SlideShare a Scribd company logo
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
1 / 40
Impostors and Computer Science
Vittorio Scarano
Dipartimento di Informatica, Università di Salerno (Italy)
vitsca@unisa.it
ISISLab Seminars
Università di Salerno (Italy)
February 25th, 2021
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
2 / 40
LESSON PLAN
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
4 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
5 / 40
WHAT IS AN IMPOSTOR?
Impostor’s Syndrome
“The Impostor Phenomenon/Syndrome is the experience of intellectual
phoniness as perceived by high achieving individuals. ””
• A fear that others might discover that they are not as competent
as they appear
• The success? Only matter of:
• luck,
• knowing the right people,
• being in the right place at the right time,
• personal charm
• Belief that IP is more prevalent in Computer Science than other
fields
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
6 / 40
THE IMPOSTOR PHONEMENON: WHERE
• Appears to be prevalent among underrepresented populations in
a particular field
• Also evidence that both underrepresented and represented groups
are affected
• In Computer Science, prevalent among students
• Albert Einstein was reportedly suffering the IP
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
7 / 40
SOME EXAMPLES: JOB REQUIREMENTS
• Requirements in the job
description as a developer:
several technologies . . .
• AngularJs, Agile
methodology, Git, Python,
Javascript, SASS, Build
tools (Grunt, Gulp, NPM
Scripts), flux, React . . .
• Heavy Keywords: kickass
developer, energetic developer,
evaluating new programs,
strong fundamentals,
analytical mind, innovator
• Result: “I don’t fit in this
job role”
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
8 / 40
SOME EXAMPLES: A SEMINAR
• Attending a seminar where all
the others are active and
asking questions and
commenting
• Attending a training or tech
meetup where all the
developers are debating on the
latest technology and some
popular tools
• You are silent. . .
• Result: “no idea about what
they are talking about”
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
9 / 40
A ”NON-SCIENTIFIC” REPORT (2018)
• Blind’s blog
• According to a 2011 paper (International Journal of Behavioral
Science), an estimated 70 percent of people experience impostor
syndrome at one point in their lives.
• No distinction: women, men, finance executives, marketing
managers, and physicians.
• Even software engineers and product managers sometimes feel
undeserving of their roles.
• A survey: 10,402 participants (August-Sept. 2018)
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
10 / 40
RESULTS - 1
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
11 / 40
RESULTS - 2
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
12 / 40
A SIGNAL: GOOD OR BAD?
• You’re doing something outside of your comfort zone.
• Which is good sign, not a bad sign.
• “If you’re the smartest person in the room, you’re in the wrong
room.”
• (Confucius, Michael Dell, Lorne Michaels, Marissa Mayer, and
others!)
• Embrace the problem, and act
• by acquiring more knowledge and skills, and expand yourself and
you try to do something you’re not comfortable with.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
13 / 40
OFTEN IN COMPUTER SCIENCE!
• ICT industry is very different and diverse
• A lot of developers enter in the industry and have to stay updated
with the latest technology, frameworks, language, tools, practices
and a lot of things.
• Constantly in a constant learning phase, with different kind of
expertise in different tools, language or technologies.
• Result: pressure to learn something new every time
• If unknown is found then doubts about their accomplishment, feel
insecure, compare themselves and suffer from this problem.
• Understand that it’s impossible for any developer to know
everything.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
14 / 40
A SHORT HISTORY OF IMPOSTOR PHENOMENON
• In 1978, Clance and Imes defined the term Impostor Phenomenon
to designate an internal experience of intellectual phoniness
• The sample was a made of high achieving women where, despite
numerous achievements, the women did not experience an
internal sense of success.
• These women persisted in believing that they were not really
bright and had merely fooled anyone who thought otherwise
• Accompanying features: dread of evaluation, fear of failure, guilt
about success, and cycle of belief that the person must suffer in
order to succeed and that self-doubt can be crucial to ensuring
success
• In the 80s, it was also proved that men experienced it with just as
much frequency as women (for example, male faculty members
exhibited higher feelings of IP than their female counterparts)
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
15 / 40
EFFECTS
• IP contribute negatively to an individual’s life
• IP often corresponds to increased levels in depression and anxiety
• IP is found to be stronger than perceived discrimination and
minority status stress
• A significant part of medical students, experience IP that was
found to be significantly associated with burnout indices.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
17 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
18 / 40
A SCIENTIFIC STUDY IN CS
• A validated metric of measuring the preva-lence of IP, the Clance
IP Scale (protected under copyright!).
• A survey of 203 computer science students (graduate/undergrad)
at a large, public, research-intensive university (UC San Diego,
probably)
• Research questions:
• (a) How prevalent is IP among CS students?
• (b) What differences are there between sub-populations within CS?
• (c) How does the prevalence of IP in CS compare to other
populations?
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
19 / 40
THE METHOD
• Udergraduate classes were an upper division Data Structures
course (2nd and 3rd year students), and an upper division
Natural Language Processing course (3rd and 4th year students).
(Many CS Majors)
• The graduate class selected was a graduate level class in Natural
Language Processing.
• Following the protocol, a brief introduction about the survey, then
filled-in online
• No mandatory, nor compensation
• Students were not told about the nature of study
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
20 / 40
RESULTS
• ANOVA found a statistically significant difference between male
and female responses
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
21 / 40
THE ANALYSIS OF THE SCORE
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
22 / 40
INTERPRETATIONS
• Data validates that the female students had significantly higher
levels of impostor feelings than the male students.
• The Gender Gap hit again: the lack of representation of women in
computer science
• Lack of significant differences of IP between students who
identified as White/Asian and those who identified as members of
underrepresent groups
• probably due to our low sample sizes of underrepresented students
in the dataset
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
23 / 40
COMPARISON IN OTHER FIELDS
• Compared to other fields, it appears like CS students suffer more
of IP
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
24 / 40
WHY MORE ”IMPOSTORS” IN CS?
• Imbalance in access to K-12 computer science courses: formal
classes offered in higher income neighboroods.
• The ones who had early access have some ”geek-gene”
• Message conveyed by faculties: ”CS is not for all”
• Defensive climate in classroom because of show-off of knowledge
by some students
• Content: the idea of a black-box inherently suggests that there is
a part of the work you know nothing about.
• The culture in CS of preconceived notions about who is ”fit” for
CS: ”I do not belong here”
• The inherent multidisciplinarity of CS: applied CS to X
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
26 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
27 / 40
TREAT YOURSELF WELL
• Prioritize your whole self and your overall well-being: you are
more than what you do in your course, in your team, or in your
organization.
• Recognize internal monologues of failure or less than optimal
performance.
• Don’t get into unhealthy competition with yourself.
• Laugh at yourself with compassion.
• Allow yourself to brag about your successes, and don’t take
anyone who teases you about it seriously.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
28 / 40
MANAGE YOUR RELATIONSHIPS
• Remember why you got into your line of work and if you were
”told to do” and you really don’t care, change your line of work.
• Some of the most successful people have thrived in multiple areas.
• Establish realistic yardsticks and take input from others on
whether goals are achievable.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
29 / 40
NATURAL CYCLES OF KNOWLEDGE AND EXPERTISE
• Know that knowledge shifts and morphs: you’ll know more about
some topics tomorrow, and you’ll forget some things you knew
before.
• Let yourself be a novice when you approach a new topic.
• Ask for help: the keenest minds and deepest domain experts are
the ones who truly enjoy sharing their knowledge and inviting
others to the party.
• The dismissive people may themselves be suffering from impostor
syndrome.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
30 / 40
UNDERSTAND THE IMPORTANCE OF CULTURE
• Note your cultural programming—are you really feeling like an
impostor, or are you afraid to admit you’re good at what you do for
fear of being called arrogant?
• Look for personal cultural differences around bragging,
self-promotion, competition, and contribution, including taking
responsibility for an honest audit of your own cultural or personal
biases.
• Don’t introduce unhealthy competition into your teams, whether
you are a manager or a peer.
• Introduce play and playfulness into the work world.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
31 / 40
STRESS MANAGEMENT
Yerkes-Dodson law
Performance increases with physiological or mental arousal, but only
up to a point
• So, when the stress is just right, people will grow by leaps and
bounds: positive stress.
• As stress increases, there is a point of diminishing returns.
• At high levels of stress, the person will become debilitated.
• IP is probably spun from such heightened stress and anxiety
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
32 / 40
MAKE A HABIT OF BEING UNCOMFORTABLE
• Software development is a field where nobody knows everything.
• Accept that you, like everyone in software development, needs
help from StackOverflow or other resources: you’re not alone
• Accept the truth that you can not be an expert in software
development
• There is no endpoint of being completely knowledgeable and
comfortable in software development.
• Nobody can learn everything all the time so you need to make a
habit of being uncomfortable.
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
33 / 40
MAKE YOUR FUNDAMENTALS CLEAR
• Think to the moment you entered in programming and kept
learning you start realizing how far you’ have come.
• You can plan a career goal and decide what you want to learn
every month.
• Make a calendar for every month, learn the skill and keep track
of all the accomplishments.
• Check your past accomplishments, take inspiration from there
and feel positive for everything you have achieved.
• helps to overcome imposter’s syndrome but also boost your resume
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
34 / 40
THE ENVIRONMENT IS CRUCIAL!
• The environment will trigger, feed, and exacerbate impostor
syndrome.
• Triggered by noticing one ”does not belong” in other ways—being
part of a minority group
• The culture of an organization or institution is a big factor in
whether people feel like they belong and can take risks.
• Be aware of diversity in many cultures: bragging about your
achievements may be considered impolite
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
36 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
37 / 40
WHY IT MATTERS
• As a person
• As a professional, about your peers
• As a teacher/educator, with regards to students
• As PhD advisor, toward PhD Students
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
38 / 40
READING MATERIAL AND CREDITS
• ”Identifying the Prevalence of the Impostor Phenomenon Among Computer Science Students”,
Adam Rosenstein, Aishma Raghu, Leo Porter. SIGCSE ’20: Proceedings of the 51st ACM Technical Symposium on
Computer Science Education, February 2020 Pages 30–36,
https://doi.org/10.1145/3328778.3366815
• ”Is there a fix for impostor syndrome?”,
Elizabeth F. Churchill, Interactions, April 2018, ACM.
https://doi.org/10.1145/3197577
• ”Impostor syndrome and burnout: some reflections”,
Elizabeth F. Churchill, Interactions, April 2019, ACM.
https://doi.org/10.1145/3320107
• ”58 percent of Tech Workers Feel Like Impostors”,
Blind Blog-Workspace Insights, Sept. 2018.
https://www.teamblind.com/blog/index.php/2018/09/05/
58-percent-of-tech-workers-feel-like-impostors
• ”An antidote to impostor syndrome”,
Dean Jackson, Taliver B Heath. XRDS: Crossroads, The ACM Magazine for Students, December 2014.
https://doi.org/10.1145/2685027
• ”Imposter Syndrome In Software Developers: Am I A Fake Developer?”
GeeksforGeeks, Dec. 2020.
https:
//www.geeksforgeeks.org/imposter-syndrome-in-software-developers-am-i-a-fake-developer/
Some figures by Pixabay.com
VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
39 / 40
QUESTIONS? COMMENTS? ANYTHING?
Impostors and Computer Science

More Related Content

Similar to Impostors and Computer Science

2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
Phil Agcaoili
 
Lect6 technologies fall 2017
Lect6 technologies fall 2017Lect6 technologies fall 2017
Lect6 technologies fall 2017
SukaynaAmeen
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Kimberley Dray
 
Arduino.pptx
Arduino.pptxArduino.pptx
Arduino.pptx
shreeramediot
 
Cyber securityeducation may2015
Cyber securityeducation may2015Cyber securityeducation may2015
Cyber securityeducation may2015
Mark Guzdial
 
Digital scholarship - all day workshop
Digital scholarship - all day workshopDigital scholarship - all day workshop
Digital scholarship - all day workshop
Martin Weller
 
Data Science Intro.pptx
Data Science Intro.pptxData Science Intro.pptx
Data Science Intro.pptx
PerumalPitchandi
 
Introduction to Data Science.pptx
Introduction to Data Science.pptxIntroduction to Data Science.pptx
Introduction to Data Science.pptx
PerumalPitchandi
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Laguna State Polytechnic University
 
"Assessing Emerging Technology and Futures Capacity for Your Organization
"Assessing Emerging Technology and Futures Capacity for Your Organization"Assessing Emerging Technology and Futures Capacity for Your Organization
"Assessing Emerging Technology and Futures Capacity for Your Organization
Bryan Alexander
 
Tech Talk @ Dev Bootcamp Chicago
Tech Talk @ Dev Bootcamp ChicagoTech Talk @ Dev Bootcamp Chicago
Tech Talk @ Dev Bootcamp Chicago
Fred Lee
 
Use of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionalsUse of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionals
Tony Ratcliffe
 
Digital Citizenship Summit 2014
Digital Citizenship Summit 2014Digital Citizenship Summit 2014
Digital Citizenship Summit 2014
Elizabeth Calhoon
 
Byoi orcidimpactstory
Byoi orcidimpactstoryByoi orcidimpactstory
Byoi orcidimpactstory
academictechwarwick
 
No, you don't need to learn python
No, you don't need to learn pythonNo, you don't need to learn python
No, you don't need to learn python
QuantUniversity
 
Restless digital natives (Btg)
Restless digital natives (Btg)Restless digital natives (Btg)
Restless digital natives (Btg)
Colin Campbell
 
STREAM Info Night Presentation
STREAM Info Night PresentationSTREAM Info Night Presentation
STREAM Info Night PresentationBailes
 
Beyond the paper cv and developing a scientific profile online
Beyond the paper cv and developing a scientific profile onlineBeyond the paper cv and developing a scientific profile online
Beyond the paper cv and developing a scientific profile online
US Environmental Protection Agency (EPA), Center for Computational Toxicology and Exposure
 
Singapore chapitre #4 - Presentation
Singapore chapitre #4 - PresentationSingapore chapitre #4 - Presentation
Singapore chapitre #4 - Presentation
While42
 

Similar to Impostors and Computer Science (20)

2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
Lect6 technologies fall 2017
Lect6 technologies fall 2017Lect6 technologies fall 2017
Lect6 technologies fall 2017
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Arduino.pptx
Arduino.pptxArduino.pptx
Arduino.pptx
 
Cyber securityeducation may2015
Cyber securityeducation may2015Cyber securityeducation may2015
Cyber securityeducation may2015
 
Digital scholarship - all day workshop
Digital scholarship - all day workshopDigital scholarship - all day workshop
Digital scholarship - all day workshop
 
Data Science Intro.pptx
Data Science Intro.pptxData Science Intro.pptx
Data Science Intro.pptx
 
Introduction to Data Science.pptx
Introduction to Data Science.pptxIntroduction to Data Science.pptx
Introduction to Data Science.pptx
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Presentation
PresentationPresentation
Presentation
 
"Assessing Emerging Technology and Futures Capacity for Your Organization
"Assessing Emerging Technology and Futures Capacity for Your Organization"Assessing Emerging Technology and Futures Capacity for Your Organization
"Assessing Emerging Technology and Futures Capacity for Your Organization
 
Tech Talk @ Dev Bootcamp Chicago
Tech Talk @ Dev Bootcamp ChicagoTech Talk @ Dev Bootcamp Chicago
Tech Talk @ Dev Bootcamp Chicago
 
Use of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionalsUse of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionals
 
Digital Citizenship Summit 2014
Digital Citizenship Summit 2014Digital Citizenship Summit 2014
Digital Citizenship Summit 2014
 
Byoi orcidimpactstory
Byoi orcidimpactstoryByoi orcidimpactstory
Byoi orcidimpactstory
 
No, you don't need to learn python
No, you don't need to learn pythonNo, you don't need to learn python
No, you don't need to learn python
 
Restless digital natives (Btg)
Restless digital natives (Btg)Restless digital natives (Btg)
Restless digital natives (Btg)
 
STREAM Info Night Presentation
STREAM Info Night PresentationSTREAM Info Night Presentation
STREAM Info Night Presentation
 
Beyond the paper cv and developing a scientific profile online
Beyond the paper cv and developing a scientific profile onlineBeyond the paper cv and developing a scientific profile online
Beyond the paper cv and developing a scientific profile online
 
Singapore chapitre #4 - Presentation
Singapore chapitre #4 - PresentationSingapore chapitre #4 - Presentation
Singapore chapitre #4 - Presentation
 

More from Vittorio Scarano

Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
Vittorio Scarano
 
Storylet: prima giornata di formazione
Storylet: prima giornata di formazioneStorylet: prima giornata di formazione
Storylet: prima giornata di formazione
Vittorio Scarano
 
2 - Systematic Literature Reviews: tools
2 - Systematic Literature Reviews: tools2 - Systematic Literature Reviews: tools
2 - Systematic Literature Reviews: tools
Vittorio Scarano
 
1 - Systematic Literature Reviews: introduction and methods
1 - Systematic Literature Reviews: introduction and methods1 - Systematic Literature Reviews: introduction and methods
1 - Systematic Literature Reviews: introduction and methods
Vittorio Scarano
 
Hetor per la Rete dei Licei Artistici della Campania
Hetor per la Rete dei Licei Artistici della CampaniaHetor per la Rete dei Licei Artistici della Campania
Hetor per la Rete dei Licei Artistici della Campania
Vittorio Scarano
 
Solid: an introduction
Solid: an introduction Solid: an introduction
Solid: an introduction
Vittorio Scarano
 
Introduzione agli Open Data
Introduzione agli Open DataIntroduzione agli Open Data
Introduzione agli Open Data
Vittorio Scarano
 
Progetto Hetor: La Campania da riscoprire
Progetto Hetor: La Campania da riscoprireProgetto Hetor: La Campania da riscoprire
Progetto Hetor: La Campania da riscoprire
Vittorio Scarano
 
Scratch da 0 a 100 Km/h in 3 ore, scarse!
Scratch da 0 a 100 Km/h in 3 ore, scarse!Scratch da 0 a 100 Km/h in 3 ore, scarse!
Scratch da 0 a 100 Km/h in 3 ore, scarse!
Vittorio Scarano
 
Learning by doing: il pensiero computazionale
Learning by doing: il pensiero computazionaleLearning by doing: il pensiero computazionale
Learning by doing: il pensiero computazionale
Vittorio Scarano
 
La presenza su LinkedIn (ma non solo!)
La presenza su LinkedIn (ma non solo!)La presenza su LinkedIn (ma non solo!)
La presenza su LinkedIn (ma non solo!)
Vittorio Scarano
 
Come "costruire" il curriculum di un Informatico
Come "costruire" il curriculum di un InformaticoCome "costruire" il curriculum di un Informatico
Come "costruire" il curriculum di un Informatico
Vittorio Scarano
 
Come presentare se stessi ed il proprio lavoro
Come presentare se stessi ed il proprio lavoroCome presentare se stessi ed il proprio lavoro
Come presentare se stessi ed il proprio lavoro
Vittorio Scarano
 

More from Vittorio Scarano (13)

Offloading Computation to the Edge
Offloading Computation to the EdgeOffloading Computation to the Edge
Offloading Computation to the Edge
 
Storylet: prima giornata di formazione
Storylet: prima giornata di formazioneStorylet: prima giornata di formazione
Storylet: prima giornata di formazione
 
2 - Systematic Literature Reviews: tools
2 - Systematic Literature Reviews: tools2 - Systematic Literature Reviews: tools
2 - Systematic Literature Reviews: tools
 
1 - Systematic Literature Reviews: introduction and methods
1 - Systematic Literature Reviews: introduction and methods1 - Systematic Literature Reviews: introduction and methods
1 - Systematic Literature Reviews: introduction and methods
 
Hetor per la Rete dei Licei Artistici della Campania
Hetor per la Rete dei Licei Artistici della CampaniaHetor per la Rete dei Licei Artistici della Campania
Hetor per la Rete dei Licei Artistici della Campania
 
Solid: an introduction
Solid: an introduction Solid: an introduction
Solid: an introduction
 
Introduzione agli Open Data
Introduzione agli Open DataIntroduzione agli Open Data
Introduzione agli Open Data
 
Progetto Hetor: La Campania da riscoprire
Progetto Hetor: La Campania da riscoprireProgetto Hetor: La Campania da riscoprire
Progetto Hetor: La Campania da riscoprire
 
Scratch da 0 a 100 Km/h in 3 ore, scarse!
Scratch da 0 a 100 Km/h in 3 ore, scarse!Scratch da 0 a 100 Km/h in 3 ore, scarse!
Scratch da 0 a 100 Km/h in 3 ore, scarse!
 
Learning by doing: il pensiero computazionale
Learning by doing: il pensiero computazionaleLearning by doing: il pensiero computazionale
Learning by doing: il pensiero computazionale
 
La presenza su LinkedIn (ma non solo!)
La presenza su LinkedIn (ma non solo!)La presenza su LinkedIn (ma non solo!)
La presenza su LinkedIn (ma non solo!)
 
Come "costruire" il curriculum di un Informatico
Come "costruire" il curriculum di un InformaticoCome "costruire" il curriculum di un Informatico
Come "costruire" il curriculum di un Informatico
 
Come presentare se stessi ed il proprio lavoro
Come presentare se stessi ed il proprio lavoroCome presentare se stessi ed il proprio lavoro
Come presentare se stessi ed il proprio lavoro
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 

Impostors and Computer Science

  • 1. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 1 / 40 Impostors and Computer Science Vittorio Scarano Dipartimento di Informatica, Università di Salerno (Italy) vitsca@unisa.it ISISLab Seminars Università di Salerno (Italy) February 25th, 2021
  • 2. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 2 / 40 LESSON PLAN 1 Impostors 2 A study on IP in CS 3 What to do 4 Conclusions
  • 3.
  • 4. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 4 / 40 MAP 1 Impostors 2 A study on IP in CS 3 What to do 4 Conclusions
  • 5. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 5 / 40 WHAT IS AN IMPOSTOR? Impostor’s Syndrome “The Impostor Phenomenon/Syndrome is the experience of intellectual phoniness as perceived by high achieving individuals. ”” • A fear that others might discover that they are not as competent as they appear • The success? Only matter of: • luck, • knowing the right people, • being in the right place at the right time, • personal charm • Belief that IP is more prevalent in Computer Science than other fields
  • 6. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 6 / 40 THE IMPOSTOR PHONEMENON: WHERE • Appears to be prevalent among underrepresented populations in a particular field • Also evidence that both underrepresented and represented groups are affected • In Computer Science, prevalent among students • Albert Einstein was reportedly suffering the IP
  • 7. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 7 / 40 SOME EXAMPLES: JOB REQUIREMENTS • Requirements in the job description as a developer: several technologies . . . • AngularJs, Agile methodology, Git, Python, Javascript, SASS, Build tools (Grunt, Gulp, NPM Scripts), flux, React . . . • Heavy Keywords: kickass developer, energetic developer, evaluating new programs, strong fundamentals, analytical mind, innovator • Result: “I don’t fit in this job role”
  • 8. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 8 / 40 SOME EXAMPLES: A SEMINAR • Attending a seminar where all the others are active and asking questions and commenting • Attending a training or tech meetup where all the developers are debating on the latest technology and some popular tools • You are silent. . . • Result: “no idea about what they are talking about”
  • 9. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 9 / 40 A ”NON-SCIENTIFIC” REPORT (2018) • Blind’s blog • According to a 2011 paper (International Journal of Behavioral Science), an estimated 70 percent of people experience impostor syndrome at one point in their lives. • No distinction: women, men, finance executives, marketing managers, and physicians. • Even software engineers and product managers sometimes feel undeserving of their roles. • A survey: 10,402 participants (August-Sept. 2018)
  • 10. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 10 / 40 RESULTS - 1
  • 11. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 11 / 40 RESULTS - 2
  • 12. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 12 / 40 A SIGNAL: GOOD OR BAD? • You’re doing something outside of your comfort zone. • Which is good sign, not a bad sign. • “If you’re the smartest person in the room, you’re in the wrong room.” • (Confucius, Michael Dell, Lorne Michaels, Marissa Mayer, and others!) • Embrace the problem, and act • by acquiring more knowledge and skills, and expand yourself and you try to do something you’re not comfortable with.
  • 13. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 13 / 40 OFTEN IN COMPUTER SCIENCE! • ICT industry is very different and diverse • A lot of developers enter in the industry and have to stay updated with the latest technology, frameworks, language, tools, practices and a lot of things. • Constantly in a constant learning phase, with different kind of expertise in different tools, language or technologies. • Result: pressure to learn something new every time • If unknown is found then doubts about their accomplishment, feel insecure, compare themselves and suffer from this problem. • Understand that it’s impossible for any developer to know everything.
  • 14. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 14 / 40 A SHORT HISTORY OF IMPOSTOR PHENOMENON • In 1978, Clance and Imes defined the term Impostor Phenomenon to designate an internal experience of intellectual phoniness • The sample was a made of high achieving women where, despite numerous achievements, the women did not experience an internal sense of success. • These women persisted in believing that they were not really bright and had merely fooled anyone who thought otherwise • Accompanying features: dread of evaluation, fear of failure, guilt about success, and cycle of belief that the person must suffer in order to succeed and that self-doubt can be crucial to ensuring success • In the 80s, it was also proved that men experienced it with just as much frequency as women (for example, male faculty members exhibited higher feelings of IP than their female counterparts)
  • 15. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 15 / 40 EFFECTS • IP contribute negatively to an individual’s life • IP often corresponds to increased levels in depression and anxiety • IP is found to be stronger than perceived discrimination and minority status stress • A significant part of medical students, experience IP that was found to be significantly associated with burnout indices.
  • 16.
  • 17. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 17 / 40 MAP 1 Impostors 2 A study on IP in CS 3 What to do 4 Conclusions
  • 18. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 18 / 40 A SCIENTIFIC STUDY IN CS • A validated metric of measuring the preva-lence of IP, the Clance IP Scale (protected under copyright!). • A survey of 203 computer science students (graduate/undergrad) at a large, public, research-intensive university (UC San Diego, probably) • Research questions: • (a) How prevalent is IP among CS students? • (b) What differences are there between sub-populations within CS? • (c) How does the prevalence of IP in CS compare to other populations?
  • 19. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 19 / 40 THE METHOD • Udergraduate classes were an upper division Data Structures course (2nd and 3rd year students), and an upper division Natural Language Processing course (3rd and 4th year students). (Many CS Majors) • The graduate class selected was a graduate level class in Natural Language Processing. • Following the protocol, a brief introduction about the survey, then filled-in online • No mandatory, nor compensation • Students were not told about the nature of study
  • 20. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 20 / 40 RESULTS • ANOVA found a statistically significant difference between male and female responses
  • 21. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 21 / 40 THE ANALYSIS OF THE SCORE
  • 22. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 22 / 40 INTERPRETATIONS • Data validates that the female students had significantly higher levels of impostor feelings than the male students. • The Gender Gap hit again: the lack of representation of women in computer science • Lack of significant differences of IP between students who identified as White/Asian and those who identified as members of underrepresent groups • probably due to our low sample sizes of underrepresented students in the dataset
  • 23. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 23 / 40 COMPARISON IN OTHER FIELDS • Compared to other fields, it appears like CS students suffer more of IP
  • 24. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 24 / 40 WHY MORE ”IMPOSTORS” IN CS? • Imbalance in access to K-12 computer science courses: formal classes offered in higher income neighboroods. • The ones who had early access have some ”geek-gene” • Message conveyed by faculties: ”CS is not for all” • Defensive climate in classroom because of show-off of knowledge by some students • Content: the idea of a black-box inherently suggests that there is a part of the work you know nothing about. • The culture in CS of preconceived notions about who is ”fit” for CS: ”I do not belong here” • The inherent multidisciplinarity of CS: applied CS to X
  • 25.
  • 26. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 26 / 40 MAP 1 Impostors 2 A study on IP in CS 3 What to do 4 Conclusions
  • 27. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 27 / 40 TREAT YOURSELF WELL • Prioritize your whole self and your overall well-being: you are more than what you do in your course, in your team, or in your organization. • Recognize internal monologues of failure or less than optimal performance. • Don’t get into unhealthy competition with yourself. • Laugh at yourself with compassion. • Allow yourself to brag about your successes, and don’t take anyone who teases you about it seriously.
  • 28. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 28 / 40 MANAGE YOUR RELATIONSHIPS • Remember why you got into your line of work and if you were ”told to do” and you really don’t care, change your line of work. • Some of the most successful people have thrived in multiple areas. • Establish realistic yardsticks and take input from others on whether goals are achievable.
  • 29. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 29 / 40 NATURAL CYCLES OF KNOWLEDGE AND EXPERTISE • Know that knowledge shifts and morphs: you’ll know more about some topics tomorrow, and you’ll forget some things you knew before. • Let yourself be a novice when you approach a new topic. • Ask for help: the keenest minds and deepest domain experts are the ones who truly enjoy sharing their knowledge and inviting others to the party. • The dismissive people may themselves be suffering from impostor syndrome.
  • 30. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 30 / 40 UNDERSTAND THE IMPORTANCE OF CULTURE • Note your cultural programming—are you really feeling like an impostor, or are you afraid to admit you’re good at what you do for fear of being called arrogant? • Look for personal cultural differences around bragging, self-promotion, competition, and contribution, including taking responsibility for an honest audit of your own cultural or personal biases. • Don’t introduce unhealthy competition into your teams, whether you are a manager or a peer. • Introduce play and playfulness into the work world.
  • 31. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 31 / 40 STRESS MANAGEMENT Yerkes-Dodson law Performance increases with physiological or mental arousal, but only up to a point • So, when the stress is just right, people will grow by leaps and bounds: positive stress. • As stress increases, there is a point of diminishing returns. • At high levels of stress, the person will become debilitated. • IP is probably spun from such heightened stress and anxiety
  • 32. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 32 / 40 MAKE A HABIT OF BEING UNCOMFORTABLE • Software development is a field where nobody knows everything. • Accept that you, like everyone in software development, needs help from StackOverflow or other resources: you’re not alone • Accept the truth that you can not be an expert in software development • There is no endpoint of being completely knowledgeable and comfortable in software development. • Nobody can learn everything all the time so you need to make a habit of being uncomfortable.
  • 33. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 33 / 40 MAKE YOUR FUNDAMENTALS CLEAR • Think to the moment you entered in programming and kept learning you start realizing how far you’ have come. • You can plan a career goal and decide what you want to learn every month. • Make a calendar for every month, learn the skill and keep track of all the accomplishments. • Check your past accomplishments, take inspiration from there and feel positive for everything you have achieved. • helps to overcome imposter’s syndrome but also boost your resume
  • 34. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 34 / 40 THE ENVIRONMENT IS CRUCIAL! • The environment will trigger, feed, and exacerbate impostor syndrome. • Triggered by noticing one ”does not belong” in other ways—being part of a minority group • The culture of an organization or institution is a big factor in whether people feel like they belong and can take risks. • Be aware of diversity in many cultures: bragging about your achievements may be considered impolite
  • 35.
  • 36. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 36 / 40 MAP 1 Impostors 2 A study on IP in CS 3 What to do 4 Conclusions
  • 37. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 37 / 40 WHY IT MATTERS • As a person • As a professional, about your peers • As a teacher/educator, with regards to students • As PhD advisor, toward PhD Students
  • 38. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 38 / 40 READING MATERIAL AND CREDITS • ”Identifying the Prevalence of the Impostor Phenomenon Among Computer Science Students”, Adam Rosenstein, Aishma Raghu, Leo Porter. SIGCSE ’20: Proceedings of the 51st ACM Technical Symposium on Computer Science Education, February 2020 Pages 30–36, https://doi.org/10.1145/3328778.3366815 • ”Is there a fix for impostor syndrome?”, Elizabeth F. Churchill, Interactions, April 2018, ACM. https://doi.org/10.1145/3197577 • ”Impostor syndrome and burnout: some reflections”, Elizabeth F. Churchill, Interactions, April 2019, ACM. https://doi.org/10.1145/3320107 • ”58 percent of Tech Workers Feel Like Impostors”, Blind Blog-Workspace Insights, Sept. 2018. https://www.teamblind.com/blog/index.php/2018/09/05/ 58-percent-of-tech-workers-feel-like-impostors • ”An antidote to impostor syndrome”, Dean Jackson, Taliver B Heath. XRDS: Crossroads, The ACM Magazine for Students, December 2014. https://doi.org/10.1145/2685027 • ”Imposter Syndrome In Software Developers: Am I A Fake Developer?” GeeksforGeeks, Dec. 2020. https: //www.geeksforgeeks.org/imposter-syndrome-in-software-developers-am-i-a-fake-developer/ Some figures by Pixabay.com
  • 39. VITTORIO SCARANO Impostors and Computer Science Impostors A study on IP in CS What to do Conclusions 39 / 40 QUESTIONS? COMMENTS? ANYTHING?