{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:06Z","timestamp":1775199546457,"version":"3.50.1"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T00:00:00Z","timestamp":1465430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2016,10,13]]},"abstract":"<jats:p>A lack of diversity in the computing field has existed for several decades, and although female participation in computing remains low, outreach programs attempting to address the situation are now quite numerous. To begin to understand whether or not these past activities have had long-term impact, we conducted a systematic literature review. Upon discovering that longitudinal studies were lacking, we investigated whether undergraduate students believed that their participation in computing activities prior to college contributed to their decision to major in a computing field. From the 770 participants in the study, we discovered that approximately 20% of males and 24% of females who were required to participate in computing activities chose a computing or related major, but that males perceived that the activity had a greater affect on their decision (20%) than females (6.9%). Females who participated in an outreach activity were more likely to major in computing. Compared with females who chose to major in computing, females who did not were less likely to indicate that the majority of students participating in activities were boys and that they were a welcome part of the groups. Results also showed that female participants who do not ultimately major in computing have a much stronger negative perception of the outreach activities than male participants who also chose a non-computing major. Although many computing outreach activities are designed to diversify computing, it may be the case that, overall, boys receive these activities more favorably than girls, although requiring participation yields approximately the same net positive impact.<\/jats:p>","DOI":"10.1145\/2920214","type":"journal-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:54:00Z","timestamp":1465566840000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Undergraduate Students\u2019 Perceptions of the Impact of Pre-College Computing Activities on Choices of Major"],"prefix":"10.1145","volume":"16","author":[{"given":"Monica M.","family":"McGill","sequence":"first","affiliation":[{"name":"Bradley University, IL, USA"}]},{"given":"Adrienne","family":"Decker","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, NY, USA"}]},{"given":"Amber","family":"Settle","sequence":"additional","affiliation":[{"name":"DePaul University, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,6,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Retrieved","author":"W.","year":"2015"},{"key":"e_1_2_1_2_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_1_3_1","article-title":"In a more balanced computer science environment, similarity is the difference and computer science is the winner","author":"Blum Lenore","year":"2005","journal-title":"Computing Research News. Retrieved"},{"key":"e_1_2_1_4_1","volume-title":"TechCrunch. Retrieved","author":"Buhr Sarah","year":"2014"},{"key":"e_1_2_1_5_1","unstructured":"D. Campbell and J. Stanley. 1963. Experimental and Quasi-Experimental Designs for Research. Rand-McNally Chicago IL.  D. Campbell and J. Stanley. 1963. Experimental and Quasi-Experimental Designs for Research. Rand-McNally Chicago IL."},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"Eu Code Week","year":"2015"},{"key":"e_1_2_1_8_1","volume-title":"Passion for Social Justice and Technology. Retrieved","year":"2015"},{"key":"e_1_2_1_9_1","volume-title":"Educational Research: Planning, Conducting, and Evaluating Quantitative and Qualitative Research. Pearson Education","author":"Creswell J. W.","year":"2008"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037276.2037279"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037276.2037282"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2010.5673333"},{"key":"e_1_2_1_13_1","volume-title":"Retrieved","author":"Science Exploring Computer","year":"2015"},{"key":"e_1_2_1_14_1","volume-title":"Retrieved","author":"European Commission","year":"2014"},{"key":"e_1_2_1_15_1","volume-title":"Washington Post. Retrieved","author":"Feltman Rachel","year":"2015"},{"key":"e_1_2_1_16_1","volume-title":"Williams Institute. Retrieved","author":"Gates Gary J.","year":"2011"},{"key":"e_1_2_1_17_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2361276.2361304"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602488"},{"key":"e_1_2_1_20_1","volume-title":"IT World. Retrieved","author":"Johnson Phil","year":"2015"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/014107680309600304"},{"key":"e_1_2_1_22_1","volume-title":"Forbes. Retrieved","author":"Klawe Maria","year":"2015"},{"key":"e_1_2_1_23_1","volume-title":"Retrieved","author":"Larson Selena","year":"2014"},{"key":"e_1_2_1_24_1","unstructured":"Carrie Liston Karen Peterson and Vicky Ragan. 2008. Evaluating Promising Practices in Informal Information Technology (IT) Education for Girls. Phase III: Women in IT\u2014Survey Results. Available at https:\/\/www.ncwit.org\/sites\/default\/files\/resources\/ncwit-gsusaphaseiiireport_final.pdf.  Carrie Liston Karen Peterson and Vicky Ragan. 2008. Evaluating Promising Practices in Informal Information Technology (IT) Education for Girls. Phase III: Women in IT\u2014Survey Results. Available at https:\/\/www.ncwit.org\/sites\/default\/files\/resources\/ncwit-gsusaphaseiiireport_final.pdf."},{"key":"e_1_2_1_25_1","volume-title":"Pew Research Center. Retrieved","author":"Lopez Mark Hugo","year":"2014"},{"key":"e_1_2_1_26_1","unstructured":"Jane Margolis. 2008. Stuck in the Shallow End. MIT Press Cambridge MA.   Jane Margolis. 2008. Stuck in the Shallow End. MIT Press Cambridge MA."},{"key":"e_1_2_1_27_1","unstructured":"Elizabeth Martin. 2006. Survey Questionnaire Construction. Research Report Series (Survey Methodology #2006-13). Available at https:\/\/www.census.gov\/srd\/papers\/pdf\/rsm2006-13.pdf.  Elizabeth Martin. 2006. Survey Questionnaire Construction. Research Report Series (Survey Methodology #2006-13). Available at https:\/\/www.census.gov\/srd\/papers\/pdf\/rsm2006-13.pdf."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787711"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714569"},{"key":"e_1_2_1_30_1","volume-title":"TechCrunch. Retrieved","author":"Miller Alison Derbenwick","year":"2014"},{"key":"e_1_2_1_31_1","volume-title":"Retrieved","author":"National Center for Women and Information Technology.","year":"2015"},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","author":"National Public Radio.","year":"2014"},{"key":"e_1_2_1_33_1","volume-title":"Retrieved","author":"National Science Foundation.","year":"2011"},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"National Science Foundation.","year":"2013"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024232915870"},{"key":"e_1_2_1_36_1","volume-title":"Anita Borg Institute for Women and Technology. Retrieved","author":"Simard C.","year":"2016"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742611"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"S. Wellek. 2002. Testing Statistical Hypotheses of Equivalence. Chapman & Hall London England.  S. Wellek. 2002. Testing Statistical Hypotheses of Equivalence. Chapman & Hall London England.","DOI":"10.1201\/9781420035964"},{"key":"e_1_2_1_39_1","volume-title":"Office for Research Development and Education. Retrieved","author":"Wessa P.","year":"2014"}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2920214","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2920214","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:54Z","timestamp":1750222554000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2920214"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,9]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10,13]]}},"alternative-id":["10.1145\/2920214"],"URL":"https:\/\/doi.org\/10.1145\/2920214","relation":{},"ISSN":["1946-6226"],"issn-type":[{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,9]]},"assertion":[{"value":"2015-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}