skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Ko, Amy J"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available June 23, 2026
  2. Free, publicly-accessible full text available July 14, 2026
  3. Free, publicly-accessible full text available August 2, 2026
  4. Free, publicly-accessible full text available April 25, 2026
  5. Paper presented as part of symposium. 
    more » « less
    Free, publicly-accessible full text available June 10, 2026
  6. For computing to serve humanity, computing spaces must be safe for all individuals. While prior work has surfaced how hegemonic racial and gendered expectations manifest in computing, it has only indirectly attended to expectations surrounding neurodivergence. As computing stereotypes largely align with stereotypes of some neurodivergent individuals, we investigated whether computing legitimized neurodivergent traits over neuronormative ones. We conducted semi-structured interviews with 21 students, faculty, and industry professionals, sampling both neurodivergent-identifying and non-neurodivergent-identifying participants. We found that computing legitimized hyper-focus, deep “special” interests, and high organization, and that fitting these expectations was frequently required for persistence. Some neurodivergent-identifying participants felt that computing provided refuge from societal neuronormative expectations, though one’s sense of refuge depended on sufficiently fitting computing’s neurodivergent expectations. We offer reflections on inclusion and belonging efforts within computing, as well as directions for future work that attends to individuals’ neurodivergent identities. 
    more » « less
  7. Background and Context: With the growing movement to adopt critical framings of computing, scholars have worked to reframe computing education from the narrow development of programming skills to skills in identifying and resisting oppressive structures in computing. However, we have little guidance on how these framings may manifest in classroom practice. Objectives: To better understand the processes and practice of critical pedagogy in a computing classrooms, we taught a critically conscious computing elective within a summer academic program at a northwest United States university targeted at secondary students (ages 14–18) from low-income backgrounds and would be the first in their families to pursue a post-secondary education (i.e., first-generation). We investigated: (1) our participants’ initial perceptions of and attitudes toward the benefits and perils of computing, and (2) potential tensions that might emerge when secondary students negotiate the integration of critical pedagogy in a computing classroom. Methods: We qualitatively coded participant work from a critically conscious computing course within a summer academic program in the United States focused on students from low-income backgrounds or would be the first in their family to pursue a post-secondary education. Findings: Our participants’ initial attitudes toward technology were mostly positive, but exhibited an awareness of its negative impacts on their lives and society. Throughout the course, while participants demonstrated a rich social consciousness around technology, they faced challenges in addressing hegemonic values embedded in their programs, designs, and other classwork. Implications: Our findings revealed tensions between our participants’ computing attitudes, knowledge, self-efficacy, and social consciousness, suggesting pathways for scaffolding the critical examination of technology in secondary education. This study provides insights into the pedagogical content knowledge necessary for critical computing education. 
    more » « less
    Free, publicly-accessible full text available March 31, 2026