default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 54 matches
- 2018
- Anna Agafonova, Cornelia Connolly, Nicola Marsden:
Sexism in remote collaboration in student teams. GenderIT 2018: 183-189 - Michael Ahmadi, Anne Weibert, Corinna Ogonowski, Konstantin Aal, Kristian Gäckle, Nicola Marsden, Volker Wulf:
Challenges and lessons learned by applying living labs in gender and IT contexts. GenderIT 2018: 239-249 - Alice Ashcroft:
"A nice brain teaser". GenderIT 2018: 55-58 - Helena Barke:
How many story points for diversity?: estimation as a chance for diversity reflexion. GenderIT 2018: 221-223 - Philipp Brauner, Martina Ziefle, Ulrik Schroeder, Thiemo Leonhardt, Nadine Bergner, Birgit Ziegler:
Gender influences on school students' mental models of computer science: a quantitative rich picture analysis with sixth graders. GenderIT 2018: 113-122 - Sandra Buchmüller, Corinna Bath, Roman Henze:
To whom does the driver's seat belong in the future?: a case of negotiation between gender studies and automotive engineering. GenderIT 2018: 165-174 - Simone Burel:
Gender audit: linguistic approach to gender stereotypes in online communication. GenderIT 2018: 59-61 - Hilde G. Corneliussen, Fay Tveranger:
Programming in secondary schools in Norway: a wasted opportunity for inclusion. GenderIT 2018: 175-182 - Cecile K. M. Crutzen:
The critical transformative room "elite sport" as phenomenon. GenderIT 2018: 71-73 - Claude Draude, Susanne Maaß:
Making IT work: integrating gender research in computing through a process model. GenderIT 2018: 43-50 - Diana Drechsel:
Research-based gender competences as a professional skill in STEM exemplified by the "fix-IT. fixing IT for women" project. GenderIT 2018: 147-151 - Bettina Finzel, Hannah Deininger, Ute Schmid:
From beliefs to intention: mentoring as an approach to motivate female high school students to enrol in computer science studies. GenderIT 2018: 251-260 - Silvia Förtsch:
Find the right role: specialist vs. management career - individual career coaching for IT specialists. GenderIT 2018: 135-137 - Swetlana Franken, Johanna Schenk, Malte Wattenberg:
Gender-specific attitudes and competences of young professionals in the context of digitalization. GenderIT 2018: 139-141 - Kristian Gäckle, Tim Reichert, Nicola Marsden:
Virtual reality or virtuous reality?: how gender stereotypes limit access to virtual reality. GenderIT 2018: 143-145 - Sabine Hastedt, Ulrike Erb:
Gender sensitive design of e-learning applications: online-education in gender competences. GenderIT 2018: 237-238 - Blake W. Hawkins, Ryan Burns:
Queering (meta)data ontologies. GenderIT 2018: 233-234 - Blake W. Hawkins, Oliver L. Haimson:
Building an online community of care: Tumblr use by transgender individuals. GenderIT 2018: 75-77 - Karen Holtzblatt:
The @work experience framework: a guide for retaining women in technology. GenderIT 2018: 1 - Dennis Hummel, Sinja Herbertz, Alexander Mädche:
Biological sex vs. psychological gender-roles in online channel choices: evidence from two studies in the financial services industry. GenderIT 2018: 199-208 - Melanie Irrgang:
Hands-on participatory and interdisciplinary design in computer science: an example. GenderIT 2018: 29-33 - Yves Jeanrenaud, Alexandra Sept, Jenny Schnaller, Susanne Ihsen:
Study decisions, entrance and academic success of women and men in STEM. GenderIT 2018: 157-160 - Robin C. Ladwig, Evelyn C. Ferstl:
What's in a name?: an online survey on gender stereotyping of humanoid social robots. GenderIT 2018: 67-69 - Johanna Levy:
'It's your period and therefore it has to be pink and you are a girl': users' experiences of (de-)gendered menstrual app design. GenderIT 2018: 63-65 - Katharina Losch:
Impacts of female doctoral researchers from China and India on the 'masculinized' disciplinary culture of german computer science. GenderIT 2018: 153-155 - Marion Mangelsdorf, Ronja Mikoleit, Sigrid Schmitz, Daniel Fetzner:
Gendering marteloscopes: digitalization of gender-knowledge in STEM. GenderIT 2018: 225-227 - Andrea Marshall, Jennifer A. Rode:
Deconstructing sociotechnical identity in maker cultures. GenderIT 2018: 91-100 - Akiko Orita:
What is your "formal" name?: situational usage of surnames in Japanese social life. GenderIT 2018: 161-163 - Monika Pröbster, Julia Hermann, Nicola Marsden:
Digital training in tech: a matter of gender? GenderIT 2018: 11-18 - Kerstin Raudonat, Nicola Marsden:
Social actions in MMORPG raiding groups from the perspective of culture-inclusive action theory. GenderIT 2018: 101-111
skipping 24 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 01:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint