{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":15740642,"items":[{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T15:25:55Z","timestamp":1715009155303},"reference-count":0,"publisher":"Oxford University Press","isbn-type":[{"value":"9780198733461","type":"print"},{"value":"9780191798146","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2016,3,24]]},"abstract":"<p>The Epilogue concludes that although computer science is a science of the artificial, one centred on symbol processing, it also serves as a bridge between the world of computational artefacts and the natural world, specifically, that of biological molecules, human cognition, and neuronal processes. Could it be that computation embraces both the natural and artificial and is, therefore, a universal science? What is certain is that computer science has given us a remarkably distinctive way of perceiving, thinking about, and solving a breathtakingly broad spectrum of problems\u2014spanning natural, social, cultural, technological, and economic realms.<\/p>","DOI":"10.1093\/actrade\/9780198733461.003.0008","type":"book-chapter","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T16:28:28Z","timestamp":1492705708000},"page":"129-132","source":"Crossref","is-referenced-by-count":0,"title":["Epilogue"],"prefix":"10.1093","author":[{"given":"Subrata","family":"Dasgupta","sequence":"first","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,3,24]]},"container-title":["Computer Science: A Very Short Introduction"],"original-title":["Epilogue"],"language":"en","deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T22:19:21Z","timestamp":1659478761000},"score":11.864759,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/book\/405\/chapter\/135209488"}},"subtitle":["is computer science a universal science?"],"issued":{"date-parts":[[2016,3,24]]},"ISBN":["9780198733461","9780191798146"],"references-count":0,"URL":"https:\/\/doi.org\/10.1093\/actrade\/9780198733461.003.0008","published":{"date-parts":[[2016,3,24]]}},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:22:59Z","timestamp":1723051379996},"reference-count":0,"publisher":"Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP","issue":"2","content-domain":{"domain":["www.ijrte.org"],"crossmark-restriction":true},"short-container-title":["IJRTE"],"abstract":"<jats:p>In learning management system, a discussion forum, in which the students and lecturers are involved actively as part of the learning method, enriches the context of communication, thereby enhancing the students\u2019 learning and performance. The aim of this paper was to determine the appropriate topics for a discussion forum for learning management systems through enhanced probabilistic latent semantic analysis (PLSA) with the corpus classifier algorithm. In preparing the paper, the methods used were PLSA and the classifying process, which classifies the documents to become a corpus based on the similarity word approach. The similarity word is influenced by the term-frequency of the word in the document. The novel concept in this paper is the corpus classifier algorithm. The experiment was conducted using three approaches to discover the topic, and it used 4,868 distinct words from 234 documents. The documents were contained in three threads subject. The post of the discussion forum is the text document. The performance of the result was measured by the f-measure, which was calculated for each thread subject. The corpus classifier algorithm was used in the second approach, and third approach increased the average f-measure values for the second and third thread subjects by approximately 24 and 17%, respectively.<\/jats:p>","DOI":"10.35940\/ijrte.b2166.078219","type":"journal-article","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T12:02:08Z","timestamp":1565611328000},"page":"1521-1530","update-policy":"http:\/\/dx.doi.org\/10.35940\/beiesp.crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Focus Topic Findings of Discussion Forum through Corpus Classifier Algorithm"],"prefix":"10.35940","volume":"8","author":[{"name":"Computer Science Department, BINUS Graduate Program \u2013 Doctor of Computer Science, Computer Science Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.","sequence":"first","affiliation":[]},{"given":"Reina","family":"Setiawan","sequence":"first","affiliation":[]},{"given":"Widodo","family":"Budiharto","sequence":"additional","affiliation":[]},{"name":"Computer Science Department, BINUS Graduate Program \u2013 Doctor of Computer Science, Computer Science Department, School of Computer Science, Bina Nusantara University, Jakarta, Indonesia.","sequence":"additional","affiliation":[]},{"given":"Iman Herwidiana","family":"Kartowisastro","sequence":"additional","affiliation":[]},{"name":"Computer Science Department, BINUS Graduate Program \u2013 Doctor of Computer Science, Computer Engineering Department, Faculty of Engineering, Bina Nusantara University, Jakarta, Indonesia.","sequence":"additional","affiliation":[]},{"given":"Harjanto","family":"Prabowo","sequence":"additional","affiliation":[]},{"name":"Computer Science Department, BINUS Graduate Program \u2013 Doctor of Computer Science, Management Department, BINUS Business School - Undergraduate, Bina Nusantara University, Jakarta, Indonesia.","sequence":"additional","affiliation":[]}],"member":"21590","published-online":{"date-parts":[[2019,7,30]]},"container-title":["International Journal of Recent Technology and Engineering (IJRTE)"],"link":[{"URL":"https:\/\/www.ijrte.org\/wp-content\/uploads\/papers\/v8i2\/B2166078219.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T07:42:31Z","timestamp":1663573351000},"score":11.825262,"resource":{"primary":{"URL":"https:\/\/www.ijrte.org\/portfolio-item\/B2166078219\/"}},"issued":{"date-parts":[[2019,7,30]]},"references-count":0,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,7,30]]}},"URL":"https:\/\/doi.org\/10.35940\/ijrte.b2166.078219","ISSN":["2277-3878"],"issn-type":[{"type":"electronic","value":"2277-3878"}],"published":{"date-parts":[[2019,7,30]]}},{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T22:47:41Z","timestamp":1648680461286},"reference-count":0,"publisher":"Petro Mohyla Black Sea National University","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.26693\/cse","type":"journal","created":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T16:48:53Z","timestamp":1587314933000},"source":"Crossref","is-referenced-by-count":0,"title":["Computer Science and Engineering"],"prefix":"10.26693","member":"11225","deposited":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T16:48:53Z","timestamp":1587314933000},"score":11.758787,"resource":{"primary":{"URL":"https:\/\/cse-journal.com\/index.php\/journal"}},"short-title":["Computer Science and Engineering"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.26693\/cse","ISSN":["2706-817X"],"issn-type":[{"value":"2706-817X","type":"print"}]},{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:16:43Z","timestamp":1755796603452},"reference-count":0,"publisher":"Science Publications","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Science"],"published-print":{"date-parts":[[2015,8,1]]},"DOI":"10.3844\/jcssp.2015.915.927","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T15:06:14Z","timestamp":1449673574000},"page":"915-927","source":"Crossref","is-referenced-by-count":11,"title":["Instructional Methods to Computer Science Education as Investigated by Computer Science Teachers"],"prefix":"10.3844","volume":"11","author":[{"given":"Andreas","family":"Zendler","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Klaudt","sequence":"additional","affiliation":[]}],"member":"2204","container-title":["Journal of Computer Science"],"link":[{"URL":"http:\/\/thescipub.com\/PDF\/jcssp.2015.915.927.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,31]],"date-time":"2016-12-31T19:10:50Z","timestamp":1483211450000},"score":11.68804,"resource":{"primary":{"URL":"http:\/\/thescipub.com\/abstract\/10.3844\/jcssp.2015.915.927"}},"issued":{"date-parts":[[2015,8,1]]},"references-count":0,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8,1]]}},"URL":"https:\/\/doi.org\/10.3844\/jcssp.2015.915.927","ISSN":["1549-3636"],"issn-type":[{"value":"1549-3636","type":"print"}],"published":{"date-parts":[[2015,8,1]]}},{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T10:37:08Z","timestamp":1648550228292},"reference-count":0,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":7502,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1993,1]]},"DOI":"10.1016\/0304-3975(93)90177-u","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:47:37Z","timestamp":1027655257000},"page":"365-370","source":"Crossref","is-referenced-by-count":0,"title":["European Association for Theoretical Computer Science"],"prefix":"10.1016","volume":"107","member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030439759390177U?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030439759390177U?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T04:21:13Z","timestamp":1555129273000},"score":11.684934,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/030439759390177U"}},"issued":{"date-parts":[[1993,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1993,1]]}},"alternative-id":["030439759390177U"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(93)90177-u","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1993,1]]}},{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:32:50Z","timestamp":1648935170970},"reference-count":0,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1993,2,1]],"date-time":"1993-02-01T00:00:00Z","timestamp":728524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":7471,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1993,2]]},"DOI":"10.1016\/0304-3975(93)90204-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T23:47:37Z","timestamp":1027640857000},"page":"401-406","source":"Crossref","is-referenced-by-count":0,"title":["European association for theoretical computer science"],"prefix":"10.1016","volume":"108","member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397593902047?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397593902047?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T00:21:30Z","timestamp":1555114890000},"score":11.684179,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0304397593902047"}},"issued":{"date-parts":[[1993,2]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1993,2]]}},"alternative-id":["0304397593902047"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(93)90204-7","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1993,2]]}},{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:10:31Z","timestamp":1747714231944,"version":"3.40.5"},"reference-count":0,"publisher":"Zaporizhzhia National University","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.26661\/2786-6254","type":"journal","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T12:59:30Z","timestamp":1679057970000},"source":"Crossref","is-referenced-by-count":0,"title":["Computer Science and Applied Mathematics"],"prefix":"10.26661","member":"11209","deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T19:25:07Z","timestamp":1747682707000},"score":11.682809,"resource":{"primary":{"URL":"https:\/\/journalsofznu.zp.ua\/index.php\/comp-science\/index"}},"short-title":["Computer Science and Applied Mathematics"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.26661\/2786-6254"},{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T01:11:12Z","timestamp":1648775472874},"reference-count":0,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1976,10,1]],"date-time":"1976-10-01T00:00:00Z","timestamp":212976000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":13438,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1976,10]]},"DOI":"10.1016\/0304-3975(76)90069-4","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:48:55Z","timestamp":1027655335000},"page":"119-120","source":"Crossref","is-referenced-by-count":0,"title":["A conference on theoretical computer science"],"prefix":"10.1016","volume":"3","member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397576900694?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397576900694?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T03:21:24Z","timestamp":1555125684000},"score":11.647549,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0304397576900694"}},"issued":{"date-parts":[[1976,10]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1976,10]]}},"alternative-id":["0304397576900694"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(76)90069-4","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1976,10]]}},{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T03:58:51Z","timestamp":1720670331124},"reference-count":0,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Science Review"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/s1574-0137(19)30321-1","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T04:00:42Z","timestamp":1574049642000},"page":"100212","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Introducing article numbering to Computer Science Review"],"prefix":"10.1016","volume":"34","author":[{"given":"Jimeng","family":"Li","sequence":"first","affiliation":[]}],"member":"78","container-title":["Computer Science Review"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574013719303211?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574013719303211?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T04:47:45Z","timestamp":1574052465000},"score":11.645518,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574013719303211"}},"issued":{"date-parts":[[2019,11]]},"references-count":0,"alternative-id":["S1574013719303211"],"URL":"https:\/\/doi.org\/10.1016\/s1574-0137(19)30321-1","ISSN":["1574-0137"],"issn-type":[{"value":"1574-0137","type":"print"}],"published":{"date-parts":[[2019,11]]},"article-number":"100212"},{"indexed":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T07:03:44Z","timestamp":1672815824040},"reference-count":0,"publisher":"Zaporizhzhia National University","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.26661\/2413-6549","type":"journal","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T15:19:29Z","timestamp":1672759169000},"source":"Crossref","is-referenced-by-count":0,"title":["Computer Science and Applied Mathematics"],"prefix":"10.26661","member":"11209","deposited":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T15:19:29Z","timestamp":1672759169000},"score":11.636744,"resource":{"primary":{"URL":"http:\/\/journalsofznu.zp.ua\/index.php\/comp-science\/index"}},"short-title":["Computer Science and Applied Mathematics"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.26661\/2413-6549"},{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T18:18:47Z","timestamp":1769278727189,"version":"3.49.0"},"reference-count":19,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Science Education"],"published-print":{"date-parts":[[1988,1]]},"DOI":"10.1080\/0899340880010104","type":"journal-article","created":{"date-parts":[[2007,6,25]],"date-time":"2007-06-25T08:36:48Z","timestamp":1182760608000},"page":"37-52","source":"Crossref","is-referenced-by-count":38,"title":["Integrating Computer Ethics into the Computer Science Curriculum"],"prefix":"10.1080","volume":"1","author":[{"given":"Keith","family":"Miller","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/359080.359083"},{"key":"CIT0002","unstructured":"Baum, R. J. 1980.Ethics and Engineering Curricula, 1\u20132. 33\u201338. New York: The Hastings Center, Briarcliff Manor."},{"key":"CIT0003","first-page":"148","volume-title":"Ethical Issues in the Use of Computers","author":"Burnham D.","year":"1985"},{"key":"CIT0004","first-page":"1","volume":"210","author":"Davis B.","year":"1987","journal-title":"The Wall Street Journal"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/5666.5667"},{"key":"CIT0006","unstructured":"The Hastings Center. 1980.The Teaching of Ethics in Higher Education, 68\u201371. Briarcliff Manor, NY: The Hastings Center."},{"key":"CIT0007","first-page":"1","author":"Joyce E. J.","year":"1986","journal-title":"American Medical News"},{"key":"CIT0008","first-page":"23","author":"Laudon K. C.","year":"1983","journal-title":"Pre\u2010publication draft"},{"key":"CIT0009","first-page":"37","volume-title":"Proceedings, Compass \u201886: Computer Assurance","author":"Leveson N. G.","year":"1986"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican1285-46"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.2307\/3560763"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1145\/382288.382762"},{"key":"CIT0013","first-page":"1","volume":"137","year":"1987","journal-title":"Richmond Times\u2010Dispatch"},{"key":"CIT0014","first-page":"4","volume":"4","author":"Ornstein S. M.","year":"1986","journal-title":"The CPSR Newsletter"},{"key":"CIT0015","unstructured":"Parker, D. B. 1981.Ethical Conflicts in Computer Science and Technology, 85\u201387. Arlington, VA: AFIPS Press."},{"key":"CIT0016","first-page":"432","volume":"73","author":"Parnas D.","year":"1985","journal-title":"American Scientist"},{"key":"CIT0017","first-page":"9","volume":"4","author":"Rosenberg R.","year":"1986","journal-title":"The CPSR Newsletter"},{"key":"CIT0018","first-page":"63","volume":"129","author":"Shannon E.","year":"1987","journal-title":"Time"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1001\/jama.257.22.3073"}],"container-title":["Computer Science Education"],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0899340880010104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T18:48:56Z","timestamp":1481568536000},"score":11.631525,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/0899340880010104"}},"issued":{"date-parts":[[1988,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1988,1]]}},"alternative-id":["10.1080\/0899340880010104"],"URL":"https:\/\/doi.org\/10.1080\/0899340880010104","ISSN":["0899-3408","1744-5175"],"issn-type":[{"value":"0899-3408","type":"print"},{"value":"1744-5175","type":"electronic"}],"published":{"date-parts":[[1988,1]]}},{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:41:09Z","timestamp":1720201269486},"reference-count":0,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T00:00:00Z","timestamp":1590192000000},"content-version":"vor","delay-in-days":1483,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1016\/j.tcs.2016.04.010","type":"journal-article","created":{"date-parts":[[2016,5,22]],"date-time":"2016-05-22T01:11:34Z","timestamp":1463879494000},"page":"1","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Theoretical Computer Science in Italy"],"prefix":"10.1016","volume":"629","author":[{"given":"Stefano","family":"Bistarelli","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Formisano","sequence":"additional","affiliation":[]}],"member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397516300494?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397516300494?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,23]],"date-time":"2020-05-23T01:22:33Z","timestamp":1590196953000},"score":11.610323,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397516300494"}},"issued":{"date-parts":[[2016,5]]},"references-count":0,"alternative-id":["S0304397516300494"],"URL":"https:\/\/doi.org\/10.1016\/j.tcs.2016.04.010","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[2016,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Theoretical Computer Science in Italy","name":"articletitle","label":"Article Title"},{"value":"Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.tcs.2016.04.010","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"simple-article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:44:13Z","timestamp":1649076253183},"reference-count":0,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1982,10,1]],"date-time":"1982-10-01T00:00:00Z","timestamp":402278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":11247,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1982,10]]},"DOI":"10.1016\/0304-3975(82)90093-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T23:48:55Z","timestamp":1027640935000},"page":"113-114","source":"Crossref","is-referenced-by-count":0,"title":["6th GI conference on theoretical computer science"],"prefix":"10.1016","volume":"21","member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397582900937?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397582900937?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T23:27:03Z","timestamp":1555111623000},"score":11.609404,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0304397582900937"}},"issued":{"date-parts":[[1982,10]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1982,10]]}},"alternative-id":["0304397582900937"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(82)90093-7","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1982,10]]}},{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:14:08Z","timestamp":1745381648841,"version":"3.40.4"},"reference-count":0,"publisher":"Yayasan Pendidikan Islam Daarut Thufulah","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.70177\/jsca","type":"journal","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T09:05:50Z","timestamp":1745312750000},"source":"Crossref","is-referenced-by-count":0,"title":["Journal of Computer Science Advancements"],"prefix":"10.70177","member":"50894","deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T09:05:51Z","timestamp":1745312751000},"score":11.609022,"resource":{"primary":{"URL":"https:\/\/journal.ypidathu.or.id\/index.php\/jcsa"}},"short-title":["J. Computer Science Advancements"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.70177\/jsca","ISSN":["3024-899X"],"issn-type":[{"value":"3024-899X","type":"electronic"}]},{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:37:10Z","timestamp":1720201030253},"reference-count":0,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[1988,1,1]],"date-time":"1988-01-01T00:00:00Z","timestamp":567993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":9329,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1988]]},"DOI":"10.1016\/0304-3975(88)90001-1","type":"journal-article","created":{"date-parts":[[2002,10,10]],"date-time":"2002-10-10T17:32:03Z","timestamp":1034271123000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"special_numbering":"S1","title":["Fiftieth volume of theoretical computer science"],"prefix":"10.1016","volume":"50","author":[{"given":"Maurice","family":"Nivat","sequence":"first","affiliation":[]}],"member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397588900011?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397588900011?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T23:20:52Z","timestamp":1555111252000},"score":11.6043625,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0304397588900011"}},"issued":{"date-parts":[[1988]]},"references-count":0,"alternative-id":["0304397588900011"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(88)90001-1","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1988]]}},{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T05:15:21Z","timestamp":1720588521171},"reference-count":0,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Science Education"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1080\/08993400802172449","type":"journal-article","created":{"date-parts":[[2008,6,20]],"date-time":"2008-06-20T23:17:49Z","timestamp":1214003869000},"page":"65-66","source":"Crossref","is-referenced-by-count":1,"title":["Computer Science Education"],"prefix":"10.1080","volume":"18","author":[{"given":"Raymond","family":"Lister","sequence":"first","affiliation":[]}],"member":"301","container-title":["Computer Science Education"],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08993400802172449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T18:50:29Z","timestamp":1481568629000},"score":11.596173,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08993400802172449"}},"issued":{"date-parts":[[2008,6]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["10.1080\/08993400802172449"],"URL":"https:\/\/doi.org\/10.1080\/08993400802172449","ISSN":["0899-3408","1744-5175"],"issn-type":[{"value":"0899-3408","type":"print"},{"value":"1744-5175","type":"electronic"}],"published":{"date-parts":[[2008,6]]}},{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:08:42Z","timestamp":1723010922766},"reference-count":0,"publisher":"Advance Academic Publisher","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJARCSSE"],"published-print":{"date-parts":[[2017,5,30]]},"DOI":"10.23956\/ijarcsse\/v7i4\/01412","type":"journal-article","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T11:42:38Z","timestamp":1501933358000},"page":"16-22","source":"Crossref","is-referenced-by-count":0,"title":["Mojular \u2013 Modular Solutions"],"prefix":"10.23956","volume":"7","author":[{"name":"Bachelor of Science in Computer Science, AMA Computer College, Philippines","sequence":"first","affiliation":[]},{"given":"Angelo Z.","family":"Torres","sequence":"first","affiliation":[]},{"given":"Mark Patrick H.","family":"Bernas","sequence":"additional","affiliation":[]},{"name":"Bachelor of Science in Computer Science, AMA Computer College, Philippines","sequence":"additional","affiliation":[]},{"given":"Marc Joseph Yui G.","family":"Aranilla","sequence":"additional","affiliation":[]},{"name":"Bachelor of Science in Computer Science, AMA Computer College, Philippines","sequence":"additional","affiliation":[]},{"given":"Jenny Lyn V.","family":"Abamo","sequence":"additional","affiliation":[]},{"name":"Professor, AMA Computer College, Philippines","sequence":"additional","affiliation":[]}],"member":"10044","published-online":{"date-parts":[[2017,5,30]]},"container-title":["International Journal of Advanced Research in Computer Science and Software Engineering"],"deposited":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T11:42:43Z","timestamp":1501933363000},"score":11.593805,"resource":{"primary":{"URL":"http:\/\/ijarcsse.com\/docs\/papers\/Volume_7\/5_May2017\/V7I4-01412.pdf"}},"issued":{"date-parts":[[2017,5,30]]},"references-count":0,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,5,30]]},"published-print":{"date-parts":[[2017,5,30]]}},"URL":"https:\/\/doi.org\/10.23956\/ijarcsse\/v7i4\/01412","ISSN":["2277-6451","2277-128X"],"issn-type":[{"type":"print","value":"2277-6451"},{"type":"electronic","value":"2277-128X"}],"published":{"date-parts":[[2017,5,30]]}},{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:26:19Z","timestamp":1648880779669},"reference-count":0,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1979,1,1]],"date-time":"1979-01-01T00:00:00Z","timestamp":283996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":12616,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[1979]]},"DOI":"10.1016\/0304-3975(79)90050-1","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T03:48:55Z","timestamp":1027655335000},"page":"265-270","source":"Crossref","is-referenced-by-count":1,"title":["The European Association for Theoretical Computer Science\u2014(EATCS)"],"prefix":"10.1016","volume":"8","member":"78","container-title":["Theoretical Computer Science"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397579900501?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0304397579900501?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T03:23:16Z","timestamp":1555125796000},"score":11.5871725,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0304397579900501"}},"issued":{"date-parts":[[1979]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1979]]}},"alternative-id":["0304397579900501"],"URL":"https:\/\/doi.org\/10.1016\/0304-3975(79)90050-1","ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"published":{"date-parts":[[1979]]}},{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:01:22Z","timestamp":1725778882534},"edition-number":"0","reference-count":1,"publisher":"Routledge","isbn-type":[{"type":"electronic","value":"9780203078723"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2013,2,11]]},"DOI":"10.4324\/9780203078723-15","type":"book-chapter","created":{"date-parts":[[2020,12,2]],"date-time":"2020-12-02T05:39:38Z","timestamp":1606887578000},"page":"75-90","source":"Crossref","is-referenced-by-count":0,"title":["Unplugging computer science"],"prefix":"10.4324","member":"301","reference":[{"key":"ref5","unstructured":"Anderson, L. W., Krathwohl, D. R., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths, J., et al. (2001). A taxonomy for learning, teaching, and assessing: A revision of Bloom\u2019s taxonomy of educational objectives (abridged edition). New York: Addison Wesley Longman."}],"container-title":["Improving Computer Science Education"],"language":"en","deposited":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T23:35:30Z","timestamp":1608593730000},"score":11.571701,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781136156489\/chapters\/10.4324\/9780203078723-15"}},"issued":{"date-parts":[[2013,2,11]]},"ISBN":["9780203078723"],"references-count":1,"URL":"https:\/\/doi.org\/10.4324\/9780203078723-15","published":{"date-parts":[[2013,2,11]]}},{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:49:14Z","timestamp":1740185354986,"version":"3.37.3"},"reference-count":23,"publisher":"Chapman University","license":[{"start":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T00:00:00Z","timestamp":1550707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"abstract":"<jats:p>This article compares the two most prominent courses of Advanced Placement (AP) computer science study offered throughout 9-12 grades in the U.S. The structure, guidelines, components, and exam formats of the traditional AP Computer Science A course and the relatively newer AP Computer Science Principles course were compared to examine differences in content and emphases. A depth-of-learning analysis was conducted employing Bloom\u2019s Revised Taxonomy to examine potential differences in rigor and challenge represented by the two options, particularly as it relates to acquiring computer programming proficiency. Analyses suggest structural differences in both course content and end-of-course exam components likely result in less depth and rigor in the new Computer Science Principles course as compared to the Computer Science A course. A lower minimum standard for learning programming skills in the Computer Science Principles course was observed, making it a less viable option for students looking to acquire skills transferable to future computer science study or employment. The potential implications for students choosing the new course over the traditional offering, as well as for schools opting for the new course as its sole or primary offering are discussed.<\/jats:p>","DOI":"10.26716\/jcsi.2019.02.1.2","type":"journal-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T06:43:53Z","timestamp":1550731433000},"source":"Crossref","is-referenced-by-count":1,"title":["All Advanced Placement (AP) Computer Science is Not Created Equal: A Comparison of AP Computer Science A and Computer Science Principles"],"prefix":"10.36837","author":[{"given":"Douglas D.","family":"Havard","sequence":"first","affiliation":[{"name":"Chapman University"}]},{"given":"Keith E.","family":"Howard","sequence":"additional","affiliation":[{"name":"Chapman University"}]}],"member":"12805","published-online":{"date-parts":[[2019,2,21]]},"reference":[{"key":"ref0","doi-asserted-by":"crossref","unstructured":"Aho, A. V. (2012). Computation and computational thinking. The Computer Journal, 55(7), 832-835. https:\/\/doi.org\/10.1093\/comjnl\/bxs074","DOI":"10.1093\/comjnl\/bxs074"},{"key":"ref1","unstructured":"Bureau of Labor Statistics. (2018). Occupational Outlook Handbook: Computer and Information Technology Occupations. Retrieved from https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/home.htm"},{"key":"ref2","unstructured":"College Board. (2014). AP Computer Science A course description. Retrieved from https:\/\/apcentral.collegeboard.org\/pdf\/ap-computer-science-a-course-description.pdf?course=ap-computer-science-a"},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"College Board. (2017a). AP\u00ae computer science principles. Retrieved from https:\/\/apcentral.collegeboard.org\/pdf\/ap-computer-science-principles-course-overview.pdf?course=ap-computer-science-principles","DOI":"10.1145\/2835851"},{"key":"ref4","unstructured":"College Board. (2017b). Course and exam description: AP computer science principles. Retrieved from https:\/\/apcentral.collegeboard.org\/pdf\/ap-computer-science-principles-course-and-exam-description.pdf?course=ap-computer-science-principles"},{"key":"ref5","unstructured":"College Board. (2018a). AP Archived Data. Retrieved from https:\/\/research.collegeboard.org\/programs\/ap\/data\/archived"},{"key":"ref6","unstructured":"College Board. (2018b). AP Program Participation and Performance Data 2018. Retrieved from: https:\/\/research.collegeboard.org\/programs\/ap\/data\/participation\/ap-2018"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"Cuny, J. (2015). Transforming K-12 computing education:  AP\u00ae computer science principles. ACM Inroads, 6(4), 58-59. https:\/\/doi.org\/10.1145\/2832916","DOI":"10.1145\/2832916"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"Denning, P. J. (2017). Remaining trouble spots with computational thinking. Communications of the ACM, 60(6), 33-39. https:\/\/doi.org\/10.1145\/2998438","DOI":"10.1145\/2998438"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"Grover, S., & Pea, R. (2013). Computational thinking in K\u201312: A review of the state of the field. Educational Researcher, 42(1), 38-43. https:\/\/doi.org\/10.3102\/0013189X12463051","DOI":"10.3102\/0013189x12463051"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"Guzdial, M. (2008). Paving the Way for Computational Thinking. Communications of the ACM, 51(8), 25-27. https:\/\/doi.org\/10.1145\/1378704.1378713","DOI":"10.1145\/1378704.1378713"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Howard, K. E., & Havard, D. D. (2019). Advanced Placement (AP) Computer Science Principles: Searching for Equity in a Two-Tiered Solution to Underrepresentation. Journal of Computer Science Integration, 1(1), xx-xx.","DOI":"10.26716\/jcsi.2019.01.1.1"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"Miller, G. A. (2003). The cognitive revolution: A historical perspective. Trends in Cognitive Sciences, 7(3), 141-144. https:\/\/doi.org\/10.1016\/S1364-6613(03)00029-9","DOI":"10.1016\/s1364-6613(03)00029-9"},{"key":"ref13","unstructured":"Minsky, M. (1974). A Framework for Representing Knowledge. Retrieved from https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/6089\/AIM-306.pdf?sequence=2"},{"key":"ref14","unstructured":"National Economic Council and Office of Science and Technology Policy. (2015). A strategy for American Innovation. Retrieved from https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/strategy_for_american_innovation_october_2015.pdf"},{"key":"ref15","unstructured":"National Science Foundation. (2014). College Board launches new AP Computer Science Principles course. Retrieved from https:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=133571"},{"key":"ref16","unstructured":"Papert, S. (1980). Mindstorms: Children, computers, and powerful ideas. New York, NY: Basic Books, Inc."},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"Papert, S. (1996). An exploration in the space of mathematics educations. International Journal of Computers for Mathematical Learning, 1(1), 95-123. https:\/\/doi.org\/10.1007\/BF00191473","DOI":"10.1007\/bf00191473"},{"key":"ref18","unstructured":"Papert, S., & Harel, I. (Eds.). (1991). Constructionism. Norwood, NJ: Ablex Publishing Corp."},{"key":"ref19","unstructured":"Royal Society. (2012). Shut down or restart: The way forward for computing in UK schools. Retrieved from http:\/\/royalsociety.org\/education\/policy\/computing-in-schools\/report\/"},{"key":"ref20","doi-asserted-by":"publisher","unstructured":"Tedre, M., & Denning, P. J. (2016). The long quest for computational thinking. Paper presented at the Proceedings of the 16th Koli Calling International Conference on Computing Education Research, Koli, Finland.","DOI":"10.1145\/2999541.2999542"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"Wing, J. M. (2006). Computational thinking. Communications of the ACM, 49(3), 33-35.","DOI":"10.1145\/1118178.1118215"},{"key":"ref22","unstructured":"Wing, J. M. (2011). Research notebook: Computational thinking\u2014What and why? Retrieved from https:\/\/www.cs.cmu.edu\/link\/research-notebook-computational-thinking-what-and-why"}],"container-title":["Journal of Computer Science Integration"],"language":"en","deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:05:35Z","timestamp":1740182735000},"score":11.565174,"resource":{"primary":{"URL":"https:\/\/digitalcommons.chapman.edu\/jcsi\/vol2\/iss1\/2"}},"issued":{"date-parts":[[2019,2,21]]},"references-count":23,"URL":"https:\/\/doi.org\/10.26716\/jcsi.2019.02.1.2","archive":["CLOCKSS"],"ISSN":["2574-108X"],"issn-type":[{"type":"electronic","value":"2574-108X"}],"published":{"date-parts":[[2019,2,21]]}}],"items-per-page":20,"query":{"start-index":0,"search-terms":"Computer+Science"}}}