{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:55:03Z","timestamp":1756000503404,"version":"3.28.0"},"reference-count":60,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/vlhcc.2018.8506514","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:44:51Z","timestamp":1540511091000},"page":"23-32","source":"Crossref","is-referenced-by-count":7,"title":["Semi-Automating (or not) a Socio-Technical Method for Socio-Technical Systems"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Mendez","sequence":"first","affiliation":[]},{"given":"Zoe Steine","family":"Hanson","sequence":"additional","affiliation":[]},{"given":"Alannah","family":"Oleson","sequence":"additional","affiliation":[]},{"given":"Amber","family":"Horvath","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Hilderbrand","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Sarma","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40548-3_20"},{"journal-title":"Unlocking the Clubhouse Women in Computing","year":"2003","author":"margolis","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125622"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025609"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2016.7739685"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781409"},{"key":"ref36","first-page":"5","article-title":"Barriers to programming engagement","volume":"1","author":"kelleher","year":"2009","journal-title":"Advances in Gender and Education"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208344"},{"journal-title":"Two case studies in using cognitive walkthrough for interface evaluation (No CMU-CS-00-132)","year":"2000","author":"jacobsen","key":"ref34"},{"key":"ref60","first-page":"105","article-title":"The cognitive walkthrough method: A practitioner's guide","author":"wharton","year":"1994","journal-title":"Usability Inspection Methods"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","article-title":"Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research","volume":"52","author":"hart","year":"1988","journal-title":"Advances in Psychology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10798-014-9274-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903933"},{"journal-title":"The Essential Persona Lifecycle Your Guide to Building and Using Personas","year":"2010","author":"adlin","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.04.023"},{"key":"ref20","first-page":"103","article-title":"An empirical investigation of color temperature and gender effects on web aesthetics","volume":"3","author":"coursaris","year":"2008","journal-title":"J Usability Studies"},{"key":"ref22","first-page":"10","article-title":"USEFul: A framework to mainstream web site usability thorugh automated evaluation","volume":"2","author":"dingli","year":"2011","journal-title":"International Journal of Human-Computer Interaction"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-319-49304-6_6","article-title":"Supporting gender-neutral digital library creation: A case study using the GenderMag Toolkit","author":"cunningham","year":"2016","journal-title":"Digital Libraries Knowledge Information and Data in an Open Access Society"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00006-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-4774.2011.01015.x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466421"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208572"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108986"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518768"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.414"},{"key":"ref58","first-page":"353","article-title":"The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company","author":"spencer","year":"2000","journal-title":"ACM CHI"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.009"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/506740.506744","article-title":"The impact of culture and gender on web sites: An empirical study","volume":"32","author":"simon","year":"2001","journal-title":"The DATA BASE for Advances in Information Systems"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/3196839.3196869","article-title":"Cognitive Walkthrough of a learning management system with gendered personas","author":"shekhar","year":"2018","journal-title":"4th Gender & IT Conference (GenderIT'18)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc0903_2"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1177\/0956797612439070"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852824"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858274"},{"journal-title":"Open Source barriers to entry revisited A sociotechnical perspective","year":"2018","author":"mendez","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwv046"},{"journal-title":"The GenderMag Kit How to Use the GenderMag Method to Find Usability Issues through a Gender Lens","year":"0","author":"burnett","key":"ref13"},{"key":"ref14","article-title":"Gender differences in information processing: a selectivity interpretation","author":"cafferata","year":"1989","journal-title":"Cognitive and Affective Responses to Advertising"},{"key":"ref15","first-page":"149","author":"cao","year":"2010","journal-title":"A debugging perspective on end-user mashup programming"},{"key":"ref16","first-page":"402","article-title":"Genderizing HCI","author":"cassell","year":"2002","journal-title":"The Hand-book of Human-Computer Interaction"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531660"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"journal-title":"The Inmates Are Running the Asylum","year":"2004","author":"cooper","key":"ref19"},{"key":"ref4","first-page":"869","article-title":"Effectiveness of end-user debugging software features: Are there gender issues?","author":"beckwith","year":"2005","journal-title":"ACM CHI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/503457.503459"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124808"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.06.004"},{"key":"ref7","article-title":"Automated Cognitive Walkthrough for the Web (AutoCWW)","author":"blackmon","year":"2002","journal-title":"ACM CHI Workshop Automatically Evaluating the Usability of Web Sites"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.2307\/20721434"},{"key":"ref9","first-page":"139","article-title":"Gender HCI and Microsoft: Highlights from a longitudinal study","author":"burnett","year":"2017","journal-title":"IEEE VLHCC"},{"journal-title":"STEM confidence gap","year":"2015","key":"ref46"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1145\/1180639.1180831","article-title":"Human-centered design meets cognitive load theory: Designing interfaces that help people think","author":"oviatt","year":"2006","journal-title":"14th ACM Int Conference on Multimedia"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/997078.997089"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00076512"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1086\/209241"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2014.06.003"},{"key":"ref44","first-page":"65","article-title":"The influence of professional identification on the retention of women and racial minorities in the IT workforce","author":"o'leary-kelly","year":"2004","journal-title":"NSF Info Tech Workforce & Info Tech Res PI Conf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191729"}],"event":{"name":"2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2018,10,1]]},"location":"Lisbon","end":{"date-parts":[[2018,10,4]]}},"container-title":["2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488603\/8506479\/08506514.pdf?arnumber=8506514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:06:27Z","timestamp":1643231187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2018.8506514","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}