Skip to main content

Conclusions

  • Chapter
  • First Online:
Participation in Computing

Part of the book series: History of Computing ((HC))

  • 486 Accesses

Abstract

This chapter summarizes the earlier chapters. It also provides a discussion of a number of more general issues: the organizational capability of NSF to deal with deeply embedded social and cultural issues; how politics and the built environment have affected bottom-up and top-down initiatives related to broadening participation in computing; the impact of labor practices and funding models on the effectiveness of broadening participation programs; questions about where broadening participation programs should reside in NSF, the tensions between funding research and funding implementations, and differences in understanding of computer scientists and social scientists in carrying out these programs; the implications of adopting a pipeline metaphor; and topics not covered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See, for example, Norberg et al. (1996) regarding DARPA’s early work in information technology research and development.

  2. 2.

    See Correll (2001, 2004) for discussions of some of these issues.

  3. 3.

    There are of course many people working together at NSF, plus thousands of project personnel spread across the United States, that make these things happen. One notable person who worked behind the scenes to make the IT Workforce program and the Broadening Participation in Computing program succeed was Deborah Crawford . As a long-time NSF employee, she knew how to work with budgets, people, and organizational structures inside NSF to make things happen in ways that Cuny and Freeman, as newcomers to NSF did not know how to achieve. Also important was the support of NSF Deputy Director Joseph Bordogna .

    Peter Freeman was not the only CISE AD with a strong interest in broadening participation. Notable among the earlier ADs were William Wulf , who continued to support these goals after he left NSF and became president of the National Academy of Engineering, and Nico Habermann , whose influence was cut short by an early death. (We do not have historical perspective to judge some of the recent CISE AD’s commitments to and accomplishments in broadening participation.)

  4. 4.

    Freeman and Aspray (1999) did some mapping of degree programs, but this situation has no doubt changed significantly in the past 15 years.

  5. 5.

    Steve McLaughlin, a doctoral student in the School of Information at the University of Texas at Austin , has begun research on this topic of the history of informal approaches to computing but there are no publications from the research as of yet.

  6. 6.

    The iconic embodiment of the pipeline metaphor is Camp (1997). As we saw in Chap. 2, CEOSE abandoned the pipeline metaphor in favor of a multiple pathways metaphor in 2004. Other scholars have been critical of the pipeline metaphor for various reasons. See, for example, Jesse (2006) a nd Guzdial (2015). Miller and Wai (2015) argue that for science overall, the leaky pipeline does not leak more women than men. The Computing Research Association study of the IT wor kforce (Freeman and Aspray 1999) was careful to point to informal as well as formal pathways to an IT education.

References

  • Adrion, R. 2015. Oral history interview by William Aspray. July 1. Charles Babbage Institute Oral History Collection.

    Google Scholar 

  • Camp, T. 1997. The incredible shrinking pipeline. Communications of the ACM 40(10): 103–110.

    Article  Google Scholar 

  • Correll, S.J. 2001. Gender and the career choice process: The role of biased self-assessments. The American Journal of Sociology 106(6): 1691–1730.

    Article  Google Scholar 

  • Correll, S.J. 2004. Constraints into preferences: Gender, status and emerging career aspirations. American Sociological Review 69: 93–113.

    Article  Google Scholar 

  • Denning, P. 1998. Computing the profession. Educom Review, November.

    Google Scholar 

  • Freeman, P., and W. Aspray. 1999. The supply of information technology workers in the United States. Washington, DC: Computing Research Association.

    Google Scholar 

  • Guzdial, M. 2015. End the ‘leaky pipeline’ metaphor when discussing women in science. Computing Education Blog, April 27, 8:17 AM. https://computinged.wordpress.com/2015/04/27/end-the-leaky-pipeline-metaphor-when-discussing-women-in-science-technical-knowledgecan-be-used-in-many-domains/. Accessed 15 Sept 2015.

  • Jesse, J. 2006. The poverty of the pipeline metaphor: The AAAS/CPST study of nontraditional pathways into IT/CS education and the workforce. In Women and information technology, ed. J. McGrath Cohoon and A. William, 239–278. Cambridge, MA: MIT Press.

    Google Scholar 

  • Miller, D., and W. Jonathan. 2015. The bachelor’s to Ph.D. STEM pipeline no longer leaks more women than men: A 30-year analysis. Frontiers in Psychology 6: 37. http://journal.frontiersin.org/article/10.3389/fpsyg.2015.00037/full. Accessed 15 Sept 2015.

  • Norberg, A.L., J.E. O’Neill, and K.J. Freedman. 1996. Transforming computer technology: Information processing for the Pentagon, 1962–1986. Baltimore: John Hopkins University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Aspray, W. (2016). Conclusions. In: Participation in Computing. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-24832-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24832-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24830-1

  • Online ISBN: 978-3-319-24832-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics