{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:06:51Z","timestamp":1771636011543,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1611959"],"award-info":[{"award-number":["1611959"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3287324.3287469","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"435-441","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Infusing Computational Thinking Across Disciplines"],"prefix":"10.1145","author":[{"given":"Lori","family":"Pollock","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]},{"given":"Chrystalla","family":"Mouza","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]},{"given":"Kevin R.","family":"Guidry","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]},{"given":"Kathleen","family":"Pusecker","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929887.1929905"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1118178.1118215"},{"key":"e_1_3_2_1_3_1","volume-title":"Report of a Workshop on the Scope and Nature of Computational Thinking","author":"National Research Council. 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953163.1953243"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1822090.1822126"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1409873.1409894"},{"key":"e_1_3_2_1_7_1","volume-title":"CPATH PI Meeting, March 25- 26","author":"Alvarado C.","year":"2010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677286"},{"key":"e_1_3_2_1_9_1","unstructured":"Kuster C. & Hu C. 2012. CAPTH-1: Developing computational thinking skills across the Undergraduate curriculum. Retrieved from: http:\/\/grantome.com\/grant\/NSF\/CNS-0939032. Kuster C. & Hu C. 2012. CAPTH-1: Developing computational thinking skills across the Undergraduate curriculum. Retrieved from: http:\/\/grantome.com\/grant\/NSF\/CNS-0939032."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2539016"},{"key":"e_1_3_2_1_11_1","volume-title":"Professional development: What works","author":"Zepeda S.J.","edition":"2"},{"key":"e_1_3_2_1_12_1","volume-title":"Making time and space for writing: Student writing mentors and the writing centre. Presentation at Writing Development in Higher Education Conference","author":"Harrington K."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677286"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576872"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","volume-title":"Doing qualitative research in education settings","author":"Hatch J. A.","DOI":"10.1515\/9780791487945"}],"event":{"name":"SIGCSE '19: The 50th ACM Technical Symposium on Computer Science Education","location":"Minneapolis MN USA","acronym":"SIGCSE '19","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 50th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287469","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:55Z","timestamp":1750208515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287469"}},"subtitle":["Reflections &amp; Lessons Learned"],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":15,"alternative-id":["10.1145\/3287324.3287469","10.1145\/3287324"],"URL":"https:\/\/doi.org\/10.1145\/3287324.3287469","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}