{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:17:03Z","timestamp":1776104223128,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1314384,1528061,1559657, 1560526"],"award-info":[{"award-number":["1314384,1528061,1559657, 1560526"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180241","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:16:01Z","timestamp":1528805761000},"page":"1004-1015","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":100,"title":["Open source barriers to entry, revisited"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Mendez","sequence":"first","affiliation":[{"name":"Oregon State University"}]},{"given":"Hema Susmita","family":"Padala","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Zoe","family":"Steine-Hanson","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Claudia","family":"Hilderbrand","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Amber","family":"Horvath","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Charles","family":"Hill","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Logan","family":"Simpson","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Nupoor","family":"Patil","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Anita","family":"Sarma","sequence":"additional","affiliation":[{"name":"Oregon State University"}]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Ashcraft and W. Dubow. 2015. The Tricky (And Necessary) Business of Being A Male Advocate For Gender Equality. (May 2015). http:\/\/www.fastcompany.com\/3046555\/strong-femalelead\/the-tricky- and- necessary-business- of-being-amale-advocate-for-gender-equ"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"M. Burnett R. Counts R. Lawrence and H. Hanson. 2017. Gender HCI and Microsoft: Highlights from a Longitudinal Study (VL\/HCC2017).","DOI":"10.1109\/VLHCC.2017.8103461"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852824"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858274"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwv046"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.06.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2010.29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/772072.772100"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"A.-M. Cazan E. Cocorad\u0103 and C. I. Maican. 2016. Computer Anxiety and Attitudes Towards the Computer and the Internet with Romanian High-school and University Students. Comput. Hum. Behav. 55 PA (Feb. 2016) 258--267. 10.1016\/j.chb.2015.09.001","DOI":"10.1016\/j.chb.2015.09.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531660"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835567.2835569"},{"key":"e_1_3_2_1_13_1","volume-title":"Supporting Gender-Neutral Digital Library Creation: A Case Study Using the GenderMag Toolkit. In 18th International Conference on Asia-Pacific Digital Libraries, ICADL","author":"Cunningham S. J.","year":"2016","unstructured":"S. J. Cunningham, A. Hinze, and D. M. Nichols. 2016. Supporting Gender-Neutral Digital Library Creation: A Case Study Using the GenderMag Toolkit. In 18th International Conference on Asia-Pacific Digital Libraries, ICADL 2016, Atsuyuki Morishima, Andreas Rauber, and Chern Li Liew (Eds.). Springer International Publishing, 45--50."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806842"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.1995.10673467"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2008.10.001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-4774.2011.01015.x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/359640.359723"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/543812.543836"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D. Ford A. Harkins and C. Parnin. 2017. Someone Like Me: How Does Peer Parity Influence Participation of Women on Stack Overflow? (VL\/HCC2017).","DOI":"10.1109\/VLHCC.2017.8103473"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950331"},{"key":"e_1_3_2_1_23_1","volume-title":"Part IV: Survey of Developers.","author":"Ghosh R.","year":"2002","unstructured":"R. Ghosh, A. Glott, B. Krieger, and B. Robles. 2002. Free\/Libre and Open Source Software: Survey and Study (FLOSS), Final Report, Part IV: Survey of Developers. (2002)."},{"key":"e_1_3_2_1_24_1","volume-title":"Why Personas Work: The Psychological Evidence. (12","author":"Grudin J.","year":"2006","unstructured":"J. Grudin. 2006. Why Personas Work: The Psychological Evidence. (12 2006), 642--664 pages."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903933"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025609"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206307308587"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125622"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.012"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.264"},{"key":"e_1_3_2_1_31_1","first-page":"5","article-title":"Barriers to Programming Engagement","volume":"1","author":"Kelleher C.","year":"2009","unstructured":"C. Kelleher. 2009. Barriers to Programming Engagement. Advances in Gender andEducation 1 (2009), 5--10. http:\/\/www.mcrcad.org\/Web_Kelleher.pdf","journal-title":"Advances in Gender andEducation"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/0003122416653602"},{"key":"e_1_3_2_1_33_1","unstructured":"M. Lee. 2015. Teaching and Engaging with Debugging Puzzles. (2015)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447311003781409"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2014.06.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1086\/209241"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337209"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811422887"},{"key":"e_1_3_2_1_40_1","volume-title":"NSF Info. Tech. Workforce & Info. Tech. Res. PI Conf (NSF '04)","author":"O'Leary-Kelly A.","unstructured":"A. O'Leary-Kelly, B. Hardgrave, V McKinney, and D. Wilson. 2004. The influence of professional identification on the retention of women and racial minorities in the IT workforce. In NSF Info. Tech. Workforce & Info. Tech. Res. PI Conf (NSF '04). 65--69. https:\/\/www.nsf.gov\/cise\/cns\/cwardle\/itwf03.jsp"},{"key":"e_1_3_2_1_41_1","volume-title":"STEM confidence gap. (January","year":"2015","unstructured":"PiazzaBlog. 2015. STEM confidence gap. (January 2015). http:\/\/blog.piazza.com\/stem-confidence-gap\/"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428110375002"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017458.2017469"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597129"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518768"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983984"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/506740.506744"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","unstructured":"A. Singh V Bhadauria A. Jain and A. Gurung. 2013. Role of gender self-efficacy anxiety and testing formats in learning spreadsheets. 29 (05 2013) 739--746. 10.1016\/j.chb.2012.11.009","DOI":"10.1016\/j.chb.2012.11.009"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332456"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2014.9"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884806"},{"key":"e_1_3_2_1_54_1","volume-title":"2013 6th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). 25--32","author":"Steinmacher I.","unstructured":"I. Steinmacher, I. Wiese, A. P. Chaves, and M. A. Gerosa. 2013. Why do newcomers abandon open source software projects?. In 2013 6th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE). 25--32."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"J. Terrell A. Kofink J. Middleton C. Rainear E. Murphy-Hill and C. Parnin. 2016. Gender bias in open source: Pull request acceptance of women versus men. (Jan 2016).","DOI":"10.7287\/peerj.preprints.1733v1"},{"key":"e_1_3_2_1_56_1","volume-title":"The Second Self: Computers and the Human Spirit","author":"Turkle S.","unstructured":"S. Turkle. 2005. The Second Self: Computers and the Human Spirit. Simon & Schuster, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702549"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(03)00050-7"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.414"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"C. Wharton J. Rieman C. Lewis and P. Polson. 1994. The Cognitive Walkthrough Method: A Practitioner's Guide. In Usability Inspection Methods Jakob Nielsen and Robert L. Mack (Eds.). John Wiley & Sons Inc. New York NY USA 105--140. http:\/\/dl.acm.org\/citation.cfm?id=189200.189214","DOI":"10.5555\/189200.189214"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/330775"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337284"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180241","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:29Z","timestamp":1750210769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180241"}},"subtitle":["a sociotechnical perspective"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":62,"alternative-id":["10.1145\/3180155.3180241","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180241","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}