{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:41:47Z","timestamp":1773412907438,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/vlhcc.2014.6883040","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:19:56Z","timestamp":1409739596000},"page":"157-160","source":"Crossref","is-referenced-by-count":3,"title":["Visualizing the problem domain for spreadsheet users: A mental model perspective"],"prefix":"10.1109","author":[{"given":"Bennett","family":"Kankuzi","sequence":"first","affiliation":[]},{"given":"Jorma","family":"Sajaniemi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","author":"wertheimer","year":"1938","journal-title":"A Source Book of Gestalt Psychology"},{"key":"15","author":"raffensperger","year":"2008","journal-title":"The Art of the Spreadsheet"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1999.0142"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(87)90007-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.002"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.1998040102"},{"key":"12","article-title":"Sarbanes-oxley: What about all the spreadsheets? Controlling for errors and fraud in financial reporting","author":"panko","year":"2005","journal-title":"Proceedings of the EuSpRIG 2005 Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ne.18.030195.001205"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0061"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(83)80031-5"},{"key":"10","author":"nielsen","year":"1994","journal-title":"Usability Engineering"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1083231.1083242"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101929"},{"key":"5","author":"duggirala","year":"2012","journal-title":"Excel Auditing Functions [Spreadsheet Risk Management-Part 3 of 4]"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1727(199821)14:1<3::AID-SDR140>3.0.CO;2-K"},{"key":"9","article-title":"An exploratory analysis of the impact of named ranges on the debugging performance of novice users","author":"mckeever","year":"2009","journal-title":"Proceedings of EuSpRIG 2009 Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645237"}],"event":{"name":"2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","location":"Melbourne, Australia","start":{"date-parts":[[2014,7,28]]},"end":{"date-parts":[[2014,8,1]]}},"container-title":["2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878991\/6883003\/06883040.pdf?arnumber=6883040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:30:49Z","timestamp":1490308249000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2014.6883040","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}