Abstract
In our Behavioral Cybersecurity course at Howard University in last spring (2016), students for their final exam were asked to write an opinion on the following question: “We know, in general in the US as well as at Howard, that only about 20% of Computer Science majors are female. Furthermore, of those CS students choosing to concentrate in Cybersecurity, fewer than 10% are female. Can you suggest any reason or reasons that so many fewer female computer scientists choose Cybersecurity?” In the course of reviewing the answers, it became clear that the challenge of determining the gender of the writer was a difficult problem. To that end, a sample of approximately 50 readers have analyzed the students’ texts and tried to determine the gender of the writers. The distribution of answers, to be presented in the full paper, has provided interesting options for further development of this research. In some aspects, the challenge of determining gender from a source absent of physical signals is similar to the challenge of the original Turing Test, which Turing formulated in order to present the challenge of determining whether or not machines could be said to possess intelligence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Peter Hilton was portrayed in “The Imitation Game,” only called “Peter” in the dialogue, but listed in the credits for the actor Matthew Beard in the role of “Peter Hilton.”
References
Turing, A.M.: Computing machinery and intelligence. Mind Q. Rev. Psychol. Philos. LIX(236), 433–460 (1950)
Patterson, W., Winston, C. E., Fleming, L.: Behavioral Cybersecurity: a needed aspect of the security curriculum. In: Proceedings of the IEEE SoutheastCon 2016, Norfolk, VA, March 2016
Patterson, W., Winston, C. E., Fleming, L.: Behavioral Cybersecurity: human factors in the cybersecurity curriculum. In: Proceedings of the 2nd International Conference on Human Factors in Cybersecurity, Orlando, FL, July 2016
National Centers of Academic Excellence in Information Assurance Education, National Security Agency (2017). https://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml
SONY Pictures Releasing, The Imitation Game (Film) (2014)
Weizenbaum, J.: ELIZA—a computer program for the study of natural language communication between man and machine. Commun. Assoc. Comput. Mach. 9, 36–45 (1966)
Baker, S., Jeopardy, F.: The Story of Watson, the Computer That Will Transform Our World. Paperback – Houghton Mifflin Harcourt, Boston, 27 March 2012
Argamon, S., Koppel, M., Fine, J., Shimoni, A.R.: Gender, genre, and writing style in formal written texts. Text 23(3), 321–346 (2003)
Krawetz, N.: Gender Guesser. http://hackerfactor.com/GenderGuesser.php
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Patterson, W., Boboye, J., Hall, S., Hornbuckle, M. (2018). The Gender Turing Test. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-60585-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60584-5
Online ISBN: 978-3-319-60585-2
eBook Packages: EngineeringEngineering (R0)