首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
POOL HALLS, CHIPS, AND WAR GAMES: WOMEN IN THE CULTURE OF COMPUTING   总被引:4,自引:0,他引:4  
Computers are becoming ubiquitous in our society and they offer superb opportunities for people in jobs and everyday life. But there is a noticeable sex difference in use of computers among children. This article asks why computers are more attractive to boys than to girls and offers a cultural framework for explaining the apparent sex differences. Although the data are fragmentary, the world of computing seems to be more consistent with male adolescent culture than with feminine values and goals. Furthermore, both arcade and educational software is designed with boys in mind. These observations lead us to speculate that computing is neither inherently difficult nor uninteresting to girls, but rather that computer games and other software might have to be designed differently for girls. Programs to help teachers instill computer efficacy in all children also need to be developed.  相似文献   

2.
3.
The choice of computer courses has a direct influence on the development of computer literacy. It is alarming, therefore, that girls seem to choose computer courses less frequently than boys. The present paper examines (a) whether these often-reported gender differences also occur at the early high school level (Study 1) and (b) how these differences can be predicted by applying an expectancy-value model to the domain of computing (Study 2). Both studies clearly show gender differences in the choice of computer courses in children between 10 and 16 years in the real-life situation of choosing courses at school. In Study 2, the suggested expectancy-value model is tested using data from 159 students and 137 parents. The model shows a good fit to the data, and the observed gender differences in the choice of computer course could be predicted by differences in the value placed on computers and the expectations of success. However, these differences could only be partly explained by differences in perceived parental attitudes, and there were only weak relationships between parental attitudes and the corresponding perceptions of the students. Educational implications of the findings and suggestions for future research are discussed.  相似文献   

4.
A general approach to the design and development of real-time operating systems is discussed. Operating system design for small to medium scale laboratory computers is described at a moderately elementary level. Analysis of system design as a supervisory control hierarchy is presented in an attempt to bridge the gap between an elementary general understanding of computer operation and the more sophisticated understanding assumed by the writers of most computer systems operator’s manuals. PROSS, a programming language developed at Indiana University, is presented as an example of the highest level of supervisory control.  相似文献   

5.
In view of the obvious advantages of computers for the behavioral sciences, the question is raised as to how to make more effective use of computing capabilities. One idea is to require that fledgling behavioral scientists receive brief training in flowcharting and algorithm generation rather than a full course in computing skills. Such training would be an important adjunct for those who would go on for further instruction, especially in view of current deficiencies in many computer courses. One recurrent deficiency lies in the lack of specific guidelines for conceptualizing problems for computer implementation. Such guidelines are developed here, along with other suggestions designed to attenuate the difficulty in conceptualization.  相似文献   

6.
This paper examines several areas in the use of laboratory computers in psychobiology, specifically how they are being used, the problems in languages and software, in interfacing computers to experimental configurations, and in the hardware involved. The paper defines the experimental tasks and data requirements which tend to distinguish computer usage in physiological research from other areas of psychology and the tasks which absolutely necessitate the use of a computer and in what mode. Finally we present our views of the dangers of computer use and misuse and make our own subjective evaluation of how well computers are living up to their end of the bargain, how well scientists are doing at their end, and where we should go from here.  相似文献   

7.
A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature, mechanisms, and preventive measures for personal-computer viruses are reviewed. Different procedures are recommended to protect research laboratories, instructional laboratories, and software lending libraries. Tradeoffs between providing adequate protection and not having the security become too burdensome are considered.  相似文献   

8.
Accuracy is a measure of the extent of agreement between a rater’s ratings and the ratings of experts or the responses of ratees. Cronbach (1955) argued that accuracy research should focus on components of accuracy rather than on an overall measure. However, complex calculations are required to compute Cronbach’s accuracy components. A program is presented that provides a convenient way of computing all four components of accuracy (elevation, differential elevation, stereotype accuracy, and differential accuracy), as well as the associated correlation components, on an Apple Macintosh computer. The standard Macintosh interface is used to obtain all necessary information. The program will read data in a standard text file and will run faster on computers with math coprocessors.  相似文献   

9.
Irene T. Miura 《Sex roles》1987,16(5-6):303-311
Gender differences in perceived self-efficacy for computer use may help account for differential computer interest and course enrollment at the college level. Three hundred sixty-eight students completed a two-page questionnaire assessing perceived computer self-efficacy, plans to take a computer science course, perceived importance of computing skills, and interest in learning about computers. Men rated themselves higher than did women for perceived self-efficacy. They were also more positive on the cognitive outcome measures, but with computer self-efficacy held constant, the magnitude of these differences was decreased, suggesting that perceived self-efficacy may be an important consideration when examining gender differences in computer interest and use.The author wishes to thank Dr. Martin Ford and Dr. Albert Bandura for their helpful comments on an earlier version of this article. This research was supported by a grant from the San Jose State University Foundation. Portions of this research were reported at the annual meetings of the American Educational Research Association in San Francisco, April 1986.  相似文献   

10.
COMPUTERS     
Abstract: I offer an explication of the notion of computer, grounded in the practices of computability theorists and computer scientists. I begin by explaining what distinguishes computers from calculators. Then, I offer a systematic taxonomy of kinds of computer, including hard-wired versus programmable, general-purpose versus special-purpose, analog versus digital, and serial versus parallel, giving explicit criteria for each kind. My account is mechanistic: which class a system belongs in, and which functions are computable by which system, depends on the system's mechanistic properties. Finally, I briefly illustrate how my account sheds light on some issues in the history and philosophy of computing as well as the philosophy of mind.  相似文献   

11.
This study aimed to investigate the experiences of pre-service mathematics (PSM) teachers with computers and their attitudes toward them. The Computer Attitude Scale, Computer Competency Survey, and Computer Use Information Form were administered to 180 Turkish PSM teachers. Results revealed that most PSM teachers used computers at home and at Internet cafes, and that their competency was generally intermediate and upper level. The study concludes that PSM teachers' attitudes about computers differ according to their years of study, computer ownership, level of computer competency, frequency of computer use, computer experience, and whether they had attended a computer-aided instruction course. However, computer attitudes were not affected by gender.  相似文献   

12.
Experimentation represents today a ‘hot’ topic in computing. If experiments made with the support of computers, such as computer simulations, have received increasing attention from philosophers of science and technology, questions such as “what does it mean to do experiments in computer science and engineering and what are their benefits?” emerged only recently as central in the debate over the disciplinary status of the discipline. In this work we aim at showing, also by means of paradigmatic examples, how the traditional notion of controlled experiment should be revised to take into account a part of the experimental practice in computing along the lines of experimentation as exploration. Taking inspiration from the discussion on exploratory experimentation in the philosophy of science—experimentation that is not theory-driven—we advance the idea of explorative experiments that, although not new, can contribute to enlarge the debate about the nature and role of experimental methods in computing. In order to further refine this concept we recast explorative experiments as socio-technical experiments, that test new technologies in their socio-technical contexts. We suggest that, when experiments are explorative, control should be intended in a posteriori form, in opposition to the a priori form that usually takes place in traditional experimental contexts.  相似文献   

13.
14.
The advent of the desktop computer has allowed organizations to help their employees become faster and more productive workers. Some employees, however, use their work computers in unproductive ways as well, such as sending personal email and playing computer games. We call this Personal Use of Work Computers (PUWC). Using a work computer for personal reasons deviates from many organizations' norms. In the current study, we surveyed employees at an educational institution and asked them to report how they use their computers at work. These respondents also answered questions related to their sensation seeking, impulsiveness, conscientiousness, and job satisfaction as well as demographic information. We found that people who use their computers in unproductive ways tend to be men, younger, more impulsive, and less conscientious. We also found that those who use their computers for riskier PUWC behaviors (like viewing sexual content) tended to have sensation seeking personalities.  相似文献   

15.
This paper attempts to evaluate the impact of microprocessors and other products using large-scale integrated circuit technologies with a set of examples of past, current, and proposed computer applications in psychological research. I first discuss a number of developments in real-time computing that have taken place during the last 10 years. The major part of this paper describes future developments in the Computer Laboratory for Instruction in Psychological Research. We are developing an intelligent high-speed communication network that will enable computers and terminals to communicate with each other. In addition, we are developing a microprocessor-based real-time computer system. The network, the real-time system, and the general assumption underlying the development of the next generation of CLIPR facilities are described.  相似文献   

16.
17.
Ethical problems are related to computer data bases, containing data on individuals and groups of persons, as well as to computer knowledge bases, containing general rules and elements of expert systems.In the present essay the following conclusions are made regarding computer data bases: privacy, security, and confidentiality of medical computer data bases should be ensured. This duty should rest with physicians in hospitals. The principle of informed consent should be applied to gathering information which is to be stored and processed by computers. Information stored in computer data bases should not be used for purposes for which the subjects (patients as well as personnel) have not given their consent. In order to decrease the possibility of misuses of medical data bases containing information on individuals, these registers should not be linked to other central data bases.  相似文献   

18.
19.
A new visual electrophysiology and eye-movement laboratory was developed with three goals in mind: (1) rapid execution speed for quick acquisition of data from infant subjects, (2) ease of operation by experimenters, and (3) modularity and flexibility. A powerful system composed of two linked Macintosh computers was constructed in which one computer was used solely to generate visual stimuli and the second solely to record subjects’ responses, allowing recording to execute at maximum speed without being slowed by stimulus graphics generation. A single program on the recording computer allowed the experimenter to choose the stimulus and recording parameters. The two computers intercommunicated via a local EtherNet network to coordinate recording and signal averaging. This paper presents design principles and specific programming techniques relevant to any Macintosh system that must rapidly acquire physiological recordings while simultaneously displaying sensory stimuli.  相似文献   

20.
The computer-rich environment that exists when every student has a computer provides a variety of new opportunities for instructional use of computers, including new opportunities for the use of microcomputer application programs. After arguing that computer programming has a limited role in instructional computing, this paper describes the assumptions, development, and structure of a psychology course in which students make use of the microcomputer and its application programs as a tool in software design. However, programming is not required. Rather, the personal computer and its application programs provide an environment in which the student has the freedom to develop software design and explore course content without being constrained by the mind-numbing minutiae involved in programming a rigid, inflexible tutee.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号