{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:12:22Z","timestamp":1762459942073,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["023.005.063"],"award-info":[{"award-number":["023.005.063"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,19]]},"DOI":"10.1145\/3428029.3428043","type":"proceedings-article","created":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T20:32:05Z","timestamp":1606077125000},"page":"1-10","source":"Crossref","is-referenced-by-count":24,"title":["Student Refactoring Behaviour in a Programming Tutor"],"prefix":"10.1145","author":[{"given":"Hieke","family":"Keuning","sequence":"first","affiliation":[{"name":"Open University of the Netherlands and Utrecht University, The Netherlands"}]},{"given":"Bastiaan","family":"Heeren","sequence":"additional","affiliation":[{"name":"Open University of the Netherlands, The Netherlands"}]},{"given":"Johan","family":"Jeuring","sequence":"additional","affiliation":[{"name":"Open University of the Netherlands and Utrecht University, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.28945\/300"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Brett\u00a0A Becker Paul Denny Raymond Pettit Durell Bouchard Dennis\u00a0J Bouvier Brian Harrington Amir Kamil Amey Karkare Chris McDonald Peter-Michael Osera 2019. Compiler Error Messages Considered Unhelpful: The Landscape of Text-Based Programming Error Message Research. In ITiCSE WG Reports. 177\u2013210.  Brett\u00a0A Becker Paul Denny Raymond Pettit Durell Bouchard Dennis\u00a0J Bouvier Brian Harrington Amir Kamil Amey Karkare Chris McDonald Peter-Michael Osera 2019. Compiler Error Messages Considered Unhelpful: The Landscape of Text-Based Programming Error Message Research. In ITiCSE WG Reports. 177\u2013210.","DOI":"10.1145\/3344429.3372508"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Hannah Blau and J.\u00a0Eliot\u00a0B. Moss. 2015. FrenchPress Gives Students Automated Feedback on Java Program Flaws. In ITiCSE. 15\u201320.  Hannah Blau and J.\u00a0Eliot\u00a0B. Moss. 2015. FrenchPress Gives Students Automated Feedback on Java Program Flaws. In ITiCSE. 15\u201320.","DOI":"10.1145\/2729094.2742622"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3174781.3174785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994154"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Janet Carter Kirsti Ala-Mutka Ursula Fuller Martin Dick John English William Fone and Judy Sheard. 2003. How shall we assess this?. In ITiCSE WG Reports. 107\u2013123.  Janet Carter Kirsti Ala-Mutka Ursula Fuller Martin Dick John English William Fone and Judy Sheard. 2003. How shall we assess this?. In ITiCSE WG Reports. 107\u2013123.","DOI":"10.1145\/960492.960539"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Rohan\u00a0Roy Choudhury Hezheng Yin and Armando Fox. 2016. Scale-Driven Automatic Hint Generation for Coding Style. In ITS. 122\u2013132.  Rohan\u00a0Roy Choudhury Hezheng Yin and Armando Fox. 2016. Scale-Driven Automatic Hint Generation for Coding Style. In ITS. 122\u2013132.","DOI":"10.1007\/978-3-319-39583-8_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Tyne Crow Andrew Luxton-Reilly and Burkhard Wuensche. 2018. Intelligent tutoring systems for programming education: a systematic review. In ACE. 53\u201362.  Tyne Crow Andrew Luxton-Reilly and Burkhard Wuensche. 2018. Intelligent tutoring systems for programming education: a systematic review. In ACE. 53\u201362.","DOI":"10.1145\/3160489.3160492"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Giuseppe De\u00a0Ruvo Ewan Tempero Andrew Luxton-Reilly Gerard\u00a0B. Rowe and Nasser Giacaman. 2018. Understanding Semantic Style by Analysing Student Code. In ACE. 73\u201382.  Giuseppe De\u00a0Ruvo Ewan Tempero Andrew Luxton-Reilly Gerard\u00a0B. Rowe and Nasser Giacaman. 2018. Understanding Semantic Style by Analysing Student Code. In ACE. 73\u201382.","DOI":"10.1145\/3160489.3160500"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Stephen Edwards Nischel Kandru and Mukund Rajagopal. 2017. Investigating static analysis errors in student Java programs. In ICER. 65\u201373.  Stephen Edwards Nischel Kandru and Mukund Rajagopal. 2017. Investigating static analysis errors in student Java programs. In ICER. 65\u201373.","DOI":"10.1145\/3105726.3106182"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Stephen Edwards Jaime Spacco and David Hovemeyer. 2019. Can Industrial-Strength Static Analysis Be Used to Help Students Who Are Struggling to Complete Programming Activities?. In HICSS. 7825\u20137834.  Stephen Edwards Jaime Spacco and David Hovemeyer. 2019. Can Industrial-Strength Static Analysis Be Used to Help Students Who Are Struggling to Complete Programming Activities?. In HICSS. 7825\u20137834.","DOI":"10.24251\/HICSS.2019.941"},{"key":"e_1_3_2_1_13_1","unstructured":"Martin Fowler. 1999. Refactoring: improving the design of existing code.  Martin Fowler. 1999. Refactoring: improving the design of existing code."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3102\/003465430298487"},{"key":"e_1_3_2_1_15_1","unstructured":"Julian Jansen Ana Oprescu and Magiel Bruntink. 2017. The Impact of Automated Code Quality Feedback in Programming Education. In SATToSE.  Julian Jansen Ana Oprescu and Magiel Bruntink. 2017. The Impact of Automated Code Quality Feedback in Programming Education. In SATToSE."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2017. Code Quality Issues in Student Programs. In ITiCSE. 110\u2013115.  Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2017. Code Quality Issues in Student Programs. In ITiCSE. 110\u2013115.","DOI":"10.1145\/3059009.3059061"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2019. How Teachers Would Help Students to Improve Their Code. In ITiCSE. 119\u2013125.  Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2019. How Teachers Would Help Students to Improve Their Code. In ITiCSE. 119\u2013125.","DOI":"10.1145\/3304221.3319780"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2021. A Tutoring System to Learn Code Refactoring. (2021). To appear in SIGCSE.  Hieke Keuning Bastiaan Heeren and Johan Jeuring. 2021. A Tutoring System to Learn Code Refactoring. (2021). To appear in SIGCSE.","DOI":"10.1145\/3408877.3432526"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231711"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Diana Kirk Tyne Crow Andrew Luxton-Reilly and Ewan Tempero. 2020. On Assuring Learning About Code Quality. In ACE. 86\u201394.  Diana Kirk Tyne Crow Andrew Luxton-Reilly and Ewan Tempero. 2020. On Assuring Learning About Code Quality. In ACE. 86\u201394.","DOI":"10.1145\/3373165.3373175"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Andrew Luxton-Reilly Ibrahim Albluwi Brett\u00a0A Becker Michail Giannakos Amruth\u00a0N Kumar Linda Ott James Paterson Michael\u00a0James Scott Judy Sheard and Claudia Szabo. 2018. Introductory programming: a systematic literature review. In ITiCSE WG Reports. 55\u2013106.  Andrew Luxton-Reilly Ibrahim Albluwi Brett\u00a0A Becker Michail Giannakos Amruth\u00a0N Kumar Linda Ott James Paterson Michael\u00a0James Scott Judy Sheard and Claudia Szabo. 2018. Introductory programming: a systematic literature review. In ITiCSE WG Reports. 55\u2013106.","DOI":"10.1145\/3293881.3295779"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Andrew Luxton-Reilly Paul Denny Diana Kirk Ewan Tempero and Se-Young Yu. 2013. On the Differences Between Correct Student Solutions. In ITiCSE. 177\u2013182.  Andrew Luxton-Reilly Paul Denny Diana Kirk Ewan Tempero and Se-Young Yu. 2013. On the Differences Between Correct Student Solutions. In ITiCSE. 177\u2013182.","DOI":"10.1145\/2462476.2462505"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2016.1179865"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077618"},{"key":"e_1_3_2_1_26_1","first-page":"119","article-title":"An incremental model for developing educational critiquing systems: experiences with the Java Critiquer","volume":"19","author":"Qiu Lin","year":"2008","journal-title":"Journal of Interactive Learning Research"},{"volume-title":"Learning and teaching programming: A review and discussion. Computer science education 13, 2","year":"2003","author":"Robins Anthony","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3102\/0034654307313795"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Michele Tufano Fabio Palomba Gabriele Bavota Rocco Oliveto Massimiliano Di\u00a0Penta Andrea De\u00a0Lucia and Denys Poshyvanyk. 2015. When and why your code starts to smell bad. In ICSE. 403\u2013414.  Michele Tufano Fabio Palomba Gabriele Bavota Rocco Oliveto Massimiliano Di\u00a0Penta Andrea De\u00a0Lucia and Denys Poshyvanyk. 2015. When and why your code starts to smell bad. In ICSE. 403\u2013414.","DOI":"10.1109\/ICSE.2015.59"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287463"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1435351.1435353"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2011.611369"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Arto Vihavainen Jonne Airaksinen and Christopher Watson. 2014. A systematic review of approaches for teaching introductory programming and their influence on success. In ICER. 19\u201326.  Arto Vihavainen Jonne Airaksinen and Christopher Watson. 2014. A systematic review of approaches for teaching introductory programming and their influence on success. In ICER. 19\u201326.","DOI":"10.1145\/2632320.2632349"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Arto Vihavainen Matti Luukkainen and Petri Ihantola. 2014. Analysis of source code snapshot granularity levels. In SIGITE. 21\u201326.  Arto Vihavainen Matti Luukkainen and Petri Ihantola. 2014. Analysis of source code snapshot granularity levels. In SIGITE. 21\u201326.","DOI":"10.1145\/2656450.2656473"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Eliane\u00a0S. Wiese Michael Yen Antares Chen Lucas\u00a0A. Santos and Armando Fox. 2017. Teaching Students to Recognize and Implement Good Coding Style. In L@S. 41\u201350.  Eliane\u00a0S. Wiese Michael Yen Antares Chen Lucas\u00a0A. Santos and Armando Fox. 2017. Teaching Students to Recognize and Implement Good Coding Style. In L@S. 41\u201350.","DOI":"10.1145\/3051457.3051469"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191799"}],"event":{"name":"Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research","acronym":"Koli Calling '20","location":"Koli Finland"},"container-title":["Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428029.3428043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":34,"alternative-id":["10.1145\/3428029.3428043","10.1145\/3428029"],"URL":"https:\/\/doi.org\/10.1145\/3428029.3428043","relation":{},"subject":[],"published":{"date-parts":[[2020,11,19]]}}}