{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:37:20Z","timestamp":1757615840412,"version":"3.44.0"},"reference-count":61,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"vor","delay-in-days":5327,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Man-Machine Studies"],"published-print":{"date-parts":[[1992,6]]},"DOI":"10.1016\/0020-7373(92)90076-w","type":"journal-article","created":{"date-parts":[[2004,9,2]],"date-time":"2004-09-02T17:57:35Z","timestamp":1094147855000},"page":"843-859","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["Nested IF-THEN-ELSE constructs in end-user computing: personality and aptitude as predictors of programming ability"],"prefix":"10.1016","volume":"36","author":[{"given":"Houn-Gee","family":"Chen","sequence":"first","affiliation":[]},{"given":"Robert P.","family":"Vecchio","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/0020-7373(92)90076-W_BIB1","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1287\/mnsc.29.5.530","article-title":"Development of a tool for measuring and analyzing computer user satisfaction","volume":"29","author":"Baily","year":"1983","journal-title":"Management Science"},{"year":"1977","author":"Barron","key":"10.1016\/0020-7373(92)90076-W_BIB2"},{"year":"1972","author":"Bennett","key":"10.1016\/0020-7373(92)90076-W_BIB3"},{"key":"10.1016\/0020-7373(92)90076-W_BIB4","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/248745","article-title":"A field study of end-user computing: findings and issues","author":"Benson","year":"1983","journal-title":"MIS Quarterly"},{"key":"10.1016\/0020-7373(92)90076-W_BIB5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1147\/sj.233.0224","article-title":"Ease of use: a system design challenge","volume":"23","author":"Branscomb","year":"1984","journal-title":"IBM System Journal"},{"key":"10.1016\/0020-7373(92)90076-W_BIB6","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/S0020-7373(77)80039-4","article-title":"Towards a theory of the cognitive processes in computer programming","volume":"9","author":"Brooks","year":"1977","journal-title":"International Journal of Man-Machine Studies"},{"issue":"1","key":"10.1016\/0020-7373(92)90076-W_BIB7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/07421222.1986.11517755","article-title":"Organizational factors affecting the success of end-user computing","volume":"3","author":"Cheney","year":"1986","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"10.1016\/0020-7373(92)90076-W_BIB8","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/0001-8791(85)90053-3","article-title":"Correlates of sex differences in attitudes toward and involvement with computers","volume":"27","author":"Dambrot","year":"1985","journal-title":"Journal of Vocational Behavior"},{"issue":"1","key":"10.1016\/0020-7373(92)90076-W_BIB9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/248803","article-title":"Determinants of success for computer usage in small business","volume":"12","author":"DeLone","year":"1988","journal-title":"MIS Quarterly"},{"key":"10.1016\/0020-7373(92)90076-W_BIB10","first-page":"511","article-title":"Cognitive characteristics and the perceived importance of information","volume":"48","author":"Dermer","year":"1973","journal-title":"Accounting Review"},{"issue":"3","key":"10.1016\/0020-7373(92)90076-W_BIB11","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2307\/248662","article-title":"Key information systems issues for the 1980's","volume":"8","author":"Dickson","year":"1984","journal-title":"MIS Quarterly"},{"key":"10.1016\/0020-7373(92)90076-W_BIB12","doi-asserted-by":"crossref","first-page":"259","DOI":"10.2307\/248851","article-title":"The measurement of end-user computing satisfaction","author":"Doll","year":"1988","journal-title":"MIS Quarterly"},{"year":"1977","author":"Eysenck","key":"10.1016\/0020-7373(92)90076-W_BIB13"},{"issue":"3","key":"10.1016\/0020-7373(92)90076-W_BIB14","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1145\/214748.214758","article-title":"Functionality and usability","volume":"30","author":"Goodwin","year":"1987","journal-title":"Communications of the ACM"},{"key":"10.1016\/0020-7373(92)90076-W_BIB15","series-title":"Handbook of Industrial and Organizational Psychology","first-page":"571","article-title":"Personality and personality assessment","author":"Gough","year":"1976"},{"key":"10.1016\/0020-7373(92)90076-W_BIB16","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2044-8325.1977.tb00363.x","article-title":"Conditional program statements and their comprehensibility to professional programmers","volume":"50","author":"Green","year":"1977","journal-title":"Journal of Occupational Psychology"},{"key":"10.1016\/0020-7373(92)90076-W_BIB17","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1002\/spe.4380100505","article-title":"IFs and THENs: is nesting just for the birds?","volume":"10","author":"Green","year":"1980","journal-title":"Software\u2014Practice and Experience"},{"year":"1988","series-title":"Handbook of Human-Computer Interaction","key":"10.1016\/0020-7373(92)90076-W_BIB18"},{"key":"10.1016\/0020-7373(92)90076-W_BIB19_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/6138.6143","article-title":"Computer anxiety in management: myth or reality?","volume":"29","author":"Howard","year":"1986","journal-title":"Communications of the ACM"},{"key":"10.1016\/0020-7373(92)90076-W_BIB19_2","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1145\/6138.6143","article-title":"Computer anxiety in management: myth or reality?","volume":"29","author":"Howard","year":"1986","journal-title":"Communications of the ACM"},{"key":"10.1016\/0020-7373(92)90076-W_BIB20","series-title":"The Psychology of Learning and Memory","first-page":"115","article-title":"Individual differences in cognition: a new approach to intelligence","author":"Hunt","year":"1973"},{"key":"10.1016\/0020-7373(92)90076-W_BIB21","series-title":"Handbook of Learning and Cognitive Processes","article-title":"Cognitive theory applied to individual differences","author":"Hunt","year":"1975"},{"key":"10.1016\/0020-7373(92)90076-W_BIB22","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0378-7206(89)90036-0","article-title":"Microcomputer applications: an empirical look at usage","volume":"16","author":"Igbaria","year":"1989","journal-title":"Information and Management"},{"issue":"3","key":"10.1016\/0020-7373(92)90076-W_BIB23","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1177\/014920638901500302","article-title":"A path analytic study of individual characteristics, computer anxiety and attitudes toward microcomputers","volume":"15","author":"Igbaria","year":"1989","journal-title":"Journal of Management"},{"key":"10.1016\/0020-7373(92)90076-W_BIB24","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1145\/356635.356641","article-title":"Programming style: examples and counter-examples","volume":"6","author":"Kernighan","year":"1974","journal-title":"Computing Surveys"},{"issue":"2","key":"10.1016\/0020-7373(92)90076-W_BIB25","doi-asserted-by":"crossref","first-page":"27","DOI":"10.2307\/248939","article-title":"Empirical evidence for a descriptive model of implementation","volume":"2","author":"Lucas","year":"1978","journal-title":"MIS Quarterly"},{"issue":"10","key":"10.1016\/0020-7373(92)90076-W_BIB26","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1287\/mnsc.26.10.982","article-title":"The impact of the mode of information presentation on learning and performance","volume":"26","author":"Lucas","year":"1980","journal-title":"Management Science"},{"issue":"5","key":"10.1016\/0020-7373(92)90076-W_BIB27","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1287\/mnsc.19.5.475","article-title":"A program for research on management information system","volume":"19","author":"Mason","year":"1973","journal-title":"Management Science"},{"key":"10.1016\/0020-7373(92)90076-W_BIB28","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/S0020-7373(05)80091-4","article-title":"Interactive videodisc instruction: The influence of personality on learning","volume":"35","author":"Matta","year":"1991","journal-title":"International Journal of Man-Machine Studies"},{"issue":"1","key":"10.1016\/0020-7373(92)90076-W_BIB29","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/356835.356841","article-title":"The psychology of how novices learn computer programming","volume":"13","author":"Mayer","year":"1981","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0020-7373(92)90076-W_BIB30","doi-asserted-by":"crossref","first-page":"37","DOI":"10.2307\/249047","article-title":"End users as application developers","author":"McLean","year":"1979","journal-title":"MIS Quarterly"},{"key":"10.1016\/0020-7373(92)90076-W_BIB31","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0043158","article-title":"The magical number seven, plus or minus two: some limits on our capacity for processing information","volume":"63","author":"Miller","year":"1956","journal-title":"Psychological Review"},{"year":"1989","series-title":"Knowledge Representation and Organization in Machine Learning","key":"10.1016\/0020-7373(92)90076-W_BIB32"},{"year":"1962","author":"Myers","key":"10.1016\/0020-7373(92)90076-W_BIB33"},{"year":"1988","author":"Myers","key":"10.1016\/0020-7373(92)90076-W_BIB34"},{"issue":"2","key":"10.1016\/0020-7373(92)90076-W_BIB35","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/01449298608914508","article-title":"Content and representation effects with reasoning tasks in prolog form","volume":"5","author":"Ormerod","year":"1986","journal-title":"Behavior and Information Technology"},{"key":"10.1016\/0020-7373(92)90076-W_BIB36","series-title":"Lines of Thinking","first-page":"57","article-title":"The effects of content and representation on the transfer of prolog reasoning skills","author":"Omerod","year":"1991"},{"key":"10.1016\/0020-7373(92)90076-W_BIB37","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1111\/j.2044-8279.1976.tb02305.x","article-title":"Styles and strategies of learning","volume":"46","author":"Pask","year":"1976","journal-title":"British Journal of Educational Psychology"},{"year":"1984","author":"Poplin","key":"10.1016\/0020-7373(92)90076-W_BIB38"},{"key":"10.1016\/0020-7373(92)90076-W_BIB39","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1111\/j.1540-5915.1988.tb00289.x","article-title":"The effects of an interactive graphics-based DSS to support problem structuring","volume":"19","author":"Pracht","year":"1988","journal-title":"Decision Science"},{"article-title":"Correlates of Computer Anxiety in College Students","year":"1981","author":"Raub","key":"10.1016\/0020-7373(92)90076-W_BIB40"},{"volume":"Vol. 1","year":"1986","author":"Rauch-Hindin","key":"10.1016\/0020-7373(92)90076-W_BIB41"},{"key":"10.1016\/0020-7373(92)90076-W_BIB42","series-title":"Structured Programming: An Infotech State-of-the-Art Report","first-page":"13","article-title":"Programming structure, style and efficiency","author":"Richards","year":"1976"},{"year":"1989","series-title":"Approaches to Knowledge Representation","key":"10.1016\/0020-7373(92)90076-W_BIB43"},{"issue":"5","key":"10.1016\/0020-7373(92)90076-W_BIB44","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/42411.42418","article-title":"Factors of success for end-user computing","volume":"31","author":"Rivard","year":"1981","journal-title":"Communications of the ACM"},{"issue":"10","key":"10.1016\/0020-7373(92)90076-W_BIB45","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1145\/358413.358429","article-title":"The management of end-user computing","volume":"26","author":"Rockart","year":"1983","journal-title":"Communications of the ACM"},{"year":"1979","author":"Sandman","key":"10.1016\/0020-7373(92)90076-W_BIB46"},{"year":"1980","author":"Shneiderman","key":"10.1016\/0020-7373(92)90076-W_BIB47"},{"key":"10.1016\/0020-7373(92)90076-W_BIB48","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-7373(73)80011-2","article-title":"Psychological evaluation of two conditional constructions used in computer languages","volume":"5","author":"Sime","year":"1973","journal-title":"International Journal of Man-Machine studies"},{"key":"10.1016\/0020-7373(92)90076-W_BIB49","first-page":"107","article-title":"Scope marking in computer conditionals\u2014A psychological evaluation","volume":"9","author":"Sime","year":"1977","journal-title":"International Journal of Man-Made Studies"},{"issue":"11","key":"10.1016\/0020-7373(92)90076-W_BIB50","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1145\/182.358436","article-title":"Cognitive strategies and looping constructs: an empirical study","volume":"26","author":"Soloway","year":"1983","journal-title":"Communications of the ACM"},{"year":"1982","author":"Sommerville","key":"10.1016\/0020-7373(92)90076-W_BIB51"},{"key":"10.1016\/0020-7373(92)90076-W_BIB52","first-page":"286","article-title":"Relative contribution of decision-maker attributes to decision process","volume":"12","author":"Taylor","year":"1974","journal-title":"Organizational Behavior and Human Behavior"},{"key":"10.1016\/0020-7373(92)90076-W_BIB53","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1002\/spe.4380090207","article-title":"Computer programming and human thought process","volume":"9","author":"Tracz","year":"1979","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1016\/0020-7373(92)90076-W_BIB54","series-title":"The Psychology of Computer Use","article-title":"Individual differences and aspects of control flow notations","author":"van der Veer","year":"1983"},{"key":"10.1016\/0020-7373(92)90076-W_BIB55","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/S0020-7373(84)80065-6","article-title":"Conditional statements and program coding: An experimental evaluation","volume":"21","author":"Vessey","year":"1984","journal-title":"International Journal of Man-Machines Studies"},{"year":"1971","author":"Weinberg","key":"10.1016\/0020-7373(92)90076-W_BIB56"},{"issue":"8","key":"10.1016\/0020-7373(92)90076-W_BIB57","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/956028.956032","article-title":"IF-THEN-ELSE considered harmful","volume":"10","author":"Weinberg","year":"1975","journal-title":"ACM SIGPLAN Notices"},{"year":"1971","author":"Witkin","key":"10.1016\/0020-7373(92)90076-W_BIB58"},{"year":"1982","author":"Wolfe","key":"10.1016\/0020-7373(92)90076-W_BIB59"},{"issue":"10","key":"10.1016\/0020-7373(92)90076-W_BIB60","doi-asserted-by":"crossref","first-page":"966","DOI":"10.1287\/mnsc.25.10.966","article-title":"Individual differences and MIS success: a review of the empirical literature","volume":"25","author":"Zmud","year":"1979","journal-title":"Management Science"}],"container-title":["International Journal of Man-Machine Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002073739290076W?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002073739290076W?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T15:20:53Z","timestamp":1757085653000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/002073739290076W"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,6]]},"references-count":61,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1992,6]]}},"alternative-id":["002073739290076W"],"URL":"https:\/\/doi.org\/10.1016\/0020-7373(92)90076-w","relation":{},"ISSN":["0020-7373"],"issn-type":[{"type":"print","value":"0020-7373"}],"subject":[],"published":{"date-parts":[[1992,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Nested IF-THEN-ELSE constructs in end-user computing: personality and aptitude as predictors of programming ability","name":"articletitle","label":"Article Title"},{"value":"International Journal of Man-Machine Studies","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/0020-7373(92)90076-W","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 1992 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}]}}