{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:10:33Z","timestamp":1776103833106,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025711","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"4911-4923","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Teaching Programming with Gamified Semantics"],"prefix":"10.1145","author":[{"given":"Ian","family":"Arawjo","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Cheng-Yao","family":"Wang","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Erik","family":"Andersen","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Fran\u00e7ois","family":"Guimbreti\u00e8re","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(93)90181-R"},{"key":"e_1_3_2_2_2_1","volume-title":"Computer science curricula","author":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013.","year":"2013","unstructured":"ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer science curricula 2013 . http:\/\/www.acm.org\/education\/CS2013-final-report.pdf. (2013). ACM\/IEEE-CS Joint Task Force on Computing Curricula. 2013. Computer science curricula 2013. http:\/\/www.acm.org\/education\/CS2013-final-report.pdf. (2013)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742610"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2960310.2960325"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2159365.2159370"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207687"},{"key":"e_1_3_2_2_7_1","unstructured":"John Robert Anderson. 2000. Learning and memory. (2000).  John Robert Anderson. 2000. Learning and memory. (2000)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1304_1"},{"key":"e_1_3_2_2_9_1","volume-title":"Cognitive tutors: Lessons learned. The journal of the learning sciences 4, 2","author":"Anderson John R.","year":"1995","unstructured":"John R. Anderson , Albert T. Corbett , Kenneth R. Koedinger , and Ray Pelletier . 1995. Cognitive tutors: Lessons learned. The journal of the learning sciences 4, 2 ( 1995 ), 167--207. John R. Anderson, Albert T. Corbett, Kenneth R. Koedinger, and Ray Pelletier. 1995. Cognitive tutors: Lessons learned. The journal of the learning sciences 4, 2 (1995), 167--207."},{"key":"e_1_3_2_2_10_1","volume-title":"Math anxiety: Personal, educational, and cognitive consequences. Current directions in psychological science 11, 5","author":"Ashcraft Mark H.","year":"2002","unstructured":"Mark H. Ashcraft . 2002. Math anxiety: Personal, educational, and cognitive consequences. Current directions in psychological science 11, 5 ( 2002 ), 181--185. Mark H. Ashcraft. 2002. Math anxiety: Personal, educational, and cognitive consequences. Current directions in psychological science 11, 5 (2002), 181--185."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2016.7739676"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771839.2771875"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/358172.358408"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0032095"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844661"},{"key":"e_1_3_2_2_17_1","volume-title":"Toward a theory of instruction","author":"Bruner Jerome Seymour","unstructured":"Jerome Seymour Bruner . 1966. Toward a theory of instruction . Vol. 59 . Harvard University Press . Jerome Seymour Bruner. 1966. Toward a theory of instruction. Vol. 59. Harvard University Press."},{"key":"e_1_3_2_2_18_1","volume-title":"Challenges persist when gamifying education. (December","author":"Chatlani Shalina","year":"2016","unstructured":"Shalina Chatlani . 2016. Challenges persist when gamifying education. (December 2016 ). http:\/\/www.educationdive.com\/news\/challenges-persist-when-gamifying-education\/430817\/ {Online; posted 5-Dec-2016}. Shalina Chatlani. 2016. Challenges persist when gamifying education. (December 2016). http:\/\/www.educationdive.com\/news\/challenges-persist-when-gamifying-education\/430817\/ {Online; posted 5-Dec-2016}."},{"key":"e_1_3_2_2_19_1","volume-title":"The calculi of lambda-conversion. Number 6","author":"Church Alonzo","unstructured":"Alonzo Church . 1941. The calculi of lambda-conversion. Number 6 . Princeton University Press . Alonzo Church. 1941. The calculi of lambda-conversion. Number 6. Princeton University Press."},{"key":"e_1_3_2_2_20_1","volume-title":"Misconceptions and attitudes that interfere with learning to program. Computer science education research","author":"Clancy Michael","year":"2004","unstructured":"Michael Clancy . 2004. Misconceptions and attitudes that interfere with learning to program. Computer science education research ( 2004 ), 85--100. Michael Clancy. 2004. Misconceptions and attitudes that interfere with learning to program. Computer science education research (2004), 85--100."},{"key":"e_1_3_2_2_21_1","unstructured":"Codeacademy. 2011. Codeacademy. http:\/\/www.codeacademy.org. (2011).  Codeacademy. 2011. Codeacademy. http:\/\/www.codeacademy.org. (2011)."},{"key":"e_1_3_2_2_22_1","unstructured":"CodeCombat. 2014. Code Combat. PC Game. (2014).  CodeCombat. 2014. Code Combat. PC Game. (2014)."},{"key":"e_1_3_2_2_23_1","unstructured":"Code.org. 2013. Code.org. http:\/\/www.code.org. (2013).  Code.org. 2013. Code.org. http:\/\/www.code.org. (2013)."},{"key":"e_1_3_2_2_24_1","volume-title":"Journal of Computing Sciences in Colleges","volume":"15","author":"Cooper Stephen","year":"2000","unstructured":"Stephen Cooper , Wanda Dann , and Randy Pausch . 2000 . Alice: a 3-D tool for introductory programming concepts . In Journal of Computing Sciences in Colleges , Vol. 15 . Consortium for Computing Sciences in Colleges, 107--116. Stephen Cooper, Wanda Dann, and Randy Pausch. 2000. Alice: a 3-D tool for introductory programming concepts. In Journal of Computing Sciences in Colleges, Vol. 15. Consortium for Computing Sciences in Colleges, 107--116."},{"key":"e_1_3_2_2_25_1","volume-title":"Flow: The psychology of optimal experience.","author":"Csikszentmihalyi Mihaly","year":"1991","unstructured":"Mihaly Csikszentmihalyi . 1991 . Flow: The psychology of optimal experience. Vol. 41 . HarperPerennial NY. Mihaly Csikszentmihalyi. 1991. Flow: The psychology of optimal experience. Vol. 41. HarperPerennial NY."},{"key":"e_1_3_2_2_26_1","volume-title":"Flow and the psychology of discovery and invention","author":"Csikszentmihalyi Mihaly","year":"1996","unstructured":"Mihaly Csikszentmihalyi . 1996. Flow and the psychology of discovery and invention . New Yprk : Harper Collins ( 1996 ). Mihaly Csikszentmihalyi. 1996. Flow and the psychology of discovery and invention. New Yprk: Harper Collins (1996)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819984"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2465593"},{"key":"e_1_3_2_2_30_1","volume-title":"Mayer","author":"Fay Anne L.","year":"1988","unstructured":"Anne L. Fay and Richard E . Mayer . 1988 . Learning LOGO : A cognitive analysis. (1988). Anne L. Fay and Richard E. Mayer. 1988. Learning LOGO: A cognitive analysis. (1988)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.learninstruc.2014.10.004"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-014-9249-3"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327809jls1401_4"},{"key":"e_1_3_2_2_34_1","unstructured":"Google. 2013. Blockly. https:\/\/developers.google.com\/blockly\/. (2013).  Google. 2013. Blockly. https:\/\/developers.google.com\/blockly\/. (2013)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2466518"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445368"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2015.7357226"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518851"},{"key":"e_1_3_2_2_39_1","unstructured":"Hansen Hsu. 2015. The Appsmiths: Community Identity Affect And Ideology Among Cocoa Developers From Next To Iphone. Ph.D. Dissertation. Cornell University.  Hansen Hsu. 2015. The Appsmiths: Community Identity Affect And Ideology Among Cocoa Developers From Next To Iphone. Ph.D. Dissertation. Cornell University."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734299"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0011"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240844"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2013.6645250"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Khan Academy. 2006. https:\/\/www.khanacademy.org\/. (2006).  Khan Academy. 2006. https:\/\/www.khanacademy.org\/. (2006).","DOI":"10.1002\/ejoc.200500603"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818314.2818331"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223818"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568195.2568200"},{"key":"e_1_3_2_2_48_1","unstructured":"Alyson La. 2015. Language trends on GitHub. https:\/\/github.com\/blog\/2047-language-trends-on-github. (2015).  Alyson La. 2015. Language trends on GitHub. https:\/\/github.com\/blog\/2047-language-trends-on-github. (2015)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2014.6883023"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787709"},{"key":"e_1_3_2_2_51_1","volume-title":"Wired","author":"Liu Jonathan","year":"2012","unstructured":"Jonathan Liu . 2012 . Dragonbox: Algebra beats angry birds . Wired , June (2012). Jonathan Liu. 2012. Dragonbox: Algebra beats angry birds. Wired, June (2012)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699760"},{"key":"e_1_3_2_2_53_1","volume-title":"Intelligent Tutoring Systems","author":"Long Yanjin","unstructured":"Yanjin Long and Vincent Aleven . 2014. Gamification of Joint Student\/System Control over Problem Selection in a Linear Equation Tutor . In Intelligent Tutoring Systems . Springer , 378--387. Yanjin Long and Vincent Aleven. 2014. Gamification of Joint Student\/System Control over Problem Selection in a Linear Equation Tutor. In Intelligent Tutoring Systems. Springer, 378--387."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352322.1352260"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.learninstruc.2012.05.001"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0295-6"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTD.2006.301841"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999796"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2013.832022"},{"key":"e_1_3_2_2_60_1","unstructured":"Marvin Minsky. 1986. Introduction to LogoWorks. (1986).  Marvin Minsky. 1986. Introduction to LogoWorks. (1986)."},{"key":"e_1_3_2_2_61_1","volume-title":"Mindstorms: Children, computers, and powerful ideas","author":"Papert Seymour","year":"1980","unstructured":"Seymour Papert . 1980 . Mindstorms: Children, computers, and powerful ideas . Basic Books, Inc. Seymour Papert. 1980. Mindstorms: Children, computers, and powerful ideas. Basic Books, Inc."},{"key":"e_1_3_2_2_62_1","volume-title":"Seymour Papert: On Logo.","author":"Papert Seymour","year":"1986","unstructured":"Seymour Papert . 1986 . Seymour Papert: On Logo. (1986). {Video series}. Seymour Papert. 1986. Seymour Papert: On Logo. (1986). {Video series}."},{"key":"e_1_3_2_2_63_1","volume-title":"Pea and Karen Sheingold","author":"Roy","year":"1987","unstructured":"Roy D. Pea and Karen Sheingold . 1987 . Mirrors of minds: Patterns of experience in educational computing. ERIC. Roy D. Pea and Karen Sheingold. 1987. Mirrors of minds: Patterns of experience in educational computing. ERIC."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345375.1345441"},{"key":"e_1_3_2_2_65_1","unstructured":"Gordon D. Plotkin. 1981. A structural approach to operational semantics. (1981).  Gordon D. Plotkin. 1981. A structural approach to operational semantics. (1981)."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/258549.258793"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1026487.1008042"},{"key":"e_1_3_2_2_68_1","unstructured":"C. Reigeluth and R. Stein. 1983. Elaboration theory. Instructional-design theories and models: An overview of their current status (1983) 335--381.  C. Reigeluth and R. Stein. 1983. Elaboration theory. Instructional-design theories and models: An overview of their current status (1983) 335--381."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254960.1254961"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592779"},{"key":"e_1_3_2_2_71_1","first-page":"205","article-title":"Computer self-efficacy, computer anxiety, and attitudes toward the Internet: A study among undergraduates in Unimas","volume":"8","author":"Sam Hong Kian","year":"2005","unstructured":"Hong Kian Sam , Abang Ekhsan Abang Othman , and Zaimuarifuddin Shukri Nordin . 2005 . Computer self-efficacy, computer anxiety, and attitudes toward the Internet: A study among undergraduates in Unimas . Educational Technology & Society 8 , 4 (2005), 205 -- 219 . Hong Kian Sam, Abang Ekhsan Abang Othman, and Zaimuarifuddin Shukri Nordin. 2005. Computer self-efficacy, computer anxiety, and attitudes toward the Internet: A study among undergraduates in Unimas. Educational Technology & Society 8, 4 (2005), 205--219.","journal-title":"Educational Technology & Society"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11251-009-9114-9"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/6138.6145"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486941"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87805-6_16"},{"key":"e_1_3_2_2_76_1","unstructured":"Tomorrow Corporation. 2015. Human Resource Machine. PC Game. (2015).  Tomorrow Corporation. 2015. Human Resource Machine. PC Game. (2015)."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.2190\/4NK5-17L7-TWQV-1EHL"},{"key":"e_1_3_2_2_78_1","unstructured":"We Want To Know. 2013. DragonBox. PC Game. (2013).  We Want To Know. 2013. DragonBox. PC Game. (2013)."},{"key":"e_1_3_2_2_79_1","unstructured":"Wizards of the Coast. 1995. RoboRally. Board Game. (1995).  Wizards of the Coast. 1995. RoboRally. Board Game. (1995)."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858239"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:22Z","timestamp":1750215802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":78,"alternative-id":["10.1145\/3025453.3025711","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025711","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}