and inclusion of students and colleagues with disabilities in engineering and in our academic and professional communities. 
    more » « less
  4. Human-Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW) have a longstanding tradition of interrogating the values that underlie systems in order to create novel and accessible experiences. In this work, we use a neurodiversity framing to examine how people with ways of thinking, speaking, and being that differ from normative assumptions are perceived by researchers seeking to study and design social computing systems for neurodivergent people. From a critical analysis of 84 publications systematically gathered across a decade of social computing research, we determine that research into social computing with neurodiverse participants is largely medicalized, adheres to historical stereotypes of neurodivergent children and their families, and is insensitive to the wide spectrum of neurodivergent people that are potential users of social technologies. When social computing systems designed for neurodivergent people rely upon a conception of disability that restricts expression for the sake of preserving existing norms surrounding social experience, the result is often simplistic and restrictive systems that prevent users from being social in a way that feels natural and enjoyable. We argue that a neurodiversity perspective informed by critical disability theory allows us to engage with alternative forms of sociality as meaningful and desirable rather than a deficit to be compensated for. We conclude by identifying opportunities for researchers to collaborate with neurodivergent users and their communities, including the creation of spectrum-conscious social systems and the embedding of double empathy into systems for more equitable design. 
    more » « less
  5. Disability and accessibility are often left out of policies and actions related to diversity, equity, and inclusion (DEI). Despite progress on including disability and accessibility in broadening participation in computing (BPC) efforts over the past fifteen years, the idea of including people with disabilities in the groups that are minoritized in computing is still not universal. In this article we document successes in including disability in BPC efforts and where and how improvement can be made. We will argue that without explicitly calling out disability and accessibility, DEI policies and actions replicate the ableism present in our existing institutions. 
    more » « less