{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:55Z","timestamp":1772164015296,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,4]],"date-time":"2009-03-04T00:00:00Z","timestamp":1236124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,4]]},"DOI":"10.1145\/1508865.1509042","type":"proceedings-article","created":{"date-parts":[[2009,3,3]],"date-time":"2009-03-03T11:06:03Z","timestamp":1236078363000},"page":"509-513","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["<i>Young women in computing<\/i>"],"prefix":"10.1145","author":[{"given":"Inna","family":"Pivkina","sequence":"first","affiliation":[{"name":"New Mexico State Unversity, Las Cruces, NM, USA"}]},{"given":"Enrico","family":"Pontelli","sequence":"additional","affiliation":[{"name":"New Mexico State Unversity, Las Cruces, NM, USA"}]},{"given":"Rachel","family":"Jensen","sequence":"additional","affiliation":[{"name":"New Mexico State Unversity, Las Cruces, NM, USA"}]},{"given":"Jessica","family":"Haebe","sequence":"additional","affiliation":[{"name":"New Mexico State Unversity, Las Cruces, NM, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Recruiting Middle-school Girls in IT: Data on Girl's Perception and Experience from a Mixed Demographic Group. Women and Information Technology","author":"Baker L. J.","unstructured":"Baker , L. J. , Snow , E. , Garvin-Poxas , K. , Weston , T. 2006. Recruiting Middle-school Girls in IT: Data on Girl's Perception and Experience from a Mixed Demographic Group. Women and Information Technology . The MIT Press . Baker, L. J., Snow, E., Garvin-Poxas, K., Weston, T. 2006. Recruiting Middle-school Girls in IT: Data on Girl's Perception and Experience from a Mixed Demographic Group. Women and Information Technology. The MIT Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776912"},{"key":"e_1_3_2_1_3_1","unstructured":"Dann W. P. Cooper S. and Paush R. 2008. Learning to Program with Alice 2\/e. Prentice-Hall.   Dann W. P. Cooper S. and Paush R. 2008. Learning to Program with Alice 2\/e. Prentice-Hall."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121479"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/611892.611998"},{"key":"e_1_3_2_1_6_1","unstructured":"Gunstone R. and Mitchell I. J. 1998. Metacognition and Conceptual Change. Teaching for Science Education: a Human Constructivist View Academic Press.  Gunstone R. and Mitchell I. J. 1998. Metacognition and Conceptual Change. Teaching for Science Education: a Human Constructivist View Academic Press."},{"key":"e_1_3_2_1_7_1","unstructured":"Gurer D. Camp T. 2000. Investigating the Incredible Shrinking Pipeline for Women in Computer Science.  Gurer D. Camp T. 2000. Investigating the Incredible Shrinking Pipeline for Women in Computer Science."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2003.10782391"},{"key":"e_1_3_2_1_9_1","volume-title":"LEGO MindStorms NXT-G Programming Guide","author":"Kelly J.","unstructured":"Kelly , J. 2007. LEGO MindStorms NXT-G Programming Guide . Apress . Kelly, J. 2007. LEGO MindStorms NXT-G Programming Guide. Apress."},{"key":"e_1_3_2_1_10_1","volume-title":"Women in Computer Science: a report for the NSF CISE Cross-disciplinary activities advisory committee","author":"Leveson N.","unstructured":"Leveson , N. 1989. Women in Computer Science: a report for the NSF CISE Cross-disciplinary activities advisory committee . University of California , Irvine. Leveson, N.1989. Women in Computer Science: a report for the NSF CISE Cross-disciplinary activities advisory committee. University of California, Irvine."},{"key":"e_1_3_2_1_11_1","volume-title":"Clubhouse: Women in Computing","author":"Margolis J.","year":"2002","unstructured":"Margolis , J. , and Fisher , A . 2002 . Unlocking the Clubhouse: Women in Computing . The MIT Press . Margolis, J., and Fisher, A. 2002. Unlocking the Clubhouse: Women in Computing. The MIT Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.90.1.25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971369"},{"key":"e_1_3_2_1_14_1","volume-title":"Female Friendly Science: Applying Women's Studies Methods and Theories to Attract Students","author":"Rosser S.","unstructured":"Rosser , S. 1990. Female Friendly Science: Applying Women's Studies Methods and Theories to Attract Students . Pergamon Press . Rosser, S. 1990. Female Friendly Science: Applying Women's Studies Methods and Theories to Attract Students. Pergamon Press."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Seifert K. and Mandzuk D. 2006. Student Cohorts In Teacher Education: Support Groups or Intellectual Communities: Teachers College Records 108(7).  Seifert K. and Mandzuk D. 2006. Student Cohorts In Teacher Education: Support Groups or Intellectual Communities: Teachers College Records 108(7).","DOI":"10.1111\/j.1467-9620.2006.00694.x"},{"key":"e_1_3_2_1_16_1","volume-title":"They're Different. Stalking the Second Tier","author":"Tobias S.","unstructured":"Tobias , S. 1990. They're not Dumb , They're Different. Stalking the Second Tier . Research Corporation . Tobias, S. 1990. They're not Dumb, They're Different. Stalking the Second Tier. Research Corporation."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118215"}],"event":{"name":"SIGCSE09: The 40th ACM Technical Symposium on Computer Science Education","location":"Chattanooga TN USA","acronym":"SIGCSE09","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 40th ACM technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1509042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1508865.1509042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:46Z","timestamp":1750238986000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1508865.1509042"}},"subtitle":["lessons learned from an educational &amp; outreach program"],"short-title":[],"issued":{"date-parts":[[2009,3,4]]},"references-count":17,"alternative-id":["10.1145\/1508865.1509042","10.1145\/1508865"],"URL":"https:\/\/doi.org\/10.1145\/1508865.1509042","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1539024.1509042","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,3,4]]},"assertion":[{"value":"2009-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}