{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:02:03Z","timestamp":1749096123334,"version":"3.41.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["101060231"],"award-info":[{"award-number":["101060231"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016308","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Fun Until the Limits: Students' Perceptions of Design Thinking Projects with Digital Tools"],"prefix":"10.1109","author":[{"given":"Isabella","family":"Possaghi","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU),Department of Computer Science,Trondheim,Norway"}]},{"given":"Feiran","family":"Zhang","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU),Department of Computer Science,Trondheim,Norway"}]},{"given":"Kshitij","family":"Sharma","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU),Department of Computer Science,Trondheim,Norway"}]},{"given":"Sofia","family":"Papavlasopoulou","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU),Department of Computer Science,Trondheim,Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/10986065.2018.1403544"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-016-0098-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445373"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2015.1124022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3210586.3210592"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13375.003.0009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3628516.3655806"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3427594"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3569897"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569750"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3102\/0034654312457429"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2015.10.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-444-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/edu-2019-0022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.12.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.07.004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.20897\/ejsteme\/3868"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/polsoc\/puab016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-020-09756-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2023.100616"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/0022057418811128"},{"volume-title":"Fostering computational thinking and design thinking in the PYP, MYP and DP","year":"2020","author":"Slotta","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4324\/9781315647500-2"},{"key":"ref24","first-page":"108","article-title":"Exploring cybersecurity education at the k-12 level","volume-title":"SITE Interactive Conference","author":"Chen","year":"2021"},{"issue":"3","key":"ref25","first-page":"2018","article-title":"Thinking & acting like a designer: How design thinking supports innovation in k-12 education","volume":"6","author":"Diefenthaler","year":"2017","journal-title":"Wise & Ideo"},{"volume-title":"Key competences for lifelong learning","year":"2019","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4324\/9781351173285-1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2020.100637"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-021-00607-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12898"},{"key":"ref31","article-title":"Young children (0-8) and digital technology","author":"Chaudron","year":"2015","journal-title":"A qualitative exploratory study across seven countries. Joint Research Centre. European Commission"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100343"},{"issue":"6","key":"ref33","first-page":"75","article-title":"Cyber security education through gaming cybersecurity games can be interactive, fun, educational and engaging","volume":"30","author":"Cullinane","year":"2015","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"ref34","first-page":"75","article-title":"Can educational be fun","volume-title":"Game developers conference","volume":"99","author":"Bruckman","year":"1999"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON60312.2024.10578636"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2023.101335"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3686703"},{"volume-title":"Researching information systems and computing","year":"2005","author":"Oates","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-42134-1_2"},{"key":"ref40","article-title":"10.7 strengths and weaknesses of qualitative interviews","author":"Sheppard","year":"2020","journal-title":"Research Methods for the Social Sciences: An Introduction"},{"issue":"1","key":"ref41","article-title":"A beginner\u2019s guide to applied educational research using thematic analysis","volume":"25","author":"Peel","year":"2020","journal-title":"Practical Assessment Research and Evaluation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/VL\/HCC60511.2024.00016"},{"volume-title":"Using technology as a learning tool, not just the cool new thing. educase","year":"2011","author":"McNeely","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10798-021-09692-4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3564721.3565949"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2025,4,22]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016308.pdf?arnumber=11016308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:10:52Z","timestamp":1749013852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016308","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}