{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:06:16Z","timestamp":1766732776333,"version":"3.28.0"},"reference-count":109,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/vlhcc.2019.8818790","type":"proceedings-article","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:12:54Z","timestamp":1568923974000},"page":"75-85","source":"Crossref","is-referenced-by-count":33,"title":["Remote Pair Programming in Online CS Education: Investigating through a Gender Lens"],"prefix":"10.1109","author":[{"given":"Sandeep","family":"Kaur Kuttal","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Gerstner","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Bejarano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/02632769922050520"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.937460"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3991\/ijep.v9i2.9947"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.10.003"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2008.82"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/3-540-45672-4_20","article-title":"Exploring the efficacy of distributed pair programming","author":"baheti","year":"2002","journal-title":"Proceedings of the Second XP Universe and First Agile Universe Conference on Extreme Programming and Agile Methods - XP\/Agile Universe 2002"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.07.017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287380"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287432"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.02.011","article-title":"Distributed pair programming","volume":"63","author":"da silva est\u00e1cio","year":"2015","journal-title":"Inf Softw Technol"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/ICSE.2005.1553598","article-title":"Global software development at siemens: experience from nine projects","author":"herbsleb","year":"2005","journal-title":"Proceedings 27th International Conference on Software Engineering 2005 ICSE 2005"},{"journal-title":"Global Software Development","year":"2001","author":"herbsleb","key":"ref27"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/TSE.2002.1019481","article-title":"Rapid software development through team collocation","volume":"28","author":"teasley","year":"2002","journal-title":"IEEE Trans Softw Eng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201243"},{"key":"ref22","first-page":"11","volume":"9","author":"han","year":"2006","journal-title":"The effects of pair programming on achievement and motivated strategies in programming course"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145293"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844558"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017748"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1002\/spip.182","article-title":"Global software development: growing opportunities, ongoing challenges","volume":"8","author":"damian","year":"2003","journal-title":"Software Process Improvement and Practice"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180241"},{"key":"ref25","article-title":"Pair-programming helps female computer science students","volume":"4","author":"werner","year":"0","journal-title":"J Educ Resour Comput"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/0003122414524207"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.63.1.133"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1177\/0146167213493643"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1037\/11863-002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.108.2.233"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.109.3.573"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.60.5.685"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1471-6402.1993.tb00491.x"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/99977.99987"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/0891243287001002002"},{"key":"ref4","first-page":"223","author":"cockburn","year":"2001","journal-title":"Extreme Programming Examined"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.158"},{"journal-title":"Knowledge management through pair programming","year":"2002","author":"palmieri","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1076\/csed.12.3.197.8618"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159516"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.17"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2012.00974.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.87"},{"year":"0","key":"ref46"},{"year":"2019","key":"ref45"},{"key":"ref48","first-page":"547","article-title":"Etude de la distribution florale dans une portion des alpes et du jura","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"journal-title":"Study Material","year":"0","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"journal-title":"Using the &#x201C;thinking aloud&#x201D; method in cognitive interface design RC 9265","year":"1982","author":"lewis","key":"ref41"},{"year":"2019","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/52.854064"},{"journal-title":"Non-Verbal Communication in Human Interaction","year":"0","author":"knapp","key":"ref73"},{"key":"ref72","first-page":"69","volume":"38","author":"kraut","year":"1995","journal-title":"Coordination in software development Commun"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289514"},{"key":"ref70","volume":"31","author":"curtis","year":"1998","journal-title":"A Field Study of the Software design Process for Large Systems"},{"journal-title":"You Just Don t Understand Women and Men in Conversation","year":"1990","author":"tannen","key":"ref76"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.14481"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/BF01544758"},{"key":"ref75","article-title":"Men & women communicating in the workplace","author":"leigh","year":"2010","journal-title":"The Center for Healthcare Communications"},{"key":"ref78","article-title":"Gender differences in intimacy, emotional expressivity, and relationship satisfaction","volume":"4","author":"ubando","year":"0","journal-title":"Pepperdine Journal of Communication Research"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919083"},{"journal-title":"Impossible selves Image strategies and identity threat in professional women&#x2019;s career transitions by","year":"2007","author":"ibarra","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2013.0303"},{"key":"ref61","first-page":"1","article-title":"Who does she think she is? women, leadership and the b(ias) word","volume":"32","author":"kubu","year":"2017","journal-title":"The Clinical Neuropsychologist"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1037\/apl0000283"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/52.300082"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"178","DOI":"10.2307\/1556375","article-title":"Consequences of abusive supervision","volume":"43","author":"tepper","year":"2000","journal-title":"Academy of Management Journal"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.44.1.78"},{"key":"ref67","first-page":"231","article-title":"Women, men, and interruptions: A critical review","author":"james","year":"1998","journal-title":"Gender and Conversational Interaction"},{"key":"ref68","first-page":"1268","article-title":"West, sex roles, interruptions and silences in conversation","author":"zimmerman","year":"1988","journal-title":"Communications of the ACM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ADC.2005.37"},{"journal-title":"Meta-analyses of gender effects on conversational interruption Who what when where and how","year":"1988","author":"anderson","key":"ref69"},{"journal-title":"Diversity in computer science","year":"0","key":"ref1"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466213"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143468"},{"key":"ref108","first-page":"59","author":"kuttal","year":"2013","journal-title":"Predator Behavior in the Wild Web World of Bugs An Information Foraging Theory Perspective"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.11.009"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753431"},{"journal-title":"STEM confidence gap","year":"2005","key":"ref93"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781409"},{"journal-title":"Philadelphia The influence of professional identification on the retention of women and racial minorities in the it workforce","first-page":"65","year":"2004","key":"ref92"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/971258.971262"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/792548.611896","volume":"35","author":"fisher","year":"2003","journal-title":"Unlocking the clubhouse Women in computing SIGCSE Bull"},{"journal-title":"Gender","year":"0","key":"ref104"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903933"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwv046"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858274"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15714-1_15"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3196839.3196869"},{"key":"ref96","first-page":"171","author":"nutter","year":"2003","journal-title":"Historical awareness support and its evaluation in collaborative software engineering"},{"key":"ref97","first-page":"3","author":"olsson","year":"2006","journal-title":"Global Software Development Challenges A Case Study on Temporal Geographical and Socio-cultural Distance"},{"key":"ref10","first-page":"1","article-title":"A transition from partner programming to pair programming- an industrial case study","author":"gallis","year":"2002","journal-title":"Proceedings of Pair programming workshop in 17th annual ACM conference on Object-Oriented Programming Systems Languages and Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2009.2019121"},{"key":"ref12","first-page":"103","author":"jones","year":"2013","journal-title":"What use is a backseat driver? a qualitative investigation of pair programming"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538968"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/612005.612006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677289"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/Agile.2008.12"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00019-7"},{"journal-title":"Pair Programming Illuminated","year":"2002","author":"williams","key":"ref17"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.6.791"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787716"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/spip.378"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563353"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0028"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1998.11518185"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00006-7"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1145\/1054972.1055094","article-title":"Effectiveness of end-user debugging software features: Are there gender issues?","author":"beckwith","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124808"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852824"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.06.004"}],"event":{"name":"2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2019,10,14]]},"location":"Memphis, TN, USA","end":{"date-parts":[[2019,10,18]]}},"container-title":["2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8809324\/8818679\/08818790.pdf?arnumber=8818790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T14:21:14Z","timestamp":1695219674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8818790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2019.8818790","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}