iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3304221.3319751
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:48:20Z","timestamp":1730321300653,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3304221.3319751","type":"proceedings-article","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T13:44:24Z","timestamp":1563543864000},"page":"224-230","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Qualitative Observations of Student Reasoning"],"prefix":"10.1145","author":[{"given":"Cazembe","family":"Kennedy","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Eileen T.","family":"Kraemer","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77--101. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77--101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844559"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538966"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843348"},{"key":"e_1_3_2_1_5_1","unstructured":"Svetlana V Drachova-Strang. 2013. Teaching and assessment of mathematical principles for software correctness using a reasoning concept inventory. Clemson University. Svetlana V Drachova-Strang. 2013. Teaching and assessment of mathematical principles for software correctness using a reasoning concept inventory. Clemson University."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028174.971312"},{"key":"e_1_3_2_1_7_1","unstructured":"KA Ericsson. 6. 8: Simon HA (1984). Protocol analysis: Verbal reports as data. . KA Ericsson. 6. 8: Simon HA (1984). Protocol analysis: Verbal reports as data. ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Karl Anders Ericsson and Herbert Alexander Simon. 1993. Protocol analysis: Verbal reports as data Rev. the MIT Press. Karl Anders Ericsson and Herbert Alexander Simon. 1993. Protocol analysis: Verbal reports as data Rev. the MIT Press.","DOI":"10.7551\/mitpress\/5657.001.0001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352226"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230977.3231002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404520.1404527"},{"volume":"3","volume-title":"PME conference","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151599"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279720.3279728"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041624.1041673"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/572133.572137"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/572020.572033"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2960310.2960316"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953200"}],"event":{"name":"ITiCSE '19: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Aberdeen Scotland Uk","acronym":"ITiCSE '19"},"container-title":["Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3304221.3319751","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T20:56:58Z","timestamp":1673297818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3304221.3319751"}},"subtitle":["Coding in the Wild"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":20,"alternative-id":["10.1145\/3304221.3319751","10.1145\/3304221"],"URL":"https:\/\/doi.org\/10.1145\/3304221.3319751","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}