{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T09:00:05Z","timestamp":1775466005686,"version":"3.50.1"},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T00:00:00Z","timestamp":1479686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2016,11,21]]},"DOI":"10.1145\/2998500","type":"journal-article","created":{"date-parts":[[2016,11,22]],"date-time":"2016-11-22T19:49:22Z","timestamp":1479844162000},"page":"74-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Efforts to Make Computer Science More Inclusive of Women"],"prefix":"10.1145","volume":"7","author":[{"given":"Wendy M.","family":"DuBow","sequence":"first","affiliation":[{"name":"National Center for Women &amp; Information Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Beth A.","family":"Quinn","sequence":"additional","affiliation":[{"name":"National Center for Women &amp; Information Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gloria Childress","family":"Townsend","sequence":"additional","affiliation":[{"name":"ACM-W"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rosario","family":"Robinson","sequence":"additional","affiliation":[{"name":"Anita Borg Institute"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Valerie","family":"Barr","sequence":"additional","affiliation":[{"name":"ACM-W"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,11,21]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Cooperative Institutional Research Program","author":"Freshman The American","year":"2016"},{"key":"e_1_2_1_2_1","unstructured":"Anita Borg Institute; http:\/\/anitaborg.org\/ Accessed 2016 October 1.  Anita Borg Institute; http:\/\/anitaborg.org\/ Accessed 2016 October 1."},{"key":"e_1_2_1_3_1","unstructured":"Anita Borg Institute \"ABI.Local \" (October 2015); http:\/\/local.anitaborg.org\/. Accessed 2016 May 3.  Anita Borg Institute \"ABI.Local \" (October 2015); http:\/\/local.anitaborg.org\/. Accessed 2016 May 3."},{"key":"e_1_2_1_4_1","series-title":"March 2015","volume-title":"Building, Recruiting and Inclusion for Diversity,\"","author":"Anita Borg Institute","year":"2016"},{"key":"e_1_2_1_5_1","unstructured":"Anita Borg Institute \"GHC 2015 Impact Report \" (February 2016); http:\/\/ghc.anitaborg.org\/wp-content\/uploads\/sites\/2\/2016\/01\/2015-ghc-impact-report.pdf. Accessed 2016 May 3.  Anita Borg Institute \"GHC 2015 Impact Report \" (February 2016); http:\/\/ghc.anitaborg.org\/wp-content\/uploads\/sites\/2\/2016\/01\/2015-ghc-impact-report.pdf. Accessed 2016 May 3."},{"key":"e_1_2_1_6_1","unstructured":"Anita Borg Institute \"Systers \" (September 2013); http:\/\/systers.org\/. Accessed 2016 May 3.  Anita Borg Institute \"Systers \" (September 2013); http:\/\/systers.org\/. Accessed 2016 May 3."},{"key":"e_1_2_1_7_1","unstructured":"Anita Borg Institute \"Technical Executive Forum at GHC \" (October 2015); http:\/\/ghc.anitaborg.org\/technical-executive-forum\/. Accessed 2016 May 6.  Anita Borg Institute \"Technical Executive Forum at GHC \" (October 2015); http:\/\/ghc.anitaborg.org\/technical-executive-forum\/. Accessed 2016 May 6."},{"key":"e_1_2_1_8_1","unstructured":"Anita Borg Institute \"Top Company Leadership Index \" (September 2015); http:\/\/anitaborg.org\/awards-grants\/top-companies-for-women-technologists\/. Accessed 2016 May 6.  Anita Borg Institute \"Top Company Leadership Index \" (September 2015); http:\/\/anitaborg.org\/awards-grants\/top-companies-for-women-technologists\/. Accessed 2016 May 6."},{"key":"#cr-split#-e_1_2_1_9_1.1","unstructured":"Boese E. \"Using Programming to Analyze Real Human DNA files \" In EngageCSEdu (2016)"},{"key":"#cr-split#-e_1_2_1_9_1.2","unstructured":"https:\/\/www.engage-csedu.org\/find-resources\/using-programming-analyze-real-human-dna-files. Accessed 2016 June 2. Boese E. \"Using Programming to Analyze Real Human DNA files \" In EngageCSEdu (2016)"},{"key":"#cr-split#-e_1_2_1_9_1.3","unstructured":"https:\/\/www.engage-csedu.org\/find-resources\/using-programming-analyze-real-human-dna-files. Accessed 2016 June 2."},{"key":"e_1_2_1_10_1","unstructured":"EngageCSEdu; https:\/\/www.engage-csedu.org\/. Accessed 2016 June 2.  EngageCSEdu; https:\/\/www.engage-csedu.org\/. Accessed 2016 June 2."},{"key":"e_1_2_1_11_1","unstructured":"EngageCSEdu \"EngageCSEdu Engagement Practices Framework;\" https:\/\/www.engage-csedu.org\/engagement\/make-it-matter. Accessed 2016 June 2.  EngageCSEdu \"EngageCSEdu Engagement Practices Framework;\" https:\/\/www.engage-csedu.org\/engagement\/make-it-matter. Accessed 2016 June 2."},{"key":"#cr-split#-e_1_2_1_12_1.1","unstructured":"Kussmaul C. \"Searching in Hi-Lo - CS1 First Day on Algorithm Design & Analysis \" In EngageCSEdu (2016)"},{"key":"#cr-split#-e_1_2_1_12_1.2","unstructured":"https:\/\/www.engage-csedu.org\/find-resources\/searching-hi-lo-cs1-first-day-algorithm-design-analysis. Accessed 2016 June 2. Kussmaul C. \"Searching in Hi-Lo - CS1 First Day on Algorithm Design & Analysis \" In EngageCSEdu (2016)"},{"key":"#cr-split#-e_1_2_1_12_1.3","unstructured":"https:\/\/www.engage-csedu.org\/find-resources\/searching-hi-lo-cs1-first-day-algorithm-design-analysis. Accessed 2016 June 2."},{"key":"e_1_2_1_13_1","volume-title":"Integrated Postsecondary Education Data System","author":"National Center for Education Statistics","year":"2016"},{"key":"e_1_2_1_14_1","unstructured":"National Center for Women & Information Technology \"By the Numbers;\" www.ncwit.org\/bythenumbers. Accessed 2016 August 3.  National Center for Women & Information Technology \"By the Numbers;\" www.ncwit.org\/bythenumbers. Accessed 2016 August 3."},{"key":"e_1_2_1_15_1","unstructured":"National Center for Women & Information Technology \"Computing: Get the Most Out of Your College Degree;\" www.ncwit.org\/csqualityoflife. Accessed 2016 August 3.  National Center for Women & Information Technology \"Computing: Get the Most Out of Your College Degree;\" www.ncwit.org\/csqualityoflife. Accessed 2016 August 3."},{"key":"e_1_2_1_16_1","unstructured":"National Center for Women & Information Technology \"How Can Encouragement Increase Persistence in Computing?\"; www.ncwit.org\/academicencouragement. Accessed 2016 June 2.  National Center for Women & Information Technology \"How Can Encouragement Increase Persistence in Computing?\"; www.ncwit.org\/academicencouragement. Accessed 2016 June 2."},{"key":"e_1_2_1_17_1","unstructured":"National Center for Women & Information Technology \"How Do You Retain Women through Collaborative Learning?\"; www.ncwit.org\/pltl. Accessed 2016 June 2.  National Center for Women & Information Technology \"How Do You Retain Women through Collaborative Learning?\"; www.ncwit.org\/pltl. Accessed 2016 June 2."},{"key":"e_1_2_1_18_1","unstructured":"National Center for Women & Information Technology \"NCWIT Tips: 8 Ways to Give Students More Effective Feedback Using a Growth Mindset;\" www.ncwit.org\/feedbackstudent. Accessed 2016 June 2.  National Center for Women & Information Technology \"NCWIT Tips: 8 Ways to Give Students More Effective Feedback Using a Growth Mindset;\" www.ncwit.org\/feedbackstudent. Accessed 2016 June 2."},{"key":"e_1_2_1_19_1","unstructured":"National Center for Women & Information Technology \"Talk with Faculty Colleagues About Stereotype Threat;\" https:\/\/www.ncwit.org\/resources\/talk-faculty-colleagues-about-stereotype-threat\/talk-faculty-colleagues-about-stereotype. Accessed 2016 June 2.  National Center for Women & Information Technology \"Talk with Faculty Colleagues About Stereotype Threat;\" https:\/\/www.ncwit.org\/resources\/talk-faculty-colleagues-about-stereotype-threat\/talk-faculty-colleagues-about-stereotype. Accessed 2016 June 2."},{"key":"e_1_2_1_20_1","unstructured":"Sweet K. \"We're Not Second Class Students.\" (December 2015); https:\/\/medium.com\/perspectives-from-abi\/guest-post-community-college-we-re-not-second-class-students-798f9eeeba48#.x1dgfwyvi. Accessed 2016 May 6.  Sweet K. \"We're Not Second Class Students.\" (December 2015); https:\/\/medium.com\/perspectives-from-abi\/guest-post-community-college-we-re-not-second-class-students-798f9eeeba48#.x1dgfwyvi. Accessed 2016 May 6."}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2998500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:35Z","timestamp":1750218635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,21]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11,21]]}},"alternative-id":["10.1145\/2998500"],"URL":"https:\/\/doi.org\/10.1145\/2998500","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"value":"2153-2184","type":"print"},{"value":"2153-2192","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,21]]},"assertion":[{"value":"2016-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}