Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education
abstract: This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in differ...
Other Authors: | |
---|---|
Format: | Doctoral Thesis |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/2286/R.I.14625 |
id |
ndltd-asu.edu-item-14625 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-asu.edu-item-146252018-06-22T03:02:39Z Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education abstract: This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in different types of computing cultures. In-depth interviews with ten participants were conducted over the course of eight months. Analytical frameworks drawn from the digital divide and explorations of the role of hidden curricula in higher education contexts were used to analyze computing experiences in earlier k-12, informal, workplace, and post-secondary educational contexts to understand how barriers to computing emerge for women. Findings suggest several key themes. First, early experiences in formal education contexts are alienating women who develop an interest in computing. Opportunities for self-guided exploration, play, and tinkering help sustain interest in computing for women of color to engage in computing at the post-secondary level. Second, post-secondary computing climates remain hostile places for women, and in particular, for women of color. Thirdly, women employ a combination of different strategies to navigate these post-secondary computing cultures. Some women internalized existing dominant cultures of computing programs. Others chose exclusively online programs in computing to avoid negative interactions based on assumptions about their identity categories. Some women chose to forge their own pathways through computing to help diversify the culture via teaching, creating their own businesses, and through social programs. Dissertation/Thesis Ratnabalasuriar, Sheruni D. (Author) Romero, Mary (Advisor) Margolis, Eric (Committee member) Lim, Merlyna (Committee member) Arizona State University (Publisher) Sociology of education Higher education Women's studies Computing Education Digital Divide Hidden Curriculum Higher Education Intersectionality Qualitative eng 233 pages Ph.D. Justice Studies 2012 Doctoral Dissertation http://hdl.handle.net/2286/R.I.14625 http://rightsstatements.org/vocab/InC/1.0/ All Rights Reserved 2012 |
collection |
NDLTD |
language |
English |
format |
Doctoral Thesis |
sources |
NDLTD |
topic |
Sociology of education Higher education Women's studies Computing Education Digital Divide Hidden Curriculum Higher Education Intersectionality Qualitative |
spellingShingle |
Sociology of education Higher education Women's studies Computing Education Digital Divide Hidden Curriculum Higher Education Intersectionality Qualitative Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
description |
abstract: This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in different types of computing cultures. In-depth interviews with ten participants were conducted over the course of eight months. Analytical frameworks drawn from the digital divide and explorations of the role of hidden curricula in higher education contexts were used to analyze computing experiences in earlier k-12, informal, workplace, and post-secondary educational contexts to understand how barriers to computing emerge for women. Findings suggest several key themes. First, early experiences in formal education contexts are alienating women who develop an interest in computing. Opportunities for self-guided exploration, play, and tinkering help sustain interest in computing for women of color to engage in computing at the post-secondary level. Second, post-secondary computing climates remain hostile places for women, and in particular, for women of color. Thirdly, women employ a combination of different strategies to navigate these post-secondary computing cultures. Some women internalized existing dominant cultures of computing programs. Others chose exclusively online programs in computing to avoid negative interactions based on assumptions about their identity categories. Some women chose to forge their own pathways through computing to help diversify the culture via teaching, creating their own businesses, and through social programs. === Dissertation/Thesis === Ph.D. Justice Studies 2012 |
author2 |
Ratnabalasuriar, Sheruni D. (Author) |
author_facet |
Ratnabalasuriar, Sheruni D. (Author) |
title |
Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
title_short |
Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
title_full |
Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
title_fullStr |
Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
title_full_unstemmed |
Forging Paths Through Hostile Territory: Intersections of Women's Identities Pursuing Post-Secondary Computing Education |
title_sort |
forging paths through hostile territory: intersections of women's identities pursuing post-secondary computing education |
publishDate |
2012 |
url |
http://hdl.handle.net/2286/R.I.14625 |
_version_ |
1718699502021378048 |