Gender-inclusive HCI research and design: A conceptual review
Previous research has investigated gender and its implications for HCI. We consider
inclusive design of technology whatever the gender of its users of particular importance. This …
inclusive design of technology whatever the gender of its users of particular importance. This …
From gender biases to gender-inclusive design: An empirical investigation
M Vorvoreanu, L Zhang, YH Huang… - Proceedings of the …, 2019 - dl.acm.org
In recent years, research has revealed gender biases in numerous software products. But
although some researchers have found ways to improve gender participation in specific …
although some researchers have found ways to improve gender participation in specific …
GenderMag: A method for evaluating software's gender inclusiveness
In recent years, research into gender differences has established that individual differences
in how people problem-solve often cluster by gender. Research also shows that these …
in how people problem-solve often cluster by gender. Research also shows that these …
What did my AI learn? How data scientists make sense of model behavior
Data scientists require rich mental models of how AI systems behave to effectively train,
debug, and work with them. Despite the prevalence of AI analysis tools, there is no general …
debug, and work with them. Despite the prevalence of AI analysis tools, there is no general …
Finding gender-inclusiveness software issues with GenderMag: A field investigation
Gender inclusiveness in computing settings is receiving a lot of attention, but one potentially
critical factor has mostly been overlooked--software itself. To help close this gap, we recently …
critical factor has mostly been overlooked--software itself. To help close this gap, we recently …
Social influences on secure development tool adoption: why security tools spread
S Xiao, J Witschey, E Murphy-Hill - … of the 17th ACM conference on …, 2014 - dl.acm.org
Security tools can help developers build more secure software systems by helping
developers detect or fix security vulnerabilities in source code. However, developers do not …
developers detect or fix security vulnerabilities in source code. However, developers do not …
Battling gender stereotypes: A user study of a code-learning game,“Code Combat,” with middle school children
Y Yücel, K Rızvanoğlu - Computers in Human Behavior, 2019 - Elsevier
Gender has been consistently controlled as a variable in usability and playability tests.
However, there is no consensus on whether and how gender differences should influence …
However, there is no consensus on whether and how gender differences should influence …
Empowering end users in debugging trigger-action rules
End users can program trigger-action rules to personalize the joint behavior of their smart
devices and online services. Trigger-action programming is, however, a complex task for …
devices and online services. Trigger-action programming is, however, a complex task for …
Spreadsheet quality assurance: a literature review
PL Poon, MF Lau, YT Yu, SF Tang - Frontiers of Computer Science, 2024 - Springer
Spreadsheets are very common for information processing to support decision making by
both professional developers and non-technical end users. Moreover, business intelligence …
both professional developers and non-technical end users. Moreover, business intelligence …
How developers diagnose potential security vulnerabilities with a static analysis tool
While using security tools to resolve security defects, software developers must apply
considerable effort. Success depends on a developer's ability to interact with tools, ask the …
considerable effort. Success depends on a developer's ability to interact with tools, ask the …