{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:46Z","timestamp":1763467786301,"version":"3.41.0"},"reference-count":107,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2006,6,26]],"date-time":"2006-06-26T00:00:00Z","timestamp":1151280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCSE Bull."],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>Despite a lack of consensus on the nature of Computing Research Methods (CRM), a growing number of programs are exploring models and content for CRM courses. This report is one step in a participatory design process to develop a general framework for thinking about and teaching CRM.We introduce a novel sense-making structure for teaching CRM. That structure consists of a road map to the CRM literature, a framework grounded in questions rather than answers, and two CRM skill sets: core skills and specific skills. We integrate our structure with a model for the process a learner goes through on the way to becoming an expert computing researcher and offer example learning activities that represent a growing repository of course materials meant to aid those wishing to teach research skills to computing students.Our model is designed to ground discussion of teaching CRM and to serve as a roadmap for institutions, faculty, students and research communities addressing the transition from student to fully enfranchised member of a computing research community of practice. To that end, we offer several possible scenarios for using our model.In computing, research methods have traditionally been passed from advisor to student via apprenticeship. Establishing a richer pedagogy for training researchers in computing will benefit all (see Figure 1).<\/jats:p>","DOI":"10.1145\/1189136.1189180","type":"journal-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T18:32:02Z","timestamp":1169058722000},"page":"96-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Research methods in computing"],"prefix":"10.1145","volume":"38","author":[{"given":"Hilary J.","family":"Holz","sequence":"first","affiliation":[{"name":"Cal State, East Bay"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anne","family":"Applin","sequence":"additional","affiliation":[{"name":"Ithaca College"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruria","family":"Haberman","sequence":"additional","affiliation":[{"name":"Holon Institute of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Donald","family":"Joyce","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, Unitec"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Helen","family":"Purchase","sequence":"additional","affiliation":[{"name":"University of Glasgow"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Catherine","family":"Reed","sequence":"additional","affiliation":[{"name":"Cal State, East Bay"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,6,26]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1080\/07421222.1992.11517938"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/504350.504357"},{"key":"e_1_2_1_3_1","volume-title":"A theory of computer semiotics: semiotic approaches to construction and assessment of computer systems","author":"Andersen P. B.","year":"1997","unstructured":"P. B. Andersen . A theory of computer semiotics: semiotic approaches to construction and assessment of computer systems . Cambridge University Press , 1997 . P. B. Andersen. A theory of computer semiotics: semiotic approaches to construction and assessment of computer systems. Cambridge University Press, 1997."},{"key":"e_1_2_1_4_1","volume-title":"Alliance for Telecommunications Industry Solutions","author":"ATIS Committee T1A1","year":"2001","unstructured":"ATIS Committee T1A1 : performance and signal processing. T1 Glossary 2000: glossary of telecommunications terms . Alliance for Telecommunications Industry Solutions , 2001 . ATIS Committee T1A1: performance and signal processing. T1 Glossary 2000: glossary of telecommunications terms. Alliance for Telecommunications Industry Solutions, 2001."},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1080\/08993400412331363823"},{"key":"e_1_2_1_6_1","volume-title":"Designing interactive systems","author":"Benyon D.","year":"2005","unstructured":"D. Benyon , P. Turner and S. Turner . Designing interactive systems . Addison-Wesley , 2005 . D. Benyon, P. Turner and S. Turner. Designing interactive systems. Addison-Wesley, 2005."},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.5555\/942796.943250"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1007\/11555261_59"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1145\/66617.66630"},{"key":"e_1_2_1_10_1","volume-title":"Longmans","author":"Bloom B.","year":"1956","unstructured":"B. Bloom . Taxonomy of educational objectives . Longmans , New York , 1956 . B. Bloom. Taxonomy of educational objectives. Longmans, New York, 1956."},{"doi-asserted-by":"publisher","key":"e_1_2_1_11_1","DOI":"10.1145\/563340.563381"},{"key":"e_1_2_1_12_1","volume-title":"Experimental and quasi-experimental designs for research","author":"Campbell J.","year":"1963","unstructured":"J. Campbell and D. Stanley . Experimental and quasi-experimental designs for research . Houghton Mifflin Company , 1963 . J. Campbell and D. Stanley. Experimental and quasi-experimental designs for research. Houghton Mifflin Company, 1963."},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1016\/0378-7206(93)90060-7"},{"key":"e_1_2_1_14_1","volume-title":"The MIT Press","author":"Cohen P.","year":"1995","unstructured":"P. Cohen . Empirical methods for artificial intelligence . The MIT Press , 1995 . P. Cohen. Empirical methods for artificial intelligence. The MIT Press, 1995."},{"volume-title":"CSPR - participatory design","year":"2005","unstructured":"Computer Professionals for Social Responsibility. CSPR - participatory design . 1 June 2005 CSPR.org Viewed : 8 July 2006 http:\/\/www.cpsr.org\/issues\/pd\/ Computer Professionals for Social Responsibility. CSPR - participatory design. 1 June 2005 CSPR.org Viewed: 8 July 2006 http:\/\/www.cpsr.org\/issues\/pd\/","key":"e_1_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_16_1","DOI":"10.1145\/1056808.1056902"},{"doi-asserted-by":"publisher","key":"e_1_2_1_17_1","DOI":"10.1145\/971300.971303"},{"doi-asserted-by":"publisher","key":"e_1_2_1_18_1","DOI":"10.1108\/13673279810249369"},{"key":"e_1_2_1_19_1","volume-title":"Human computer interaction","author":"Dix A.","year":"2004","unstructured":"A. Dix , J. Finlay , G. D. Abowd , and R. Beale . Human computer interaction , 3 rd ed. Prentice Hall , 2004 . A. Dix, J. Finlay, G. D. Abowd, and R. Beale. Human computer interaction, 3rd ed. Prentice Hall, 2004.","edition":"3"},{"key":"e_1_2_1_20_1","volume-title":"Five steps from novice to expert. Mind over machine: the power of human intuition and expertise in the era of the computer, 16--51","author":"Dreyfus H. L.","year":"1986","unstructured":"H. L. Dreyfus and S. E. Dreyfus . Five steps from novice to expert. Mind over machine: the power of human intuition and expertise in the era of the computer, 16--51 . Free Press , New York , 1986 . H. L. Dreyfus and S. E. Dreyfus. Five steps from novice to expert. Mind over machine: the power of human intuition and expertise in the era of the computer, 16--51. Free Press, New York, 1986."},{"unstructured":"Elsevier Engineering Information. Compendex. http:\/\/www.ei.org\/databases\/compendex.html  Elsevier Engineering Information. Compendex. http:\/\/www.ei.org\/databases\/compendex.html","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","volume-title":"CASCON '93","author":"Emam K. E.","year":"1993","unstructured":"K. E. Emam , N. Moukheiber , and N. H. Madhavji . An empirical evaluation of the G\/Q\/M method . In CASCON '93 , Toronto, ON , Oct. 1993 , 265--289. K. E. Emam, N. Moukheiber, and N. H. Madhavji. An empirical evaluation of the G\/Q\/M method. In CASCON '93, Toronto, ON, Oct. 1993, 265--289."},{"doi-asserted-by":"publisher","key":"e_1_2_1_23_1","DOI":"10.1007\/BF00156001"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1145\/1017816.1017821"},{"key":"e_1_2_1_25_1","first-page":"19","article-title":"A historiographical examination of information systems","volume":"1","author":"Farhoomand A.","year":"1999","unstructured":"A. Farhoomand and D. H. Drury . A historiographical examination of information systems . Commun. AIS , 1 : 19 , 1999 . A. Farhoomand and D. H. Drury. A historiographical examination of information systems. Commun. AIS, 1:19, 1999.","journal-title":"Commun. AIS"},{"doi-asserted-by":"publisher","key":"e_1_2_1_26_1","DOI":"10.1145\/236452.236516"},{"unstructured":"A. Fekete. \"Definitions for computing research methods needed.\" Online posting. 16 Sept. 2006 SIGCSE-CSRM Listserv. http:\/\/listserv.acm.org\/scripts\/wa.exe? A1 =ind0609c&L=sigcse-csrm  A. Fekete. \"Definitions for computing research methods needed.\" Online posting. 16 Sept. 2006 SIGCSE-CSRM Listserv. http:\/\/listserv.acm.org\/scripts\/wa.exe? A1 =ind0609c&L=sigcse-csrm","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","first-page":"184","article-title":"Mathematical modeling and Ada simulation of some synchronization processes. In ANSS '87","volume":"163","author":"Fraser M. D.","year":"1987","unstructured":"M. D. Fraser and R. A. Gagliano . Mathematical modeling and Ada simulation of some synchronization processes. In ANSS '87 , Tampa, FL , 1987 , 163 -- 184 . M. D. Fraser and R. A. Gagliano. Mathematical modeling and Ada simulation of some synchronization processes. In ANSS '87, Tampa, FL, 1987, 163--184.","journal-title":"Tampa, FL"},{"key":"e_1_2_1_29_1","volume-title":"competencies for analysis and application","author":"Gay R. L.","year":"1996","unstructured":"R. L. Gay . Educational research : competencies for analysis and application , 5 th edition. Prentice-Hall , 1996 . R. L. Gay. Educational research: competencies for analysis and application, 5th edition. Prentice-Hall, 1996.","edition":"5"},{"doi-asserted-by":"publisher","key":"e_1_2_1_30_1","DOI":"10.1017\/S0269888905000299"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1145\/990680.990686"},{"doi-asserted-by":"publisher","key":"e_1_2_1_32_1","DOI":"10.1016\/j.infsof.2008.09.015"},{"key":"e_1_2_1_33_1","volume-title":"SAICSIT '03","author":"Goede R.","year":"2003","unstructured":"R. Goede and C. de Villiers . The applicability of grounded theory as research methodology in studies on the use of methodologies in IS practices . In SAICSIT '03 , Sept. 2003 , 208--217. R. Goede and C. de Villiers. The applicability of grounded theory as research methodology in studies on the use of methodologies in IS practices. In SAICSIT '03, Sept. 2003, 208--217."},{"key":"e_1_2_1_34_1","volume-title":"Using fuzzy k-modes to analyze patterns of system calls for intrusion detection. Masters thesis","author":"Groat M. M.","year":"2005","unstructured":"M. M. Groat . Using fuzzy k-modes to analyze patterns of system calls for intrusion detection. Masters thesis , California State University , East Bay , December 2005 . M. M. Groat. Using fuzzy k-modes to analyze patterns of system calls for intrusion detection. Masters thesis, California State University, East Bay, December 2005."},{"doi-asserted-by":"publisher","key":"e_1_2_1_35_1","DOI":"10.1016\/0378-7206(93)90028-R"},{"key":"e_1_2_1_36_1","volume-title":"OZCHI '05","author":"Hagen P.","year":"2005","unstructured":"P. Hagen , T. Robertson , M. Kan , and K. Sadler . Emerging research methods for understanding mobile technology use . In OZCHI '05 , Canberra, Australia , Nov. 2005 , 1--10. P. Hagen, T. Robertson, M. Kan, and K. Sadler. Emerging research methods for understanding mobile technology use. In OZCHI '05, Canberra, Australia, Nov. 2005, 1--10."},{"key":"e_1_2_1_37_1","volume-title":"December","author":"Hamilton S.","year":"1982","unstructured":"S. Hamilton and B. Ives . Knowledge utilization among MIS researchers. MIS Quarterly, 61--77 , December 1982 . S. Hamilton and B. Ives. Knowledge utilization among MIS researchers. MIS Quarterly, 61--77, December 1982."},{"key":"e_1_2_1_38_1","volume-title":"Papers from The Conference on Empirical Assessment in Software Engineering (EASE)","author":"Harrison R.","year":"2000","unstructured":"R. Harrison and M. Wells . A meta-analysis of multidisciplinary research . In Papers from The Conference on Empirical Assessment in Software Engineering (EASE) , Staffordshire , UK , April 2000 . R. Harrison and M. Wells. A meta-analysis of multidisciplinary research. In Papers from The Conference on Empirical Assessment in Software Engineering (EASE), Staffordshire, UK, April 2000."},{"key":"e_1_2_1_39_1","volume-title":"LEAD Center, 1900","author":"Herrerra O.","year":"2001","unstructured":"O. Herrerra . Distributed mentor project: comprehensive participant survey analyses (1994-2000). Technical report , LEAD Center, 1900 University Ave, Madison, WI 53726 , 2001 . O. Herrerra. Distributed mentor project: comprehensive participant survey analyses (1994-2000). Technical report, LEAD Center, 1900 University Ave, Madison, WI 53726, 2001."},{"doi-asserted-by":"publisher","key":"e_1_2_1_40_1","DOI":"10.1145\/371578.371593"},{"key":"e_1_2_1_41_1","volume-title":"SIGCSE '06","author":"Holz H.","year":"2006","unstructured":"H. Holz and A. Applin . Teaching computer science research methods . In SIGCSE '06 , Houston, TX , March 2006 , 576. H. Holz and A. Applin. Teaching computer science research methods. In SIGCSE '06, Houston, TX, March 2006, 576."},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.1023\/A:1018938021528"},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.1145\/944868.944888"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1016\/S0360-1315(02)00044-1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1145\/1109540.1109551"},{"unstructured":"C. Johnson. What is research in computing science? Available from http:\/\/www.dcs.gla.ac.uk\/~johnson\/teaching\/research_skills\/basics.html  C. Johnson. What is research in computing science? Available from http:\/\/www.dcs.gla.ac.uk\/~johnson\/teaching\/research_skills\/basics.html","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","volume-title":"Computing curricula 2005: the overview report","author":"The Joint Task Force on Computing Curricula.","year":"2005","unstructured":"The Joint Task Force on Computing Curricula. Computing curricula 2005: the overview report . ACM Press , 2005 . The Joint Task Force on Computing Curricula. Computing curricula 2005: the overview report. ACM Press, 2005."},{"key":"e_1_2_1_48_1","volume-title":"Evaluation and dissemination of an undergraduate program to improve retention of at-risk students. Technical report","author":"Jonides J.","year":"1995","unstructured":"J. Jonides . Evaluation and dissemination of an undergraduate program to improve retention of at-risk students. Technical report , University of Michigan, Ann Arbor College of Literature , Science, and the Arts, 1995 . J. Jonides. Evaluation and dissemination of an undergraduate program to improve retention of at-risk students. Technical report, University of Michigan, Ann Arbor College of Literature, Science, and the Arts, 1995."},{"doi-asserted-by":"publisher","key":"e_1_2_1_49_1","DOI":"10.1145\/761849.761872"},{"doi-asserted-by":"publisher","key":"e_1_2_1_50_1","DOI":"10.1145\/944868.944883"},{"key":"e_1_2_1_51_1","volume-title":"Helsinki University of Technology","author":"Kaski S.","year":"1997","unstructured":"S. Kaski . Data exploration using self-organizing maps. PhD thesis , Helsinki University of Technology , 1997 . S. Kaski. Data exploration using self-organizing maps. PhD thesis, Helsinki University of Technology, 1997."},{"key":"e_1_2_1_52_1","volume-title":"F. N. Kerlinger. Foundations of behavioral research","year":"1992","unstructured":"F. N. Kerlinger. Foundations of behavioral research , 3 rd edition. Harcourt Brace and Company , 1992 . F. N. Kerlinger. Foundations of behavioral research, 3rd edition. Harcourt Brace and Company, 1992.","edition":"3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_53_1","DOI":"10.1016\/S0167-9236(03)00022-8"},{"doi-asserted-by":"publisher","key":"e_1_2_1_54_1","DOI":"10.1145\/1141753.1141864"},{"doi-asserted-by":"publisher","key":"e_1_2_1_55_1","DOI":"10.1016\/S0378-7206(97)00022-0"},{"doi-asserted-by":"publisher","key":"e_1_2_1_56_1","DOI":"10.1145\/322276.322279"},{"doi-asserted-by":"publisher","key":"e_1_2_1_57_1","DOI":"10.1017\/CBO9780511815355"},{"doi-asserted-by":"publisher","key":"e_1_2_1_58_1","DOI":"10.1145\/1113847.1113857"},{"doi-asserted-by":"publisher","key":"e_1_2_1_59_1","DOI":"10.1145\/174608.174609"},{"key":"e_1_2_1_60_1","volume-title":"Self-regulated learning and academic achievement: theoretical perspectives","author":"McCombs B. L.","year":"2001","unstructured":"B. L. McCombs . Self-regulated learning and academic achievement : a phenomenological view . In B. J. Zimmerman, editor, Self-regulated learning and academic achievement: theoretical perspectives . Lawrence Erlbaum Associates, Inc. , 2001 . B. L. McCombs. Self-regulated learning and academic achievement: a phenomenological view. In B. J. Zimmerman, editor, Self-regulated learning and academic achievement: theoretical perspectives. Lawrence Erlbaum Associates, Inc., 2001."},{"doi-asserted-by":"publisher","key":"e_1_2_1_61_1","DOI":"10.1145\/226188.226193"},{"doi-asserted-by":"publisher","key":"e_1_2_1_62_1","DOI":"10.1145\/765891.766148"},{"doi-asserted-by":"publisher","key":"e_1_2_1_63_1","DOI":"10.1145\/213859.214802"},{"key":"e_1_2_1_64_1","volume-title":"CRPIT '02","author":"Murnane J. S.","year":"2002","unstructured":"J. S. Murnane and J. W. Warner . An empirical study of junior secondary students' expression of algorithms in natural language . In CRPIT '02 , Copenhagen, Denmark , July 2002 , 81--85. J. S. Murnane and J. W. Warner. An empirical study of junior secondary students' expression of algorithms in natural language. In CRPIT '02, Copenhagen, Denmark, July 2002, 81--85."},{"doi-asserted-by":"publisher","key":"e_1_2_1_65_1","DOI":"10.1145\/97243.97281"},{"doi-asserted-by":"publisher","key":"e_1_2_1_66_1","DOI":"10.1287\/isre.2.1.1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_67_1","DOI":"10.1007\/11527886_60"},{"volume-title":"UPA 2005 Advanced Topic Seminar. Montreal, Quebec. http:\/\/www.upassoc.org\/conference\/2007\/call\/eptopics\/Adv Topics_Ex1.pdf","author":"Parush A.","unstructured":"A. Parush . Expanding our toolkit: from descriptive techniques to in-depth analyses . UPA 2005 Advanced Topic Seminar. Montreal, Quebec. http:\/\/www.upassoc.org\/conference\/2007\/call\/eptopics\/Adv Topics_Ex1.pdf A. Parush. Expanding our toolkit: from descriptive techniques to in-depth analyses. UPA 2005 Advanced Topic Seminar. Montreal, Quebec. http:\/\/www.upassoc.org\/conference\/2007\/call\/eptopics\/Adv Topics_Ex1.pdf","key":"e_1_2_1_68_1"},{"issue":"1","key":"e_1_2_1_69_1","first-page":"1","article-title":"A taxonomy of future higher thinking skills","volume":"2","author":"Passig D.","year":"2003","unstructured":"D. Passig . A taxonomy of future higher thinking skills . INFORMATICA , 2 ( 1 ): 1 -- 12 , 2003 . D. Passig. A taxonomy of future higher thinking skills. INFORMATICA, 2(1): 1--12, 2003.","journal-title":"INFORMATICA"},{"doi-asserted-by":"publisher","key":"e_1_2_1_70_1","DOI":"10.1145\/1142473.1142487"},{"doi-asserted-by":"publisher","key":"e_1_2_1_71_1","DOI":"10.1145\/1113847.1113893"},{"doi-asserted-by":"publisher","key":"e_1_2_1_72_1","DOI":"10.1145\/336512.336586"},{"key":"e_1_2_1_73_1","volume-title":"SAICSIT '05","author":"Pillay N.","year":"2005","unstructured":"N. Pillay . A genetic programming system for the induction of iterative solution algorithms to novice procedural programming problems . In SAICSIT '05 , White River, South Africa , Sept. 2005 , 66--77. N. Pillay. A genetic programming system for the induction of iterative solution algorithms to novice procedural programming problems. In SAICSIT '05, White River, South Africa, Sept. 2005, 66--77."},{"key":"e_1_2_1_74_1","volume-title":"FIE 2005","author":"Polack-Wahl J.","year":"2005","unstructured":"J. Polack-Wahl and K. Anewalt . WIP - Research methods: teaching students how to learn about learning . In FIE 2005 , Indianapolis, IN , Oct. 2005 , F1F-12 -- F1F-13. J. Polack-Wahl and K. Anewalt. WIP - Research methods: teaching students how to learn about learning. In FIE 2005, Indianapolis, IN, Oct. 2005, F1F-12 -- F1F-13."},{"key":"e_1_2_1_75_1","volume-title":"Carey Human-computer interaction: concepts and design","author":"Preece J.","year":"1994","unstructured":"J. Preece , Y. Rogers , H. Sharp , D. Benyon , S Holland and T. Carey Human-computer interaction: concepts and design . Addison-Wesley , 1994 . J. Preece, Y. Rogers, H. Sharp, D. Benyon, S Holland and T. Carey Human-computer interaction: concepts and design. Addison-Wesley, 1994."},{"doi-asserted-by":"publisher","key":"e_1_2_1_76_1","DOI":"10.1016\/S0164-1212(03)00015-3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_77_1","DOI":"10.1145\/1125451.1125464"},{"doi-asserted-by":"publisher","key":"e_1_2_1_78_1","DOI":"10.1145\/227614.227615"},{"doi-asserted-by":"publisher","key":"e_1_2_1_79_1","DOI":"10.1145\/1011870.1011884"},{"doi-asserted-by":"publisher","key":"e_1_2_1_80_1","DOI":"10.1145\/312683.312715"},{"doi-asserted-by":"publisher","key":"e_1_2_1_81_1","DOI":"10.1145\/820127.820164"},{"key":"e_1_2_1_82_1","first-page":"17","article-title":"What is capability maturity model? a definition from Whatis.com","year":"2003","unstructured":"SearchCIO.com . What is capability maturity model? a definition from Whatis.com . CIO Definitions. 5 Oct 2003 . TechTarget. Viewed: 17 Sept 2006 http:\/\/searchcio.techtarget.com\/sDefinition\/0,290660, sid19_gci930057,00.html SearchCIO.com. What is capability maturity model? a definition from Whatis.com. CIO Definitions. 5 Oct 2003. TechTarget. Viewed: 17 Sept 2006 http:\/\/searchcio.techtarget.com\/sDefinition\/0,290660, sid19_gci930057,00.html","journal-title":"CIO Definitions."},{"volume-title":"TechTarget Security Media. Viewed","year":"2005","unstructured":"SearchSecurity.com What is computer forensics? - a definition from Whatis.com. Definitions. 14 Jan 2005. TechTarget Security Media. Viewed : 14 Sept 2005 . http:\/\/searchsecurity.techtarget.com\/sDefinition\/0.290660,sid14_gci1007675,00.html SearchSecurity.com What is computer forensics? - a definition from Whatis.com. Definitions. 14 Jan 2005. TechTarget Security Media. Viewed: 14 Sept 2005. http:\/\/searchsecurity.techtarget.com\/sDefinition\/0.290660,sid14_gci1007675,00.html","key":"e_1_2_1_83_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_84_1","DOI":"10.1145\/1138403.1138442"},{"key":"e_1_2_1_85_1","volume-title":"Statistical reasoning for the behavioral sciences","author":"Shavelson R. J.","year":"1996","unstructured":"R. J. Shavelson . Statistical reasoning for the behavioral sciences , 3 rd edition. Allyn and Bacon , 1996 . R. J. Shavelson. Statistical reasoning for the behavioral sciences, 3rd edition. Allyn and Bacon, 1996.","edition":"3"},{"key":"e_1_2_1_86_1","first-page":"32","article-title":"On the science of education design studies","author":"Shavelson R. J.","year":"2003","unstructured":"R. J. Shavelson , D. C. Phillips , L. Towne , and M. J. Feuer . On the science of education design studies . Educ. Res. , 32 , 2003 . R. J. Shavelson, D. C. Phillips, L. Towne, and M. J. Feuer. On the science of education design studies. Educ. Res., 32, 2003.","journal-title":"Educ. Res."},{"key":"e_1_2_1_87_1","volume-title":"CSRMRepository","author":"CSRM.","year":"2005","unstructured":"SIGCSE- CSRM. CSRM Course Materials Repository. http:\/\/acc.csueastbay.edu\/~csrm\/kwiki\/index.cgi ? CSRMRepository , 2005 . SIGCSE-CSRM. CSRM Course Materials Repository. http:\/\/acc.csueastbay.edu\/~csrm\/kwiki\/index.cgi? CSRMRepository, 2005."},{"key":"e_1_2_1_88_1","volume-title":"http:\/\/acc.csueastbay.edu\/~csrm\/kwiki\/","author":"Wiki RM.","year":"2005","unstructured":"SIGCSE-CS RM. CSRM Wiki . http:\/\/acc.csueastbay.edu\/~csrm\/kwiki\/ , 2005 . SIGCSE-CSRM. CSRM Wiki. http:\/\/acc.csueastbay.edu\/~csrm\/kwiki\/, 2005."},{"unstructured":"SIGCSE-CSRM. SIGCSE Committee on Teaching Computer Science Research Methods. http:\/\/www.sigcse.org\/topics\/committees.shtml.  SIGCSE-CSRM. SIGCSE Committee on Teaching Computer Science Research Methods. http:\/\/www.sigcse.org\/topics\/committees.shtml.","key":"e_1_2_1_89_1"},{"unstructured":"SIGCSE-CSRM. SIGCSE-CSRM listserv archive http:\/\/listserv.acm.org\/archives\/sigcse-csrm.html  SIGCSE-CSRM. SIGCSE-CSRM listserv archive http:\/\/listserv.acm.org\/archives\/sigcse-csrm.html","key":"e_1_2_1_90_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_91_1","DOI":"10.1145\/571773.571781"},{"doi-asserted-by":"publisher","key":"e_1_2_1_92_1","DOI":"10.1145\/508791.508934"},{"doi-asserted-by":"publisher","key":"e_1_2_1_93_1","DOI":"10.1109\/WPC.2005.38"},{"doi-asserted-by":"publisher","key":"e_1_2_1_94_1","DOI":"10.1145\/188423.188429"},{"key":"e_1_2_1_95_1","volume-title":"Conf","author":"Tall D.","year":"1998","unstructured":"D. Tall . The cognitive development of proof: is mathematical proof for all or for some? In Conf . Univ. Chicago School Mathematics Project. August 1998 . D. Tall. The cognitive development of proof: is mathematical proof for all or for some? In Conf. Univ. Chicago School Mathematics Project. August 1998."},{"doi-asserted-by":"publisher","key":"e_1_2_1_96_1","DOI":"10.1002\/asi.10243"},{"key":"e_1_2_1_97_1","volume-title":"Empirical studies of management information systems. SIGMIS Database, 5(2-3-4):  172--182","author":"Van Horn R. L.","year":"1973","unstructured":"R. L. Van Horn . Empirical studies of management information systems. SIGMIS Database, 5(2-3-4): 172--182 , 1973 . R. L. Van Horn. Empirical studies of management information systems. SIGMIS Database, 5(2-3-4): 172--182, 1973."},{"doi-asserted-by":"publisher","key":"e_1_2_1_99_1","DOI":"10.1145\/1113511.1113512"},{"unstructured":"H. M. Walker. SIGCSE: Committee. Available from http:\/\/www.sigcse.org\/topics\/committees.shtml.  H. M. Walker. SIGCSE: Committee. Available from http:\/\/www.sigcse.org\/topics\/committees.shtml.","key":"e_1_2_1_100_1"},{"issue":"2","key":"e_1_2_1_101_1","article-title":"The fifty-four day thesis proposal: first experiences with a research course","volume":"20","author":"Ward K.","year":"2004","unstructured":"K. Ward . The fifty-four day thesis proposal: first experiences with a research course . J. Comp. Sci. Colleges , 20 ( 2 ), 2004 . K. Ward. The fifty-four day thesis proposal: first experiences with a research course. J. Comp. Sci. Colleges, 20(2), 2004.","journal-title":"J. Comp. Sci. Colleges"},{"doi-asserted-by":"publisher","key":"e_1_2_1_102_1","DOI":"10.1145\/142750.142864"},{"volume-title":"Algorithmic Analysis - Wikipedia, the free encyclopedia","year":"2006","unstructured":"Wikipedia. Algorithmic Analysis - Wikipedia, the free encyclopedia . 14 Sept 2006 . Wikipedia.org Viewed : 14 Sept 2006 http:\/\/en.wikipedia.org\/wiki\/Analysis_of_algorithms Wikipedia. Algorithmic Analysis - Wikipedia, the free encyclopedia. 14 Sept 2006. Wikipedia.org Viewed: 14 Sept 2006 http:\/\/en.wikipedia.org\/wiki\/Analysis_of_algorithms","key":"e_1_2_1_103_1"},{"volume-title":"Mathematical proof-Wikipedia, the free encyclopedia","year":"2006","unstructured":"Wikipedia. Mathematical proof-Wikipedia, the free encyclopedia . 14 Sept 2006 . Wikipedia.org Viewed : 14 Sept 2006 http:\/\/en.wikipedia.org\/wiki\/Mathematical_proof Wikipedia. Mathematical proof-Wikipedia, the free encyclopedia. 14 Sept 2006. Wikipedia.org Viewed: 14 Sept 2006 http:\/\/en.wikipedia.org\/wiki\/Mathematical_proof","key":"e_1_2_1_104_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_105_1","DOI":"10.1145\/169070.169385"},{"doi-asserted-by":"publisher","key":"e_1_2_1_106_1","DOI":"10.1016\/S0950-5849(97)00025-6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_107_1","DOI":"10.1145\/1083292.1103038"},{"key":"e_1_2_1_108_1","volume-title":"J. Zobel. Writing for Computer Science","year":"2004","unstructured":"J. Zobel. Writing for Computer Science , 2 nd ed. Springer , 2004 . J. Zobel. Writing for Computer Science, 2nd ed. Springer, 2004.","edition":"2"}],"container-title":["ACM SIGCSE Bulletin"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1189136.1189180","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1189136.1189180","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:21Z","timestamp":1750259181000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1189136.1189180"}},"subtitle":["what are they, and how should we teach them?"],"short-title":[],"issued":{"date-parts":[[2006,6,26]]},"references-count":107,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1189136.1189180"],"URL":"https:\/\/doi.org\/10.1145\/1189136.1189180","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1189215.1189180","asserted-by":"subject"}]},"ISSN":["0097-8418"],"issn-type":[{"type":"print","value":"0097-8418"}],"subject":[],"published":{"date-parts":[[2006,6,26]]},"assertion":[{"value":"2006-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}