{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:38:41Z","timestamp":1776083921544,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,6,28]],"date-time":"2004-06-28T00:00:00Z","timestamp":1088380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,6,28]]},"DOI":"10.1145\/1007996.1008042","type":"proceedings-article","created":{"date-parts":[[2004,7,20]],"date-time":"2004-07-20T11:55:38Z","timestamp":1090324538000},"page":"171-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":110,"title":["Self-efficacy and mental models in learning to program"],"prefix":"10.1145","author":[{"given":"Vennila","family":"Ramalingam","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]},{"given":"Deborah","family":"LaBelle","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, Media, PA"}]},{"given":"Susan","family":"Wiedenbeck","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA"}]}],"member":"320","published-online":{"date-parts":[[2004,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Social Foundations of Thought and Action","author":"Bandura A.","year":"1986","unstructured":"Bandura , A. Social Foundations of Thought and Action . Prentice Hall , Englewood Cliffs, NJ , 1986 . Bandura, A. Social Foundations of Thought and Action. Prentice Hall, Englewood Cliffs, NJ, 1986."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08886504.1995.10782148"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/377435.377467"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1994.1038"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505261"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.28945\/615"},{"key":"e_1_3_2_1_8_1","volume-title":"Reinhart & Winston","author":"Kerlinger F.N.","year":"1973","unstructured":"Kerlinger , F.N. & Pehazur , E.J. Multiple Regression in Behavioral Research. Holt , Reinhart & Winston , New York , 1973 . Kerlinger, F.N. & Pehazur, E.J. Multiple Regression in Behavioral Research. Holt, Reinhart & Winston, New York, 1973."},{"key":"e_1_3_2_1_9_1","volume-title":"Mental Models","author":"Norman D.A.","year":"1983","unstructured":"Norman , D.A. Some observations on mental models . In D. Gentner and A.L. Stevens, Eds., Mental Models , Erlbaum , Hillsdale, NJ , 1983 . Norman, D.A. Some observations on mental models. In D. Gentner and A.L. Stevens, Eds., Mental Models, Erlbaum, Hillsdale, NJ, 1983."},{"key":"e_1_3_2_1_10_1","volume-title":"Empirical Studies of Programmers: Second Workshop. Ablex","author":"Pennington N.","year":"1987","unstructured":"Pennington , N. Comprehension strategies in programming. In E. Soloway and S. Iyengar, Eds ., Empirical Studies of Programmers: Second Workshop. Ablex , Norwood, NJ , 1987 , 100--113. Pennington, N. Comprehension strategies in programming. In E. Soloway and S. Iyengar, Eds., Empirical Studies of Programmers: Second Workshop. Ablex, Norwood, NJ, 1987, 100--113."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00050-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2190\/C670-Y3C8-LTJ1-CT3P"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00975629"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2190\/4U0A-36XP-EU5K-H4KV"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563352"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(98)00029-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364581"}],"event":{"name":"ITiCSE04: Innovation and Technology in Computer Science Education","location":"Leeds United Kingdom","acronym":"ITiCSE04","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1007996.1008042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1007996.1008042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:31:15Z","timestamp":1750249875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1007996.1008042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6,28]]},"references-count":18,"alternative-id":["10.1145\/1007996.1008042","10.1145\/1007996"],"URL":"https:\/\/doi.org\/10.1145\/1007996.1008042","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1026487.1008042","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,6,28]]},"assertion":[{"value":"2004-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}