{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:10:42Z","timestamp":1771045842960,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,17]]},"DOI":"10.1145\/3564721.3564727","type":"proceedings-article","created":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T23:17:42Z","timestamp":1668295062000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["How Gender, Ethnicity, and Public Presentation Shape Coding Perseverance after Hackathons"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7127-5939","authenticated-orcid":false,"given":"Emilia","family":"Gan","sequence":"first","affiliation":[{"name":"University of Washington, United States"}]},{"given":"Tyler","family":"Menezes","sequence":"additional","affiliation":[{"name":"CodeDay, United States"}]},{"given":"Benjamin Mako","family":"Hill","sequence":"additional","affiliation":[{"name":"University of Washington, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"What do we mean by broadening participation? Race, inequality, and diversity in tech work. Sociology Compass 14 (03","author":"Alegria Sharla","year":"2020","unstructured":"Sharla Alegria . 2020. What do we mean by broadening participation? Race, inequality, and diversity in tech work. Sociology Compass 14 (03 2020 ). https:\/\/doi.org\/10.1111\/soc4.12793 10.1111\/soc4.12793 Sharla Alegria. 2020. What do we mean by broadening participation? Race, inequality, and diversity in tech work. Sociology Compass 14 (03 2020). https:\/\/doi.org\/10.1111\/soc4.12793"},{"key":"e_1_3_2_1_2_1","volume-title":"Digital Innovation: The Hackathon Phenomenon","author":"Briscoe Gerard","year":"2014","unstructured":"Gerard Briscoe . 2014 . Digital Innovation: The Hackathon Phenomenon . http:\/\/www.creativeworkslondon.org.uk\/wp-content\/uploads\/2013\/11\/Digital-Innovation-The-Hackathon-Phenomenon.pdf Accessed: 2022-03-08. Gerard Briscoe. 2014. Digital Innovation: The Hackathon Phenomenon. http:\/\/www.creativeworkslondon.org.uk\/wp-content\/uploads\/2013\/11\/Digital-Innovation-The-Hackathon-Phenomenon.pdf Accessed: 2022-03-08."},{"key":"e_1_3_2_1_3_1","unstructured":"Yahsmene Butler. 2021. 2020 Wrapped. https:\/\/www.hackthegap.com\/blog\/overcoming-2020 Accessed: 2021-08-12.  Yahsmene Butler. 2021. 2020 Wrapped. https:\/\/www.hackthegap.com\/blog\/overcoming-2020 Accessed: 2021-08-12."},{"key":"e_1_3_2_1_4_1","volume-title":"Explaining Underrepresentation: A Theory of Precluded Interest. Sex roles 63, 7","author":"Cheryan Sapna","year":"2010","unstructured":"Sapna Cheryan and Victoria\u00a0 C Plaut . 2010 . Explaining Underrepresentation: A Theory of Precluded Interest. Sex roles 63, 7 (2010), 475\u2013488. Sapna Cheryan and Victoria\u00a0C Plaut. 2010. Explaining Underrepresentation: A Theory of Precluded Interest. Sex roles 63, 7 (2010), 475\u2013488."},{"key":"e_1_3_2_1_5_1","volume-title":"Ambient belonging: how stereotypical cues impact gender participation in computer science.Journal of personality and social psychology 97 6","author":"Cheryan Sapna","year":"2009","unstructured":"Sapna Cheryan , Victoria\u00a0 C. Plaut , Paul\u00a0 G. Davies , and Claude\u00a0 M. Steele . 2009. Ambient belonging: how stereotypical cues impact gender participation in computer science.Journal of personality and social psychology 97 6 ( 2009 ), 1045\u201360. Sapna Cheryan, Victoria\u00a0C. Plaut, Paul\u00a0G. Davies, and Claude\u00a0M. Steele. 2009. Ambient belonging: how stereotypical cues impact gender participation in computer science.Journal of personality and social psychology 97 6 (2009), 1045\u201360."},{"key":"e_1_3_2_1_6_1","unstructured":"CodeDay. 2021. CodeDay Homepage. https:\/\/www.codeday.org\/ Accessed: 2021-07-29.  CodeDay. 2021. CodeDay Homepage. https:\/\/www.codeday.org\/ Accessed: 2021-07-29."},{"key":"e_1_3_2_1_7_1","volume-title":"Special Report: Diversity in High Tech. https:\/\/www.eeoc.gov\/special-report\/diversity-high-tech","author":"U.S. Equal Employment\u00a0Opportunity Commission","year":"2016","unstructured":"U.S. Equal Employment\u00a0Opportunity Commission . 2016 . Special Report: Diversity in High Tech. https:\/\/www.eeoc.gov\/special-report\/diversity-high-tech U.S. Equal Employment\u00a0Opportunity Commission. 2016. Special Report: Diversity in High Tech. https:\/\/www.eeoc.gov\/special-report\/diversity-high-tech"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344211"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3064435"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274323"},{"key":"e_1_3_2_1_11_1","volume-title":"High School Hackathons","year":"2022","unstructured":"HackClub. 2022. High School Hackathons in 2022 . https:\/\/hackathons.hackclub.com\/ Accessed : 2022-02-24. HackClub. 2022. High School Hackathons in 2022. https:\/\/hackathons.hackclub.com\/ Accessed: 2022-02-24."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488042.3490175"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/00187267211070769"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/543812.543826"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316287.3316292"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"Increasing Minority Youths\u2019 Participation in Computing through near-Peer Mentorship","volume":"35","author":"Lee J.","year":"2019","unstructured":"Michael\u00a0 J. Lee . 2019 . Increasing Minority Youths\u2019 Participation in Computing through near-Peer Mentorship . J. Comput. Sci. Coll. 35 , 3 (Oct. 2019), 47\u201356. Michael\u00a0J. Lee. 2019. Increasing Minority Youths\u2019 Participation in Computing through near-Peer Mentorship. J. Comput. Sci. Coll. 35, 3 (Oct. 2019), 47\u201356.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_17_1","volume-title":"Unlocking the clubhouse : women in computing","author":"Margolis Jane","unstructured":"Jane Margolis and Allan Fisher . 2002. Unlocking the clubhouse : women in computing . MIT Press , Cambridge, Mass . Jane Margolis and Allan Fisher. 2002. Unlocking the clubhouse : women in computing. MIT Press, Cambridge, Mass."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/44.808844"},{"key":"e_1_3_2_1_19_1","volume-title":"Stuck in the Shallow End - Education, Race, and Computing","author":"Margolis Jane","unstructured":"Jane Margolis , Joanna Goode , Rachel Estrella , Kimberly Nao , and Jennifer\u00a0Jellison Holme . 2019. Stuck in the Shallow End - Education, Race, and Computing . The MIT Press . Jane Margolis, Joanna Goode, Rachel Estrella, Kimberly Nao, and Jennifer\u00a0Jellison Holme. 2019. Stuck in the Shallow End - Education, Race, and Computing. The MIT Press."},{"key":"e_1_3_2_1_20_1","unstructured":"[\n  20\n  ]  Tyler Menezes.2021. personal communication.  [20] Tyler Menezes.2021. personal communication."},{"key":"e_1_3_2_1_21_1","unstructured":"MLH. 2022. What is Major League Hacking?https:\/\/mlh.io\/about Accessed: 2022-02-24.  MLH. 2022. What is Major League Hacking?https:\/\/mlh.io\/about Accessed: 2022-02-24."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844590"},{"key":"e_1_3_2_1_23_1","unstructured":"OpenBSD. 2022. OpenBSD hackathons. https:\/\/openbsd.org\/hackathons.html Accessed: 2022-02-24.  OpenBSD. 2022. OpenBSD hackathons. https:\/\/openbsd.org\/hackathons.html Accessed: 2022-02-24."},{"key":"#cr-split#-e_1_3_2_1_24_1.1","doi-asserted-by":"crossref","unstructured":"F.\u00a0C. Pampel. 2000. Logistic Regression. https:\/\/doi.org\/10.4135\/9781412984805 10.4135\/9781412984805","DOI":"10.4135\/9781412984805"},{"key":"#cr-split#-e_1_3_2_1_24_1.2","doi-asserted-by":"crossref","unstructured":"F.\u00a0C. Pampel. 2000. Logistic Regression. https:\/\/doi.org\/10.4135\/9781412984805","DOI":"10.4135\/9781412984805"},{"key":"e_1_3_2_1_25_1","unstructured":"PennApps. 2022. PennApps The Original College Hackathon. https:\/\/pennapps.com Accessed: 2022-02-24.  PennApps. 2022. PennApps The Original College Hackathon. https:\/\/pennapps.com Accessed: 2022-02-24."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025637"},{"key":"e_1_3_2_1_27_1","unstructured":"Kjetil Raaen and Per Lauv\u00e5s. 2018. How companies find and evaluate graduate computer programmers. In NIK. https:\/\/ojs.bibsys.no\/index.php\/NIK\/issue\/view\/41 Accessed: 2022-03-08.  Kjetil Raaen and Per Lauv\u00e5s. 2018. How companies find and evaluate graduate computer programmers. In NIK. https:\/\/ojs.bibsys.no\/index.php\/NIK\/issue\/view\/41 Accessed: 2022-03-08."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0431"},{"key":"e_1_3_2_1_29_1","volume-title":"Hackathons for Workforce Development: A Case Study. In International Conference on Game Jams, Hackathons and Game Creation Events 2020","author":"Ru Amy","year":"2020","unstructured":"Amy Ru and Foaad Khosmood . 2020 . Hackathons for Workforce Development: A Case Study. In International Conference on Game Jams, Hackathons and Game Creation Events 2020 ( Osaka, Japan) (ICGJ20). Association for Computing Machinery, New York, NY, USA, 30\u201333. https:\/\/doi.org\/10.1145\/3409456.3409462 10.1145\/3409456.3409462 Amy Ru and Foaad Khosmood. 2020. Hackathons for Workforce Development: A Case Study. In International Conference on Game Jams, Hackathons and Game Creation Events 2020 (Osaka, Japan) (ICGJ20). Association for Computing Machinery, New York, NY, USA, 30\u201333. https:\/\/doi.org\/10.1145\/3409456.3409462"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-016-0694-y"},{"key":"e_1_3_2_1_31_1","unstructured":"James Tetazoo. 2021. Who\u2019s going to MLH hackathons?https:\/\/news.mlh.io\/mlh-hackathon-demographics-09-03-2019 Accessed: 2021-08-11.  James Tetazoo. 2021. Who\u2019s going to MLH hackathons?https:\/\/news.mlh.io\/mlh-hackathon-demographics-09-03-2019 Accessed: 2021-08-11."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113041"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"G. Walton Geoffrey\u00a0L. Cohen David Cwir and S. Spencer. 2012. Mere belonging: the power of social connections.Journal of personality and social psychology 102 3 (2012) 513\u201332.  G. Walton Geoffrey\u00a0L. Cohen David Cwir and S. Spencer. 2012. Mere belonging: the power of social connections.Journal of personality and social psychology 102 3 (2012) 513\u201332.","DOI":"10.1037\/a0025731"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.92.1.82"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017734"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105726.3106174"},{"key":"e_1_3_2_1_37_1","unstructured":"Womxn\/Hacks. 2021. Womxn\/Hacks Homepage. https:\/\/www.womxnhacks.com\/ Accessed: 2021-08-12.  Womxn\/Hacks. 2021. Womxn\/Hacks Homepage. https:\/\/www.womxnhacks.com\/ Accessed: 2021-08-12."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1108\/S0277-283320170000031005"}],"event":{"name":"Koli 2022: 22nd Koli Calling International Conference on Computing Education Research","location":"Koli Finland","acronym":"Koli 2022"},"container-title":["Proceedings of the 22nd Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564721.3564727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564721.3564727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:30Z","timestamp":1750182570000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564721.3564727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,17]]},"references-count":39,"alternative-id":["10.1145\/3564721.3564727","10.1145\/3564721"],"URL":"https:\/\/doi.org\/10.1145\/3564721.3564727","relation":{},"subject":[],"published":{"date-parts":[[2022,11,17]]},"assertion":[{"value":"2022-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}