{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:23Z","timestamp":1750306943652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T00:00:00Z","timestamp":1369872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,30]]},"DOI":"10.1145\/2487294.2487304","type":"proceedings-article","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T12:34:01Z","timestamp":1369139641000},"page":"45-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A structured review of IS research on gender and IT"],"prefix":"10.1145","author":[{"given":"Mike","family":"Gallivan","sequence":"first","affiliation":[{"name":"Georgia State University, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"261","article-title":"ethics in a different voice,?","volume":"235","author":"Adam A.","year":"2001","journal-title":"Information and Organization"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/02683960210145959"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010012313068"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000631"},{"key":"e_1_3_2_1_5_1","first-page":"94","article-title":"?Guest Editorial: Special issue on gender and information systems,?","volume":"15","author":"Adam A.","year":"2002","journal-title":"Information Technology & People"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-005X.2004.00139.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840510615860"},{"key":"e_1_3_2_1_8_1","first-page":"34","volume":"20","author":"Ahuja M.","year":"2002","journal-title":"European Journal of Information Systems"},{"volume-title":"Jossey-Bass","year":"1974","author":"Argyris C.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1994.11518055"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(98)00091-3"},{"key":"e_1_3_2_1_12_1","first-page":"27","article-title":"?The identity crisis within the IS discipline,?","author":"Benbasat I.","year":"2003","journal-title":"MIS Quarterly"},{"volume-title":"Proceedings of PACIS conference","year":"2008","author":"Chan K.Y.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00414.x"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506417"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/374308.374367"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978542.1978561"},{"volume-title":"Proceedings of AMCIS conference","year":"2009","author":"Creamer E.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132472"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/122393.122395"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"7","article-title":"?Gender and IT: implications of definitions,?","volume":"13","author":"Cukier W.","year":"2003","journal-title":"Journal of IS Education"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2009.03.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000667"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840810881079"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.3.233"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066149.1066156"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240601057254"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518141"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903932"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355238.1355247"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.30"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/17.865903"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22704"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2008.00294.x"},{"volume-title":"Proceedings of PACIS Conference","year":"2010","author":"Hu S.","key":"e_1_3_2_1_35_1"},{"volume-title":"AMCIS Conference","year":"2010","author":"Hwang Y.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/47.988359"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000023"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.40"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00872327"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.28"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01632"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1990.9960088"},{"key":"e_1_3_2_1_44_1","first-page":"186","article-title":"bodies in virtual space: the rhetoric of avatar design,?","volume":"177","author":"Kolko B.","year":"1998","journal-title":"Information Society"},{"volume-title":"New York: Roxbury Press","year":"2005","author":"Kramer L.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/285070.285084"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-006-9179-1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840610689813"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185335.1185342"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593841211254330"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/371209.371235"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000709"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840810896046"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/47.807966"},{"volume-title":"Australasian Conference on Information Systems","year":"2008","author":"Masrom M.","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240601057213"},{"key":"e_1_3_2_1_57_1","first-page":"64","article-title":"?Information technology ethics: a research framework,?","volume":"6","author":"McCarthy R.V.","year":"2005","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_58_1","first-page":"10","article-title":"?The work experiences of professional men and women who telecommute,?","author":"McCloskey D.","year":"1998","journal-title":"Journal of End User Computing"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/126524.126528"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/158011.158117"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593841011022528"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:12%3C1115::AID-ASI7%3E3.0.CO;2-Y"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017284.2017294"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2007.902656"},{"volume-title":"Proceedings of 1st Working Conference on Women, Work and Computerization, North-Holland","year":"1984","author":"Olerup A.","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118185"},{"key":"e_1_3_2_1_67_1","first-page":"24","article-title":"?Persuasive technology to shape social beliefs: a case of health IS for rural women in India,?","author":"Parmar V.","year":"2009","journal-title":"Communications of the AIS"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.32"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323688.1323714"},{"key":"e_1_3_2_1_70_1","first-page":"276","article-title":"?Switching behavior of mobile users: do users? relational investments and demographics matter?,?","volume":"269","author":"Ranganathan C.","year":"2006","journal-title":"European Journal of Information Systems"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(97)00005-5"},{"key":"e_1_3_2_1_72_1","first-page":"35","article-title":"a feminist approach to IS research and using the ?thinking tools? provided by sociologist Pierre Bourdieu,?","volume":"26","author":"Richardson H.","year":"2009","journal-title":"Information Technology & People"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00413.x"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00098.x"},{"volume-title":"Proceedings of ECIS conference","year":"2009","author":"Saunders C.","key":"e_1_3_2_1_75_1"},{"volume-title":"Proceedings of ICIS Conference","year":"2011","author":"Schiller S.","key":"e_1_3_2_1_76_1"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.12"},{"key":"e_1_3_2_1_78_1","first-page":"22","article-title":"?E-learning and the digital divide: perpetuating cultural and socio-economic elitism in higher education,?","author":"Sims J.","year":"2008","journal-title":"Communications of AIS"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.3"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/158011.158242"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/982372.982392"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840210430552"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1796900.1796965"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2132176.2132184"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840610689859"},{"volume-title":"Proceedings of AMCIS","year":"2010","author":"Trauth E.M.","key":"e_1_3_2_1_86_1"},{"volume-title":"Proceedings of International Conference on Information Systems","year":"2006","author":"Trauth E.M.","key":"e_1_3_2_1_87_1"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.2307\/249761"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250981"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543071004613"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/379300.379310"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00412.x"},{"volume-title":"Proceedings of AMCIS","year":"2012","author":"Warren J.","key":"e_1_3_2_1_93_1"},{"key":"e_1_3_2_1_94_1","unstructured":"Webster J. and Watson R.T. ?Analyzing the past to prepare for the future ? MIS Quarterly 26 2002 viii-xxiii.   Webster J. and Watson R.T. ?Analyzing the past to prepare for the future ? MIS Quarterly 26 2002 viii-xxiii."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010053521802"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(96)00026-X"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840210430570"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jit.2000008"},{"key":"e_1_3_2_1_99_1","first-page":"598","article-title":"?Computer ethics: gender effects and employee Internet misuse,?","volume":"10","author":"Young K.S.","year":"2009","journal-title":"Issues in Information Systems"}],"event":{"name":"SIGMIS-CPR '13: 2013 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Cincinnati Ohio USA","acronym":"SIGMIS-CPR '13"},"container-title":["Proceedings of the 2013 annual conference on Computers and people research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487294.2487304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487294.2487304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:54Z","timestamp":1750235754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487294.2487304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,30]]},"references-count":99,"alternative-id":["10.1145\/2487294.2487304","10.1145\/2487294"],"URL":"https:\/\/doi.org\/10.1145\/2487294.2487304","relation":{},"subject":[],"published":{"date-parts":[[2013,5,30]]},"assertion":[{"value":"2013-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}