{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T01:57:26Z","timestamp":1776477446055,"version":"3.51.2"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T00:00:00Z","timestamp":1620864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1906795, 1907002"],"award-info":[{"award-number":["1906795, 1907002"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2021,6,30]]},"abstract":"<jats:p>As society increasingly relies on digital technologies in many different aspects, those who lack relevant access and skills are lagging increasingly behind. Among the underserved groups disproportionately affected by the digital divide are women who are transitioning from incarceration and seeking to reenter the workforce outside the carceral system (women-in-transition). Women-in-transition rarely have been exposed to sound technology education, as they have generally been isolated from the digital environment while in incarceration. Furthermore, while women have become the fastest-growing segment of the incarcerated population in the United States in recent decades, prison education and reentry programs are still not well adjusted for them. Most programs are mainly designed for the dominant male population. Consequently, women-in-transition face significant post-incarceration challenges in accessing and using relevant digital technologies and thus have added difficulties in entering or reentering the workforce. Against this backdrop, our multi-disciplinary research team has conducted empirical research as part of technology education offered to women-in-transition in the Midwest. In this article, we report results from our interviews with 75 women-in-transition in the Midwest that were conducted to develop a tailored technology education program for the women. More than half of the participants in our study are women of color and face precarious housing and financial situations. Then, we discuss principles that we adopted in developing our education program for the marginalized women and participants\u2019 feedback on the program. Our team launched in-person sessions with women-in-reentry at public libraries in February 2020 and had to move the sessions online in March due to COVID-19. Our research-informed educational program is designed primarily to support the women in enhancing their knowledge and comfort with technology and nurturing computational thinking. Our study shows that low self-efficacy and mental health challenges, as well as lack of resources for technology access and use, are some of the major issues that need to be addressed in supporting technology learning among women-in-transition. This research offers scholarly and practical implications for computing education for women-in-transition and other marginalized populations.<\/jats:p>","DOI":"10.1145\/3425711","type":"journal-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T22:08:10Z","timestamp":1620943690000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Informal Technology Education for Women Transitioning from Incarceration"],"prefix":"10.1145","volume":"21","author":[{"given":"Hyunjin","family":"Seo","sequence":"first","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Darcey","family":"Altschwager","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Baek-young","family":"Choi","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Sejun","family":"Song","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Hannah","family":"Britton","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Megha","family":"Ramaswamy","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Bernard","family":"Schuster","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Marilyn","family":"Ault","sequence":"additional","affiliation":[{"name":"University of Kansas, Lawrence, KS, USA"}]},{"given":"Kaushik","family":"Ayinala","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Rafida","family":"Zaman","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Ben","family":"Tihen","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]},{"given":"Lohitha","family":"Yenugu","sequence":"additional","affiliation":[{"name":"University of Missouri - Kansas City, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Moodle Community. 2020. Moodle - Open-source learning platform. Retrieved from https:\/\/moodle.org\/.  Moodle Community. 2020. Moodle - Open-source learning platform. Retrieved from https:\/\/moodle.org\/."},{"key":"e_1_2_1_2_1","volume-title":"University of Missouri -- Kansas City","author":"Computing School","year":"2019","unstructured":"School of Computing and Engineering , University of Missouri -- Kansas City . 2019 . Technology Education for Women-in-Transition: Learning Management System . https:\/\/aislwomen-lms.umkc.edu\/. School of Computing and Engineering, University of Missouri -- Kansas City. 2019. Technology Education for Women-in-Transition: Learning Management System. https:\/\/aislwomen-lms.umkc.edu\/."},{"key":"e_1_2_1_3_1","unstructured":"Pew research Center. 2021. Broadband Technology Fact Sheet: Highlights of the Pew Internet Project\u2019s research related to broadband. Retrieved from http:\/\/www.pewinternet.org\/fact-sheets\/broadband-technology-fact-sheet.  Pew research Center. 2021. Broadband Technology Fact Sheet: Highlights of the Pew Internet Project\u2019s research related to broadband. Retrieved from http:\/\/www.pewinternet.org\/fact-sheets\/broadband-technology-fact-sheet."},{"key":"e_1_2_1_4_1","volume-title":"Prisoners","author":"Stats Internet World","year":"2014","unstructured":"Internet World Stats . 2021. Prisoners in 2014 . Washington, D.C. : Bureau of Justice Statistics . Retrieved from https:\/\/www.internetworldstats.com\/. Internet World Stats. 2021. Prisoners in 2014. Washington, D.C.: Bureau of Justice Statistics. Retrieved from https:\/\/www.internetworldstats.com\/."},{"key":"e_1_2_1_5_1","volume-title":"Net Inclusion: The National Digital Inclusion Summit.","author":"National Digital Inclusion Alliance.","year":"2016","unstructured":"National Digital Inclusion Alliance. 2016 . Net Inclusion: The National Digital Inclusion Summit. Retrieved from https:\/\/www.digitalinclusion.org\/netinclusion2016\/. National Digital Inclusion Alliance. 2016. Net Inclusion: The National Digital Inclusion Summit. Retrieved from https:\/\/www.digitalinclusion.org\/netinclusion2016\/."},{"key":"e_1_2_1_6_1","unstructured":"A Volunteer Group at Princeton University teaching accredited college courses in New Jersey State prisons. 2021. The Prison Teaching Initiative (PTI) at Princeton University. Retrieved from https:\/\/english.princeton.edu\/collaborations\/Prison-Teaching-Initiative\/.  A Volunteer Group at Princeton University teaching accredited college courses in New Jersey State prisons. 2021. The Prison Teaching Initiative (PTI) at Princeton University. Retrieved from https:\/\/english.princeton.edu\/collaborations\/Prison-Teaching-Initiative\/."},{"key":"e_1_2_1_7_1","volume-title":"Women in Computing","year":"2021","unstructured":"ACM-W : Women in Computing . 2021 . Supporting, celebrating and advocating for Women in Computing. Retrieved from https:\/\/women.acm.org\/. ACM-W: Women in Computing. 2021. Supporting, celebrating and advocating for Women in Computing. Retrieved from https:\/\/women.acm.org\/."},{"key":"e_1_2_1_8_1","volume-title":"Self-efficacy: The exercise of control. 158--166.","author":"Bandura Albert","year":"1999","unstructured":"Albert Bandura , W. H. Freeman , and Richard Lightsey . 1999 . Self-efficacy: The exercise of control. 158--166. Albert Bandura, W. H. Freeman, and Richard Lightsey. 1999. Self-efficacy: The exercise of control. 158--166."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2014.963363"},{"key":"e_1_2_1_10_1","volume-title":"The case for Internet access in prisons. The Washington Post (Feb. 9","author":"Branstetter B.","year":"2015","unstructured":"B. Branstetter . 2015. The case for Internet access in prisons. The Washington Post (Feb. 9 , 2015 ) Retrieved from https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2015\/02\/09\/the-case-for-internet-access-in-prisons\/?utm_term&equals;.a516da3d5820. B. Branstetter. 2015. The case for Internet access in prisons. The Washington Post (Feb. 9, 2015) Retrieved from https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2015\/02\/09\/the-case-for-internet-access-in-prisons\/?utm_term&equals;.a516da3d5820."},{"key":"e_1_2_1_11_1","unstructured":"ITU Telecommunication Development Bureau. 2016. Comments of Partnership for Progress on the Digital Divide. Retrieved from http:\/\/www.ppdd.org\/wp-content\/uploads\/2017\/01\/PPDD-NBRAComments.pdf.  ITU Telecommunication Development Bureau. 2016. Comments of Partnership for Progress on the Digital Divide. Retrieved from http:\/\/www.ppdd.org\/wp-content\/uploads\/2017\/01\/PPDD-NBRAComments.pdf."},{"key":"e_1_2_1_12_1","unstructured":"U.S. Department of Labor Bureau of Labor Statistics. 2018. Occupational outlook handbook. Retrieved from https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm.  U.S. Department of Labor Bureau of Labor Statistics. 2018. Occupational outlook handbook. Retrieved from https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm."},{"key":"e_1_2_1_13_1","unstructured":"E. A. Carson and E. Anderson. 2016. Prisoners in 2015. U.S. Department of Justice. Retrieved from https:\/\/www.internetworldstats.com\/.  E. A. Carson and E. Anderson. 2016. Prisoners in 2015. U.S. Department of Justice. Retrieved from https:\/\/www.internetworldstats.com\/."},{"key":"e_1_2_1_14_1","volume-title":"Constructing Grounded Theory","author":"Charmaz Kathy","unstructured":"Kathy Charmaz . 2014. Constructing Grounded Theory . Sage . Kathy Charmaz. 2014. Constructing Grounded Theory. Sage."},{"key":"e_1_2_1_15_1","unstructured":"Computer Science for All. 2016. Retrieved from https:\/\/obamawhitehouse.archives.gov\/blog\/2016\/01\/30\/computer-science-all.  Computer Science for All. 2016. Retrieved from https:\/\/obamawhitehouse.archives.gov\/blog\/2016\/01\/30\/computer-science-all."},{"key":"e_1_2_1_16_1","unstructured":"CS for All. 2021. Retrieved from https:\/\/www.csforall.org\/.  CS for All. 2021. Retrieved from https:\/\/www.csforall.org\/."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education. 16--21","author":"Scaico Pasqueline Dantas","year":"2017","unstructured":"Pasqueline Dantas Scaico , Ruy Jos\u00e9 G. B. de Queiroz , and Jos\u00e9 Jorge Lima Dias Jr . 2017 . Analyzing how interest in learning programming changes during a CS0 course: A qualitative study with Brazilian undergraduates . In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education. 16--21 . Pasqueline Dantas Scaico, Ruy Jos\u00e9 G. B. de Queiroz, and Jos\u00e9 Jorge Lima Dias Jr. 2017. Analyzing how interest in learning programming changes during a CS0 course: A qualitative study with Brazilian undergraduates. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education. 16--21."},{"key":"e_1_2_1_18_1","volume-title":"Why coding is still the most important job skill of the future. Fast Comp. 14","author":"Dishman Lydia","year":"2016","unstructured":"Lydia Dishman . 2016. Why coding is still the most important job skill of the future. Fast Comp. 14 ( 2016 ). Lydia Dishman. 2016. Why coding is still the most important job skill of the future. Fast Comp. 14 (2016)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180600751298"},{"key":"#cr-split#-e_1_2_1_20_1.1","doi-asserted-by":"crossref","unstructured":"K. Dobransky and E. Hargittai. 2016. Unrealized potential: Exploring the digital disability divide. DOI:https:\/\/doi.org\/10.1016\/j.poetic.2016.08.003 10.1016\/j.poetic.2016.08.003","DOI":"10.1016\/j.poetic.2016.08.003"},{"key":"#cr-split#-e_1_2_1_20_1.2","doi-asserted-by":"crossref","unstructured":"K. Dobransky and E. Hargittai. 2016. Unrealized potential: Exploring the digital disability divide. DOI:https:\/\/doi.org\/10.1016\/j.poetic.2016.08.003","DOI":"10.1016\/j.poetic.2016.08.003"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 6th International Conference on Learning Sciences. 166--173","author":"Daniel","unstructured":"Daniel C. Edelson and Diana M. Joseph. 2004. The interest-driven learning design framework: Motivating learning through usefulness . In Proceedings of the 6th International Conference on Learning Sciences. 166--173 . Daniel C. Edelson and Diana M. Joseph. 2004. The interest-driven learning design framework: Motivating learning through usefulness. In Proceedings of the 6th International Conference on Learning Sciences. 166--173."},{"key":"e_1_2_1_22_1","unstructured":"Education Development Center (EDC). 1994--2021. Retrieved from https:\/\/www.edc.org\/.  Education Development Center (EDC). 1994--2021. Retrieved from https:\/\/www.edc.org\/."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1097\/ANS.0000000000000216"},{"key":"e_1_2_1_24_1","volume-title":"Shaw","author":"Emmerson Roland M.","year":"1995","unstructured":"Roland M. Emmerson , Rachel I. Fretz , and Linda L . Shaw . 1995 . Writing Ethnographic Fieldnotes. University of Chicago , Chicago, IL. Roland M. Emmerson, Rachel I. Fretz, and Linda L. Shaw. 1995. Writing Ethnographic Fieldnotes. University of Chicago, Chicago, IL."},{"key":"e_1_2_1_25_1","volume-title":"A week to focus on computer science education","author":"National Science Foundation. 2009.","unstructured":"National Science Foundation. 2009. A week to focus on computer science education ( Press Release 09-234). https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=116059. National Science Foundation. 2009. A week to focus on computer science education (Press Release 09-234). https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=116059."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/92755.92756"},{"key":"e_1_2_1_27_1","unstructured":"From Prison Cells to PhD. 2021. Retrieved from https:\/\/www.fromprisoncellstophd.org\/.  From Prison Cells to PhD. 2021. Retrieved from https:\/\/www.fromprisoncellstophd.org\/."},{"key":"e_1_2_1_28_1","volume-title":"Int.","author":"Gatta Mary","year":"2006","unstructured":"Mary Gatta , Johanna E. Foster , and Rebecca Sanford . 2006. Does gender shape women\u2019s access to college programs in US state prisons? Equal Opport . Int. ( 2006 ). Mary Gatta, Johanna E. Foster, and Rebecca Sanford. 2006. Does gender shape women\u2019s access to college programs in US state prisons? Equal Opport. Int. (2006)."},{"key":"e_1_2_1_29_1","unstructured":"Girls Scout. 2016--2020. Partnership with Code.org. Retrieved from https:\/\/www.girlscouts.org\/en\/about-girl-scouts\/our-partners\/code-dot-org.html.  Girls Scout. 2016--2020. Partnership with Code.org. Retrieved from https:\/\/www.girlscouts.org\/en\/about-girl-scouts\/our-partners\/code-dot-org.html."},{"key":"e_1_2_1_30_1","unstructured":"Girls Who Code. 2021. Retrieved from http:\/\/girlswhocode.com\/.  Girls Who Code. 2021. Retrieved from http:\/\/girlswhocode.com\/."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"L. E. Glaze and L. M. Maruschack. 2009. Parents in prison and their minor children. Retrieved from https:\/\/www.bjs.gov\/content\/pub\/pdf\/pptmc.pdf.  L. E. Glaze and L. M. Maruschack. 2009. Parents in prison and their minor children. Retrieved from https:\/\/www.bjs.gov\/content\/pub\/pdf\/pptmc.pdf.","DOI":"10.1037\/e513862010-001"},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Joanna Goode Rachel Estrella and Jane Margolis. 2006. Lost in translation: Gender and high school computer science. In Women and Information Technology: Research on Underrepresentation J. M. Cohoon and W. Aspray (Eds.).  Joanna Goode Rachel Estrella and Jane Margolis. 2006. Lost in translation: Gender and high school computer science. In Women and Information Technology: Research on Underrepresentation J. M. Cohoon and W. Aspray (Eds.).","DOI":"10.7551\/mitpress\/9780262033459.003.0003"},{"key":"e_1_2_1_33_1","unstructured":"Google for Education. 2021. Exploring Computational Thinking Resources. Retrieved from https:\/\/edu.google.com\/resources\/programs\/exploring-computational-thinking\/.  Google for Education. 2021. Exploring Computational Thinking Resources. Retrieved from https:\/\/edu.google.com\/resources\/programs\/exploring-computational-thinking\/."},{"key":"e_1_2_1_34_1","unstructured":"The Initiative for Race Research and Justice at Peabody College--Vanderbilt University. 2021. Retrieved from https:\/\/peabody.vanderbilt.edu\/\/.  The Initiative for Race Research and Justice at Peabody College--Vanderbilt University. 2021. Retrieved from https:\/\/peabody.vanderbilt.edu\/\/."},{"key":"e_1_2_1_35_1","volume-title":"The Practice of Qualitative Research","author":"Hesse-Biber Sharlene Nagy","unstructured":"Sharlene Nagy Hesse-Biber and Patricia Leavy . 2010. The Practice of Qualitative Research . Sage . Sharlene Nagy Hesse-Biber and Patricia Leavy. 2010. The Practice of Qualitative Research. Sage."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810543.1810614"},{"key":"e_1_2_1_37_1","article-title":"Returning to the digital world: Technology use and privacy management of women transitioning from incarceration","author":"Seo Hyunjin Hyunjin","year":"2020","unstructured":"Hyunjin Hyunjin Seo , Hannah Britton , Megha Ramaswamy , Darcey Altschwager , Matthew Blomberg , Olushola Aromona , Bernard Schuster , Ellie Booton , Marilyn Ault , and Joi Wickliffe . 2020 . Returning to the digital world: Technology use and privacy management of women transitioning from incarceration . Assoc. Educ. J. Mass Commun. ( August 2020). Retrieved from http:\/\/aejmc.org\/events\/sanfrancisco20\/friday-schedule\/. Hyunjin Hyunjin Seo, Hannah Britton, Megha Ramaswamy, Darcey Altschwager, Matthew Blomberg, Olushola Aromona, Bernard Schuster, Ellie Booton, Marilyn Ault, and Joi Wickliffe. 2020. Returning to the digital world: Technology use and privacy management of women transitioning from incarceration. Assoc. Educ. J. Mass Commun. (August 2020). Retrieved from http:\/\/aejmc.org\/events\/sanfrancisco20\/friday-schedule\/.","journal-title":"Assoc. Educ. J. Mass Commun."},{"key":"e_1_2_1_38_1","volume-title":"Women in Engineering","author":"IEEE","year":"2021","unstructured":"IEEE WIE : Women in Engineering . 2021 . A global network of Women in Technology. Retrieved from https:\/\/wie.ieee.org\/. IEEE WIE: Women in Engineering. 2021. A global network of Women in Technology. Retrieved from https:\/\/wie.ieee.org\/."},{"key":"e_1_2_1_39_1","unstructured":"Justice Resource Institute. 2021. Retrieved from https:\/\/jri.org\/.  Justice Resource Institute. 2021. Retrieved from https:\/\/jri.org\/."},{"key":"e_1_2_1_40_1","volume-title":"Improving recidivism as a performance measure","author":"King Ryan","year":"2014","unstructured":"Ryan King and Brian Elderbroom . 2014. Improving recidivism as a performance measure . Justice Policy Center Brief (October 2014 ). Retrieved from https:\/\/bja.ojp.gov\/sites\/g\/files\/xyckuh186\/files\/media\/document\/UI-ImprovingRecidivism.pdf. Ryan King and Brian Elderbroom. 2014. Improving recidivism as a performance measure. Justice Policy Center Brief (October 2014). Retrieved from https:\/\/bja.ojp.gov\/sites\/g\/files\/xyckuh186\/files\/media\/document\/UI-ImprovingRecidivism.pdf."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems. 1--12","author":"King Ryan","year":"2019","unstructured":"Ryan King and Brian Elderbroom . 2019 . Improving recidivism as a performance measure . In Proceedings of the Conference on Human Factors in Computing Systems. 1--12 . DOI:https:\/\/doi.org\/10.1145\/3290605.3300744 10.1145\/3290605.3300744 Ryan King and Brian Elderbroom. 2019. Improving recidivism as a performance measure. In Proceedings of the Conference on Human Factors in Computing Systems. 1--12. DOI:https:\/\/doi.org\/10.1145\/3290605.3300744"},{"key":"e_1_2_1_42_1","article-title":"With No Google, the Incarcerated Wait for the","author":"Kutner Max","year":"2015","unstructured":"Max Kutner . 2015 . With No Google, the Incarcerated Wait for the Mail. Newsweek. Retrieved from https:\/\/www.newsweek.com\/people-behind-bars-google-answers-arrive-mail-301836. Max Kutner. 2015. With No Google, the Incarcerated Wait for the Mail. Newsweek. Retrieved from https:\/\/www.newsweek.com\/people-behind-bars-google-answers-arrive-mail-301836.","journal-title":"Mail. Newsweek. Retrieved from https:\/\/www.newsweek.com\/people-behind-bars-google-answers-arrive-mail-301836."},{"key":"e_1_2_1_43_1","unstructured":"M. Hinton. 2016. Big racial gender gaps seen in computer science education. Retrieved from https:\/\/blogs.edweek.org\/edweek\/curriculum\/2016\/10\/big_racial_gender_gaps_seen_in_computer_science_education.html.  M. Hinton. 2016. Big racial gender gaps seen in computer science education. Retrieved from https:\/\/blogs.edweek.org\/edweek\/curriculum\/2016\/10\/big_racial_gender_gaps_seen_in_computer_science_education.html."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.17763\/haer.81.2.t022245n7x4752v2"},{"key":"e_1_2_1_45_1","volume-title":"Unlocking the Clubhouse: Women in Computing","author":"Margolis Jane","unstructured":"Jane Margolis and Allan Fisher . 2002. Unlocking the Clubhouse: Women in Computing . The MIT Press , Cambridge, MA . Jane Margolis and Allan Fisher. 2002. Unlocking the Clubhouse: Women in Computing. The MIT Press, Cambridge, MA."},{"key":"e_1_2_1_46_1","first-page":"104","article-title":"The anatomy of interest: Women in undergraduate computer science","volume":"28","author":"Margolis Jane","year":"2000","unstructured":"Jane Margolis , Allan Fisher , and Faye Miller . 2000 . The anatomy of interest: Women in undergraduate computer science . Wom. Stud. Quart. 28 , 1\/2 (2000), 104 -- 127 . Jane Margolis, Allan Fisher, and Faye Miller. 2000. The anatomy of interest: Women in undergraduate computer science. Wom. Stud. Quart. 28, 1\/2 (2000), 104--127.","journal-title":"Wom. Stud. Quart."},{"key":"e_1_2_1_47_1","first-page":"4","article-title":"How to recruit women and girls to the science, technology, engineering, and math (STEM) classroom","volume":"71","author":"Milgram Donna","year":"2011","unstructured":"Donna Milgram . 2011 . How to recruit women and girls to the science, technology, engineering, and math (STEM) classroom . Technol. Eng. Teach. 71 , 3 (2011), 4 . Donna Milgram. 2011. How to recruit women and girls to the science, technology, engineering, and math (STEM) classroom. Technol. Eng. Teach. 71, 3 (2011), 4.","journal-title":"Technol. Eng. Teach."},{"key":"e_1_2_1_48_1","volume-title":"Minton and Zhen Zeng","author":"Todd","year":"2016","unstructured":"Todd D. Minton and Zhen Zeng . 2016 . Jail inmates in 2015. NCJ 250394 (2016). https:\/\/www.bjs.gov\/content\/pub\/pdf\/ji15.pdf. Todd D. Minton and Zhen Zeng. 2016. Jail inmates in 2015. NCJ 250394 (2016). https:\/\/www.bjs.gov\/content\/pub\/pdf\/ji15.pdf."},{"key":"e_1_2_1_49_1","unstructured":"Operation Restoration. 2021. Retrieved from https:\/\/or-nola.org\/.  Operation Restoration. 2021. Retrieved from https:\/\/or-nola.org\/."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377426"},{"key":"e_1_2_1_51_1","volume-title":"Rubin","author":"Rubin Herbert J.","year":"2011","unstructured":"Herbert J. Rubin and Irene S . Rubin . 2011 . Qualitative Interviewing : The Art of Hearing Data. Sage . Herbert J. Rubin and Irene S. Rubin. 2011. Qualitative Interviewing: The Art of Hearing Data. Sage."},{"key":"e_1_2_1_52_1","volume-title":"The gender divide: Tracking women\u2019s state prison growth. Pris. Polic. Init. 9","author":"Sawyer Wendy","year":"2018","unstructured":"Wendy Sawyer . 2018. The gender divide: Tracking women\u2019s state prison growth. Pris. Polic. Init. 9 ( 2018 ). Wendy Sawyer. 2018. The gender divide: Tracking women\u2019s state prison growth. Pris. Polic. Init. 9 (2018)."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/0042085913491219"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/00909882.2019.1587176"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813495162"},{"key":"e_1_2_1_56_1","first-page":"2019","article-title":"Pew Research Center","volume":"12","author":"Sheet Mobile Fact","year":"2019","unstructured":"Mobile Fact Sheet . 2019 . Pew Research Center , Internet and Technology . June 12 , 2019 . https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/. Mobile Fact Sheet. 2019. Pew Research Center, Internet and Technology. June 12, 2019. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/.","journal-title":"Internet and Technology"},{"key":"e_1_2_1_57_1","first-page":"273","article-title":"Grounded theory methodology","volume":"17","author":"Strauss Anselm","year":"1994","unstructured":"Anselm Strauss and Juliet Corbin . 1994 . Grounded theory methodology . Handb. Qualit. Res. 17 , 1 (1994), 273 -- 285 . Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology. Handb. Qualit. Res. 17, 1 (1994), 273--285.","journal-title":"Handb. Qualit. Res."},{"key":"e_1_2_1_58_1","volume-title":"Overlooked: Women and Jails in an Era of Reform","author":"Swavola Elizabeth","year":"2016","unstructured":"Elizabeth Swavola , Kristine Riley , and Ram Subramanian . 2016 . Overlooked: Women and Jails in an Era of Reform . Vera Institute of Justice , New York, NY . Elizabeth Swavola, Kristine Riley, and Ram Subramanian. 2016. Overlooked: Women and Jails in an Era of Reform. Vera Institute of Justice, New York, NY."},{"key":"e_1_2_1_59_1","volume-title":"What it means, how to respond","author":"Industrial Revolution The Fourth","year":"2016","unstructured":"The Fourth Industrial Revolution : What it means, how to respond . 2016 . Retrieved from https:\/\/www.weforum.org\/agenda\/2016\/01\/the-fourth-industrial-revolution-what-it-means-and-how-to-respond\/. The Fourth Industrial Revolution: What it means, how to respond. 2016. Retrieved from https:\/\/www.weforum.org\/agenda\/2016\/01\/the-fourth-industrial-revolution-what-it-means-and-how-to-respond\/."},{"key":"e_1_2_1_60_1","unstructured":"The International Justice and Public Safety Network. 2020. Retrieved from https:\/\/www.nlets.org\/.  The International Justice and Public Safety Network. 2020. Retrieved from https:\/\/www.nlets.org\/."},{"key":"e_1_2_1_61_1","first-page":"110","article-title":"Student interest and choice in programming assignments","volume":"26","author":"Torrey Lisa","year":"2011","unstructured":"Lisa Torrey . 2011 . Student interest and choice in programming assignments . J. Comput. Sci. Coll. 26 , 6 (2011), 110 -- 116 . Lisa Torrey. 2011. Student interest and choice in programming assignments. J. Comput. Sci. Coll. 26, 6 (2011), 110--116.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701307396"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.01.003"}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3425711","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3425711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,13]]},"references-count":64,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6,30]]}},"alternative-id":["10.1145\/3425711"],"URL":"https:\/\/doi.org\/10.1145\/3425711","relation":{},"ISSN":["1946-6226"],"issn-type":[{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,13]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}