There was a time when Bell Boys would bring you a printed message from the electric telegraph; when a telephone operator would ask you for the number; when a typist would type your letter; when the Xerox operator would create your copies; when the computer operator would load and run your program; and when a secretary would organise your mail. Those days and those jobs are long gone, but at the time the concern was; what would these people do when they came redundant ? In reality all these people found employment as new jobs were created at the behest of new technologies. Web designers, CAD experts, IT specialists, data analysts, spread sheet drivers and many more replaced the old to the point of staffing shortages. Perhaps more poignantly; we are all now the bell boys, telephone operators, typists, printers, copiers, computer operators and secretaries - empowered by the self same technologies!
Today we see a global shortfall of some 200,000 Big data analysts complemented by similar needs for specialists and experts in Artificial Intelligence, Business Modelling, Decision Support Systems, 3D Printing, Genomics; Nano Tech and more. And there is a huge demand for people with the ‘hands on’ skills to design, build, repair and fix just about everything. The reality is that many of the people in these spheres derived their base skills through play. Wasting their young lives on a screen playing computer games, searching the web, hacking code, ‘building stuff’ and more turned out to be their springboard to employment and personal prosperity. But this presents companies and managers with many new challenges as they find it difficult to let go of the old and embrace the new.
Hierarchies and old management methods might just work for industries that are static and churning out the same product day after day, but for those facing rapid change and unpredictable demands, then agility and flexibility are ket, and that demands low flat structures with new and autonomous ways of working…
There was a time when Bell Boys would bring you a printed message from the electric telegraph; when a telephone operator would ask you for the number; when a typist would type your letter; when the Xerox operator would create your copies; when the computer operator would load and run your program; and when a secretary would organise your mail. Those days and those jobs are long gone, but at the time the concern was; what would these people do when they came redundant ? In reality all these people found employment as new jobs were created at the behest of new technologies. Web designers, CAD experts, IT specialists, data analysts, spread sheet drivers and many more replaced the old to the point of staffing shortages. Perhaps more poignantly; we are all now the bell boys, telephone operators, typists, printers, copiers, computer operators and secretaries - empowered by the self same technologies!
Today we see a global shortfall of some 200,000 Big data analysts complemented by similar needs for specialists and experts in Artificial Intelligence, Business Modelling, Decision Support Systems, 3D Printing, Genomics; Nano Tech and more. And there is a huge demand for people with the ‘hands on’ skills to design, build, repair and fix just about everything. The reality is that many of the people in these spheres derived their base skills through play. Wasting their young lives on a screen playing computer games, searching the web, hacking code, ‘building stuff’ and more turned out to be their springboard to employment and personal prosperity. But this presents companies and managers with many new challenges as they find it difficult to let go of the old and embrace the new.
Hierarchies and old management methods might just work for industries that are static and churning out the same product day after day, but for those facing rapid change and unpredictable demands, then agility and flexibility are ket, and that demands low flat structures with new and autonomous ways of working…
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
Held February 2019
Annual Privacy and Security Conference
Workshop re: Cybersecurity, Ethics and Careers
Presentation Schedule: https://psv20th.sched.com/event/Jrtl/you-are-the-alpha-and-omega-of-a-secure-future-explore-understand-and-practice-your-role-in-advancing-a-positive-cybersecurity
Lessons from the Learning Sciences for Cyber Security Education. Cyber Security Education requires thinking about “how computing works.”
For programmers, why some practices create holes/opportunities.
For end-users, why some activities compromise security.
We need everyone to learn about cyber security.
What can learning sciences tell us about encouraging that kind of learning?
Lesson #1: Context matters.
The Story of Computing for All at Georgia Tech.
Lesson #2: Identity matters.
“Teaching” Graphics Designers who reject CS about CS.
Lesson #3: Structure matters.
Subgoal Labels can Dramatically Improve Learning
The presentation is about the career path in the field of Data Science. Data Science is a multi-disciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
"Assessing Emerging Technology and Futures Capacity for Your OrganizationBryan Alexander
Materials for my 2016 Campus Technology workshop.
From the conference description:
"How can a campus information services organization best approach and strategize emerging technologies? Mr. Alexander will present futuring methods currently used in academia, non-profits, governments and businesses. You will learn how to use environmental scanning to identify major trends in the present which are likely to shape the medium-term future. Additionally, you will discuss with other attendees how to expand your institution’s capacity for assessing emerging technologies and other drivers that will reshape higher education."
Academics: bring your own identity. Exploratory thoughts and a plug for the ORCID ecosystem.
By Amber Thomas, head of Academic Technology Team at the University of Warwick UK. @ambrouk
The goal of this workshop is not to disregard the amazing innovations brought about by Machine Learning and AI but to emphasize the rigor, discipline and the effort involved in successfully adopting data science, AI and machine learning in financial organizations.
How do we help learners make the most of the web? What opportunities does it afford us? Where might it take us? An optimistic but cautious take on the web and learning
This is a presentation made at the "Advancing Research Communication and Scholarship" http://arcscon.tumblr.com/
Many of us nowadays invest significant amounts of time in sharing our activities and opinions with friends and family via social networking tools. However, despite the availability of many platforms for scientists to connect and share with their peers in the scientific community the majority do not make use of these tools, despite their promise and potential impact and influence on our future careers. We are being indexed and exposed on the internet via our publications, presentations and data. We also have many more ways to contribute to science, to annotate and curate data, to “publish” in new ways, and many of these activities are as part of a growing crowdsourcing network. This presentation will provide an overview of the various types of networking and collaborative sites available to scientists and ways to expose your scientific activities online. Many of these can ultimately contribute to the developing measures of you as a scientist as identified in the new world of alternative metrics. Participating offers a great opportunity to develop a scientific profile within the community and may ultimately be very beneficial, especially to scientists early in their career.
La prima giornata di formazione sullo strumento delle Storylet, per creare e condividere favole con gli strumenti narrativi di Gianni Rodari. Lo strumento è creato dal laboratorio ISISLab del Dipartimento di Informatica dell'Università di Salerno
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
Held February 2019
Annual Privacy and Security Conference
Workshop re: Cybersecurity, Ethics and Careers
Presentation Schedule: https://psv20th.sched.com/event/Jrtl/you-are-the-alpha-and-omega-of-a-secure-future-explore-understand-and-practice-your-role-in-advancing-a-positive-cybersecurity
Lessons from the Learning Sciences for Cyber Security Education. Cyber Security Education requires thinking about “how computing works.”
For programmers, why some practices create holes/opportunities.
For end-users, why some activities compromise security.
We need everyone to learn about cyber security.
What can learning sciences tell us about encouraging that kind of learning?
Lesson #1: Context matters.
The Story of Computing for All at Georgia Tech.
Lesson #2: Identity matters.
“Teaching” Graphics Designers who reject CS about CS.
Lesson #3: Structure matters.
Subgoal Labels can Dramatically Improve Learning
The presentation is about the career path in the field of Data Science. Data Science is a multi-disciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
"Assessing Emerging Technology and Futures Capacity for Your OrganizationBryan Alexander
Materials for my 2016 Campus Technology workshop.
From the conference description:
"How can a campus information services organization best approach and strategize emerging technologies? Mr. Alexander will present futuring methods currently used in academia, non-profits, governments and businesses. You will learn how to use environmental scanning to identify major trends in the present which are likely to shape the medium-term future. Additionally, you will discuss with other attendees how to expand your institution’s capacity for assessing emerging technologies and other drivers that will reshape higher education."
Academics: bring your own identity. Exploratory thoughts and a plug for the ORCID ecosystem.
By Amber Thomas, head of Academic Technology Team at the University of Warwick UK. @ambrouk
The goal of this workshop is not to disregard the amazing innovations brought about by Machine Learning and AI but to emphasize the rigor, discipline and the effort involved in successfully adopting data science, AI and machine learning in financial organizations.
How do we help learners make the most of the web? What opportunities does it afford us? Where might it take us? An optimistic but cautious take on the web and learning
This is a presentation made at the "Advancing Research Communication and Scholarship" http://arcscon.tumblr.com/
Many of us nowadays invest significant amounts of time in sharing our activities and opinions with friends and family via social networking tools. However, despite the availability of many platforms for scientists to connect and share with their peers in the scientific community the majority do not make use of these tools, despite their promise and potential impact and influence on our future careers. We are being indexed and exposed on the internet via our publications, presentations and data. We also have many more ways to contribute to science, to annotate and curate data, to “publish” in new ways, and many of these activities are as part of a growing crowdsourcing network. This presentation will provide an overview of the various types of networking and collaborative sites available to scientists and ways to expose your scientific activities online. Many of these can ultimately contribute to the developing measures of you as a scientist as identified in the new world of alternative metrics. Participating offers a great opportunity to develop a scientific profile within the community and may ultimately be very beneficial, especially to scientists early in their career.
La prima giornata di formazione sullo strumento delle Storylet, per creare e condividere favole con gli strumenti narrativi di Gianni Rodari. Lo strumento è creato dal laboratorio ISISLab del Dipartimento di Informatica dell'Università di Salerno
For the second of the two seminars on Systematic Literature Review, here the tools useful for SLR are presented. The seminar is meant for PhD students and was given at the Computer Science PhD Program at the University of Salerno, Italy
1 - Systematic Literature Reviews: introduction and methodsVittorio Scarano
For the first of the two seminars on Systematic Literature Review, here the principles and methods of SLR are presented. The seminar is meant for PhD students and was given at the Computer Science PhD Program at the University of Salerno, Italy
Hetor per la Rete dei Licei Artistici della CampaniaVittorio Scarano
Presentazione di Hetor, con una introduzione agli Open Data, gli scopi e il funzionamento di Hetor, ed il suo uso per la Rete dei Licei Artistici della Campania
Solid is a decentralized platform for social Web applications that allow users' data to be managed managed independently of the
applications that create and consume this data.
In this seminar we present the objectives, the architectural design, some examples and final considerations on Solid
L’app di Hetor consente la promozione e valorizzazione del patrimonio culturale sia materiale che immateriale della Regione Campania, permettendone la riscoperta. Hetor fonda le sue radici sulla fruizione sociale, collaborativa e lo storytelling dei dati, coinvolgendo i cittadini attraverso lo storytelling dei dati supportato da visualizzazioni interattive, ed abilitando discussioni su tematiche di forte interesse. Hetor promuove una diretta ed attiva partecipazione degli utenti stessi per la costruzione, raccolta, e catalogazione del patrimonio culturale.
Una semplice introduzione al perché si presentano le attività di coding: il pensiero computazionale. Viene anche presentato brevemente Scratch per far vedere alcuni esempi.
La presentazione è stata creata nell'ambito dei seminari di Coderdojo Salerno, una organizzazione di volontari che sul territorio presenta incontri ed attività formative sul digitale.
Seminario per il Corso di Laurea in Informatica dell'Università di Salerno, Orientamento in Uscita, su come aumentare la propria presenza (e le proprie attività!) su LinkedIn e altri importanti strumenti (GitHub, StackOverflow, etc.)
Come "costruire" il curriculum di un InformaticoVittorio Scarano
Una presentazione al Corso di Laurea di Informatica per l'Orientamento in Uscita. Consigli e suggerimenti su come fare esperienze utili durante gli studi e come riportarle all'interno del CV.
Seminario tenuto per gli studenti e laureandi del corso di Informatica dell'Università di Salerno.
Presentiamo alcuni suggerimenti per scrivere il proprio CV e per poter migliorare il proprio profilo. Concludiamo con un elenco di errori frequenti
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Group Presentation 2 Economics.Ariana Buscigliopptx
Impostors and Computer Science
1. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
1 / 40
Impostors and Computer Science
Vittorio Scarano
Dipartimento di Informatica, Università di Salerno (Italy)
vitsca@unisa.it
ISISLab Seminars
Università di Salerno (Italy)
February 25th, 2021
2. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
2 / 40
LESSON PLAN
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
3.
4. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
4 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
5. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
5 / 40
WHAT IS AN IMPOSTOR?
Impostor’s Syndrome
“The Impostor Phenomenon/Syndrome is the experience of intellectual
phoniness as perceived by high achieving individuals. ””
• A fear that others might discover that they are not as competent
as they appear
• The success? Only matter of:
• luck,
• knowing the right people,
• being in the right place at the right time,
• personal charm
• Belief that IP is more prevalent in Computer Science than other
fields
6. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
6 / 40
THE IMPOSTOR PHONEMENON: WHERE
• Appears to be prevalent among underrepresented populations in
a particular field
• Also evidence that both underrepresented and represented groups
are affected
• In Computer Science, prevalent among students
• Albert Einstein was reportedly suffering the IP
7. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
7 / 40
SOME EXAMPLES: JOB REQUIREMENTS
• Requirements in the job
description as a developer:
several technologies . . .
• AngularJs, Agile
methodology, Git, Python,
Javascript, SASS, Build
tools (Grunt, Gulp, NPM
Scripts), flux, React . . .
• Heavy Keywords: kickass
developer, energetic developer,
evaluating new programs,
strong fundamentals,
analytical mind, innovator
• Result: “I don’t fit in this
job role”
8. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
8 / 40
SOME EXAMPLES: A SEMINAR
• Attending a seminar where all
the others are active and
asking questions and
commenting
• Attending a training or tech
meetup where all the
developers are debating on the
latest technology and some
popular tools
• You are silent. . .
• Result: “no idea about what
they are talking about”
9. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
9 / 40
A ”NON-SCIENTIFIC” REPORT (2018)
• Blind’s blog
• According to a 2011 paper (International Journal of Behavioral
Science), an estimated 70 percent of people experience impostor
syndrome at one point in their lives.
• No distinction: women, men, finance executives, marketing
managers, and physicians.
• Even software engineers and product managers sometimes feel
undeserving of their roles.
• A survey: 10,402 participants (August-Sept. 2018)
12. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
12 / 40
A SIGNAL: GOOD OR BAD?
• You’re doing something outside of your comfort zone.
• Which is good sign, not a bad sign.
• “If you’re the smartest person in the room, you’re in the wrong
room.”
• (Confucius, Michael Dell, Lorne Michaels, Marissa Mayer, and
others!)
• Embrace the problem, and act
• by acquiring more knowledge and skills, and expand yourself and
you try to do something you’re not comfortable with.
13. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
13 / 40
OFTEN IN COMPUTER SCIENCE!
• ICT industry is very different and diverse
• A lot of developers enter in the industry and have to stay updated
with the latest technology, frameworks, language, tools, practices
and a lot of things.
• Constantly in a constant learning phase, with different kind of
expertise in different tools, language or technologies.
• Result: pressure to learn something new every time
• If unknown is found then doubts about their accomplishment, feel
insecure, compare themselves and suffer from this problem.
• Understand that it’s impossible for any developer to know
everything.
14. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
14 / 40
A SHORT HISTORY OF IMPOSTOR PHENOMENON
• In 1978, Clance and Imes defined the term Impostor Phenomenon
to designate an internal experience of intellectual phoniness
• The sample was a made of high achieving women where, despite
numerous achievements, the women did not experience an
internal sense of success.
• These women persisted in believing that they were not really
bright and had merely fooled anyone who thought otherwise
• Accompanying features: dread of evaluation, fear of failure, guilt
about success, and cycle of belief that the person must suffer in
order to succeed and that self-doubt can be crucial to ensuring
success
• In the 80s, it was also proved that men experienced it with just as
much frequency as women (for example, male faculty members
exhibited higher feelings of IP than their female counterparts)
15. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
15 / 40
EFFECTS
• IP contribute negatively to an individual’s life
• IP often corresponds to increased levels in depression and anxiety
• IP is found to be stronger than perceived discrimination and
minority status stress
• A significant part of medical students, experience IP that was
found to be significantly associated with burnout indices.
16.
17. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
17 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
18. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
18 / 40
A SCIENTIFIC STUDY IN CS
• A validated metric of measuring the preva-lence of IP, the Clance
IP Scale (protected under copyright!).
• A survey of 203 computer science students (graduate/undergrad)
at a large, public, research-intensive university (UC San Diego,
probably)
• Research questions:
• (a) How prevalent is IP among CS students?
• (b) What differences are there between sub-populations within CS?
• (c) How does the prevalence of IP in CS compare to other
populations?
19. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
19 / 40
THE METHOD
• Udergraduate classes were an upper division Data Structures
course (2nd and 3rd year students), and an upper division
Natural Language Processing course (3rd and 4th year students).
(Many CS Majors)
• The graduate class selected was a graduate level class in Natural
Language Processing.
• Following the protocol, a brief introduction about the survey, then
filled-in online
• No mandatory, nor compensation
• Students were not told about the nature of study
20. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
20 / 40
RESULTS
• ANOVA found a statistically significant difference between male
and female responses
22. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
22 / 40
INTERPRETATIONS
• Data validates that the female students had significantly higher
levels of impostor feelings than the male students.
• The Gender Gap hit again: the lack of representation of women in
computer science
• Lack of significant differences of IP between students who
identified as White/Asian and those who identified as members of
underrepresent groups
• probably due to our low sample sizes of underrepresented students
in the dataset
23. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
23 / 40
COMPARISON IN OTHER FIELDS
• Compared to other fields, it appears like CS students suffer more
of IP
24. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
24 / 40
WHY MORE ”IMPOSTORS” IN CS?
• Imbalance in access to K-12 computer science courses: formal
classes offered in higher income neighboroods.
• The ones who had early access have some ”geek-gene”
• Message conveyed by faculties: ”CS is not for all”
• Defensive climate in classroom because of show-off of knowledge
by some students
• Content: the idea of a black-box inherently suggests that there is
a part of the work you know nothing about.
• The culture in CS of preconceived notions about who is ”fit” for
CS: ”I do not belong here”
• The inherent multidisciplinarity of CS: applied CS to X
25.
26. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
26 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
27. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
27 / 40
TREAT YOURSELF WELL
• Prioritize your whole self and your overall well-being: you are
more than what you do in your course, in your team, or in your
organization.
• Recognize internal monologues of failure or less than optimal
performance.
• Don’t get into unhealthy competition with yourself.
• Laugh at yourself with compassion.
• Allow yourself to brag about your successes, and don’t take
anyone who teases you about it seriously.
28. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
28 / 40
MANAGE YOUR RELATIONSHIPS
• Remember why you got into your line of work and if you were
”told to do” and you really don’t care, change your line of work.
• Some of the most successful people have thrived in multiple areas.
• Establish realistic yardsticks and take input from others on
whether goals are achievable.
29. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
29 / 40
NATURAL CYCLES OF KNOWLEDGE AND EXPERTISE
• Know that knowledge shifts and morphs: you’ll know more about
some topics tomorrow, and you’ll forget some things you knew
before.
• Let yourself be a novice when you approach a new topic.
• Ask for help: the keenest minds and deepest domain experts are
the ones who truly enjoy sharing their knowledge and inviting
others to the party.
• The dismissive people may themselves be suffering from impostor
syndrome.
30. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
30 / 40
UNDERSTAND THE IMPORTANCE OF CULTURE
• Note your cultural programming—are you really feeling like an
impostor, or are you afraid to admit you’re good at what you do for
fear of being called arrogant?
• Look for personal cultural differences around bragging,
self-promotion, competition, and contribution, including taking
responsibility for an honest audit of your own cultural or personal
biases.
• Don’t introduce unhealthy competition into your teams, whether
you are a manager or a peer.
• Introduce play and playfulness into the work world.
31. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
31 / 40
STRESS MANAGEMENT
Yerkes-Dodson law
Performance increases with physiological or mental arousal, but only
up to a point
• So, when the stress is just right, people will grow by leaps and
bounds: positive stress.
• As stress increases, there is a point of diminishing returns.
• At high levels of stress, the person will become debilitated.
• IP is probably spun from such heightened stress and anxiety
32. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
32 / 40
MAKE A HABIT OF BEING UNCOMFORTABLE
• Software development is a field where nobody knows everything.
• Accept that you, like everyone in software development, needs
help from StackOverflow or other resources: you’re not alone
• Accept the truth that you can not be an expert in software
development
• There is no endpoint of being completely knowledgeable and
comfortable in software development.
• Nobody can learn everything all the time so you need to make a
habit of being uncomfortable.
33. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
33 / 40
MAKE YOUR FUNDAMENTALS CLEAR
• Think to the moment you entered in programming and kept
learning you start realizing how far you’ have come.
• You can plan a career goal and decide what you want to learn
every month.
• Make a calendar for every month, learn the skill and keep track
of all the accomplishments.
• Check your past accomplishments, take inspiration from there
and feel positive for everything you have achieved.
• helps to overcome imposter’s syndrome but also boost your resume
34. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
34 / 40
THE ENVIRONMENT IS CRUCIAL!
• The environment will trigger, feed, and exacerbate impostor
syndrome.
• Triggered by noticing one ”does not belong” in other ways—being
part of a minority group
• The culture of an organization or institution is a big factor in
whether people feel like they belong and can take risks.
• Be aware of diversity in many cultures: bragging about your
achievements may be considered impolite
35.
36. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
36 / 40
MAP
1 Impostors
2 A study on IP in CS
3 What to do
4 Conclusions
37. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
37 / 40
WHY IT MATTERS
• As a person
• As a professional, about your peers
• As a teacher/educator, with regards to students
• As PhD advisor, toward PhD Students
38. VITTORIO SCARANO
Impostors and
Computer Science
Impostors
A study on IP in CS
What to do
Conclusions
38 / 40
READING MATERIAL AND CREDITS
• ”Identifying the Prevalence of the Impostor Phenomenon Among Computer Science Students”,
Adam Rosenstein, Aishma Raghu, Leo Porter. SIGCSE ’20: Proceedings of the 51st ACM Technical Symposium on
Computer Science Education, February 2020 Pages 30–36,
https://doi.org/10.1145/3328778.3366815
• ”Is there a fix for impostor syndrome?”,
Elizabeth F. Churchill, Interactions, April 2018, ACM.
https://doi.org/10.1145/3197577
• ”Impostor syndrome and burnout: some reflections”,
Elizabeth F. Churchill, Interactions, April 2019, ACM.
https://doi.org/10.1145/3320107
• ”58 percent of Tech Workers Feel Like Impostors”,
Blind Blog-Workspace Insights, Sept. 2018.
https://www.teamblind.com/blog/index.php/2018/09/05/
58-percent-of-tech-workers-feel-like-impostors
• ”An antidote to impostor syndrome”,
Dean Jackson, Taliver B Heath. XRDS: Crossroads, The ACM Magazine for Students, December 2014.
https://doi.org/10.1145/2685027
• ”Imposter Syndrome In Software Developers: Am I A Fake Developer?”
GeeksforGeeks, Dec. 2020.
https:
//www.geeksforgeeks.org/imposter-syndrome-in-software-developers-am-i-a-fake-developer/
Some figures by Pixabay.com