{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:03:39Z","timestamp":1776110619461,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":61,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3196839.3196845","type":"proceedings-article","created":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T12:00:49Z","timestamp":1525176049000},"page":"79-90","source":"Crossref","is-referenced-by-count":43,"title":["Putting the gender back in digital housekeeping"],"prefix":"10.1145","author":[{"given":"Jennifer A.","family":"Rode","sequence":"first","affiliation":[{"name":"UCL Institute of Education, London, United Kingdom"}]},{"given":"Erika Shehan","family":"Poole","sequence":"additional","affiliation":[{"name":"Pennsylvania State University"}]}],"member":"320","reference":[{"key":"key-10.1145\/3196839.3196845-1","doi-asserted-by":"crossref","unstructured":"Linda Alcoff. 1988. Cultural Feminism Versus Post-Structualism: The Indentity Crisis in Feminist Theory.Signs13, 3, 405--436.","DOI":"10.1086\/494426"},{"key":"key-10.1145\/3196839.3196845-2","doi-asserted-by":"crossref","unstructured":"Shaowen Bardzell and Jeffrey Bardzell. 2011. Towards a Feminist Hci Methodology: Social Science, Feminism, and Hci. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Vancouver, BC, Canada, 675--684.","DOI":"10.1145\/1978942.1979041"},{"key":"key-10.1145\/3196839.3196845-3","unstructured":"Shaowen Bardzell, Shad Gross, Jeffrey Wain, Austin Toombs and Jeffrey Bardzell. 2011. The Significant Screwdriver: Care, Domestic Masculinity, and Interaction Design. InProceedings of Proceedings of the 25th BCS Conference on Human-Computer Interaction.British Computer Society, Newcastle-upon-Tyne, United Kingdom, 371--377."},{"key":"key-10.1145\/3196839.3196845-4","doi-asserted-by":"crossref","unstructured":"Louise Barkhuus and Jennifer A. Rode. 2007. From Mice to Men - 24 Years of Evaluation in Chi. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, San Jose, California, USA.","DOI":"10.1145\/1240624.2180963"},{"key":"key-10.1145\/3196839.3196845-5","doi-asserted-by":"crossref","unstructured":"L. Beckwith, C. Kissinger, M. Burnett, S. Widenbeck, J. Lawrance, A. Blackwell, and C. Cook Year. Tinkering and Gender in End-User Programmers\/Debugging. InProceedings of Proceedings of the SIGCHI conference on Human Factors in computing systems (CHI '06).ACM Press, 231--240.","DOI":"10.1145\/1124772.1124808"},{"key":"key-10.1145\/3196839.3196845-6","doi-asserted-by":"crossref","unstructured":"Anne-Jorunn Berg, and Merete Lie. 1995. Feminism and Constructivism: Do Artifacts Have Gender?Science, Technology and Human Values20, 3, 332--351.","DOI":"10.1177\/016224399502000304"},{"key":"key-10.1145\/3196839.3196845-7","doi-asserted-by":"crossref","unstructured":"H. Beyer, &#38; Holtzblatt, K. 1997Contextual Design: Defining Customer-Centered Systems.Morgan Kaufmann., San Francisco, CA.","DOI":"10.1145\/1120212.1120334"},{"key":"key-10.1145\/3196839.3196845-8","unstructured":"W. E. Bijker. 1992. The Social Construction of FluorescentLighting, or How an Artifact Was Invented in Its Diffusion Stage InShaping Technology\/Building Society: Studies in Sociotechnical Change, MIT Press, Cambridge, MA:, 75--104."},{"key":"key-10.1145\/3196839.3196845-9","unstructured":"Judith Butler. 2006.Gender Trouble.(3rd). Routeledge, New York."},{"key":"key-10.1145\/3196839.3196845-10","doi-asserted-by":"crossref","unstructured":"Marshini Chetty, Richard Banks, Richard Harper, Tim Regan, Abigail Sellen, Christos Gkantsidis, Thomas Karagiannis and Peter Key. 2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Atlanta, Georgia, USA, 659--668.","DOI":"10.1145\/1753326.1753423"},{"key":"key-10.1145\/3196839.3196845-11","doi-asserted-by":"crossref","unstructured":"C. Cockburn. 1992. The Circuit of Technology: Gender, Identity and Power. InInformation and Communication Technologies in the Home., Routledge, New York.","DOI":"10.4324\/9780203401491_chapter_2"},{"key":"key-10.1145\/3196839.3196845-12","doi-asserted-by":"crossref","unstructured":"H. G. Corneliussen. 2012.Gender-Technology Relations: Exploring Stability and Change.. Palgrave P., New York, New York: .","DOI":"10.1057\/9780230354623"},{"key":"key-10.1145\/3196839.3196845-13","doi-asserted-by":"crossref","unstructured":"Andy Crabtree and Tom Rodden. 2004. Domestic Routines and Design for the Home.Comput. Supported Coop. Work13, 2, 191--220.","DOI":"10.1023\/B:COSU.0000045712.26840.a4"},{"key":"key-10.1145\/3196839.3196845-14","doi-asserted-by":"crossref","unstructured":"Kristen Day. 2001. Constructing Masculinity and Women's Fear in Public Space in Irvine, California.Gender, Place and Culture8, 2, 109--127.","DOI":"10.1080\/09663690120050742"},{"key":"key-10.1145\/3196839.3196845-15","doi-asserted-by":"crossref","unstructured":"Jill P. Dimond, Casey Fiesler and Amy S. Bruckman. 2011. Domestic Violence and Information Communication Technologies.Interact. Comput.23, 5, 413--421.","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"key-10.1145\/3196839.3196845-16","doi-asserted-by":"crossref","unstructured":"N. Ensmenger. 2010. . Making Programming Masculine. InIn Gender Codes., T. J. Misa Ed. John Wiley &#38; Sons, Inc., Hoboken, NJ:.","DOI":"10.1002\/9780470619926.ch6"},{"key":"key-10.1145\/3196839.3196845-17","doi-asserted-by":"crossref","unstructured":"W. Faulkner. 2001. The Technology Question in Feminism: A View from Feminist Technology Studies.Women's Studies International Forum24, 1, 79--95.","DOI":"10.1016\/S0277-5395(00)00166-7"},{"key":"key-10.1145\/3196839.3196845-18","unstructured":"C.S. Fischer. 1992.America Calling: A Social History of the Telephone.U of CA Press, Berkeley, Berkeley, Ca."},{"key":"key-10.1145\/3196839.3196845-19","unstructured":"V. Frissen. 1985. Gender Is Calling: Uses of the Telephone. InThe Gender-Technology Relation; Contemporary Theory and Research., K. Grint, and Gill, R. Ed. Taylor and Francis,, London."},{"key":"key-10.1145\/3196839.3196845-20","doi-asserted-by":"crossref","unstructured":"A. Giddens. 1979.Central Problems in Social Theory: Action, Structure, and Contradiction in Social Analysis.. University of California Press., Berkeley and Los Angeles, CA.","DOI":"10.1007\/978-1-349-16161-4"},{"key":"key-10.1145\/3196839.3196845-21","doi-asserted-by":"crossref","unstructured":"Beki Grinter, Keith Edwards, Mark W. Newman, and Nicolas Ducheneaut. Year. The Work to Make a Home Network Work. InProceedings of Proceedings of the ninth conference on European Conference on Computer Supported Cooperative Work.469 -- 488.","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"key-10.1145\/3196839.3196845-22","doi-asserted-by":"crossref","unstructured":"Rebecca E. Grinter, W. Keith Edwards, Marshini Chetty, Erika S. Poole, Ja-Young Sung, Jeonghwa Yang, Andy Crabtree, Peter Tolmie, Tom Rodden, Chris Greenhalgh and Steve Benford. 2009. The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking.ACM Trans. Comput.-Hum. Interact.16, 2, 1--28.","DOI":"10.1145\/1534903.1534905"},{"key":"key-10.1145\/3196839.3196845-23","unstructured":"Sandra Harding. 1986.The Science Question in Feminism.Cornell U P, Ithaca, NY."},{"key":"key-10.1145\/3196839.3196845-24","doi-asserted-by":"crossref","unstructured":"Karen L. Henwood, Karen Anne Parkhill and Nick F. Pidgeon 2008. Science, Technology and Risk Perception: From Gender Differences to the Effects Made by Gender.Equal Opportunities International27, 8, 662--676. http:\/\/dx.doi.org\/","DOI":"10.1108\/02610150810916730"},{"key":"key-10.1145\/3196839.3196845-25","doi-asserted-by":"crossref","unstructured":"Chuck Huff. 2002. Gender, Software Design, and Occupational Equity.SIGCSE34, 2, 112--115.","DOI":"10.1145\/543812.543842"},{"key":"key-10.1145\/3196839.3196845-26","doi-asserted-by":"crossref","unstructured":"Tejinder K. Judge and Carman Neustaedter. 2010. Sharing Conversation and Sharing Life: Video Conferencing in the Home. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Atlanta, Georgia, USA, 655--658.","DOI":"10.1145\/1753326.1753422"},{"key":"key-10.1145\/3196839.3196845-27","doi-asserted-by":"crossref","unstructured":"Tejinder K. Judge, Carman Neustaedter, Steve Harrison and Andrew Blose. 2011. Family Portals: Connecting Families through a Multifamily Media Space. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Vancouver, BC, Canada, 1205--1214.","DOI":"10.1145\/1978942.1979122"},{"key":"key-10.1145\/3196839.3196845-28","doi-asserted-by":"crossref","unstructured":"Elin Kvande. 1999. 'In the Belly of the Beast;' Constructing Femininities in Engineering Organizations.The European Journal of Women's Studies6, 305--328.","DOI":"10.1177\/135050689900600304"},{"key":"key-10.1145\/3196839.3196845-29","doi-asserted-by":"crossref","unstructured":"C. Landstrom. 2007. Queering Feminist Technology Studies.Feminist Theory8, 1, 7--26.","DOI":"10.1177\/1464700107074193"},{"key":"key-10.1145\/3196839.3196845-30","doi-asserted-by":"crossref","unstructured":"S Livingstone. 1992. The Meaning of Domestic Technologies: A Personal Construct Analysis of Familial Gender Relations. InInformation and Communication Technologies in the Home., Routledge, New York.","DOI":"10.4324\/9780203401491_chapter_7"},{"key":"key-10.1145\/3196839.3196845-31","unstructured":"Carol MacCormack, and Marilyn Strathern. 1980.Nature, Culture and Gender(4th). Cambridge UP, Cambridge."},{"key":"key-10.1145\/3196839.3196845-32","unstructured":"MacKinnion. 1987. Difference and Domination: On Sex Discrimination. InFeminism Unmodified; Discourses on Life and Law, Harvard UP, Cambridge, 32--45."},{"key":"key-10.1145\/3196839.3196845-33","doi-asserted-by":"crossref","unstructured":"Bernice Martin. 1984. Mother Wouldn't Like It! Housework as Magic.Theory Society and Culture2, 2, 19--35.","DOI":"10.1177\/0263276484002002004"},{"key":"key-10.1145\/3196839.3196845-34","doi-asserted-by":"crossref","unstructured":"Michael Massimi, Jill P. Dimond and Christopher A. Le Dantec. 2012. Finding a New Normal: The Role of Technology in Life Disruptions. InProceedings of Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work.ACM, Seattle, Washington, USA, 719--728.","DOI":"10.1145\/2145204.2145314"},{"key":"key-10.1145\/3196839.3196845-35","unstructured":"L. Nader. 1992. Up the Anthropologist: Perspectives Gained from Studying Up. . InReinventing Anthropology, Dell H. Hymes Ed. Pantheon Books, New York, 284--311."},{"key":"key-10.1145\/3196839.3196845-36","doi-asserted-by":"crossref","unstructured":"Carman Neustaedter, A. J. Bernheim Brush and Saul Greenberg. 2009. The Calendar Is Crucial: Coordination and Awareness through the Family Calendar.ACM Trans. Comput.-Hum. Interact.16, 1, 1--48.","DOI":"10.1145\/1502800.1502806"},{"key":"key-10.1145\/3196839.3196845-37","doi-asserted-by":"crossref","unstructured":"J. O'Brien, Rodden, T., Rouncefield, M., and Hughes, J. . 1999. At Home with Technology: An Ethnographic Study of a Set-Top Box Trial. .ACM Transactions on HCI6, 3, 282--308.","DOI":"10.1145\/329693.329698"},{"key":"key-10.1145\/3196839.3196845-38","unstructured":"Sherry Ortner. 1995. Ethnography among the Newark; the Class of '58 Weequahic High School. InNaturalizing Power; Essays in Feminist Cultural Analysis, Sylvia J. Yanagisako, and C. Delaney Ed. Routeledge, New York."},{"key":"key-10.1145\/3196839.3196845-39","unstructured":"Sherry Beth Ortner. 1974. Is Female to Male as Nature Is to Culture.Women, Culture and Society, 67--88."},{"key":"key-10.1145\/3196839.3196845-40","doi-asserted-by":"crossref","unstructured":"Erika Shehan Poole. 2012. Interacting with Infrastructure: A Case for Breaching Experiments in Home Computing Research. InProceedings of Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work.ACM, Seattle, Washington, USA, 759--768.","DOI":"10.1145\/2145204.2145319"},{"key":"key-10.1145\/3196839.3196845-41","doi-asserted-by":"crossref","unstructured":"Erika Shehan Poole. 2012. Interacting with Infrastructure: A Case for Breaching Experiments in Home Technology Research. InProceedings of ACM CSCW 2012.ACM, Seattle, WA, USA.","DOI":"10.1145\/2145204.2145319"},{"key":"key-10.1145\/3196839.3196845-42","doi-asserted-by":"crossref","unstructured":"Erika Shehan Poole, Marshini Chetty, Rebecca E. Grinter and W. Keith Edwards. 2008. More Than Meets the Eye: Transforming the User Experience of Home Network Management. InProceedings of Proceedings of the 7th ACM conference on Designing interactive systems.ACM, Cape Town, South Africa, 455--464.","DOI":"10.1145\/1394445.1394494"},{"key":"key-10.1145\/3196839.3196845-43","doi-asserted-by":"crossref","unstructured":"Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E. Grinter and W. Keith Edwards. 2009. Computer Help at Home: Methods and Motivations for Informal Technical Support. InProceedings of ACM CHI 2009.ACM, Boston, MA, USA, 739--748.","DOI":"10.1145\/1518701.1518816"},{"key":"key-10.1145\/3196839.3196845-44","unstructured":"J.A. Rodeand J.J. Kaye. 2006. Is to Nurture in Technology's Nature InProceedings of Ubicomp."},{"key":"key-10.1145\/3196839.3196845-45","doi-asserted-by":"crossref","unstructured":"Jennifer A. Rode. 2010. The Roles That Make the Domestic Work. InProceedings of Proceedings of the 2010 ACM conference on Computer supported cooperative work.ACM, Savannah, Georgia, USA, 381--390.","DOI":"10.1145\/1718918.1718984"},{"key":"key-10.1145\/3196839.3196845-46","doi-asserted-by":"crossref","unstructured":"Jennifer A. Rode. 2010. The Roles That Make the Domestic Work. InProceedings of ACM CSCW 2010.ACM, Savannah, Georgia, USA, 381--390.","DOI":"10.1145\/1718918.1718984"},{"key":"key-10.1145\/3196839.3196845-47","doi-asserted-by":"crossref","unstructured":"Jennifer A. Rode. 2011. A Theoretical Agenda for Feminist Hci.Interact. Comput.23, 5, 393--400.","DOI":"10.1016\/j.intcom.2011.04.005"},{"key":"key-10.1145\/3196839.3196845-48","doi-asserted-by":"crossref","unstructured":"Jennifer A. Rode, Eleanor F. Toye, and Alan F. Blackwell. 2004. The Fuzzy Felt Ethnography- Understanding the Programming Patterns of Domestic Appliances.Personal and Ubiquitous Computing8, 161--176. .","DOI":"10.1007\/s00779-004-0272-0"},{"key":"key-10.1145\/3196839.3196845-49","unstructured":"Jennifer Ann Rode (2008). An Ethnographic Examination of the Relationship of Gender and End-User Programming. (Doctoral dissertation, University of California, Irvine). Advisor(s) Paul Dourish. AAI3311560."},{"key":"key-10.1145\/3196839.3196845-50","unstructured":"Ruth Schwartz-Cowan. 1983.More Work for Mother: The Ironies of Household Technology from the Open Hearth to the Microwave.Basic Books, New York, New York."},{"key":"key-10.1145\/3196839.3196845-51","doi-asserted-by":"crossref","unstructured":"Joan W. Scott. 1988. Deconstructing Equality-Versus-Difference: Or, the Usess of Postructuralist Theory for Freminism.Feminist Studies14, 1, 32--50.","DOI":"10.2307\/3177997"},{"key":"key-10.1145\/3196839.3196845-52","doi-asserted-by":"crossref","unstructured":"Timothy Sohn, Lorikeet Lee, Stephanie Zhang, David Dearman and Khai Truong. 2012. An Examination of How Households Share and Coordinate the Completion of Errands. InProceedings of Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work.ACM, Seattle, Washington, USA, 729--738.","DOI":"10.1145\/2145204.2145315"},{"key":"key-10.1145\/3196839.3196845-53","unstructured":"S. Strasser. 2000.Never Done: A History of American Housework.Holt Paperbacks,"},{"key":"key-10.1145\/3196839.3196845-54","unstructured":"A. and J. Corbin. Strauss. 1998.Basics of Qualitative Research: Grounded Theory Procedures and Techniques.(Second Edition). Sage P, Thousand Oaks, CA."},{"key":"key-10.1145\/3196839.3196845-55","doi-asserted-by":"crossref","unstructured":"Peter Tolmie, James Pycock, Tim Diggins, Allan MacLean and Alain Karsenty. 2002. Unremarkable Computing. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Minneapolis, Minnesota, USA, 399--406.","DOI":"10.1145\/503376.503448"},{"key":"key-10.1145\/3196839.3196845-56","doi-asserted-by":"crossref","unstructured":"E. M. Trauth. 2006. Theorizing Gender and Information Technology Research. . InEncyclopedia of Gender and Information Technology,, Idea Group Reference, Hershey, PA, 1154--1159. .","DOI":"10.4018\/978-1-59140-815-4.ch182"},{"key":"key-10.1145\/3196839.3196845-57","unstructured":"Sherry Turkle. 1988. Computational Reticence: Why Women Fear the Intimate Machine. InTechnology and Women's Voices: Keeping in Touch, Cheris Kramarae Ed. Routledge &#38; Kegan Paul, London, UK, 41--61."},{"key":"key-10.1145\/3196839.3196845-58","doi-asserted-by":"crossref","unstructured":"Sherry Turkle, and Seymour Papert. 1990. Epistemological Pluralism: Styles and Voices within the Computer Culture.Signs16, 1, 128--157.","DOI":"10.1086\/494648"},{"key":"key-10.1145\/3196839.3196845-59","unstructured":"Ellen van Oost. 2003. Materialized Gender: How Shavers Configure the Users' Femininity and Masculinity. InHow Users Matter,195--208."},{"key":"key-10.1145\/3196839.3196845-60","doi-asserted-by":"crossref","unstructured":"Amy Voida, Sheelagh Carpendale and Saul Greenberg. 2010. The Individual and the Group in Console Gaming. InProceedings of Proceedings of the 2010 ACM conference on Computer supported cooperative work.ACM, Savannah, Georgia, USA, 371--380.","DOI":"10.1145\/1718918.1718983"},{"key":"key-10.1145\/3196839.3196845-61","doi-asserted-by":"crossref","unstructured":"Candance West, and Sarah Fenstermaker. 1995. Doing Difference.Gender, and Society9, 1, 8--37.","DOI":"10.1177\/089124395009001002"}],"event":{"name":"the 4th Conference","location":"Heilbronn, Germany","acronym":"GenderIT '18","number":"4","start":{"date-parts":[[2018,5,14]]},"end":{"date-parts":[[2018,5,15]]}},"container-title":["Proceedings of the 4th Conference on Gender &amp; IT - GenderIT '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196839.3196845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3196845&ftid=1961901&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:29Z","timestamp":1750210769000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3196839.3196845"}},"subtitle":[],"proceedings-subject":"Gender & IT","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1145\/3196839.3196845","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}