Help us understand women in Computer Science in Central and Eastern Europe

02.27.2013, News, Slovenia, by .

Andraz Tori (@andraz), co-founder and CTO of Zemanta, did something awesome. He requested data on female and male enrollment in Computer Science the University of Ljubljana, something they’ve apparently never assembled before, and analyzed that data to see what kind of trends emerge.

The main take-away so far is that the trend is unclear, but something interesting seems to have happened in 2009 when U of L implemented the Bologna reforms. It seems that the changed curriculum and grading resulted in increased percentages of women progressing through to the second year. (From my own experience with various education systems I’d take an un-educated guess that 1-1 oral examinations were reduced and contributed to the change.) However, the data needs more mining and Tori posted it on Google docs for anyone to take a look.

It would be AMAZING to understand developments in the participation of women in computer science in other central and eastern European countries. Do you have a contact at your local computer science department/faculty/university? Can you get some data and send it to us? We will publish all data we collect, and recruit help in analyzing it. 

While we’re at it, this kind of analysis would also help us understand trends in CS enrollment in the region in general. Let’s DO THIS!

Head over to Andraz Tori’s blog for a great read and inspiration. 

Sign up for the weekly newsletter

4 Responses to Help us understand women in Computer Science in Central and Eastern Europe

  1. I would be interested in your take on the oral examinations. Why do you think they would affect women differently?

  2. 2013-02-27 at 12:26 Zuzana Fedorková

    I’ve been reading a lot about the “stereotype threat” recently. It’s the “experience of anxiety when one has the potential to confirm prevailing stereotypes about his/her group”. Among other things, it’s been hypothesized that it might affect how girls or boys do on various exams in school — for example when you ask them to indicate their gender on an exam vs when you don’t, this subconscious priming seems to affect how well they do. It would seem that 1-1 oral examinations would take this kind of a phenomenon to a new level. I’m curious if there are any studies about that specifically.

  3. Pingback: Women in Computer Science at University of Ljubljana – ideas | Andraz Tori Blog

  4. G’Day! Eastist,
    Thanks for that, Shortcuts are documents using the extension .lnk that happen to be produced and are accessed by people, prospects can make shortcuts to programs, documents, folders, removable storage equipment, and community shares. Shortcuts can current info about documents or network shares that a consumer has accessed, furthermore they give info regarding units that the user may well possibly have hooked up for the program, obtain information and facts and current the means to parse the contents of shortcut information to expose facts embedded within the data files.

    Phrase files are compound files, according to object linking and embedding systems that defines the file composition, in addition to formatting details, Phrase paperwork can involve seriously a bit of further facts that is absolutely not seen to the user, depending on the user?s view of your document, Word files can retain not basically preceding revisions but also a record of authors to edit the file, this has posed an information disclosure chance to men and girls and organizations, an investigator can use the perl scripts and to listing the ole streams embedded within a Term document.

    Portable doc format (PDF) documents might also include metadata for occasion the name on the writer, the day that the file was built, and also the software utilized to make the PDF file, commonly the metadata can demonstrate that the PDF file was generated on a Mac or that the PDF file was manufactured by changing a Word document to PDF format. As with Phrase paperwork, this metadata can pose a danger of information disclosure, an investigator can make use of the Perl scripts and to extract metadata from PDF documents, the only difference involving the two scripts is the truth that they use various perl modules to interact collectively with the PDF documents.


Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>