{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:38Z","timestamp":1750220618370,"version":"3.41.0"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:p>A new dataset significantly revises both scholarly assessment and popular understanding about gender bias in computing.<\/jats:p>","DOI":"10.1145\/3417517","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T17:58:51Z","timestamp":1621879131000},"page":"76-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Dynamics of gender bias in computing"],"prefix":"10.1145","volume":"64","author":[{"given":"Thomas J.","family":"Misa","sequence":"first","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Abbate J. The pleasure paradox: Bridging the gap between popular images of computing and women's historical experiences. Gender Codes. T. Misa (Ed) 211--227.  Abbate J. The pleasure paradox: Bridging the gap between popular images of computing and women's historical experiences. Gender Codes. T. Misa (Ed) 211--227.","DOI":"10.1002\/9780470619926.ch10"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1353\/jowh.2010.0052"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0145553200013900"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3383559"},{"key":"e_1_2_1_5_1","volume-title":"Rockefeller Foundation","author":"Berryman S.E.","year":"1983","unstructured":"Berryman , S.E. Who will do science? Minority and female attainment of science and mathematics degrees: Trends and causes . Rockefeller Foundation , New York, NY , 1983 . Berryman, S.E. Who will do science? Minority and female attainment of science and mathematics degrees: Trends and causes. Rockefeller Foundation, New York, NY, 1983."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.382"},{"key":"e_1_2_1_7_1","first-page":"1","article-title":"A history of women's U.S. engineering education","volume":"16","author":"Bix A.S.","year":"2004","unstructured":"Bix , A.S. From 'engineeresses' to 'girl engineers' to 'good engineers :' A history of women's U.S. engineering education . NWSA J. 16 , 1 , ( 2004 ), 27--49; https:\/\/muse.jhu.edu\/article\/168384. Bix, A.S. From 'engineeresses' to 'girl engineers' to 'good engineers:' A history of women's U.S. engineering education. NWSA J. 16, 1, (2004), 27--49; https:\/\/muse.jhu.edu\/article\/168384.","journal-title":"NWSA J."},{"key":"e_1_2_1_8_1","volume-title":"Man is to computer programmer as woman is to homemaker? Debiasing Word embeddings","author":"Bolukbasi T.","year":"2016","unstructured":"Bolukbasi , T. , Chang , K. W. , Zou , J. , Saligrama , V. , Kalai , A. Man is to computer programmer as woman is to homemaker? Debiasing Word embeddings . July 21, 2016 ; arXiv: 1607.06520; https:\/\/arxiv.org\/abs\/1607.06520 Bolukbasi, T., Chang, K. W., Zou, J., Saligrama, V., Kalai, A. Man is to computer programmer as woman is to homemaker? Debiasing Word embeddings. July 21, 2016; arXiv:1607.06520; https:\/\/arxiv.org\/abs\/1607.06520"},{"key":"e_1_2_1_9_1","volume-title":"Reconsidering the Pipeline","author":"Branch E.H.","year":"2016","unstructured":"Branch , E.H. Pathways , Potholes, and the Persistence of Women in Science : Reconsidering the Pipeline . Lexington Books , Lanham MD , 2016 . Branch, E.H. Pathways, Potholes, and the Persistence of Women in Science: Reconsidering the Pipeline. Lexington Books, Lanham MD, 2016."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2020.2982751"},{"volume-title":"Proceedings of the 2016 CHI Conf. on Human Factors in Computing Systems. ACM","author":"Burnett M.","key":"e_1_2_1_11_1","unstructured":"Burnett , M. , Peters , A. , Hill , C. , and Elarief , N . Finding gender-inclusiveness software issues with GenderMag: A field investigation . In Proceedings of the 2016 CHI Conf. on Human Factors in Computing Systems. ACM , New York, NY, 2586--2598 Burnett, M., Peters, A., Hill, C., and Elarief, N. Finding gender-inclusiveness software issues with GenderMag: A field investigation. In Proceedings of the 2016 CHI Conf. on Human Factors in Computing Systems. ACM, New York, NY, 2586--2598"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262813"},{"key":"e_1_2_1_13_1","first-page":"4","article-title":"Issues in programming management","volume":"12","author":"Canning R","year":"1974","unstructured":"Canning , R . Issues in programming management . EDP Analyzer 12 , 4 ( 1974 ), 1--14. Canning, R. Issues in programming management. EDP Analyzer 12, 4 (1974), 1--14.","journal-title":"EDP Analyzer"},{"key":"e_1_2_1_14_1","volume-title":"IEEE Spectrum (June 19","author":"Cass S.","year":"2015","unstructured":"Cass , S. A Review of Code: Debugging the Gender Gap . IEEE Spectrum (June 19 , 2015 ); http:\/\/bit.ly\/3q6gUgI Cass, S. A Review of Code: Debugging the Gender Gap. IEEE Spectrum (June 19, 2015); http:\/\/bit.ly\/3q6gUgI"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-013-0296-x"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542130.1542160"},{"key":"e_1_2_1_17_1","volume-title":"University of California Press","author":"Connell R.W.","year":"1995","unstructured":"Connell , R.W. Masculinities . University of California Press , Berkeley, CA , 1995 , 77. Connell, R.W. Masculinities. University of California Press, Berkeley, CA, 1995, 77."},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ensmenger N. Making programming masculine. Gender Codes. T. Misa (Ed.) 115--141.  Ensmenger N. Making programming masculine. Gender Codes. T. Misa (Ed.) 115--141.","DOI":"10.1002\/9780470619926.ch6"},{"key":"e_1_2_1_19_1","volume-title":"sandals, and other signs of rugged individualism:' Masculine culture within the computing professions. Osiris","author":"Ensmenger N.","year":"2015","unstructured":"Ensmenger , N. ' Beards , sandals, and other signs of rugged individualism:' Masculine culture within the computing professions. Osiris ( 2015 ), 38--65; https:\/\/www.journals.uchicago.edu\/doi\/10.1086\/682955. Ensmenger, N. 'Beards, sandals, and other signs of rugged individualism:' Masculine culture within the computing professions. Osiris (2015), 38--65; https:\/\/www.journals.uchicago.edu\/doi\/10.1086\/682955."},{"key":"e_1_2_1_20_1","unstructured":"Fox M.F. and Kline K. Women faculty in computing: A key case of women in science. Pathways Potholes and the Persistence of Women in Science. E.H. Branch (ed) 41--55.  Fox M.F. and Kline K. Women faculty in computing: A key case of women in science. Pathways Potholes and the Persistence of Women in Science. E.H. Branch (ed) 41--55."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047476"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/355620.361177"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1090\/hmath\/034"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/85.627896"},{"key":"e_1_2_1_25_1","first-page":"1","article-title":"Ida Rhodes and the dreams of a human computer","volume":"22","author":"Grier D.A","year":"2000","unstructured":"Grier , D.A . Ida Rhodes and the dreams of a human computer . IEEE Annals of the History of Computing 22 , 1 ( 2000 ), 82--85; https:\/\/ieeexplore.ieee.org\/document\/815468 Grier, D.A. Ida Rhodes and the dreams of a human computer. IEEE Annals of the History of Computing 22, 1 (2000), 82--85; https:\/\/ieeexplore.ieee.org\/document\/815468","journal-title":"IEEE Annals of the History of Computing"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/85.511941"},{"key":"e_1_2_1_27_1","first-page":"71","article-title":"Masculinity and the machine man: Gender in the history of data processing. Gender Codes. T. Misa, (Ed)","volume":"51","author":"Haigh T","year":"2010","unstructured":"Haigh , T . Masculinity and the machine man: Gender in the history of data processing. Gender Codes. T. Misa, (Ed) . John Wiley , 2010 , 51 -- 71 . Haigh, T. Masculinity and the machine man: Gender in the history of data processing. Gender Codes. T. Misa, (Ed). John Wiley, 2010, 51--71.","journal-title":"John Wiley"},{"key":"e_1_2_1_28_1","volume-title":"ACM","author":"Halvorson M.J.","year":"2020","unstructured":"Halvorson , M.J. Code Nation : Personal computing and the learn to program movement in America . ACM , New York, NY , 2020 ; https:\/\/dl.acm.org\/doi\/book\/10.1145\/3368274. Halvorson, M.J. Code Nation: Personal computing and the learn to program movement in America. ACM, New York, NY, 2020; https:\/\/dl.acm.org\/doi\/book\/10.1145\/3368274."},{"key":"e_1_2_1_29_1","volume-title":"University. Second Symposium on Large-Scale Digital Calculating Machinery (Sept. 11--16","author":"Harvard","year":"1949","unstructured":"Harvard University. Second Symposium on Large-Scale Digital Calculating Machinery (Sept. 11--16 , 1949 ); https:\/\/bit.ly\/2XAec6U Harvard University. Second Symposium on Large-Scale Digital Calculating Machinery (Sept. 11--16, 1949); https:\/\/bit.ly\/2XAec6U"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3102\/00346543074002171"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742007"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889385"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702520"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/136787799900200206"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 1st ACM\/IEEE Intern. Workshop on Gender Equality in Software Engineering (May 28, 2018","author":"Leavy S.","year":"1955","unstructured":"Leavy , S. Gender bias in artificial intelligence: The need for diversity and gender theory in machine learning . In Proceedings of the 1st ACM\/IEEE Intern. Workshop on Gender Equality in Software Engineering (May 28, 2018 ), 14--16; https:\/\/dl.acm.org\/doi\/10.1145\/3 1955 70.3195580. Leavy, S. Gender bias in artificial intelligence: The need for diversity and gender theory in machine learning. In Proceedings of the 1st ACM\/IEEE Intern. Workshop on Gender Equality in Software Engineering (May 28, 2018), 14--16; https:\/\/dl.acm.org\/doi\/10.1145\/3195570.3195580."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787754"},{"key":"e_1_2_1_37_1","volume-title":"Cracking the Gender Code","author":"Millar M.S.","year":"1998","unstructured":"Millar , M.S. Cracking the Gender Code . Second Story Press, Toronto , Canada , 1998 , 96--107. Millar, M.S. Cracking the Gender Code. Second Story Press, Toronto, Canada, 1998, 96--107."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470619926"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814845"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973856"},{"key":"e_1_2_1_41_1","volume-title":"Gender bias in computing. Historical Studies in Computing, Information, and Society. W. Aspray, (ed)","author":"Misa T.J.","year":"2019","unstructured":"Misa , T.J. Gender bias in computing. Historical Studies in Computing, Information, and Society. W. Aspray, (ed) . Springer Nature , Switzerland , 2019 , 113--133; https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-030-18955-6_6. Misa, T.J. Gender bias in computing. Historical Studies in Computing, Information, and Society. W. Aspray, (ed). Springer Nature, Switzerland, 2019, 113--133; https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-030-18955-6_6."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2955129.2955182"},{"key":"e_1_2_1_43_1","volume-title":"Why is Silicon Valley so awful to women? The Atlantic (Apr","author":"Mundy L.","year":"2017","unstructured":"Mundy , L. Why is Silicon Valley so awful to women? The Atlantic (Apr . 2017 ). 60--73; http:\/\/bit.ly\/3sfs6cU. Mundy, L. Why is Silicon Valley so awful to women? The Atlantic (Apr. 2017). 60--73; http:\/\/bit.ly\/3sfs6cU."},{"key":"e_1_2_1_44_1","volume-title":"Women Becoming Mathematicians: Creating a Professional Identity in Post-World War II America","author":"Murray M.A.M.","year":"2000","unstructured":"Murray , M.A.M. Women Becoming Mathematicians: Creating a Professional Identity in Post-World War II America . MIT Press , Cambridge, MA , 2000 . Murray, M.A.M. Women Becoming Mathematicians: Creating a Professional Identity in Post-World War II America. MIT Press, Cambridge, MA, 2000."},{"key":"e_1_2_1_45_1","first-page":"5","article-title":"Countering the negative image of women in computing","volume":"2","author":"Payton F.C.","year":"2019","unstructured":"Payton , F.C. and Berki , E . Countering the negative image of women in computing . Commun. ACM 2 , 5 ( May 2019 ), 56--63. Payton, F.C. and Berki, E. Countering the negative image of women in computing. Commun. ACM 2, 5 (May 2019), 56--63.","journal-title":"Commun. ACM"},{"key":"e_1_2_1_46_1","volume-title":"The fascinating evolution of brogramming and the fight to get women back","author":"Porter J.","year":"2014","unstructured":"Porter , J. The fascinating evolution of brogramming and the fight to get women back . Fast Company (Oct . 20, 2014 ); http:\/\/bit.ly\/3qcyuQl. Porter, J. The fascinating evolution of brogramming and the fight to get women back. Fast Company (Oct. 20, 2014); http:\/\/bit.ly\/3qcyuQl."},{"key":"e_1_2_1_47_1","volume-title":"William Morrow","author":"Shetterly M.L.","year":"2016","unstructured":"Shetterly , M.L. Hidden Figures : The American dream and the untold story of the Black women mathematicians who helped win the space race . William Morrow , New York, NY , 2016 . Shetterly, M.L. Hidden Figures: The American dream and the untold story of the Black women mathematicians who helped win the space race. William Morrow, New York, NY, 2016."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2467696.2467720"},{"key":"e_1_2_1_49_1","article-title":"Inferring gender from column of first names","author":"Tran A","year":"2015","unstructured":"Tran , A . Inferring gender from column of first names in R. Rev. Aug. 21, 2015 ; gist.github.com\/andrewbtran\/d3d8e04f5c86dcfa2bb0 Tran, A. Inferring gender from column of first names in R. Rev. Aug. 21, 2015; gist.github.com\/andrewbtran\/d3d8e04f5c86dcfa2bb0","journal-title":"R. Rev."},{"key":"e_1_2_1_50_1","volume-title":"Pioneer Day 1981: UNIVAC I. Annals of the History of Computing 3, 4","author":"Univac Pioneers Day","year":"1981","unstructured":"Univac Pioneers Day . Pioneer Day 1981: UNIVAC I. Annals of the History of Computing 3, 4 ( 1981 ), 400--407. Univac Pioneers Day. Pioneer Day 1981: UNIVAC I. Annals of the History of Computing 3, 4 (1981), 400--407."},{"key":"e_1_2_1_51_1","first-page":"5","article-title":"How We Lost the Women","volume":"61","author":"Vardi M.Y","year":"2018","unstructured":"Vardi , M.Y . How We Lost the Women in Computing. Commun. ACM 61 , 5 ( May 2018 ), 9; https:\/\/dl.acm.org\/doi\/10.1145\/3201113 Vardi, M.Y. How We Lost the Women in Computing. Commun. ACM 61, 5 (May 2018), 9; https:\/\/dl.acm.org\/doi\/10.1145\/3201113","journal-title":"Computing. Commun. ACM"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/09589236.2015.1087309"},{"key":"e_1_2_1_53_1","first-page":"2","article-title":"spitting image of a woman programmer': Changing portrayals of women in the American computing industry, 1958--1985","volume":"39","author":"Vogel W.F.","year":"2017","unstructured":"Vogel , W.F. ' The spitting image of a woman programmer': Changing portrayals of women in the American computing industry, 1958--1985 . IEEE Annals of the History of Computing 39 , 2 ( 2017 ), 49--64. Vogel, W.F. 'The spitting image of a woman programmer': Changing portrayals of women in the American computing industry, 1958--1985. IEEE Annals of the History of Computing 39, 2 (2017), 49--64.","journal-title":"IEEE Annals of the History of Computing"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300283"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178477.1178516"},{"key":"e_1_2_1_56_1","volume-title":"Zuckerberg meet for Wired cover shoot. (Apr. 19","author":"Wired","year":"2010","unstructured":"Wired . Gates , Zuckerberg meet for Wired cover shoot. (Apr. 19 , 2010 ); http:\/\/bit.ly\/3oAjuLS\/ Wired. Gates, Zuckerberg meet for Wired cover shoot. (Apr. 19, 2010); http:\/\/bit.ly\/3oAjuLS\/"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Yost J. Programming enterprise: Women entrepreneurs in software and computer services. Gender Codes. T. Misa (ed) 229--250.  Yost J. Programming enterprise: Women entrepreneurs in software and computer services. Gender Codes. T. Misa (ed) 229--250.","DOI":"10.1002\/9780470619926.ch11"},{"key":"e_1_2_1_58_1","first-page":"4","article-title":"The march of IDES: Early history of intrusion-detection expert systems","volume":"38","author":"Yost J.R","year":"2016","unstructured":"Yost , J.R . The march of IDES: Early history of intrusion-detection expert systems . IEEE Annals of the History of Computing 38 , 4 ( 2016 ), 42--54; https:\/\/ieeexplore.ieee.org\/document\/7155454. Yost, J.R. The march of IDES: Early history of intrusion-detection expert systems. IEEE Annals of the History of Computing 38, 4 (2016), 42--54; https:\/\/ieeexplore.ieee.org\/document\/7155454.","journal-title":"IEEE Annals of the History of Computing"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3417517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:14Z","timestamp":1750197674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1145\/3417517"],"URL":"https:\/\/doi.org\/10.1145\/3417517","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}