ABSTRACT
Computing professional identity formation is critical for curriculum decision-making, workforce development, and retaining students in computing degree programs. However, we have limited knowledge of how computing professional identity develops. My research focuses on filling this gap by empirically understanding how undergraduate computing students form their professional identity through their negotiations in formal and informal learning environments. The end goal is to generate and test a theory, grounded in data, which can help Computer Science departments to design interventions for fostering computing professional identity formation.
- John W. Creswell and J. David Creswell. 2017. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches.Google Scholar
- Sebastian Dziallas. 2018. Characterising Graduateness in Computing Education: A Narrative Approach. (2018). Retrieved January 27, 2019 from https://kar.kent.ac.uk/69292/Google Scholar
- Amanpreet Kapoor and Christina Gardner-McCune. 2018. Understanding Professional Identities and Goals of Computer Science Undergraduate Students. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education - SIGCSE '18, 191--196. Google ScholarDigital Library
- Amanpreet Kapoor and Christina Gardner-McCune. 2018. Understanding How Computer Science Undergraduate Students are Developing their Professional Identities. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education - SIGCSE '18, 1080--1080. Google ScholarDigital Library
- Amanpreet Kapoor and Christina Gardner-McCune. 2019. Understanding CS Undergraduate Students' Professional Identity through the lens of their Professional Development. In Proceedings of the 24th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'19). Google ScholarDigital Library
- Jane Kroger and Kathy E. Green. 1996. Events associated with identity status change. J. Adolesc. 19, (1996), 359--380.Google Scholar
- Jean Lave and Etienne Wenger. 1991. Situated learning?: legitimate peripheral participation. Cambridge University Press.Google Scholar
- James E. Marcia. 1966. Development and validation of ego-identity status. J. Pers. Soc. Psychol. 3, 5 (1966), 551--558.Google ScholarCross Ref
- Robert McCartney and Kate Sanders. 2015. School/Work: Development of Computing Students' Professional Identity at University. In Proceedings of the eleventh annual International Conference on International Computing Education Research - ICER '15, 151--159. Google ScholarDigital Library
- Greg L. Nelson and Andrew J. Ko. 2018. On Use of Theory in Computing Education Research. In Proceedings of the 2018 ACM Conference on International Computing Education Research - ICER '18, 31--39. Google ScholarDigital Library
- Rick Parker. 2017. Studying Professional Identity in Software Engineering. In Proceedings of the 2017 ACM Conference on International Computing Education Research - ICER '17, 283--284. Google ScholarDigital Library
- Anne-Kathrin Peters. 2018. Students' Experience of Participation in a Discipline-A Longitudinal Study of Computer Science and IT Engineering Students. ACM Trans. Comput. Educ. 19, 1 (September 2018), 1--28. Google ScholarDigital Library
- Sarah L. Rodriguez and Kathleen Lehman. 2017. Developing the next generation of diverse computer scientists: the need for enhanced, intersectional computing identity theory. Comput. Sci. Educ. 27, 3--4 (October 2017), 229--247.Google ScholarCross Ref
- Seth J. Schwartz, Koen Luyckx, and Vivian L. Vignoles. 2011. Handbook of Identity Theory and Research. Springer Science & Business Media.Google Scholar
- Anselm Strauss and Juliet Corbin. 2008. Basics of Qualitative Research. SAGE Publications, Inc.Google Scholar
Index Terms
- A Grounded Theory of Computing Professional Identity Formation
Recommendations
Understanding CS Undergraduate Students' Professional Identity through the lens of their Professional Development
ITiCSE '19: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science EducationAcademic institutions play a crucial role in the development of students' professional identities. However, we have limited knowledge of how computing professional identity develops. This paper aims to understand how CS undergraduate students develop ...
A framework for preserving privacy in cloud computing with user service dependent identity
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsThe widespread focus on the Cloud Computing has necessitated the corresponding mechanisms to ensure privacy and security. Various attempts have been made in the past to safeguard the privacy of the individual or agency trying to utilize the services ...
Development of professional competency through professional identity formation in a PBL curriculum
2016 IEEE Frontiers in Education Conference (FIE)This research paper describes a study of the student professional competency development as experienced by students in an upper-division project-based learning (PBL) curriculum that emphasis the development of the student professional identity. The ...
Comments