So, what's wrong with being an introvert?
Ira Winkler asks whether social 'ineptitude' is such a bad thing
Computerworld - Let me start this week's column off by stating that security is very much a people issue. That said, I expect to offend many groups of people, as well as some of my editors, with this week's column.
Don Tennant's July 31 editorial, in which he sharply criticized the Carnegie Mellon University professor who said the computer profession deserves its reputation for attracting socially inept introverts, surprised me and drew a lot of outrage from readers, and a bumper crop of messages in our mailbag. What upset Tennant about that assertion? In my opinion, the reputation is largely earned. We might as well accept that and deal with it.
Randy Pausch, who made the comments, is a professor at one of the most prestigious computer science programs in the world. He regularly encounters hundreds of the best and brightest emerging computer professionals and has probably met tens of thousands throughout his career. If he believes that the stereotype for computer professionals is accurate, I'd say his opinion has merit.
It's not unusual for controversy to erupt when educators make generalizations, and sometimes the logic or experience behind such observations gets lost in the uproar. Take, for instance, former Harvard President Lawrence H. Summers, who so famously remarked on possible reasons why there are more men than women working at elite levels in the sciences. The reasons he suggested included genetics, upbringing and family responsibilities. The ensuing firestorm ushered Summers out the door in Cambridge, Mass.
My educational background is in psychology, and a long line of studies in my field shows that men and women use different areas of their brains to make decisions. Likewise, they take different approaches to making decisions. There is nothing objectionable about these facts. Men Are From Mars, Women Are From Venus was a bestseller and social icon because women (yes, primarily women) bought the book to understand how differently men and women approach relationships. Many women gave the book to their spouses or significant others in an effort to have them better understand their feelings and decision processes.
Difference isn't wrong; it simply exists -- and acknowledging and understanding differences is an important step to addressing problems. If you acknowledge that there is some factor that causes women to be less inclined to go into sciences, you can begin to address that issue, without implying that there's somehow something wrong with the difference. For example, if you determine that the way sciences are traditionally taught (for example, the mechanics are taught without the application) dissuades women from pursuing the sciences as a career, you can modify teaching methods to keep women in the sciences. Criticizing someone simply for floating a difficult hypothesis silences other people and discourages people from researching the possibility -- or developing methods for correcting complex problems.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts