{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T11:17:41Z","timestamp":1726226261969},"reference-count":313,"publisher":"Springer Science and Business Media LLC","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Synthesis Lectures on Human-Centered Informatics"],"published-print":{"date-parts":[[2015,11,30]]},"DOI":"10.2200\/s00684ed1v01y201511hci033","type":"journal-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T00:34:04Z","timestamp":1450312444000},"page":"1-165","source":"Crossref","is-referenced-by-count":101,"title":["Learner-Centered Design of Computing Education: Research on Computing for Everyone"],"prefix":"10.1007","volume":"8","author":[{"given":"Mark","family":"Guzdial","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"p_1","volume-title":"Tech-Savvy: Educating Girls in the New Computer Age","author":"AAUW.","year":"2000"},{"key":"p_2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6933.001.0001","volume-title":"Turtle geometry: e computer as a medium for exploring mathematics","author":"Abelson H.","year":"1986"},{"key":"p_3","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493416"},{"issue":"8","key":"p_4","first-page":"10","volume":"32","author":"Alexander P. A.","year":"2003","journal-title":"Review of Educational Research"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734281"},{"key":"p_6","unstructured":"J. R. Anderson, F. Conrad, A. T. Corbett, J. M. Fincham, D. Hoffman, and Q. Wu. Computer programming and transfer, pages205-234. Lawrence Erlbaum Associates, Hillsdale, NJ, 1993. 29, 87"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953193"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1145\/362929.362976"},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.29"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2691947"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2014.7044464"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2014.7044267"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677282"},{"key":"p_15","first-page":"105","volume":"10","author":"Barker L. J.","year":"2002","journal-title":"ACM"},{"key":"p_16","volume-title":"http:\/\/www.bbc.co.uk\/programmes\/article s\/4hVG2Br1W1LKCmw8nSm9WnQ\/introducing-the-bbc-micro-bit","author":"BBC.","year":"2015"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157240"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1145\/2602485"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1145\/2382564.2382567"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1145\/1272848.1272879"},{"key":"p_21","first-page":"48","volume":"7","author":"Bereiter C.","year":"2013","journal-title":"Routledge"},{"key":"p_22","volume-title":"Weaving the Web: e original design and ultimate destiny of the World Wide Web by its Inventor","author":"Berners-Lee T.","year":"1999"},{"key":"p_25","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352274"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.011"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.1991.9653139"},{"key":"p_28","first-page":"53","volume-title":"Proceedings of the Tenth Conference on Australasian Computing Education -","volume":"78","author":"Bornat R.","year":"2008"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1207\/s15327809jls0202_2"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445277"},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.1145\/2602484"},{"key":"p_32","unstructured":"A. Bruckman. MOOSE Crossing: Construction, community, and learning in a networked virtual world for kids. Ph.D. thesis,MIT Media Lab, 1997. 98"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1508899"},{"key":"p_34","volume-title":"November","author":"Buechley L.","year":"2014"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1145\/273133.273178"},{"key":"p_38","unstructured":"S. M. Carver. Transfer of LOGO Debugging Skill: Analysis, Instruction, and Assessment. Ph.D. thesis,Carnegie Mellon University, Pittsburgh, PA, 1986. 47"},{"key":"p_39","doi-asserted-by":"publisher","DOI":"10.2190\/KRD4-YNHH-X283-3P5V"},{"key":"p_40","doi-asserted-by":"publisher","DOI":"10.1145\/1449814.1449888"},{"key":"p_41","doi-asserted-by":"publisher","DOI":"10.1145\/1513593.1513597"},{"key":"p_42","volume-title":"Adelaide","author":"Caspersen M. E.","year":"2013"},{"key":"p_43","volume-title":"San Francisco, computer science for all...soon. http: \/\/hechingerreport.org\/san-francisco-plans-to-be-first-large-districtto-bring-computer-science-to-all-grades\/","author":"Cenavskis A.","year":"2015"},{"key":"p_44","doi-asserted-by":"publisher","DOI":"10.1145\/1227504.1227408"},{"key":"p_45","volume-title":"Computer science coming to all Chicago Public Schools. http: \/\/www.chicagobusiness.com\/article\/20141208\/NEWS08\/141209789\/computerscience-coming-to-all-chicago-public-schools","author":"Business Chicago","year":"2014"},{"key":"p_46","volume-title":"Computing Research News, 26(5)","author":"Computing Research Association","year":"2014"},{"key":"p_47","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787728"},{"key":"p_49","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016938"},{"key":"p_50","doi-asserted-by":"publisher","DOI":"10.1119\/1.3446763"},{"key":"p_51","volume-title":"Kogan Page","author":"Daniel J. S.","year":"1996"},{"key":"p_52","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195111682.001.0001","volume-title":"Information ecology: Mastering the information and knowledge environment","author":"Davenport T. H.","year":"1997"},{"key":"p_53","doi-asserted-by":"publisher","DOI":"10.1037\/0893-3200.19.2.294"},{"key":"p_54","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787715"},{"key":"p_55","doi-asserted-by":"publisher","DOI":"10.1145\/52965.52975"},{"key":"p_56","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9809.001.0001","volume-title":"Great Principles of Computing","author":"Denning P.","year":"2015"},{"key":"p_57","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610265"},{"key":"p_58","doi-asserted-by":"publisher","DOI":"10.1145\/63238.63239"},{"key":"p_59","volume-title":"12th Koli Calling conference on computing education research","author":"Diethelm I.","year":"2012"},{"key":"p_60","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2014.112"},{"key":"p_61","doi-asserted-by":"publisher","DOI":"10.1145\/1822348.1822356"},{"key":"p_62","doi-asserted-by":"publisher","DOI":"10.1145\/1978542.1978552"},{"key":"p_63","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445292"},{"issue":"3","key":"p_64","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1080\/10508406.2014.893434","volume":"23","author":"DiSalvo E.","year":"2014","journal-title":"Journal of the Learning Sciences"},{"key":"p_66","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0101_1"},{"key":"p_67","doi-asserted-by":"publisher","DOI":"10.1145\/6592.6595"},{"issue":"117","key":"p_68","first-page":"10","volume":"2","author":"diSessa A. A.","journal-title":"Journal of Mathematical Behavior"},{"key":"p_69","volume-title":"November","author":"Bloggers Disney","year":"2014"},{"key":"p_70","volume-title":"How People Learn: Bridging Research and Practice","author":"Donovan M. S.","year":"1999"},{"key":"p_71","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016927"},{"key":"p_72","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151608"},{"key":"p_73","doi-asserted-by":"publisher","DOI":"10.1145\/1839594.1839600"},{"key":"p_74","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753430"},{"key":"p_75","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2007.35"},{"key":"p_76","unstructured":"B. J. Dorn. A case-based approach for supporting the informal computing education of enduser programmers. Ph.D. thesis,College of Computing, Georgia Instituteof Technology, Atlanta, GA,2012. 7, 72"},{"key":"p_77","doi-asserted-by":"publisher","DOI":"10.2190\/3LFX-9RRF-67T8-UVK9"},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(81)80056-9"},{"key":"p_79","doi-asserted-by":"publisher","DOI":"10.1145\/1384271.1384337"},{"key":"p_80","doi-asserted-by":"publisher","DOI":"10.1111\/j.1471-6402.1994.tb01049.x"},{"key":"p_81","doi-asserted-by":"publisher","DOI":"10.1080\/00461520902832368"},{"key":"p_82","doi-asserted-by":"publisher","DOI":"10.1080\/10413209108406432"},{"key":"p_84","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9780262050937.001.0001","volume-title":"e computer boys take over: Computers, programmers, and the politics of technical expertise","author":"Ensmenger N. L.","year":"2010"},{"key":"p_85","volume-title":"March","author":"Ericson B.","year":"2015"},{"key":"p_86","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538937"},{"key":"p_87","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538918"},{"key":"p_88","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047460"},{"key":"p_89","doi-asserted-by":"publisher","DOI":"10.1145\/1227504.1227416"},{"key":"p_90","doi-asserted-by":"publisher","DOI":"10.1145\/2818314.2818335"},{"key":"p_91","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787731"},{"key":"p_92","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.100.3.363"},{"key":"p_93","volume-title":"How to design programs","author":"Felleisen M.","year":"2001"},{"key":"p_94","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538803"},{"key":"p_95","doi-asserted-by":"publisher","DOI":"10.1145\/2670757.2670768"},{"key":"p_96","doi-asserted-by":"publisher","DOI":"10.1145\/1089786.1089797"},{"key":"p_97","volume-title":"Computer Science Education Research","author":"Fincher S.","year":"2004"},{"key":"p_98","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2006.tb00902.x"},{"key":"p_99","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632346"},{"key":"p_100","doi-asserted-by":"publisher","DOI":"10.1145\/330908.331854"},{"key":"p_101","doi-asserted-by":"publisher","DOI":"10.1109\/HCC.2003.1260252"},{"key":"p_102","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265259"},{"key":"p_103","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2004.842924"},{"key":"p_104","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953352"},{"key":"p_105","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1319030111"},{"key":"p_106","doi-asserted-by":"publisher","DOI":"10.1145\/1227504.1227456"},{"key":"p_107","first-page":"13","author":"Gal-Ezer J.","year":"2009","journal-title":"Journal for Computing Teachers"},{"key":"p_108","doi-asserted-by":"publisher","DOI":"10.1145\/2602483"},{"key":"p_109","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445384"},{"key":"p_110","first-page":"304","volume-title":"Literacy in Traditional Societies","author":"Goody J.","year":"1968"},{"key":"p_111","first-page":"104","volume":"65","author":"Ed Google CS","year":"2014","journal-title":"Google"},{"key":"p_112","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677306"},{"key":"p_113","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1977.tb00363.x"},{"key":"p_114","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157214"},{"key":"p_115","volume-title":"Computers and the World of the Future","author":"Greenberger M.","year":"1962"},{"key":"p_116","unstructured":"S. Grover. Foundations for advancing computational thinking: Balanced designs for deeper learning in an online computer science course for middle school students. Ph.D. thesis,Stanford University, 2014. 98"},{"key":"p_117","volume-title":"ICLS 2014 Proceedings. International Society for the Learning Sciences, International Society for the Learning Sciences","author":"Grover S.","year":"2014"},{"key":"p_118","doi-asserted-by":"publisher","DOI":"10.1080\/1049482940040101"},{"key":"p_119","volume-title":"Squeak: Object-oriented design with Multimedia Applications","author":"Guzdial M.","year":"2001"},{"key":"p_120","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364588"},{"key":"p_121","doi-asserted-by":"publisher","DOI":"10.1145\/961511.961542"},{"key":"p_122","volume-title":"Introduction to Computing and Programming in Python: A Multimedia Approach","author":"Guzdial M.","year":"2004"},{"key":"p_123","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506420"},{"key":"p_124","doi-asserted-by":"publisher","DOI":"10.1145\/1869746.1869747"},{"key":"p_125","volume-title":"May","author":"Guzdial M.","year":"2012"},{"key":"p_126","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493397"},{"key":"p_127","volume-title":"September","author":"Guzdial M.","year":"2014"},{"key":"p_129","volume-title":"making","author":"Guzdial M.","year":"2015"},{"key":"p_130","doi-asserted-by":"publisher","DOI":"10.1145\/2788449"},{"key":"p_131","volume-title":"Introduction to Computing and Programming in Java: A Multimedia Approach","author":"Guzdial M.","year":"2005"},{"key":"p_132","doi-asserted-by":"publisher","DOI":"10.1145\/2381083.2381104"},{"key":"p_133","doi-asserted-by":"publisher","DOI":"10.1145\/2602488"},{"key":"p_134","doi-asserted-by":"publisher","DOI":"10.1145\/2361276.2361304"},{"key":"p_135","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047468"},{"key":"p_136","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151597"},{"key":"p_137","doi-asserted-by":"publisher","DOI":"10.1080\/1049482900010102"},{"key":"p_138","doi-asserted-by":"crossref","unstructured":"M. Hewner. Student conceptions about the field of computer science. Ph.D. thesis,College of Computing, Georgia Instituteof Technology, Atlanta, GA,October 2012. 91","DOI":"10.1145\/2493394.2493414"},{"key":"p_139","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493414"},{"key":"p_140","doi-asserted-by":"publisher","DOI":"10.1145\/1404520.1404528"},{"key":"p_141","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016916"},{"key":"p_142","first-page":"128","volume-title":"Proceedings of the International Conference of the Learning Sciences 1996","author":"Hmelo C. E.","year":"1996"},{"key":"p_143","volume-title":"HarvardX and MITx: Two years of open online courses","author":"Ho A. D.","year":"2012"},{"key":"p_144","doi-asserted-by":"publisher","DOI":"10.1525\/eth.2004.32.2.127"},{"key":"p_145","doi-asserted-by":"publisher","DOI":"10.1145\/2460625.2460643"},{"key":"p_147","doi-asserted-by":"publisher","DOI":"10.1145\/2656450.2656481"},{"key":"p_148","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493395"},{"key":"p_149","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.2002.0237"},{"key":"p_150","doi-asserted-by":"publisher","DOI":"10.3102\/00028312038003499"},{"key":"p_151","doi-asserted-by":"publisher","DOI":"10.1353\/jhr.2010.0019"},{"key":"p_152","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151600"},{"key":"p_153","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979381"},{"key":"p_154","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-21554-8","volume-title":"PASCAL User Manual and Report","author":"Jensen K.","year":"1974"},{"key":"p_155","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232210"},{"key":"p_156","volume-title":"Computer science curricula","author":"Joint Task Force on Computing Curricula, ACM\/IEEE.","year":"2013"},{"key":"p_158","volume-title":"Minds in play: Computer game design as a context for children's learning","author":"Kafai Y. B.","year":"1995"},{"key":"p_159","volume-title":"Constructionism","author":"Kafai Y. B.","year":"2006"},{"key":"p_160","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9992.001.0001","volume-title":"Connected Code: Why Children Need to Learn Programming","author":"Kafai Y. B.","year":"2014"},{"key":"p_161","doi-asserted-by":"publisher","DOI":"10.1207\/S15327809JLS1003_4"},{"key":"p_162","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2010101906"},{"key":"p_163","doi-asserted-by":"publisher","DOI":"10.1145\/2576874"},{"key":"p_164","first-page":"90","volume-title":"From Barbie to Mortal Kombat: gender and computer games","author":"Kafai Y. V.","year":"1998"},{"key":"p_165","first-page":"104","volume":"62","author":"Kahneman D.","year":"2011","journal-title":"Macmillan"},{"key":"p_166","doi-asserted-by":"publisher","DOI":"10.1257\/jep.5.1.193"},{"key":"p_167","volume-title":"October","author":"Karplus K.","year":"2013"},{"key":"p_169","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217672"},{"key":"p_170","doi-asserted-by":"publisher","DOI":"10.1145\/154766.155364"},{"key":"p_172","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089734"},{"key":"p_173","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(88)90004-7"},{"key":"p_175","first-page":"134","volume-title":"Confronting student resistance in our classrooms. Teaching for Equity and Social Justice","author":"Kohl H.","year":"1994"},{"issue":"2","key":"p_176","first-page":"119","volume":"3","author":"Kolodner J. L.","year":"2003","journal-title":"Cognitive Science Quarterly"},{"key":"p_177","doi-asserted-by":"publisher","DOI":"10.1086\/461782"},{"key":"p_179","doi-asserted-by":"publisher","DOI":"10.2190\/BKML-B1QV-KDN4-8ULH"},{"key":"p_180","first-page":"74","volume":"73","author":"Lang K.","year":"2013","journal-title":"Computer Science Teachers Association (CSTA)"},{"key":"p_181","doi-asserted-by":"publisher","DOI":"10.1126\/science.208.4450.1335"},{"key":"p_182","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815355","volume-title":"Situated Learning: Legitimate Peripheral Participation","author":"Lave J.","year":"1991"},{"key":"p_183","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445214"},{"key":"p_184","doi-asserted-by":"publisher","DOI":"10.1145\/1929887.1929902"},{"key":"p_185","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2014.6883023"},{"key":"p_186","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016934"},{"key":"p_187","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2012.6344507"},{"key":"p_188","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787709"},{"key":"p_189","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493410"},{"key":"p_190","doi-asserted-by":"publisher","DOI":"10.1126\/science.1261375"},{"key":"p_191","doi-asserted-by":"publisher","DOI":"10.1145\/1288580.1288598"},{"key":"p_192","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735244"},{"key":"p_193","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016915"},{"key":"p_194","doi-asserted-by":"publisher","DOI":"10.1145\/2003616.2003622"},{"key":"p_195","doi-asserted-by":"publisher","DOI":"10.1145\/2077808.2077814"},{"key":"p_196","doi-asserted-by":"publisher","DOI":"10.1145\/1041624.1041673"},{"key":"p_197","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(87)90033-1"},{"key":"p_198","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642668"},{"key":"p_199","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985710"},{"key":"p_200","doi-asserted-by":"publisher","DOI":"10.1002\/sce.20209"},{"key":"p_201","doi-asserted-by":"publisher","DOI":"10.1145\/1868358.1868363"},{"key":"p_202","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352260"},{"key":"p_203","volume-title":"Stuck in the Shallow End: Education, Race, and Computing","author":"Margolis J.","year":"2008"},{"key":"p_204","volume-title":"Unlocking the Clubhouse: Women in Computing","author":"Margolis J.","year":"2002"},{"key":"p_205","first-page":"978","volume-title":"Proceedings of the 35th Annual Conference of the Cognitive Science Society","author":"Margulieux L. E.","year":"2013"},{"key":"p_206","doi-asserted-by":"publisher","DOI":"10.1145\/2361276.2361291"},{"key":"p_207","doi-asserted-by":"publisher","DOI":"10.1145\/572139.572181"},{"key":"p_208","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318083"},{"key":"p_209","doi-asserted-by":"publisher","DOI":"10.1145\/563517.563353"},{"key":"p_210","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145293"},{"key":"p_211","volume-title":"June","author":"McGregor J.","year":"2015"},{"key":"p_212","volume-title":"e Gutenberg Galaxy: e Making of Typographic Man","author":"McLuhan M. H.","year":"1962"},{"key":"p_213","volume-title":"Understanding Media: e Extensions of Man","author":"McLuhan M. H.","year":"1964"},{"key":"p_214","volume-title":"August","author":"Mechaber E.","year":"2015"},{"key":"p_215","volume-title":"Python programming in context","author":"Miller B. N.","year":"2014"},{"key":"p_216","volume-title":"March","author":"Miller J.","year":"2013"},{"key":"p_217","doi-asserted-by":"publisher","DOI":"10.1147\/sj.202.0184"},{"key":"p_218","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787733"},{"key":"p_219","doi-asserted-by":"publisher","DOI":"10.1145\/2361276.2361287"},{"key":"p_220","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1020.001.0001","volume-title":"A small matter of programming: perspectives on end user computing","author":"Nardi B. A.","year":"1993"},{"key":"p_221","first-page":"644","volume-title":"Proceedings of the ird International Conference on Cognitive Science","author":"Nathan M. J.","year":"2001"},{"key":"p_223","first-page":"29","volume-title":"American Educator","author":"Newcombe N. S.","year":"2010"},{"key":"p_224","doi-asserted-by":"publisher","DOI":"10.1126\/science.157.3795.1373-b"},{"key":"p_225","doi-asserted-by":"crossref","unstructured":"L. Ni. Building professional identity as computer science teachers: Supporting high school computer science teachers through reflection and community building. Ph.D. thesis,Georgia Institute of Technology, Atlanta, GA, December 2011. 75, 76, 77, 102","DOI":"10.1145\/2016911.2016942"},{"key":"p_226","volume-title":"Prepare and support computer science (CS) teachers: Understanding CS teachers' professional identity","author":"Ni L.","year":"2011"},{"key":"p_227","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953319"},{"key":"p_228","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734444"},{"key":"p_229","doi-asserted-by":"publisher","DOI":"10.1080\/13546780802490186"},{"key":"p_230","volume-title":"e design of everyday things","author":"Norman D.","year":"2002"},{"key":"p_231","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-1696-8"},{"key":"p_232","first-page":"85","author":"OECD Education Committee","year":"2005","journal-title":"Developing and Retaining Effective Teachers. OECD"},{"key":"p_233","unstructured":"G. M. Olson, R. Catrambone, and E. Soloway. Programming and algebra word problems: a failure to transfer, pages1-13. Ablex Publishing Corp., Norwood, NJ, USA,1987. 30"},{"key":"p_234","volume-title":"Guide to Teaching Computer Science: An Activity-Based Approach","author":"Orit Hazzan N. R.","year":"2011"},{"key":"p_235","doi-asserted-by":"publisher","DOI":"10.3102\/00346543060001065"},{"key":"p_236","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0410"},{"key":"p_237","first-page":"41","author":"Papert S.","year":"1971","journal-title":"MIT AI Laboratory"},{"key":"p_238","volume-title":"Children, computers, and powerful ideas","author":"Papert S.","year":"1980"},{"key":"p_239","unstructured":"S. Papert. Situating constructionism. In I. Harel and S. Papert, editors, Constructionism, pages1-11. Ablex Publishing Company, 1991. 41"},{"key":"p_240","doi-asserted-by":"publisher","DOI":"10.1145\/2700514"},{"key":"p_241","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493405"},{"key":"p_242","first-page":"157","volume-title":"Proceedings of the 8th Australasian Conference on Computing Education -","volume":"52","author":"Parsons D.","year":"2006"},{"key":"p_243","first-page":"106","author":"Paul A. M.","year":"2015","journal-title":"New York Times"},{"key":"p_244","first-page":"2","volume":"1","author":"Pea R. D.","year":"1986","journal-title":"Journal of Educational Computing Research"},{"key":"p_245","doi-asserted-by":"publisher","DOI":"10.1016\/0732-118X(84)90018-7"},{"key":"p_246","volume-title":"Children and microcomputers: Formative studies","author":"Pea R. D.","year":"1985"},{"key":"p_247","doi-asserted-by":"publisher","DOI":"10.1145\/1463689.1463740"},{"key":"p_249","doi-asserted-by":"crossref","DOI":"10.1037\/11494-000","volume-title":"e origins of intelligence in children","author":"Piaget J.","year":"1952"},{"key":"p_250","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145319"},{"key":"p_251","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445250"},{"key":"p_252","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999788"},{"key":"p_253","doi-asserted-by":"publisher","DOI":"10.1145\/2492007.2492020"},{"key":"p_254","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445248"},{"key":"p_255","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632354"},{"key":"p_257","volume-title":"Proceedings of the 1996 International Conference on","author":"Quintana C."},{"key":"p_258","unstructured":"Learning Sciences, ICLS '96, pages272-279. International Society of the Learning Sciences,"},{"key":"p_260","first-page":"271","volume-title":"Advances in Computers","volume":"57","author":"Quintana C.","year":"2003"},{"key":"p_261","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445342"},{"key":"p_262","doi-asserted-by":"publisher","DOI":"10.1080\/104948290010301"},{"key":"p_263","doi-asserted-by":"publisher","DOI":"10.1145\/257089.257095"},{"key":"p_264","volume-title":"November","author":"Resnick M.","year":"2015"},{"key":"p_265","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971370"},{"key":"p_266","volume-title":"Computing Curricula","author":"Roberts E.","year":"2001"},{"key":"p_267","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563403"},{"key":"p_268","doi-asserted-by":"publisher","DOI":"10.1080\/08993401003612167"},{"key":"p_269","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_8"},{"key":"p_270","volume-title":"January","author":"Rodger S. H.","year":"2001"},{"key":"p_271","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(84)90014-8"},{"key":"p_272","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.13.4.629"},{"key":"p_273","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.73"},{"key":"p_274","doi-asserted-by":"publisher","DOI":"10.3102\/0002831213477680"},{"key":"p_275","first-page":"1084","volume-title":"Proceedings of the 7th International Conference on Learning Sciences, ICLS '06","author":"Sawyer R. K.","year":"2006"},{"key":"p_276","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083096"},{"key":"p_277","first-page":"142","volume":"2","author":"Scardamalia M.","year":"1987","journal-title":"Advances in Applied Psycholinguistics"},{"key":"p_278","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677238"},{"key":"p_279","doi-asserted-by":"publisher","DOI":"10.1207\/s1532690xci1604_4"},{"key":"p_280","doi-asserted-by":"publisher","DOI":"10.1207\/s1532690xci2202_1"},{"key":"p_281","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787724"},{"key":"p_282","volume-title":"Introduction to Computing and Algorithms","author":"Shackelford R. L.","year":"1997","edition":"1"},{"issue":"2","key":"p_283","first-page":"195","volume":"10","author":"Shaffer D. W.","year":"1999","journal-title":"Journal of Interactive Learning Research"},{"key":"p_284","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011434026437"},{"key":"p_285","doi-asserted-by":"publisher","DOI":"10.1007\/BF00975629"},{"key":"p_287","doi-asserted-by":"publisher","DOI":"10.1145\/2282338.2282359"},{"key":"p_288","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151594"},{"key":"p_289","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076459"},{"key":"p_290","doi-asserted-by":"publisher","DOI":"10.1145\/1822090.1822151"},{"key":"p_291","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352230"},{"key":"p_292","first-page":"56","volume":"55","author":"Smith D. M.","year":"2008","journal-title":"Pearson\/Addison Wesley"},{"key":"p_293","volume-title":"Cambridge University Press","author":"Snow C.","year":"1959"},{"key":"p_294","volume-title":"Computer environments for children: A reflection on theories of learning and education. e MIT Press","author":"Solomon C.","year":"1986"},{"key":"p_295","doi-asserted-by":"publisher","DOI":"10.1145\/182.358436"},{"key":"p_296","doi-asserted-by":"publisher","DOI":"10.1145\/800049.801754"},{"key":"p_297","doi-asserted-by":"publisher","DOI":"10.1145\/174809.174813"},{"key":"p_298","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238476"},{"key":"p_299","first-page":"50","volume":"32","author":"Sorva J.","year":"2012","journal-title":"Aalto University School of Science"},{"key":"p_300","doi-asserted-by":"publisher","DOI":"10.1145\/2490822"},{"key":"p_301","doi-asserted-by":"publisher","DOI":"10.1145\/2483710.2483713"},{"key":"p_302","volume-title":"Marcel: Simulating the novice programmer","author":"Spohrer J. C.","year":"1992"},{"key":"p_303","volume-title":"real","author":"What","year":"2012"},{"key":"p_304","doi-asserted-by":"publisher","DOI":"10.1145\/2534973"},{"key":"p_305","volume-title":"Interactive Computation: e New Paradigm","author":"Stein L. A.","year":"2006"},{"key":"p_306","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2008.tb00984.x"},{"key":"p_307","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1509018"},{"key":"p_308","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1202_4"},{"key":"p_309","doi-asserted-by":"publisher","DOI":"10.1145\/2160547.2160551"},{"key":"p_311","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591712"},{"key":"p_312","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227484"},{"key":"p_313","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1420"},{"key":"p_314","unstructured":"A. E. Tew. Assessing fundamental introductory computing concept knowledge in a language independent manner. Ph.D. thesis,College of Computing, Georgia Instituteof Technology,2010. 26"},{"key":"p_315","doi-asserted-by":"publisher","DOI":"10.1145\/1404935.1404937"},{"key":"p_316","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047481"},{"key":"p_317","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734297"},{"key":"p_318","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953200"},{"key":"p_319","doi-asserted-by":"publisher","DOI":"10.1145\/1089786.1089789"},{"key":"p_320","unstructured":"J. G. Trafton and B. J. Reiser. e contributions of studying examples and solving problems to skill acquisition, pages1017-1022. Lawrence Erlbaum Associates, Inc., Hillsdale, NJ, 1993. 79"},{"key":"p_321","doi-asserted-by":"publisher","DOI":"10.1145\/2543882.2543884"},{"key":"p_322","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1015"},{"key":"p_323","volume-title":"March","year":"2015"},{"key":"p_324","volume-title":"August","year":"2015"},{"key":"p_325","doi-asserted-by":"publisher","DOI":"10.1145\/2633031"},{"key":"p_326","volume-title":"August","author":"Wilson G.","year":"2015"},{"key":"p_327","volume-title":"e Link","author":"Wing J.","year":"2010"},{"key":"p_328","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118215"},{"key":"p_329","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.1976.tb00381.x"},{"key":"p_330","doi-asserted-by":"publisher","DOI":"10.3758\/PBR.15.4.763"},{"key":"p_331","doi-asserted-by":"publisher","DOI":"10.1145\/1288580.1288586"},{"key":"p_332","doi-asserted-by":"publisher","DOI":"10.1145\/1316450.1316456"},{"key":"p_333","volume-title":"What are Code.org's costs per teach, cost per student? https:\/\/code.o rg\/about\/evaluation\/costs","author":"Yongpradit P.","year":"2015"},{"key":"p_334","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999795"}],"container-title":["Synthesis Lectures on Human-Centered Informatics"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T04:02:10Z","timestamp":1718251330000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.morganclaypool.com\/doi\/10.2200\/S00684ED1V01Y201511HCI033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,30]]},"references-count":313,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11,30]]}},"alternative-id":["10.2200\/S00684ED1V01Y201511HCI033"],"URL":"https:\/\/doi.org\/10.2200\/s00684ed1v01y201511hci033","relation":{},"ISSN":["1946-7680","1946-7699"],"issn-type":[{"value":"1946-7680","type":"print"},{"value":"1946-7699","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,30]]}}}