skip to main content
10.1145/1978942.1979381acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

African American men constructing computing identity

Published:07 May 2011Publication History

ABSTRACT

Many young African American males have a passion for video games, but they don't often translate that passion into learning about computing. Part of the problem is that they do not identify with computing as a social norm within their peer group. This disidentification with computing can negatively impact academic performance and limit opportunities for upward mobility. We developed a job training program called Glitch Game Testers in which young African American men are trained to 'Sbreak open the black box' of their game consoles to learn about computing. Perceptions of peers' technical competency were measured before and after the summer 2010 program. Results showed that participants were more likely to view their peers as technical resources and their overall access to technical resources increased. Broader implications for motivating technology adoption in HCI are discussed.

References

  1. Preparing Women & Minorities for the IT Workforce: The Role of Nontraditional Educational Pathways. AAAS Report, 2005.Google ScholarGoogle Scholar
  2. Barnes, T., Powell, E., Chaffin, A., Lipford, H. Game2Learn: improving the motivation of CS1 students. GDCSE '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. DiSalvo, B., Guzdial, M., Mcklin, T., Meadows, C., Perry, K., Steward, C., et al. (2009). Glitch Game Testers: African American Men Breaking Open the Console. DiGRA 2009 Breaking New Ground: Innovation in Games, Play, Practice and Theory.Google ScholarGoogle Scholar
  4. Eglash, R. Appropriating Technology: Vernacular Science and Social Power. Univ. of Minnesota Press, 2004.Google ScholarGoogle Scholar
  5. Forte, A. and Guzdial, M. Computers for Communication, Not Calculation: Media as a Motivation and Context for Learning. IEEE Computer Society (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goffman, E. On Face-work: An Analysis of Ritual Elements of Social Interaction. J. Study of Inter Proc. 18, 3 (1955), 213--231.Google ScholarGoogle Scholar
  7. Harper, S.R. The Measure of a Man: Conceptualizations of Masculinity Among High-achieving African American Male College Students. Ber. J. of Soc. 48, 1 (2004), 89--107.Google ScholarGoogle Scholar
  8. Katz, S., Aronis, J., Allbriton, D., Wilson, C., and Soffa, M.L. Gender and Race in Predicting Achievement in Computer Science. IEEE Tech & Soc, 22, 3 (2003), 20--27.Google ScholarGoogle Scholar
  9. Kohl, H. I Won't Learn From You. New Press, 1995.Google ScholarGoogle Scholar
  10. Lave, J. and Wenger, E. Situated Learning: Legitimate Peripheral Participation. Cambridge Univ. Press, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  11. Lenhart, A., et al. Teens, Video Games and Civics. Pew Internet Report, 2008.Google ScholarGoogle Scholar
  12. Steele, C.M. Race and the Schooling of Black Americans. The Atlantic Monthly 269, 4 (1992), 67--78.Google ScholarGoogle Scholar
  13. Steele, C. A threat in the air: How stereotypes shape intellectual identity and performance. Amer. Psych. 52, 6 (1997).Google ScholarGoogle ScholarCross RefCross Ref
  14. Szentgyorgyi, C., Terry, M., and Lank, E. Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system. In Proc. CHI '08, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Turkle, S. The second self: Computers and the human spirit. Simon & Schuster, New York, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Van Der Gaag, M. The Resource Generator: Social capital quantification with concrete items. Soc Net, (2004).Google ScholarGoogle Scholar

Index Terms

  1. African American men constructing computing identity
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          May 2011
          3530 pages
          ISBN:9781450302289
          DOI:10.1145/1978942

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 May 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '11 Paper Acceptance Rate410of1,532submissions,27%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader