Información de la conferencia
SOCC 2024: ACM Symposium on Cloud Computing
https://acmsocc.org/2024/Día de Entrega: |
2024-07-08 |
Fecha de Notificación: |
2024-09-25 |
Fecha de Conferencia: |
2024-11-20 |
Ubicación: |
Redmond, Washington, USA |
Años: |
15 |
CCF: b Vistas: 66041 Seguidores: 144 Asistentes: 20
Solicitud de Artículos
Inclusion and Diversity in Writing and Oral Presentation ACM Symposium on Cloud Computing (SoCC) brings a large scientific and technical community together and thus has a direct impact on many people from different backgrounds around the world. The goals of Diversity and Inclusion are explained by ACM as follows. Diversity is achieved when the individuals around the table are drawn from a variety of backgrounds and experience, leading to a breadth of viewpoints, reasoning, and approaches (also referred to as "the who"). Inclusion is achieved when the environment is characterized by behaviors that welcome and embrace diversity ("the how"). Both are important in our writing and other forms of communication such as posters and talks. Here we describe and point to ways to ensure SoCC’23 is diverse and inclusive in creating a welcoming environment for everyone attending the conference. Inclusion Be mindful of not using language or examples that further the marginalization, stereotyping, or erasure of any group of people, especially historically marginalized and/or under-represented groups (URGs) in computing. Of course, exclusionary or indifferent treatment can arise unintentionally. Be vigilant and actively guard against such issues in your writing. Reviewers will also be empowered to monitor and demand changes if such issues arise in your submissions. Examples of exclusionary and other non-inclusive writing to avoid: Implicit assumption: An example of database integrity constraints: "Every person has a mother and a father." This example is exclusionary and potentially hurtful to people from single-parent households and people with same-sex parents. Oppressive terminology: Using the term "Master-Slave" to describe a distributed data system architecture. This can be hurtful to people whose families have suffered the inhumanity of enslavement. A good source of alternative terms to oppressive language often used in computer science can be found in this article. ACM also has enlisted terms that should be avoided in professional writing and presentations, and suggests alternatives to those terms here. Marginalization of URGs: An example of attribute domains: "The Gender attribute is either Male or Female." This example is exclusionary and potentially hurtful to people who are intersex, transgender, third gender, two-spirit, agender, or have other non-binary gender identities. Lack of accessibility: Using color alone to convey information in a plot when good alternative data visualization schemes exist. This can be exclusionary to people who are color-blind. Please consider using patterns, symbols and textures to emphasize and contrast visual elements in graphs and figures, rather than using colors alone. Use a color-blind friendly palette that is designed with accessibility for visually impaired people. Avoid bad color combinations such as green/red or blue/purple. Stereotyping: Reinforcing gender stereotypes in names or examples of roles, e.g., using only feminine names or presentations for personal secretary or assistant roles. Diversity Going further, please also consider actively raising the representation of URGs in your writing. Diversity of representation helps create an environment and community culture that could ultimately make our field more welcoming and attractive to people from URGs. This is a small but crucial step you can take towards celebrating and improving our community’s diversity. Examples of infusing diversity into writing to consider adopting: Embracing different cultures: Names of people are a visible way to enhance diversity of representation in writing. Instead of reusing overused names in computing such as Alice and Bob, consider using names from a variety of languages, cultures, and nationalities, e.g., Alvarez and Bano. Avail of the many online resources on this front for ideas, e.g., this article on names across different cultures. Embracing differences in figures: Depictions of people or people-like icons in illustrations are also a good avenue to enhance diversity of representation. Consider depicting people of different gender presentations, skin colors, ability status, and other visible attributes of people. Embracing gender diversity in pronouns: Consider using a variety of gender pronouns across your named examples consciously, including "he/him/his," "she/her/hers," and "they/them/theirs". Likewise, consider using gender-neutral nouns when referring to generic roles, e.g., "chairperson" or just "chair" instead of "chairman," and gender-neutral pronouns for such roles. Responsibility Finally, if your work involves data-driven techniques that make decisions about people, please consider explicitly discussing whether it may lead to disparate impact on different groups, especially URGs. Consider discussing the ethical and societal implications. For example, see this article discussing the potential for disparate impact of facial recognition in healthcare and strategies to avoid or reduce harm. This SIGMOD Blog article also gives a comprehensive overview of various dimensions and approaches for responsible application of data management ideas. We hope our community can help permeate this culture of responsibility and awareness about potentially harmful unintended negative consequences of our work within the larger computing landscape.
Última Actualización Por Dou Sun en 2024-05-26
Los Mejores Artículos
Conferencias Relacionadas
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
SOCC | ACM Symposium on Cloud Computing | 2024-07-08 | 2024-11-20 |
ADBIS | European Conference on Advances in Databases and Information Systems | 2024-04-15 | 2024-08-28 |
JIST | The Joint International Semantic Technology Conference | 2019-08-10 | 2019-11-25 |
HPCC | International Conference on High Performance Computing and Communications | 2024-09-10 | 2024-12-13 |
LED-ICT | IEEE Conference on LEarning Disabilities & ICT Support | 2020-06-28 | 2020-12-12 |
FCRAR | Florida Conference on Recent Advances in Robotics | 2020-04-01 | 2020-05-14 |
ICPADS | International Conference on Parallel and Distributed Systems | 2024-07-07 | 2024-10-10 |
SIROCCO | International Colloquium on Structural Information and Communication Complexity | 2015-04-30 | 2015-07-15 |
VECoS | International Conference on Verification and Evaluation of Computer and Communication Systems | 2024-06-10 | 2024-10-16 |
FSME | International Conference on Future Software Engineering and Multimedia Engineering | 2011-07-10 | 2011-08-13 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
IEEE Transactions on Haptics | 2.400 | IEEE | 1939-1412 | |
c | Multimedia Systems | 3.500 | Springer | 0942-4962 |
Computers & Mathematics with Applications | 2.900 | Elsevier | 0898-1221 | |
Journal of Digital Imaging | 2.900 | Springer | 0897-1889 | |
Integrated Computer-Aided Engineering | 5.800 | IOS Press | 1069-2509 | |
Intelligence & Robotics | OAE Publishing | 2770-3541 | ||
c | BMC Bioinformatics | 2.900 | BioMed Central | 1471-2105 |
Active and Passive Electronic Components | 1.300 | Hindawi | 0882-7516 | |
Ethics and Information Technology | 3.400 | Springer | 1388-1957 | |
c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
IEEE Transactions on Haptics | 2.400 | IEEE |
Multimedia Systems | 3.500 | Springer |
Computers & Mathematics with Applications | 2.900 | Elsevier |
Journal of Digital Imaging | 2.900 | Springer |
Integrated Computer-Aided Engineering | 5.800 | IOS Press |
Intelligence & Robotics | OAE Publishing | |
BMC Bioinformatics | 2.900 | BioMed Central |
Active and Passive Electronic Components | 1.300 | Hindawi |
Ethics and Information Technology | 3.400 | Springer |
EURASIP Journal on Information Security | 2.500 | Springer |
Recomendaciones