{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:10Z","timestamp":1750307950705,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,2]],"date-time":"2007-10-02T00:00:00Z","timestamp":1191283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,2]]},"DOI":"10.1145\/1292491.1292499","type":"proceedings-article","created":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T12:51:38Z","timestamp":1192366298000},"page":"66-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Supporting CS1 with a program beacon recognition tool"],"prefix":"10.1145","author":[{"given":"Ronald","family":"Leppan","sequence":"first","affiliation":[{"name":"NMMU"}]},{"given":"Charmain","family":"Cilliers","sequence":"additional","affiliation":[{"name":"NMMU"}]},{"given":"Marinda","family":"Taljaard","sequence":"additional","affiliation":[{"name":"NMMU"}]}],"member":"320","published-online":{"date-parts":[[2007,10,2]]},"reference":[{"volume-title":"Code Scanning Patterns in Program Comprehension. in Proceedings of the 39th Hawaii International Conference on System Sciences","year":"2006","author":"Aschwanden C.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117309.1117356"},{"issue":"2","key":"e_1_3_2_1_3_1","article-title":"Students' use of learning objects","volume":"6","author":"Bradley C.","year":"2004","journal-title":"Interactive Multimedia Electronic Journal of Computer-Enhanced Learning"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(83)80031-5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067445.1067478"},{"volume-title":"Proceedings of PPIG","year":"2002","author":"Crosby M. E.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/77577.77580"},{"volume-title":"Pennsylvania","year":"1990","author":"Deimel L.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/838238.838969"},{"key":"e_1_3_2_1_10_1","first-page":"213","article-title":"in Informing Science &amp; Information Technology Education Joint Conference (INSITE), (Pori","author":"Garner S.","year":"2003","journal-title":"Finland"},{"volume-title":"Proceedings of the 7th Australasian conference on Computing education, (Newcastle, New South Wales, Australia","year":"2005","author":"Garner S.","key":"e_1_3_2_1_11_1"},{"volume-title":"University of Port Elizabeth, Port Elizabeth","year":"2005","author":"Harris N.","key":"e_1_3_2_1_12_1"},{"volume-title":"A Program Beacon Recognition Tool. in 7th International Conference on Information Technology Based Higher Education and Training, 2006","year":"2006","author":"Harris N.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Hornhof A. J. and Halverson T. Cleaning up systematic error in eye tracking data by using required fixation locations. Behavior Research Methods Instruments and Computers 34 (4). 2002. 596--604.  Hornhof A. J. and Halverson T. Cleaning up systematic error in eye tracking data by using required fixation locations. Behavior Research Methods Instruments and Computers 34 (4). 2002. 596--604.","DOI":"10.3758\/BF03195487"},{"key":"e_1_3_2_1_15_1","unstructured":"Jenkins T. On the difficulty of Learning to Program Available at http:\/\/www.ics.heacademy.ac.uk\/Events\/conf2002\/jenkins.html 2002. (Last accessed - 2005)  Jenkins T. On the difficulty of Learning to Program Available at http:\/\/www.ics.heacademy.ac.uk\/Events\/conf2002\/jenkins.html 2002. (Last accessed - 2005)"},{"volume-title":"The mind's eye, cognitive and Applied Aspects of Eye movement Research","year":"2003","author":"Karn K. S.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/800126.809575"},{"volume-title":"NMMU, Port Elizabeth","year":"2007","author":"Leppan R. G.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1986.233414"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/131295.131301"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041624.1041673"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(99)01418-7"},{"volume-title":"Comparison of Three Eye Tracking Devices in Psychology of Programming Research. in Proceedings of the 16th Annual Workshop of the Psychology of Programming Interest Group","year":"2004","author":"Nevalainen S.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"O'Brien M. P. Software Comprehension -- A Review &amp; Research Direction Technical Report UL-CSIS-03-3 2003.  O'Brien M. P. Software Comprehension -- A Review &amp; Research Direction Technical Report UL-CSIS-03-3 2003."},{"key":"e_1_3_2_1_25_1","first-page":"113","article-title":"Comprehension strategies in programming. in Empirical studies of programmers: Second Workshop","volume":"100","author":"Pennington N","year":"1987","journal-title":"Ablex Publishing Corp."},{"volume-title":"Proceeding of 18th Workshop of the Psychology of Programming Interest Group","year":"2006","author":"Sajaniemi J.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Soloway E. Adelson B. and Ehrlich K. Knowledge and Processes in the Comprehension of Computer Programs. A. Lawrence Erlbaum Associates Hillsdale N.J. 1988.  Soloway E. Adelson B. and Ehrlich K. Knowledge and Processes in the Comprehension of Computer Programs . A. Lawrence Erlbaum Associates Hillsdale N.J. 1988."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/800140.804605"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117309.1117357"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/15683.1044090"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/67880.67895"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/234867.234872"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216262.1216279"}],"event":{"name":"SAICSIT '07: 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","sponsor":["Telcom","Microsoft Microsoft","COE"],"location":"Port Elizabeth South Africa","acronym":"SAICSIT '07"},"container-title":["Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1292491.1292499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1292491.1292499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:49Z","timestamp":1750258669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1292491.1292499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,2]]},"references-count":33,"alternative-id":["10.1145\/1292491.1292499","10.1145\/1292491"],"URL":"https:\/\/doi.org\/10.1145\/1292491.1292499","relation":{},"subject":[],"published":{"date-parts":[[2007,10,2]]},"assertion":[{"value":"2007-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}