{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:04Z","timestamp":1775199544353,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/vlhcc.2016.7739685","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:40:55Z","timestamp":1478796055000},"page":"199-207","source":"Crossref","is-referenced-by-count":13,"title":["GenderMag experiences in the field: The whole, the parts, and the workload"],"prefix":"10.1109","author":[{"given":"Charles","family":"Hill","sequence":"first","affiliation":[]},{"given":"Shannon","family":"Ernst","sequence":"additional","affiliation":[]},{"given":"Alannah","family":"Oleson","sequence":"additional","affiliation":[]},{"given":"Amber","family":"Horvath","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"65","article-title":"The influence of professional identification on the retention of women and racial minorities in the IT workforce","author":"o'leary-kelly","year":"2004","journal-title":"NSF Info Tech Workforce & Info Tech Res PI Conf"},{"key":"ref38","first-page":"1665","author":"nielsen","year":"2014","journal-title":"Personas is applicable a study on the use of personas in Denmark ACM CHI"},{"key":"ref33","author":"marsden","year":"2016","journal-title":"Stereotypes and politics reflections on personas ACM CHI"},{"key":"ref32","author":"margolis","year":"2003","journal-title":"Unlocking the Clubhouse Women in Compu-ting"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781409"},{"key":"ref30","author":"lewis","year":"1990","journal-title":"Testing a walkthrough methodology for theory-based design of walk-up-and-use interfaces ACM CHI 1990 (CHI '90)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1086\/209241"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2014.06.003"},{"key":"ref35","first-page":"1219","author":"matthews","year":"2012","journal-title":"How do designers and user experience professionals actually perceive and use personas? ACM CHI"},{"key":"ref34","first-page":"401","volume":"12","author":"massanari","year":"2010","journal-title":"Designing for imaginary friends information architecture personas and the politics of user-centered design New Media & Society"},{"key":"ref28","first-page":"1997","author":"judge","year":"2012","journal-title":"Comparing collaboration and individual personas for the design and evaluation of collaboration software ACM CHI"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.012"},{"key":"ref29","first-page":"5","article-title":"Barriers to programming engagement","volume":"1","author":"kelleher","year":"2009","journal-title":"Advances in Gender and Education"},{"key":"ref2","first-page":"869","author":"beckwith","year":"2005","journal-title":"Effectiveness of end-user debugging software features Are there gender issues? ACM CHI"},{"key":"ref1","author":"adlin","year":"2010","journal-title":"The Essential Persona Lifecycle Your Guide to Building and Using Personas"},{"key":"ref20","author":"goodwin","year":"2009","journal-title":"Designing for the Digital Age How to Create Human-Centered Products and Services"},{"key":"ref22","first-page":"3093","author":"grigoreanu","year":"2013","journal-title":"Informal cognitive walkthroughs (lCW) paring down and pairing up for an agile world ACM CHI"},{"key":"ref21","first-page":"243","article-title":"Incorporation of users in the evaluation of usability by cognitive walkthrough","author":"granollers","year":"2004","journal-title":"HCI Related Papers of Interaccio?n"},{"key":"ref24","first-page":"167","volume":"46","author":"hartzel","year":"2003","journal-title":"How self-efficacy and gender issues affect software adoption and use Commun ACM"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10798-014-9274-z"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125622"},{"key":"ref25","article-title":"Rapid Contextual design: A How-to Guide to Key Techniques for User-Centered Design","author":"holtzblatt","year":"2004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.414"},{"key":"ref51","first-page":"105","author":"wharton","year":"1994","journal-title":"The cogmtrve walkthrough method A practitioner's guide Usability Inspection Methods"},{"key":"ref10","first-page":"402","author":"cassell","year":"2002","journal-title":"Genderizing HCI The Handbook of Human-Computer Inter-action"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531660"},{"key":"ref40","year":"2015","journal-title":"Piazza Blog STEM confidence gap"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1177\/154193120605000503","article-title":"The personas' new clothes: methodolog-ical and practical arguments against a popular method","volume":"50","author":"chapman","year":"2006","journal-title":"Proc Human Factors and Ergonomics Soc Ann Meeting"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"ref14","author":"cooper","year":"2004","journal-title":"The Inmates Are Running the Asylum"},{"key":"ref15","first-page":"103","article-title":"An empirical investigation of color temperature and gender effects on web aesthetics","volume":"3","author":"coursaris","year":"2008","journal-title":"Journal of Usability Studies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-4774.2011.01015.x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00006-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1254960.1255019"},{"key":"ref19","first-page":"1209","author":"friess","year":"2012","journal-title":"Personas and decision making in the design process an ethnographic case study ACM CHI 2012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.06.004"},{"key":"ref3","first-page":"231","author":"beckwith","year":"2006","journal-title":"Tinkering and gender in end-user program-mers' debugging ACM CHI"},{"key":"ref6","author":"burnett","year":"2016","journal-title":"Finding gender-inclusiveness software issues with GenderMag A field investigation ACM CHI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852824"},{"key":"ref8","author":"cafferata","year":"1989","journal-title":"Gender Differences in Information Pro-cessing A Selectivity Interpretation Cognitive and Affective Responses to Advertising"},{"key":"ref7","author":"burnett","year":"0","journal-title":"Gender Mag A method for evaluating soft-ware's gender inclusiveness Interacting with Computers in press"},{"key":"ref49","first-page":"353","author":"spencer","year":"2000","journal-title":"The streamlined cognitive walkthrough method working around social constraints encountered in a software development com-pany ACM CHI"},{"key":"ref9","first-page":"149","author":"cao","year":"2010","journal-title":"A debugging perspective on end-user mashup program-ming IEEE VL\/HCC"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/506740.506744"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc0903_2"},{"key":"ref48","article-title":"The Encyclopedia of Human-Computer Interaction","author":"soegaard","year":"2014","journal-title":"Personas the Interaction Design Foundation"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.009"},{"key":"ref42","first-page":"397","article-title":"Are there neural gender differences in online trust","volume":"34","author":"riedl","year":"2010","journal-title":"An fMRI study on the perceived trustworthiness of E-Bay offers MIS Quarterly"},{"key":"ref41","first-page":"1","article-title":"Personas:practice and theory","author":"pruitt","year":"2003","journal-title":"ACM Conf Designing for UX"},{"key":"ref44","first-page":"304","article-title":"Analysing interaction problems with cyclic interaction theory: low-level interaction walkthrough","volume":"2","author":"ryu","year":"2004","journal-title":"PsychNology Journal"},{"key":"ref43","first-page":"419","author":"rosner","year":"2009","journal-title":"Learning from IKEA hacking I'm not one to decoupage a tabletop and call it a day ACM CHI"}],"event":{"name":"2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","location":"Cambridge, United Kingdom","start":{"date-parts":[[2016,9,4]]},"end":{"date-parts":[[2016,9,8]]}},"container-title":["2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7602835\/7739650\/07739685.pdf?arnumber=7739685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:20:24Z","timestamp":1498346424000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7739685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2016.7739685","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}