Gender-inclusive HCI research and design: A conceptual review

S Stumpf, A Peters, S Bardzell, M Burnett… - … and Trends® in …, 2020 - nowpublishers.com
Previous research has investigated gender and its implications for HCI. We consider
inclusive design of technology whatever the gender of its users of particular importance. This …

From gender biases to gender-inclusive design: An empirical investigation

M Vorvoreanu, L Zhang, YH Huang… - Proceedings of the …, 2019 - dl.acm.org
In recent years, research has revealed gender biases in numerous software products. But
although some researchers have found ways to improve gender participation in specific …

GenderMag: A method for evaluating software's gender inclusiveness

M Burnett, S Stumpf, J Macbeth, S Makri… - Interacting with …, 2016 - academic.oup.com
In recent years, research into gender differences has established that individual differences
in how people problem-solve often cluster by gender. Research also shows that these …

What did my AI learn? How data scientists make sense of model behavior

ÁA Cabrera, M Tulio Ribeiro, B Lee, R Deline… - ACM Transactions on …, 2023 - dl.acm.org
Data scientists require rich mental models of how AI systems behave to effectively train,
debug, and work with them. Despite the prevalence of AI analysis tools, there is no general …

Finding gender-inclusiveness software issues with GenderMag: A field investigation

M Burnett, A Peters, C Hill, N Elarief - … of the 2016 CHI conference on …, 2016 - dl.acm.org
Gender inclusiveness in computing settings is receiving a lot of attention, but one potentially
critical factor has mostly been overlooked--software itself. To help close this gap, we recently …

Social influences on secure development tool adoption: why security tools spread

S Xiao, J Witschey, E Murphy-Hill - … of the 17th ACM conference on …, 2014 - dl.acm.org
Security tools can help developers build more secure software systems by helping
developers detect or fix security vulnerabilities in source code. However, developers do not …

Battling gender stereotypes: A user study of a code-learning game,“Code Combat,” with middle school children

Y Yücel, K Rızvanoğlu - Computers in Human Behavior, 2019 - Elsevier
Gender has been consistently controlled as a variable in usability and playability tests.
However, there is no consensus on whether and how gender differences should influence …

Empowering end users in debugging trigger-action rules

F Corno, L De Russis, A Monge Roffarello - Proceedings of the 2019 …, 2019 - dl.acm.org
End users can program trigger-action rules to personalize the joint behavior of their smart
devices and online services. Trigger-action programming is, however, a complex task for …

Spreadsheet quality assurance: a literature review

PL Poon, MF Lau, YT Yu, SF Tang - Frontiers of Computer Science, 2024 - Springer
Spreadsheets are very common for information processing to support decision making by
both professional developers and non-technical end users. Moreover, business intelligence …

How developers diagnose potential security vulnerabilities with a static analysis tool

J Smith, B Johnson, E Murphy-Hill… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
While using security tools to resolve security defects, software developers must apply
considerable effort. Success depends on a developer's ability to interact with tools, ask the …