{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:21:49Z","timestamp":1765268509777,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":65,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3196839.3196867","type":"proceedings-article","created":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T12:00:49Z","timestamp":1525176049000},"page":"175-182","source":"Crossref","is-referenced-by-count":4,"title":["Programming in secondary schools in Norway"],"prefix":"10.1145","author":[{"given":"Hilde G.","family":"Corneliussen","sequence":"first","affiliation":[{"name":"Western Norway Research Institute, Sogndal, Norway"}]},{"given":"Fay","family":"Tveranger","sequence":"additional","affiliation":[{"name":"University of Bergen, Bergen, Norway"}]}],"member":"320","reference":[{"key":"key-10.1145\/3196839.3196867-1","doi-asserted-by":"crossref","unstructured":"Michal Armoni. 2012. Teaching Cs in Kindergarten: How Early Can the Pipeline Begin?ACM Inroads3, 4, 18--19.","DOI":"10.1145\/2381083.2381091"},{"key":"key-10.1145\/3196839.3196867-2","doi-asserted-by":"crossref","unstructured":"Michal Armoni and Judith Gal-Ezer. 2014. Early Computing Education - Why? What? When? Who?ACM Inroads5, 4, 54--59.","DOI":"10.1145\/2684721.2684734"},{"key":"key-10.1145\/3196839.3196867-3","doi-asserted-by":"crossref","unstructured":"Lecia J. Barker and William Aspray. 2006. The State of Research on Girls and It. InWomen and Information Technology. Research on Underrepresentation, J. McGrath Cohoon and William Aspray Eds. MIT Press, Cambridge, Massachusetts, London, England, 3--54.","DOI":"10.7551\/mitpress\/9780262033459.003.0001"},{"key":"key-10.1145\/3196839.3196867-4","doi-asserted-by":"crossref","unstructured":"Solveig Bergman and Linda M Rustad. 2013.The Nordic Region-a Step Closer to Gender Balance in Research? Joint Nordic Strategies and Measures to Promote Gender Balance among Researchers in Academia.Nordic Council of Ministers,","DOI":"10.6027\/TN2013-544"},{"key":"key-10.1145\/3196839.3196867-5","doi-asserted-by":"crossref","unstructured":"Lenore Blum, Carol Frieze, Orit Hazzan and M. Bernandine Dias. 2007. A Cultural Perspective on Gender Diversity in Computing. InReconfiguring the Firewall. Recruiting Women to Information Technology across Cultures and Continents, Carol J. Burger et al. Eds. A K Peters, LTD, Wellesley, MA, 109--133.","DOI":"10.1201\/b10634-9"},{"key":"key-10.1145\/3196839.3196867-6","unstructured":"Sarah K Buday, Jayne E Stake and Zo&#235; D Peterson. 2012. Gender and the Choice of a Science Career: The Impact of Social Support and Possible Selves.Sex roles66, 3-4, 197--209."},{"key":"key-10.1145\/3196839.3196867-7","doi-asserted-by":"crossref","unstructured":"Judith Butler. 2004.Undoing Gender.Routledge, New York.","DOI":"10.4324\/9780203499627"},{"key":"key-10.1145\/3196839.3196867-8","doi-asserted-by":"crossref","unstructured":"Maria Charles and Karen Bradley. 2006. A Matter of Degrees: Female Underrepresentation in Computer Science Programs Cross-Nationally. InWomen and Information Technology. Research on Underrepresentation, J. McGrath Cohoon and William Aspray Eds. MIT Press, Cambridge, Massachusetts, London, England, 183--203.","DOI":"10.7551\/mitpress\/9780262033459.003.0006"},{"key":"key-10.1145\/3196839.3196867-9","unstructured":"Kathy Charmaz. 2006.Constructing Grounded Theory: A Practical Guide through Qualitative Research."},{"key":"key-10.1145\/3196839.3196867-10","doi-asserted-by":"crossref","unstructured":"Sapna Cheryan, Allison Master and Andrew N Meltzoff. 2015. Cultural Stereotypes as Gatekeepers: Increasing Girls' Interest in Computer Science and Engineering by Diversifying Stereotypes.Frontiers in psychology6.","DOI":"10.3389\/fpsyg.2015.00049"},{"key":"key-10.1145\/3196839.3196867-11","doi-asserted-by":"crossref","unstructured":"Sapna Cheryan, Victoria C. Plaut, Paul G. Davies and Claude M. Steele. 2009. Ambient Belonging: How Stereotypical Cues Impact Gender Participation in Computer Science.Journal of Personality and Social Psychology97, 6, 1045--1060.","DOI":"10.1037\/a0016239"},{"key":"key-10.1145\/3196839.3196867-12","doi-asserted-by":"crossref","unstructured":"Sapna Cheryan, Victoria C. Plaut, Caitlin Handron and Lauren Hudson. 2013. The Stereotypical Computer Scientist: Gendered Media Representations as a Barrier to Inclusion for Women.Sex Roles69, 1-2, 58--71.","DOI":"10.1007\/s11199-013-0296-x"},{"key":"key-10.1145\/3196839.3196867-13","doi-asserted-by":"crossref","unstructured":"Cynthia Cockburn. 1992. The Circuit of Technology: Gender, Identity and Power. InConsuming Technologies: Media and Information in Domestic Spaces, Roger Silverstone and Eric Hirsch Eds. Routledge, London, 32--47.","DOI":"10.4324\/9780203401491_chapter_2"},{"key":"key-10.1145\/3196839.3196867-14","doi-asserted-by":"crossref","unstructured":"J. McGrath Cohoon. 2006. Just Get over It or Just Get on with It: Retaining Women in Undergraduate Computing. InWomen and Information Technology. Research on Underrepresentation, J. McGrath Cohoon and William Aspray Eds. MIT Press, Cambridge, Massachusetts, London, England, 205--237.","DOI":"10.7551\/mitpress\/9780262033459.003.0007"},{"key":"key-10.1145\/3196839.3196867-15","unstructured":"J. McGrath Cohoon and William Aspray. 2006. A Critical Review of the Research on Women's Participation in Postsecondary Computing Education. InWomen and Information Technology. Research on Underrepresentation, J. McGrath Cohoon and William Aspray Eds. MIT Press, Cambridge, Massachusetts, London, England, 137--180."},{"key":"key-10.1145\/3196839.3196867-16","unstructured":"Hilde Corneliussen. 2005. \"I Fell in Love with the Machine\" - Women's Pleasure in Computing.Journal of Information, Communication and Ethics in Society3, 4: Special Issue: Women in Computing (WiC) 2005."},{"key":"key-10.1145\/3196839.3196867-17","unstructured":"Hilde Corneliussen. 2005. Women's Pleasure in Computing. InThe Gender Politics of Ict, Jacqueline Archibald et al. Eds. Middlesex University Press, London, 237--249."},{"key":"key-10.1145\/3196839.3196867-18","unstructured":"Hilde G. Corneliussen. 2011.Gender-Technology Relations: Exploring Stability and Change.Palgrave Macmillan, Basingstoke."},{"key":"key-10.1145\/3196839.3196867-19","doi-asserted-by":"crossref","unstructured":"Hilde G. Corneliussen and Lin Pr&#248;itz. 2016. Kids Code in a Rural Village in Norway: Could Code Clubs Be a New Arena for Increasing Girls' Digital Interest and Competence?Information, Communication &#38; Society19, 1 (Special Issue: Understanding Global Digital Cultures). http:\/\/dx.doi.org\/http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/1369118X.2015.1093529","DOI":"10.1080\/1369118X.2015.1093529"},{"key":"key-10.1145\/3196839.3196867-20","doi-asserted-by":"crossref","unstructured":"Betsy DiSalvo, Mark Guzdial and Amy Bruckman. 2014. Saving Face While Geeking Out: Video Game Testing as a Justification for Learning Computer Science.The journal of the Learning Sciences23, 3, 272--315.","DOI":"10.1080\/10508406.2014.893434"},{"key":"key-10.1145\/3196839.3196867-21","doi-asserted-by":"crossref","unstructured":"Betsy James DiSalvo and Amy Bruckman. 2009. Questioning Video Games' Influence on Cs Interest. InProceedings of the 4th International Conference on Foundations of Digital Games, ACM, 272--278.","DOI":"10.1145\/1536513.1536561"},{"key":"key-10.1145\/3196839.3196867-22","unstructured":"EC. 2013.Digital Agenda Scoreboard 2011.http:\/\/ec.europa.eu\/digital-agenda\/en\/news\/digital-agenda-scoreboard-2011 (Febr. 2014)."},{"key":"key-10.1145\/3196839.3196867-23","doi-asserted-by":"crossref","unstructured":"Nathan Ensmenger. 2010. Making Programming Masculine. InGender Codes: Why Women Are Leaving Computing, Thomas J. Misa Ed. IEEE Computer Society and John Wiley &#38; Sons, Inc., Hoboken, New Jersey, 115--141.","DOI":"10.1002\/9780470619926.ch6"},{"key":"key-10.1145\/3196839.3196867-24","unstructured":"European Commission. 2016. She Figures 2015. Gender in Research and Innovation. 2016."},{"key":"key-10.1145\/3196839.3196867-25","unstructured":"European Schoolnet. 2015. Computing Our Future: Computer Programming and Coding Priorities, School Curricula and Initiatives across Europe. 2015."},{"key":"key-10.1145\/3196839.3196867-26","doi-asserted-by":"crossref","unstructured":"Wendy Faulkner. 2009. Doing Gender in Engineering Workplace Cultures. Ii. Gender in\/Authenticity and the in\/Visibility Paradox.Engineering Studies1, 3, 169--189.","DOI":"10.1080\/19378620903225059"},{"key":"key-10.1145\/3196839.3196867-27","doi-asserted-by":"crossref","unstructured":"Wendy Faulkner and Merete Lie. 2007. Gender in the Information Society: Strategies of Inclusion.Gender, Technology and Development11, 2, 157--177","DOI":"10.1177\/097185240701100202"},{"key":"key-10.1145\/3196839.3196867-28","doi-asserted-by":"crossref","unstructured":"Mary Flanagan. 2009.Critical Play: Radical Game Design.MIT press,","DOI":"10.7551\/mitpress\/7678.001.0001"},{"key":"key-10.1145\/3196839.3196867-29","unstructured":"Carol Frieze and Jeria Quesenberry. 2015.Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University.Dog Ear Publishing, Indianapolis."},{"key":"key-10.1145\/3196839.3196867-30","unstructured":"Radhika Gajjala and Hilde G. Corneliussen. 2015. The Still Shrinking Pipeline in Computing. InProceedings of Gender Research NOW!Bergen."},{"key":"key-10.1145\/3196839.3196867-31","unstructured":"Helen J&#248;sok Gansmo. 2004.Towards a Happy Ending for Girls and Computing?Department of Interdisciplinary Studies of Culture, Faculty of Arts, Norwegian University of Science and Technology, Trondheim."},{"key":"key-10.1145\/3196839.3196867-32","doi-asserted-by":"crossref","unstructured":"Helen J&#248;sok Gansmo, Vivian A. Lagesen and Knut H. S&#248;rensen. 2003. Out of the Boy's Room? A Critical Analysis of the Understanding of Gender and Ict in Norway.NORA11, 3, 130--139.","DOI":"10.1080\/08038740310004255"},{"key":"key-10.1145\/3196839.3196867-33","unstructured":"Frances Grundy. 1997. Where Do We Go from Here? InWomen in Computing, Rachel Lander and Alison Adam Eds. intellect&#8482;, Exeter, England, 1--10."},{"key":"key-10.1145\/3196839.3196867-34","unstructured":"Hebe Gunnes and Elisabeth Hovdhaugen. 2008.Karrierel&#248;p I Akademia: Statistikkgrunnlag Utarbeidet for Komit&#233; for Integreringstiltak - Kvinner I Forskning.NIFU STEP,"},{"key":"key-10.1145\/3196839.3196867-35","unstructured":"Sandra Harding. 1986.The Science Question in Feminism.Cornell University Press, Ithaca, N.Y."},{"key":"key-10.1145\/3196839.3196867-36","doi-asserted-by":"crossref","unstructured":"Caroline Clarke Hayes. 2010. Gender Codes: Prospects for Change. InGender Codes: Why Women Are Leaving Computing, Thomas J. Misa Ed. IEEE Computer Society and John Wiley &#38; Sons, Inc., Hoboken, New Jersey, 265--273.","DOI":"10.1002\/9780470619926.ch13"},{"key":"key-10.1145\/3196839.3196867-37","unstructured":"Orit Hazzan. 2006. Diversity in Computing: A Means or a Target?System Design Frontier Journal: Featured Column, 8."},{"key":"key-10.1145\/3196839.3196867-38","doi-asserted-by":"crossref","unstructured":"Yasmin B Kafai, Quinn Burke and Mitchel Resnick. 2014.Connected Code: Why Children Need to Learn Programming.The MIT Press, Cambridge, Mass., London, England.","DOI":"10.7551\/mitpress\/9992.001.0001"},{"key":"key-10.1145\/3196839.3196867-39","unstructured":"Yasmin Kafai, Gabriela Richard and Brendesha Tynes. 2016. The Need for Intersectional Perspectives and Inclusive Designs in Gaming. InDiversifying Barbie and Mortal Kombat. Intersectional Perspectives and Inclusive Designs in Gaming, Yasmin B. Kafai et al. Eds. ETC Press, Carnegie Mellon. Pittsburgh, 1--20."},{"key":"key-10.1145\/3196839.3196867-40","unstructured":"Rosabeth Moss Kanter. 1993 (1977).Men and Women of the Corporation.Basic Books, New York."},{"key":"key-10.1145\/3196839.3196867-41","unstructured":"Elin Kvande and Bente Rasmussen. 1993 (1990).Nye Kvinneliv. Kvinner I Menns Organisasjoner [New Women's Lives. Women in Men's Organizations].Ad Notam, Oslo."},{"key":"key-10.1145\/3196839.3196867-42","doi-asserted-by":"crossref","unstructured":"Vivian A. Lagesen. 2007. The Strength of Numbers: Strategies to Include Women into Computer Science.Social Studies of Science37, 1, 67--92.","DOI":"10.1177\/0306312706063788"},{"key":"key-10.1145\/3196839.3196867-43","unstructured":"Mona Livholts and Maria Tamboukou. 2015.Discourse and Narrative Methods.SAGE, Los Angeles."},{"key":"key-10.1145\/3196839.3196867-44","unstructured":"Jane Margolis and Allan Fisher. 2002.Unlocking the Clubhouse. Women in Computing.MIT Press, Cambridge, Mass."},{"key":"key-10.1145\/3196839.3196867-45","unstructured":"Allison Master, Sapna Cheryan, Adriana Moscatelli and Andrew N Meltzoff. 2017. Programming Experience Promotes Higher Stem Motivation among First-Grade Girls.Journal of Experimental Child Psychology160, 92--106."},{"key":"key-10.1145\/3196839.3196867-46","doi-asserted-by":"crossref","unstructured":"Andr&#233;s Monroy-Hern&#225;ndez and Mitchel Resnick. 2008. Empowering Kids to Create and Share Programmable Media.Interactions, March - April, 50--53.","DOI":"10.1145\/1340961.1340974"},{"key":"key-10.1145\/3196839.3196867-47","doi-asserted-by":"crossref","unstructured":"Nick Montfort, Patsy Baudoin, John Bell, Ian Bogost, Jeremy Douglass, Mark C Marino, Michael Mateas, Casey Reas, Mark Sample and Noah Vawter. 2012.10 Print Chr $(205.5+ Rnd (1));: Goto 10.mit Press,","DOI":"10.7551\/mitpress\/9040.001.0001"},{"key":"key-10.1145\/3196839.3196867-48","unstructured":"Rick Morgan and John Klaric. 2007.Ap Students in College: An Analysis of Five-Year Academic Careers.Research Report No. 4, The College Board, New York."},{"key":"key-10.1145\/3196839.3196867-49","unstructured":"NOU. 2013:2. Hindre for Digital Verdiskaping [Barriers against Digital Value Creation]. 2013:2."},{"key":"key-10.1145\/3196839.3196867-50","doi-asserted-by":"crossref","unstructured":"Mazliza Othman and Rodziah Latih. 2006. Women in Computer Science: No Shortage Here!Communications of the ACM49, 3, 111--114.","DOI":"10.1145\/1118178.1118185"},{"key":"key-10.1145\/3196839.3196867-51","doi-asserted-by":"crossref","unstructured":"Kiki Prottsman. 2014. Computer Science for the Elementary Classroom.ACM Inroads5, 4, 60--63.","DOI":"10.1145\/2684721.2684735"},{"key":"key-10.1145\/3196839.3196867-52","doi-asserted-by":"crossref","unstructured":"Els Rommes, Geertjan Overbeek, Ron Scholte, Rutger Engels and Raymond De Kemp. 2007. 'I'm Not Interested in Computers': Gender-Based Occupational Choices of Adolescents.Information, Communication &#38; Society10, 3, 299--319.","DOI":"10.1080\/13691180701409838"},{"key":"key-10.1145\/3196839.3196867-53","doi-asserted-by":"crossref","unstructured":"Douglas Rushkoff. 2011.Program or Be Programmed: Ten Commands for a Digital Age.Soft Skull Press,","DOI":"10.2307\/j.ctt207g7rj"},{"key":"key-10.1145\/3196839.3196867-54","unstructured":"Kristine Sevik et al. 2016. Programmering I Skolen. 2016."},{"key":"key-10.1145\/3196839.3196867-55","doi-asserted-by":"crossref","unstructured":"Dorte Marie S&#248;ndergaard. 2002. Poststructuralist Approaches to Empirical Analysis.Qualitative studies in education15, 2, 187--204.","DOI":"10.1080\/09518390110111910"},{"key":"key-10.1145\/3196839.3196867-56","unstructured":"Knut H. S&#248;rensen. 2006. Domestication: The Enactment of Technology. InDomestication of Media and Technology, Thomas Berker et al. Eds. Open University Press, Maidenhead, 40--61."},{"key":"key-10.1145\/3196839.3196867-57","unstructured":"Knut H. S&#248;rensen. 2011. Changing Perspectives on Gender and Technology: From Exclusion to Inclusion. InTechnologies of Inclusion. Gender in the Information Society, Knut Holtan S&#248;rensen et al. Eds. Tapir Academic Press, Trondheim, 41--61."},{"key":"key-10.1145\/3196839.3196867-58","unstructured":"Knut H. S&#248;rensen. 2011. On the Road to the Information Society: Does Gender Still Matter? InTechnologies of Inclusion. Gender in the Information Society, Knut Holtan S&#248;rensen et al. Eds. Tapir Academic Press, Trondheim, 13--39."},{"key":"key-10.1145\/3196839.3196867-59","unstructured":"The Norwegian Directorate for Education and Training. 2012. Framework for Basic Skills."},{"key":"key-10.1145\/3196839.3196867-60","doi-asserted-by":"crossref","unstructured":"Sherry Turkle and Seymour Papert. 1990. Epistemological Pluralism: Styles and Voices within the Computer Culture. 1990.","DOI":"10.1086\/494648"},{"key":"key-10.1145\/3196839.3196867-61","unstructured":"Fay Pedersen Tveranger. 2017. Programming in School: An Insight to the Norwegian Programming Pilot and the Inclusion\/Exclusion of Girls in Computer Programming Education. thesis. Master's Thesis in Digital Culture, University of Bergen."},{"key":"key-10.1145\/3196839.3196867-62","unstructured":"Odd Frank Vaage. 2017. Norsk Mediebarometer 2016. 2017."},{"key":"key-10.1145\/3196839.3196867-63","unstructured":"Judy Wajcman. 2004.Technofeminism.Polity Press, Cambridge."},{"key":"key-10.1145\/3196839.3196867-64","doi-asserted-by":"crossref","unstructured":"Candace West and Don H. Zimmerman. 1987. Doing Gender.Gender &#38; Society1, 2, 125--151.","DOI":"10.1177\/0891243287001002002"},{"key":"key-10.1145\/3196839.3196867-65","unstructured":"World Economic Forum. 2017. The Global Gender Gap Report 2016. 2017."}],"event":{"name":"the 4th Conference","start":{"date-parts":[[2018,5,14]]},"number":"4","location":"Heilbronn, Germany","end":{"date-parts":[[2018,5,15]]},"acronym":"GenderIT '18"},"container-title":["Proceedings of the 4th Conference on Gender &amp; IT - GenderIT '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196839.3196867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3196867&ftid=1961863&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:29Z","timestamp":1750210769000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3196839.3196867"}},"subtitle":["a wasted opportunity for inclusion"],"proceedings-subject":"Gender & IT","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1145\/3196839.3196867","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}