{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:30:07Z","timestamp":1776105007601,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/vlhcc.2014.6883023","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:19:56Z","timestamp":1409739596000},"page":"57-64","source":"Crossref","is-referenced-by-count":64,"title":["Principles of a debugging-first puzzle game for computing education"],"prefix":"10.1109","author":[{"given":"Michael J.","family":"Lee","sequence":"first","affiliation":[{"name":"University of Washington The Information School Seattle, Washington, USA"}]},{"given":"Faezeh","family":"Bahmani","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Irwin","family":"Kwan","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Jilian","family":"LaFerte","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Polina","family":"Charters","sequence":"additional","affiliation":[{"name":"University of Washington The Information School Seattle, Washington, USA"}]},{"given":"Amber","family":"Horvath","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Fanny","family":"Luor","sequence":"additional","affiliation":[{"name":"University of Washington The Information School Seattle, Washington, USA"}]},{"given":"Jill","family":"Cao","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Catherine","family":"Law","sequence":"additional","affiliation":[{"name":"Oregon State University, STEM Academy, Corvallis, Oregon, USA"}]},{"given":"Michael","family":"Beswetherick","sequence":"additional","affiliation":[{"name":"University of Washington The Information School Seattle, Washington, USA"}]},{"given":"Sheridan","family":"Long","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University School of EECS, Corvallis, Oregon, USA"}]},{"given":"Amy J.","family":"Ko","sequence":"additional","affiliation":[{"name":"University of Washington The Information School Seattle, Washington, USA"}]}],"member":"263","reference":[{"key":"ref33","first-page":"61","article-title":"A macroadaptive approach to tutoring","volume":"4","author":"shute","year":"1993","journal-title":"Journal of AI in Education"},{"key":"ref32","author":"sch\u00f6n","year":"1983","journal-title":"The Reflective Practitioner How Professionals Think In Action"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.595621"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/35.755446"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.772"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1060071.1060075"},{"key":"ref35","year":"2013","journal-title":"National Curriculum in England Computing Programmes of Study"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2007.18"},{"key":"ref10","author":"ellis","year":"2005","journal-title":"Research on Educational Innovations"},{"key":"ref11","year":"2012","journal-title":"Essential facts about the computer and video game industry"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950595"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262033459.003.0003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240844"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645250"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.47"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2016911.2016934"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2012.6344507"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2493394.2493410"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3314.001.0001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HCC.2002.1046334"},{"key":"ref27","author":"polya","year":"1971","journal-title":"How to Solve It A New Aspect of Mathematical Method"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HCC.2002.1046367"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.06.004"},{"key":"ref29","author":"reinecke","year":"2008","journal-title":"Why Girls Play Results of A Qualitative Interview Study with Female Video Game Players"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518944"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645260"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2012.6344483"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2159365.2159370"},{"key":"ref9","article-title":"Challenging Stereotypes and Changing Attitudes: The effect of a brief programming encounter on adults' attitudes toward programming","author":"charters","year":"2013","journal-title":"ACM SIGCSE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DIGITEL.2010.55"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352260"},{"key":"ref22","first-page":"219","article-title":"Gender differences in information processing: A selectivity interpretation","author":"meyers-levy","year":"1989","journal-title":"Cognitive and Affective Responses to Advertising"},{"key":"ref21","author":"margolis","year":"2003","journal-title":"Unlocking the Clubhouse Women in Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1340961.1340974"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/9780470619926.ch1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_3"},{"key":"ref25","article-title":"NCWIT Scorecard: A report on the status of women in information technology","year":"2013","journal-title":"Nat'1 Ctr for Women & IT"}],"event":{"name":"2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","location":"Melbourne, VIC, Australia","start":{"date-parts":[[2014,7,28]]},"end":{"date-parts":[[2014,8,1]]}},"container-title":["2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878991\/6883003\/06883023.pdf?arnumber=6883023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T16:54:43Z","timestamp":1670345683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6883023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2014.6883023","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}