Stimulating and maintaining students’ interest in Computer Science using the hackathon model

Computer Science (CS) enrolments at higher education institutions across the globe remain low in comparison to other disciplines. The low interest in CS is often attributed to students' misconceptions about the discipline, such as CS being construed as complex, asocial, and only for computer wizards. Consequently, hackathons, which are self-organised programmes that bring together different stakeholders to collaborate in rapidly building software prototypes, are emerging as one potential solution to address some of the students' misconceptions about the CS field. Using an exploratory case study and activity theory for data analysis; this research article presents substantive research findings that posit hackathons as an approach that could stimulate and maintain students' interest in CS. The key elements of the hackathon model are collaborations, networking, mentoring, hands-on engagement in socially-relevant computing projects, and community involvement. The model was evaluated using expert reviews in terms of its relevance, impact, complexity, and sustainability.

[1]  Jeeshan Chowdhury Hacking Health: Bottom-up Innovation for Healthcare , 2012 .

[2]  Colin Lankshear,et al.  'Because it's boring, irrelevant and I don't like computers': Why high school girls avoid professionally-oriented ICT subjects , 2008, Comput. Educ..

[3]  Gerard Briscoe,et al.  Digital Innovation: The Hackathon Phenomenon , 2014 .

[4]  Michael Buckley ViewpointComputing as social science , 2009, CACM.

[5]  Greg Guest,et al.  Collecting Qualitative Data: A Field Manual for Applied Research , 2012 .

[6]  E. Raymond How To Become A Hacker , 2008 .

[7]  Ann Veeck,et al.  The Markathon: Adapting the Hackathon Model for an Introductory Marketing Class Project , 2015 .

[8]  D. Jonassen,et al.  Activity theory as a framework for designing constructivist learning environments , 1999 .

[9]  Jabu Mtsweni,et al.  The role of e-tutors in promoting e-learning using Web 2.0 technologies , 2014 .

[10]  Winston M. Tellis,et al.  APPLICATION OF A CASE STUDY METHODOLOGY , 1997 .

[11]  Sean P. Goggins,et al.  Quality Hackathon: Evaluating the Products of Online Co-Production Systems , 2014, GROUP '14.

[12]  Michael Jones,et al.  Activity Theory: A framework for qualitative analysis , 2007 .

[13]  Ramesh Raskar,et al.  The KumbhThon technical hackathon for Nashik: A model for STEM education and social entrepreneurship , 2014, 2014 IEEE Integrated STEM Education Conference.

[14]  Ian Douglas Sanders,et al.  Perceptions of Computer Science at a South African university , 2007, Comput. Educ..

[15]  Shona Leitch,et al.  Hacker Taggers: A new type of hackers , 2010, Inf. Syst. Frontiers.

[16]  J. D. Vakkayil,et al.  Activity Theory: A Useful Framework for Analysing Project-Based Organizations , 2010 .

[17]  Larry L. Constantine,et al.  Human Activity Modeling: Toward A Pragmatic Integration of Activity Theory and Usage-Centered Design , 2009, Human-Centered Software Engineering.

[18]  Marcos R. S. Borges,et al.  Taking advantage of collective knowledge in emergency response systems , 2012, J. Netw. Comput. Appl..

[19]  Devika Subramanian,et al.  Socially relevant computing , 2008, SIGCSE '08.

[20]  Marina Papastergiou,et al.  Are Computer Science and Information Technology still masculine fields? High school students' perceptions and career choices , 2008, Comput. Educ..

[21]  Rochelle Wessels The reception of satellite broadcasting in public administration teaching at the University of South Africa , 2012 .

[22]  Yasmin B. Kafai,et al.  StitchFest: Diversifying a College Hackathon to Broaden Participation and Perceptions in Computing , 2015, SIGCSE.