{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:08Z","timestamp":1750307288464,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,9]],"date-time":"2011-03-09T00:00:00Z","timestamp":1299628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,9]]},"DOI":"10.1145\/1953163.1953322","type":"proceedings-article","created":{"date-parts":[[2011,3,15]],"date-time":"2011-03-15T16:37:50Z","timestamp":1300207070000},"page":"565-570","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The images of computing"],"prefix":"10.1145","author":[{"given":"Carol","family":"Frieze","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076233"},{"key":"e_1_3_2_1_2_1","unstructured":"Roland Barthes. 1977. Selections from Rhetoric of the Image. In Image music text. Hill and Wang.  Roland Barthes. 1977. Selections from Rhetoric of the Image. In Image music text. Hill and Wang."},{"key":"e_1_3_2_1_3_1","volume-title":"Firewall: Recruiting Women to Information Technology across Cultures and Continents eds. Carol J. Burger, Elizabeth G. Creamer, and Peggy S.","author":"Blum L.","year":"2007","unstructured":"L. Blum , C. Frieze , O. Hazzan and M.B. Dias . 2007 . A Cultural Perspective on Gender Diversity in Computing. In Reconfiguring the Firewall: Recruiting Women to Information Technology across Cultures and Continents eds. Carol J. Burger, Elizabeth G. Creamer, and Peggy S. Meszaros, AK Peters, Ltd . L. Blum, C. Frieze, O. Hazzan and M.B. Dias. 2007. A Cultural Perspective on Gender Diversity in Computing. In Reconfiguring the Firewall: Recruiting Women to Information Technology across Cultures and Continents eds. Carol J. Burger, Elizabeth G. Creamer, and Peggy S. Meszaros, AK Peters, Ltd."},{"key":"e_1_3_2_1_4_1","unstructured":"Computer Science for Fun Cs4fn http:\/\/www.cs4fn.org\/  Computer Science for Fun Cs4fn http:\/\/www.cs4fn.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Computer Science Unplugged http:\/\/csunplugged.org\/  Computer Science Unplugged http:\/\/csunplugged.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"CRA Taulbee Surveys: http:\/\/www.cra.org\/resources\/taulbee\/  CRA Taulbee Surveys: http:\/\/www.cra.org\/resources\/taulbee\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/571968.571975"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"C. Frieze and E. Treat. 2006. Diversifying the Images of Computer Science: Carnegie Mellon Students Take on the Challenge! In Proceedings of the 2006 WEPAN conference  C. Frieze and E. Treat. 2006. Diversifying the Images of Computer Science: Carnegie Mellon Students Take on the Challenge! In Proceedings of the 2006 WEPAN conference","DOI":"10.1145\/1047344.1047476"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140124.1140184"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610263"},{"key":"e_1_3_2_1_11_1","unstructured":"Peter Lee. 2004. Shrinking Pipeline. blog. http:\/\/www.cs.cmu.edu\/~cfrieze\/courses\/Lee_ShrinkingPipeline.pdf  Peter Lee. 2004. Shrinking Pipeline. blog. http:\/\/www.cs.cmu.edu\/~cfrieze\/courses\/Lee_ShrinkingPipeline.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"Joyojeet Pal. 2010. Of mouse and men: Computers and geeks as cinematic icons in the age of ICTD. In iConference 2010 Conference Proceedings.  Joyojeet Pal. 2010. Of mouse and men: Computers and geeks as cinematic icons in the age of ICTD. In iConference 2010 Conference Proceedings."},{"volume-title":"Selections from: Computing Curricular Report","author":"The Joint Task Force for Computing Curricula. 2005.","key":"e_1_3_2_1_13_1","unstructured":"The Joint Task Force for Computing Curricula. 2005. Selections from: Computing Curricular Report . ACM and IEEE The Joint Task Force for Computing Curricula. 2005. Selections from: Computing Curricular Report. ACM and IEEE"},{"key":"e_1_3_2_1_14_1","unstructured":"The Computing Community Consortium. 2010. Where the jobs are. CCC Blog.  The Computing Community Consortium. 2010. Where the jobs are. CCC Blog."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Claude Steele. 1997. A Threat in the Air: How Stereotypes Shape Intellectual Identity and Performance. In American Psychologist. Volume: 52. Issue: 6. Page Number: 613.  Claude Steele. 1997. A Threat in the Air: How Stereotypes Shape Intellectual Identity and Performance. In American Psychologist. Volume: 52. Issue: 6. Page Number: 613.","DOI":"10.1037\/0003-066X.52.6.613"},{"key":"e_1_3_2_1_16_1","unstructured":"M. Shih T. Pettinsky and A. Trahan. 2005. Domain Specific Effects of Stereotypes on Performance. In Faculty Research Working Papers Series Harvard School of Government.  M. Shih T. Pettinsky and A. Trahan. 2005. Domain Specific Effects of Stereotypes on Performance. In Faculty Research Working Papers Series Harvard School of Government."},{"key":"e_1_3_2_1_17_1","unstructured":"US Census Bureau Quick Facts http:\/\/quickfacts.census.gov\/qfd\/states\/00000.html  US Census Bureau Quick Facts http:\/\/quickfacts.census.gov\/qfd\/states\/00000.html"},{"volume-title":"Culture is Ordinary, originally published in N","key":"e_1_3_2_1_18_1","unstructured":"Raymond Williams. 1958. Culture is Ordinary, originally published in N . McKenzie (ed.), Convictions . Raymond Williams. 1958. Culture is Ordinary, originally published in N. McKenzie (ed.), Convictions."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734401"}],"event":{"name":"SIGCSE '11: The 42nd ACM Technical Symposium on Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Dallas TX USA","acronym":"SIGCSE '11"},"container-title":["Proceedings of the 42nd ACM technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1953163.1953322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1953163.1953322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:38Z","timestamp":1750244378000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1953163.1953322"}},"subtitle":["engaging undergraduates in the broad issues of computer science"],"short-title":[],"issued":{"date-parts":[[2011,3,9]]},"references-count":19,"alternative-id":["10.1145\/1953163.1953322","10.1145\/1953163"],"URL":"https:\/\/doi.org\/10.1145\/1953163.1953322","relation":{},"subject":[],"published":{"date-parts":[[2011,3,9]]},"assertion":[{"value":"2011-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}