Proceedings of the 15th Workshop on Primary and Secondary Computing Education 2020
DOI: 10.1145/3421590.3421600
|View full text |Cite
|
Sign up to set email alerts
|

"Draw us how smartphones, video gaming consoles, and robotic vacuum cleaners look like from the inside"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 24 publications
1
5
0
Order By: Relevance
“…Initially, the open coding process was inductive to examine what themes were prevalent within the data, particularly because the age group within this research overlapped the ages represented in prior students and, therefore, did not align exactly to previous research. The overarching theme of visibility of Threats to Techquity emerged from this analysis, aligning with prior research findings (Mertala, 2019;Pancratz and Diethelm, 2020;Jayathirtha and Kafai, 2021). Therefore, I developed two descriptive codes related to how the youth designers conceptualized Techquity: visible and invisible.…”
Section: Discussionsupporting
confidence: 80%
See 4 more Smart Citations
“…Initially, the open coding process was inductive to examine what themes were prevalent within the data, particularly because the age group within this research overlapped the ages represented in prior students and, therefore, did not align exactly to previous research. The overarching theme of visibility of Threats to Techquity emerged from this analysis, aligning with prior research findings (Mertala, 2019;Pancratz and Diethelm, 2020;Jayathirtha and Kafai, 2021). Therefore, I developed two descriptive codes related to how the youth designers conceptualized Techquity: visible and invisible.…”
Section: Discussionsupporting
confidence: 80%
“…The importance of making explicit the invisible Threats to Techquity builds on prior research showing that, in their initial conceptualizations of how computers worked, youth did not identify more invisible parts of computers or computing technology (Mertala, 2019; Pancratz and Diethelm, 2020; Jayathirtha and Kafai, 2021). Instead, youth often based their conceptualizations of computing technology on what they could see, on that with which they could interact and on that with which they previously experienced a problem (Mertala, 2019; Pancratz and Diethelm, 2020). Similarly, youth’s initial conceptualizations of Threats to Techquity consisted of those things they had previously noticed or with which they had experienced issues.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations