{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T07:17:43Z","timestamp":1777101463639,"version":"3.51.4"},"publisher-location":"New York, New York, USA","reference-count":33,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["01FP1616, 01FP1617, 01FP1618"],"award-info":[{"award-number":["01FP1616, 01FP1617, 01FP1618"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3196839.3196869","type":"proceedings-article","created":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T12:00:49Z","timestamp":1525176049000},"page":"191-198","source":"Crossref","is-referenced-by-count":40,"title":["Cognitive walkthrough of a learning management system with gendered personas"],"prefix":"10.1145","author":[{"given":"Arun","family":"Shekhar","sequence":"first","affiliation":[{"name":"SAP SE, Walldorf, Germany"}]},{"given":"Nicola","family":"Marsden","sequence":"additional","affiliation":[{"name":"Heilbronn University, Heilbronn, Germany"}]}],"member":"320","reference":[{"key":"key-10.1145\/3196839.3196869-1","unstructured":"Tamara Adlin and John Pruitt. 2010.The Essential Persona Lifecycle: Your Guide to Building and Using Personas.Morgan Kaufmann Publishers Inc.,"},{"key":"key-10.1145\/3196839.3196869-2","unstructured":"Corinna Bath. 2009. Searching for Methodology: Feminist Technology Design in Computer Science."},{"key":"key-10.1145\/3196839.3196869-3","doi-asserted-by":"crossref","unstructured":"Laura Beckwith, Margaret Burnett, Susan Wiedenbeck, Curtis Cook, Shraddha Sorte and Michelle Hastings. 2005. Effectiveness of End-User Debugging Software Features: Are There Gender Issues? InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Portland, Oregon, USA, 869--878.","DOI":"10.1145\/1054972.1055094"},{"key":"key-10.1145\/3196839.3196869-4","doi-asserted-by":"crossref","unstructured":"Laura Beckwith, Cory Kissinger, Margaret Burnett, Susan Wiedenbeck, Joseph Lawrance, Alan Blackwell and Curtis Cook. 2006. Tinkering and Gender in End-User Programmers' Debugging. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Montr&#233;al, Qu&#233;bec, Canada, 231--240.","DOI":"10.1145\/1124772.1124808"},{"key":"key-10.1145\/3196839.3196869-5","doi-asserted-by":"crossref","unstructured":"Margaret M. Burnett, Laura Beckwith, Susan Wiedenbeck, Scott D. Fleming, Jill Cao, Thomas H. Park, Valentina Grigoreanu and Kyle Rector. 2011. Gender Pluralism in Problem-Solving Software.Interact. Comput.23, 5, 450--460.","DOI":"10.1016\/j.intcom.2011.06.004"},{"key":"key-10.1145\/3196839.3196869-6","doi-asserted-by":"crossref","unstructured":"Margaret Burnett, Anicia Peters, Charles Hill and Noha Elarief. 2016. Finding Gender-Inclusiveness Software Issues with Gendermag: A Field Investigation. InProceedings of the 2016 CHI Conference on Human Factors in Computing Systems.ACM, San Jose, California, USA, 2586--2598.","DOI":"10.1145\/2858036.2858274"},{"key":"key-10.1145\/3196839.3196869-7","doi-asserted-by":"crossref","unstructured":"Margaret Burnett, Simone Stumpf, Jamie Macbeth, Stephann Makri, Laura Beckwith, Irwin Kwan, Anicia Peters and William Jernigan. 2016. Gendermag: A Method for Evaluating Software's Gender Inclusiveness.Interacting with Computers28, 6, 760--787.","DOI":"10.1093\/iwc\/iwv046"},{"key":"key-10.1145\/3196839.3196869-8","doi-asserted-by":"crossref","unstructured":"Alan Cooper. 1999.The Inmates Are Running the Asylum.Macmillan Publishing Co., Inc.,","DOI":"10.1007\/978-3-322-99786-9_1"},{"key":"key-10.1145\/3196839.3196869-9","unstructured":"Thomas Dohmen, David Huffman, J. Schupp, xfc, rgen, Armin Falk, Uwe Sunde and Gert G. Wagner. 2011. Individual Risk Attitudes: Measurement, Determinants, and Behavioral Consequences.Journal of the European Economic Association9, 3, 522--550."},{"key":"key-10.1145\/3196839.3196869-10","doi-asserted-by":"crossref","unstructured":"Susan Fiske. 2000.Stereotyping, Prejudice, and Discrimination at the Seam between the Centuries: Evolution, Culture, Mind, and Brain.","DOI":"10.1002\/(SICI)1099-0992(200005\/06)30:3<299::AID-EJSP2>3.0.CO;2-F"},{"key":"key-10.1145\/3196839.3196869-11","doi-asserted-by":"crossref","unstructured":"Ingbert R Floyd, M Cameron Jones and Michael B Twidale. 2008. Resolving Incommensurable Debates: A Preliminary Identification of Persona Kinds, Attributes, and Characteristics.Artifact2, 1, 12--26.","DOI":"10.1080\/17493460802276836"},{"key":"key-10.1145\/3196839.3196869-12","doi-asserted-by":"crossref","unstructured":"Erin Friess. 2012. Personas and Decision Making in the Design Process: An Ethnographic Case Study. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Austin, Texas, USA, 1209--1218.","DOI":"10.1145\/2207676.2208572"},{"key":"key-10.1145\/3196839.3196869-13","unstructured":"Kim Goodwin. 2009.Designing for the Digital Age: How to Create Human-Centered Products and Services.Wiley Publishing,"},{"key":"key-10.1145\/3196839.3196869-14","doi-asserted-by":"crossref","unstructured":"Valentina Grigoreanu, Jill Cao, Todd Kulesza, Christopher Bogart, Kyle Rector, Margaret Burnett and Susan Wiedenbeck. 2008. Can Feature Design Reduce the Gender Gap in End-User Software Development Environments? InProceedings of Proceedings of the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.IEEE Computer Society, 149--156.","DOI":"10.1109\/VLHCC.2008.4639077"},{"key":"key-10.1145\/3196839.3196869-15","unstructured":"Morten Hertzum and Niels Ebbe Jacobsen. 1999. The Evaluator Effect During First-Time Use of the Cognitive Walkthrough Technique. InProceedings of HCI International (the 8th International Conference on Human-Computer Interaction) on Human-Computer Interaction: Ergonomics and User Interfaces-Volume I - Volume I.L. Erlbaum Associates Inc., 1063--1067."},{"key":"key-10.1145\/3196839.3196869-16","doi-asserted-by":"crossref","unstructured":"Charles G. Hill, Maren Haag, Alannah Oleson, Chris Mendez, Nicola Marsden, Anita Sarma and Margaret Burnett. 2017. Gender-Inclusiveness Personas Vs. Stereotyping: Can We Have It Both Ways? InProceedings of the 2017 CHI Conference on Human Factors in Computing Systems.ACM, Denver, Colorado, USA, 6658--6671.","DOI":"10.1145\/3025453.3025609"},{"key":"key-10.1145\/3196839.3196869-17","doi-asserted-by":"crossref","unstructured":"Karen Holtzblatt, Jessamyn Burns Wendell and Shelley Wood. 2005. Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design.Ubiquity2005, March, 3-3.","DOI":"10.1145\/1066348.1066325"},{"key":"key-10.1145\/3196839.3196869-18","doi-asserted-by":"crossref","unstructured":"Will Jerigan, Amber Horvath, Michael Lee, Margaret Burnett, Cuilty Taylor, Sandeep Kuttal, Anicia Peters, Irwin Kwan, Faezeh Bahmani and Andrew Ko. 2015.A Principled Evaluation for a Principled Idea Garden.","DOI":"10.1109\/VLHCC.2015.7357222"},{"key":"key-10.1145\/3196839.3196869-19","doi-asserted-by":"crossref","unstructured":"Clayton Lewis, Peter G. Polson, Cathleen Wharton and John Rieman. 1990. Testing a Walkthrough Methodology for Theory-Based Design of Walk-up-and-Use Interfaces. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Seattle, Washington, USA, 235--242.","DOI":"10.1145\/97243.97279"},{"key":"key-10.1145\/3196839.3196869-20","unstructured":"Clayton Lewis and John Rieman. 2011.Task-Centered User Interface Design."},{"key":"key-10.1145\/3196839.3196869-21","doi-asserted-by":"crossref","unstructured":"Thomas Mahatody, Mouldi Sagar and Christophe Kolski. 2010.State of the Art on the Cognitive Walkthrough Method, Its Variants and Evolutions.","DOI":"10.1080\/10447311003781409"},{"key":"key-10.1145\/3196839.3196869-22","unstructured":"Simone Stumpf, Margaret Burnett, Laura Beckwith, and Anicia Peters. Nov. 14, 2016. The GenderMag Kit: How to Use the Gendermag Method to Find Inclusiveness Issues through a Gender Lens. http:\/\/gendermag.org"},{"key":"key-10.1145\/3196839.3196869-23","unstructured":"Nicola Marsden. 2014.Gender-Useit - HCI, Usability Und UX Unter Gendergesichtspunkten.M&#252;nchen: De Gruyter Oldenbourg"},{"key":"key-10.1145\/3196839.3196869-24","doi-asserted-by":"crossref","unstructured":"Nicola Marsden and Maren Haag. 2016. Stereotypes and Politics: Reflections on Personas. InProceedings of the 2016 CHI Conference on Human Factors in Computing Systems.ACM, Santa Clara, California, USA, 4017--4031.","DOI":"10.1145\/2858036.2858151"},{"key":"key-10.1145\/3196839.3196869-25","doi-asserted-by":"crossref","unstructured":"Adrienne L. Massanari. 2010. Designing for Imaginary Friends: Information Architecture, Personas and the Politics of User-Centered Design.New Media &#38; Society12, 3, 401--416. http:\/\/dx.doi.org\/","DOI":"10.1177\/1461444809346722"},{"key":"key-10.1145\/3196839.3196869-26","doi-asserted-by":"crossref","unstructured":"Joan Meyers-Levy and Durairaj Maheswaran. 1991. Exploring Differences in Males' and Females' Processing Strategies.Journal of Consumer Research18, 1, 63--70.","DOI":"10.1086\/209241"},{"key":"key-10.1145\/3196839.3196869-27","doi-asserted-by":"crossref","unstructured":"Tomasz Miaskiewicz and Kenneth A. Kozar. 2011.Personas and User-Centered Design: How Can Personas Benefit Product Design Processes?","DOI":"10.1016\/j.destud.2011.03.003"},{"key":"key-10.1145\/3196839.3196869-28","doi-asserted-by":"crossref","unstructured":"Lene Nielsen and Kira Storgaard Hansen. 2014. Personas Is Applicable: A Study on the Use of Personas in Denmark. InProceedings of Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Toronto, Ontario, Canada, 1665--1674.","DOI":"10.1145\/2556288.2557080"},{"key":"key-10.1145\/3196839.3196869-29","doi-asserted-by":"crossref","unstructured":"Peter G. Polson, Clayton Lewis, John Rieman and Cathleen Wharton. 1992. Cognitive Walkthroughs: A Method for Theory-Based Evaluation of User Interfaces.Int. J. Man-Mach. Stud.36, 5, 741--773.","DOI":"10.1016\/0020-7373(92)90039-N"},{"key":"key-10.1145\/3196839.3196869-30","doi-asserted-by":"crossref","unstructured":"Desney S. Tan, Mary Czerwinski and George Robertson. 2003. Women Go with the (Optical) Flow. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Ft. Lauderdale, Florida, USA, 209--215.","DOI":"10.1145\/642611.642649"},{"key":"key-10.1145\/3196839.3196869-31","doi-asserted-by":"crossref","unstructured":"Cathleen Wharton, Janice Bradford, Robin Jeffries and Marita Franzke. 1992. Applying Cognitive Walkthroughs to More Complex User Interfaces: Experiences, Issues, and Recommendations. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM, Monterey, California, USA, 381--388.","DOI":"10.1145\/142750.142864"},{"key":"key-10.1145\/3196839.3196869-32","unstructured":"Cathleen Wharton, John Rieman, Clayton Lewis and Peter Polson. 1994. The Cognitive Walkthrough Method: A Practitioner's Guide. InUsability Inspection Methods, Nielsen Jakob and L. Mack Robert Eds. John Wiley &#38; Sons, Inc., 105--140."},{"key":"key-10.1145\/3196839.3196869-33","unstructured":"Gayna Williams. 2014. Are You Sure Your Software Is Gender-Neutral?interactions21, 1, 36--39."}],"event":{"name":"the 4th Conference","location":"Heilbronn, Germany","acronym":"GenderIT '18","number":"4","start":{"date-parts":[[2018,5,14]]},"end":{"date-parts":[[2018,5,15]]}},"container-title":["Proceedings of the 4th Conference on Gender &amp; IT - GenderIT '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196839.3196869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3196869&ftid=1961871&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:29Z","timestamp":1750210769000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3196839.3196869"}},"subtitle":[],"proceedings-subject":"Gender & IT","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1145\/3196839.3196869","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}