skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Ko, Amy"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. ObjectivesIn calls for excellent and equitable Computer Science (CS) education, the wordrigoroften appears, but it often goes undefined. The goal of this work is to understand how CS teachers, instructors, and students conceive of rigor. Research Questions:1) What do CS instructors think rigor is? and 2) What do students think rigor is? Methods:Using the principles of phenomenological research, we conducted a semi-structured interview study with 10 post-secondary CS students, 10 secondary CS teachers, and 9 post-secondary CS instructors, to understand their conceptions of rigor. Results:Analysis showed that no participants had the same understanding of rigor. We found that participants had abstractPrinciples of Rigorwhich included: Precision, Systematic Thought Process, Depth of Understanding, and Challenge. They also had concreteObservations of Rigorthat included Time and Effort, Intrinsic Drive, Productive Failure, Struggle, Outcomes, and Gatekeeping. Participants also sharedConditions for Rigorwhich included Expectations, Standards, Community Support, and Resources. Implications:Our data supports prior work that educators are using different definitions of rigor. This implies that each educator holds different expectations for students, without necessarily communicating these expectations to their students. In the best case, this might confuse students; in the worst case, it reinforces hegemonic norms which can lead to gatekeeping which prevents students from fully participating in the CS field. Based on these insights, we argue that to commit to the idea of quality CS learning, the community must discard the use of this concept of rigor to justify student learning and re-imagine alternate benchmarks. 
    more » « less
    Free, publicly-accessible full text available November 11, 2026
  2. Free, publicly-accessible full text available June 23, 2026
  3. Free, publicly-accessible full text available July 1, 2026
  4. Free, publicly-accessible full text available July 14, 2026
  5. Free, publicly-accessible full text available August 2, 2026
  6. Free, publicly-accessible full text available April 25, 2026
  7. Paper presented as part of symposium. 
    more » « less
    Free, publicly-accessible full text available June 10, 2026
  8. For computing to serve humanity, computing spaces must be safe for all individuals. While prior work has surfaced how hegemonic racial and gendered expectations manifest in computing, it has only indirectly attended to expectations surrounding neurodivergence. As computing stereotypes largely align with stereotypes of some neurodivergent individuals, we investigated whether computing legitimized neurodivergent traits over neuronormative ones. We conducted semi-structured interviews with 21 students, faculty, and industry professionals, sampling both neurodivergent-identifying and non-neurodivergent-identifying participants. We found that computing legitimized hyper-focus, deep “special” interests, and high organization, and that fitting these expectations was frequently required for persistence. Some neurodivergent-identifying participants felt that computing provided refuge from societal neuronormative expectations, though one’s sense of refuge depended on sufficiently fitting computing’s neurodivergent expectations. We offer reflections on inclusion and belonging efforts within computing, as well as directions for future work that attends to individuals’ neurodivergent identities. 
    more » « less