Recoding Gender


Book Description

The untold history of women and computing: how pioneering women succeeded in a field shaped by gender biases. Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male “computer geek” seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field. Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine “software engineering.” She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science. Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.




Proceedings of 6th International Conference in Software Engineering for Defence Applications


Book Description

This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way.




The Cambridge Handbook of Computing Education Research


Book Description

This Handbook describes the extent and shape of computing education research today. Over fifty leading researchers from academia and industry (including Google and Microsoft) have contributed chapters that together define and expand the evidence base. The foundational chapters set the field in context, articulate expertise from key disciplines, and form a practical guide for new researchers. They address what can be learned empirically, methodologically and theoretically from each area. The topic chapters explore issues that are of current interest, why they matter, and what is already known. They include discussion of motivational context, implications for practice, and open questions which might suggest future research. The authors provide an authoritative introduction to the field which is essential reading for policy makers, as well as both new and established researchers.










A Prehistory of the Cloud


Book Description

The militarized legacy of the digital cloud: how the cloud grew out of older network technologies and politics. We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game “Spacewar” as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new “cloudlike” political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu's account offers a set of new tools for rethinking the contemporary digital environment.




Index of Conference Proceedings


Book Description




Human Factors in Management Information Systems


Book Description

This text is designed to aid understanding of the broad context of human factors in a systems context and also provides guidelines and examples to aid in specific domains. This intergrated set of technical and behavioural readings are all directed at the human opportunities and problems associated with the design and implementation of information systems.




Global and Organizational Discourse about Information Technology


Book Description

Over the past 20 years, the field of information systems has grown dramatically in theoretical diversity and global reach. This growth is reflected in the language that policy makers and organizational stakeholders use when they talk about their IT plans. As information technology penetrates further into organizational and global life, it becomes ever more important to articulate assumptions embedded in the discourse. This will help to clarify the complex and yet conceptually improvised or pasted-up worldview that becomes embodied in systems. The assumptions point to particular domains of discourse. The discourse sets up conventions and boundaries. It thus shapes what can or cannot legitimately be talked about, researched, addressed, or solved within the scope of IT. A number of practical and theoretical topics are discussed in detail, including: *Globalization, development, and space; *Mobilization of power; *ERP systems; *IS planning and projects; *Critical research and the study of discourse; *Public institutions; *Analytical frameworks. This book contains the selected proceedings of the Working Conference on Global and Organizational Discourse About Information Technology, sponsored by the International Federation for Information Processing (IFIP) and held in Barcelona, Spain in December 2002.




Innovations Through Information Technology


Book Description

Innovations Through Information Technology aims to provide a collection of unique perspectives on the issues surrounding the management of information technology in organizations around the world and the ways in which these issues are addressed. This valuable book is a compilation of features including the latest research in the area of IT utilization and management, in addition to being a valuable source in support of teaching and research agendas.