{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:11:51Z","timestamp":1747807911340,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004254"},{"type":"electronic","value":"9783642004278"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00427-8_12","type":"book-chapter","created":{"date-parts":[[2009,2,23]],"date-time":"2009-02-23T07:20:59Z","timestamp":1235373659000},"page":"205-224","source":"Crossref","is-referenced-by-count":11,"title":["Males\u2019 and Females\u2019 Script Debugging Strategies"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Grigoreanu","sequence":"first","affiliation":[]},{"given":"James","family":"Brundage","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Bahna","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[]},{"given":"Paul","family":"ElRif","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Snover","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"Social Foundations of Thought and Action","author":"A. Bandura","year":"1986","unstructured":"Bandura, A.: Social Foundations of Thought and Action. Prentice Hall, Englewood Cliffs (1986)"},{"issue":"12","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TSE.1987.232881","volume":"13","author":"V. Basili","year":"1987","unstructured":"Basili, V., Selby, R.: Comparing the Effectiveness of Software Testing Strategies. IEEE Trans. Soft.\u00a013(12), 1278\u20131296 (1987)","journal-title":"IEEE Trans. Soft."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Burnett, M., Wiedenbeck, S., Cook, C., Sorte, S., Hastings, M.: Effectiveness of End-User Debugging Software Features: Are There Gender Issues? In: Proc. ACM CHI 2005, pp. 869\u2013878 (2005)","DOI":"10.1145\/1054972.1055094"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Kissinger, C., Burnett, M., Wiedenbeck, S., Lawrance, J., Blackwell, A., Cook, C.: Tinkering and Gender in End-User Programmers Debugging. In: Proc. ACM CHI 2006, pp. 231\u2013240 (2006)","DOI":"10.1145\/1124772.1124808"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Inman, D., Rector, K., Burnett, M.: On to the Real World: Gender and Self-Efficacy in Excel. In: Proc. IEEE VLHCC (2007)","DOI":"10.1109\/VLHCC.2007.15"},{"issue":"9","key":"12_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1015864.1015889","volume":"47","author":"M. Burnett","year":"2004","unstructured":"Burnett, M., Cook, C., Rothermel, G.: End-User Software Engineering. Comm. ACM\u00a047(9), 53\u201358 (2004)","journal-title":"Comm. ACM"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Danis, C., Kellogg, W., Lau, T., Stylos, J., Dredze, M., Kushmerick, N.: Managers\u2019 Email: Beyond Tasks and To-Dos. In: ACM CHI Extended Abstracts, pp. 1324\u20131327 (2005)","DOI":"10.1145\/1056808.1056907"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1006\/jecp.1999.2532","volume":"75","author":"A. Gallagher","year":"2000","unstructured":"Gallagher, A., De Lisi, R., Holst, P., McGillicuddy-De Lisi, A., Morely, M., Cahalan, C.: Gender Differences in Advanced Mathematical Problem Solving. J. Experimental Child Psychology\u00a075(3), 165\u2013190 (2000)","journal-title":"J. Experimental Child Psychology"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Grigoreanu, V., Beckwith, L., Fern, X., Yang, S., Komireddy, C., Narayanan, V., Cook, C., Burnett, M.: Gender Differences in End-User Debugging Revisited: What the Miners Found. In: IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 19\u201326 (2006)","DOI":"10.1109\/VLHCC.2006.24"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Grigoreanu, V., Cao, J., Kulesza, T., Bogart, C., Rector, R., Burnett, M., Wiedenbeck, S.: Can Feature Design Reduce the Gender Gap in End-User Software Development Environments? In: IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 149\u2013156 (2008)","DOI":"10.1109\/VLHCC.2008.4639077"},{"issue":"9","key":"12_CR11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1145\/903893.903933","volume":"46","author":"K. Hartzel","year":"2003","unstructured":"Hartzel, K.: How Self-Efficacy and Gender Issues Affect Software Adoption and Use. Communications of the ACM\u00a046(9), 167\u2013171 (2003)","journal-title":"Communications of the ACM"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1006\/jvlc.1998.0079","volume":"9","author":"N. Heger","year":"1998","unstructured":"Heger, N., Cypher, A., Smith, D.: Cocoa at the Visual Programming Challenge 1997. Journal of Visual Languages and Computing\u00a09(2), 151\u2013169 (1998)","journal-title":"Journal of Visual Languages and Computing"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Ioannidou, A., Repenning, A., Webb, D.: Using Scalable Game Design to Promote 3D Fluency: Assessing the AgentCubes Incremental 3D End-User Development Framework. In: Ioannidou, A., Repenning, A., Webb, D. (eds.) IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 47\u201354 (2008)","DOI":"10.1109\/VLHCC.2008.4639057"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kandogan, E., Haber, E., Barrett, R., Cypher, A., Maglio, P., Zhao, H.: A1: End-User Programming for Web-based System Administration. In: ACM UIST 2005, pp. 211\u2013220 (2005)","DOI":"10.1145\/1095034.1095070"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Katz, I., Anderson, J.: Debugging: An Analysis of Bug-Location Strategies. In: Human-Computer Interaction, vol.\u00a03, pp. 351\u2013399 (1988)","DOI":"10.1207\/s15327051hci0304_2"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kelleher, C., Pausch, R., Kiesler, S.: Storytelling Alice Motivates Middle School Girls to Learn Computer Programming. In: Proc. ACM CHI 2007, pp. 1455\u20131464 (2007)","DOI":"10.1145\/1240624.1240844"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Ko, A.J., Myers, B.A.: Designing the Whyline: A Debugging Interface for Asking Questions about Program Failures. In: Proc. ACM CHI 2004, pp. 151\u2013158 (2004)","DOI":"10.1145\/985692.985712"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Ko, A., DeLine, R., Venolia, G.: Information Needs in Collocated Software Development Teams. In: International Conference on Software Engineering, pp. 344\u2013353 (2007)","DOI":"10.1109\/ICSE.2007.45"},{"key":"12_CR19","unstructured":"Littman, D.C., Pinto, J., Letovsky, S., Soloway, E.: Mental Models and Software Maintenance. In: Soloway, E., Iyengar, S. (eds.) Proc. ESP. Ablex, Norwood, NJ, pp. 80\u201398 (1986)"},{"key":"12_CR20","unstructured":"Meyers-Levy, J.: Gender Differences in Information Processing: A Selectivity Interpretation. In: Cafferata, P., Tybout, A. (eds.) Cognitive and Affective Responses to Advertising, Lexington, Ma, Lexington Books (1989)"},{"key":"12_CR21","volume-title":"Proc. ESP","author":"N. Nanja","year":"1987","unstructured":"Nanja, N., Cook, C.: An Analysis of the On-Line Debugging Process. In: Olson, G.M., Sheppard, S., Soloway, E. (eds.) Proc. ESP, Ablex, Norwood (1987)"},{"key":"12_CR22","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1020.001.0001","volume-title":"A Small Matter of Programming: Perspectives on End-User Computing","author":"B. Nardi","year":"1993","unstructured":"Nardi, B.: A Small Matter of Programming: Perspectives on End-User Computing. MIT Press, Cambridge (1993)"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1099-1123.2001.00328.x","volume":"5","author":"E. O\u2019Donnell","year":"2001","unstructured":"O\u2019Donnell, E., Johnson, E.: The Effects of Auditor Gender and Task Complexity on Information Processing Efficiency. Int. J. Auditing\u00a05, 91\u2013105 (2001)","journal-title":"Int. J. Auditing"},{"issue":"3","key":"12_CR24","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/0010-0285(87)90007-7","volume":"19","author":"N. Pennington","year":"1987","unstructured":"Pennington, N.: Stimulus Structures and Mental Representations in Expert Comprehension of Computer Programs. Cognitive Psychology\u00a019(3), 295\u2013341 (1987)","journal-title":"Cognitive Psychology"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Prabhakararao, S., Cook, C., Ruthruff, J., Creswick, E., Main, M., Durham, M., Burnett, M.: Strategies and Behaviors of End-User Programmers with Interactive Fault Localization. In: IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 15\u201322 (2003)","DOI":"10.1109\/HCC.2003.1260197"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Rigby, P., German, D., Storey, M.: Open Source Software Peer Review Practices: A Case Study of the Apache Server. In: International Conference on Software Engineering, pp. 541\u2013550 (2008)","DOI":"10.1145\/1368088.1368162"},{"key":"12_CR27","unstructured":"Rode, J.A.: An Ethnographic Examination of the Relationship of Gender & End-User Programming, Ph.D. Thesis, University of California Irvine (2008)"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s00779-004-0272-0","volume":"8","author":"J.A. Rode","year":"2004","unstructured":"Rode, J.A., Toye, E.F., Blackwell, A.F.: The Fuzzy Felt Ethnography - Understanding the Programming Patterns of Domestic Appliances. Personal and Ubiquitous Computing\u00a08, 161\u2013176 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ijhcs.2007.07.005","volume":"61","author":"P. Romero","year":"2007","unstructured":"Romero, P., du Boulay, B., Cox, R., Lutz, R., Bryant, S.: Debugging Strategies and Tactics in a Multi-Representation Software Environment. International Journal on Human-Computer Studies\u00a061, 992\u20131009 (2007)","journal-title":"International Journal on Human-Computer Studies"},{"key":"12_CR30","volume-title":"Proc. VLHCC","author":"M. Rosson","year":"2007","unstructured":"Rosson, M., Sinha, H., Bhattacharya, M., Zhao, D.: Design Planning in End-User Web Development. In: Proc. VLHCC. IEEE, Los Alamitos (2007)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Storey, M., Ryall, J., Bull, R.I., Myers, D., Singer, J.: TODO or to bug: Exploring How Task Annotations Play a Role in the Work Practices of Software Developers. In: International Conference on Software Engineering, pp. 251\u2013260 (2008)","DOI":"10.1145\/1368088.1368123"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Subrahmaniyan, N., Beckwith, L., Grigoreanu, V., Narayanan, V., Bucht, K., Drummond, R., Fern, X., Wiedenbeck, S., Burnett, M.: Testing vs. Code Inspection vs. ...What Else? Male and Female End Users\u2019 Debugging Strategies. In: Proc. ACM CHI (2008)","DOI":"10.1145\/1357054.1357153"},{"issue":"3","key":"12_CR33","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1177\/0013164494054003028","volume":"54","author":"G. Torkzadeh","year":"1994","unstructured":"Torkzadeh, G., Koufteros, X.: Factorial Validity of a Computer Self-Efficacy Scale and the Impact of Computer Training. Educational and Psychological Measurement\u00a054(3), 813\u2013821 (1994)","journal-title":"Educational and Psychological Measurement"},{"issue":"7","key":"12_CR34","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1145\/358557.358577","volume":"25","author":"M. Weiser","year":"1982","unstructured":"Weiser, M.: Programmers Use Slices When Debugging, Comm. ACM\u00a025(7), 446\u2013452 (1982)","journal-title":"ACM"},{"key":"12_CR35","unstructured":"Whitaker, A., Cox, R., Gribble, S.: Configuration Debugging as Search: Finding the Needle in the Haystack. In: 6th Symposium on Operating System Design and Implementation (2004)"},{"key":"12_CR36","unstructured":"Windows PowerShell Wikipedia entry (accessed on August 20, 2008), http:\/\/en.wikipedia.org\/wiki\/Powershell"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Yuan, C., Lao, N., Wen, J., Li, J., Zhang, Z., Wang, Y., Ma, W.: Automated known problem diagnosis with event traces. In: Proc. ACM Sigops\/Eurosys European Conference on Computer Systems (2006)","DOI":"10.1145\/1217935.1217972"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Zang, N., Rosson, M.B.: What\u2019s in a Mashup? And Why? Studying the Perceptions of Web-Active End Users. In: IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 31\u201338 (2008)","DOI":"10.1109\/VLHCC.2008.4639055"}],"container-title":["Lecture Notes in Computer Science","End-User Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00427-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T21:18:53Z","timestamp":1738963133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00427-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642004254","9783642004278"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00427-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}