{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:23:30Z","timestamp":1778693010300,"version":"3.51.4"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,8,17]],"date-time":"2016-08-17T00:00:00Z","timestamp":1471392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Inroads"],"published-print":{"date-parts":[[2016,8,17]]},"DOI":"10.1145\/2950065","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:25:39Z","timestamp":1472214339000},"page":"36-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Break statement considered"],"prefix":"10.1145","volume":"7","author":[{"given":"Juha","family":"Sorva","sequence":"first","affiliation":[{"name":"Aalto University, Finland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arto","family":"Vihavainen","sequence":"additional","affiliation":[{"name":"University of Helsinki, Finland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,8,17]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Barnes D. J.\n     and \n      \n      \n      Shinners-Kennedy D.\n     \"A study of loop style and abstraction in pedagogic practice.\" \n      \n      \n      In\n      : \n      J.\n     \n      \n  \n  Hamer and M. de Raadt (eds.) Proceedings of the 13th Australasian Conference on Computing Education (ACE '11) volume \n  114\n   of \n  CRPITS\n  . (\n  Australasian Computing Society 2011\n  ) 29--36.   Barnes D. J. and Shinners-Kennedy D. \"A study of loop style and abstraction in pedagogic practice.\" In: J. Hamer and M. de Raadt (eds.) Proceedings of the 13th Australasian Conference on Computing Education (ACE '11) volume 114 of CRPITS. (Australasian Computing Society 2011) 29--36."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/234867.234878"},{"key":"e_1_2_1_3_1","unstructured":"Bootstrap project web site; http:\/\/www.bootstrapworld.org\/. Accessed 2016 June.  Bootstrap project web site; http:\/\/www.bootstrapworld.org\/. Accessed 2016 June."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047430"},{"key":"e_1_2_1_5_1","volume-title":"University of Aarhus","author":"Caspersen M. E.","year":"2007"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844574"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362929.362947"},{"key":"e_1_2_1_8_1","unstructured":"EPFL. Scala (programming language web site); http:\/\/www.scala-lang.org\/. Accessed 2016 June.  EPFL. Scala (programming language web site); http:\/\/www.scala-lang.org\/. Accessed 2016 June."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632346"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844556"},{"key":"e_1_2_1_11_1","unstructured":"Green T. R. G. and Blackwell A. F. \"Cognitive dimensions of information artefacts: A tutorial.\" (1998); http:\/\/www.cl.cam.ac.uk\/~afb21\/CognitiveDimensions\/CDtutorial.pdf. Accessed 2016 June.  Green T. R. G. and Blackwell A. F. \"Cognitive dimensions of information artefacts: A tutorial.\" (1998); http:\/\/www.cl.cam.ac.uk\/~afb21\/CognitiveDimensions\/CDtutorial.pdf. Accessed 2016 June."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0009"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352149"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047468"},{"key":"e_1_2_1_15_1","volume-title":"International Organization for Standardization. (ISO","year":"2010"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089733.1089734"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/356635.356640"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77934-6_9"},{"key":"e_1_2_1_19_1","unstructured":"Martin R. C. Clean Code. (Prentice-Hall 2008).  Martin R. C. Clean Code. (Prentice-Hall 2008)."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.202.0184"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Third International Conference on Cognitive Science. (USTC Press","author":"Nathan M. J.","year":"2001"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0410"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/199691.199815"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828963"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LaTiCE.2013.44"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828980"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/6592.6594"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/182.358436"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674683.2674690"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828961"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028700"},{"key":"e_1_2_1_32_1","unstructured":"Wikipedia. \"Joel Spolsky \/ Schlemiel the Painter's algorithm.\" Wikipedia the Free Encyclopedia. https:\/\/en.wikipedia.org\/wiki\/Joel_Spolsky#Schlemiel_the_Painter.27s_algorithm. Accessed 2016 June.  Wikipedia. \"Joel Spolsky \/ Schlemiel the Painter's algorithm.\" Wikipedia the Free Encyclopedia. https:\/\/en.wikipedia.org\/wiki\/Joel_Spolsky#Schlemiel_the_Painter.27s_algorithm. Accessed 2016 June."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/356635.356639"}],"container-title":["ACM Inroads"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:56Z","timestamp":1750218596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,17]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,8,17]]}},"alternative-id":["10.1145\/2950065"],"URL":"https:\/\/doi.org\/10.1145\/2950065","relation":{},"ISSN":["2153-2184","2153-2192"],"issn-type":[{"value":"2153-2184","type":"print"},{"value":"2153-2192","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,17]]},"assertion":[{"value":"2016-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}