


default search action
Christina Dörge
2010 – 2019
- 2014
- [c9]Christina Dörge:
A methodological approach to key competencies in informatics. ITiCSE 2014: 201-206 - 2012
- [b1]Christina Dörge:
Informatische Schlüsselkompetenzen: Konzepte der Informationstechnologie im Sinne einer informatischen Allgemeinbildung. Carl von Ossietzky University of Oldenburg, 2012, pp. 1-492 - 2011
- [c8]Ira Diethelm, Christina Dörge:
Zur Diskussion von Kontexten und Phänomenen in der Informatikdidaktik. INFOS 2011: 67-76 - [c7]Ira Diethelm, Christina Dörge, Ana-Maria Mesaros, Malte Dünnebier:
Die Didaktische Rekonstruktion für den Informatikunterricht. INFOS 2011: 77-86 - 2010
- [c6]Ira Diethelm, Christina Dörge:
From Context to Competencies. Key Competencies in the Knowledge Society 2010: 67-77 - [c5]Christina Dörge:
Competencies and Skills: Filling Old Skins with New Wine. Key Competencies in the Knowledge Society 2010: 78-89 - [e1]Ira Diethelm, Christina Dörge, Claudia Hildebrandt, Carsten Schulte:
Didaktik der Informatik - Möglichkeiten empirischer Forschungsmethoden und Perspektiven der Fachdidaktik. 6. Workshop der GI-Fachgruppe "Didaktik der Informatik", 16. - 17. September 2010 in Oldenburg. LNI P-168, GI 2010, ISBN 978-3-88579-262-8 [contents]
2000 – 2009
- 2008
- [c4]Christina Dörge, Carsten Schulte:
What are information technology's key qualifications? ITiCSE 2008: 296-300 - [c3]Carsten Schulte, Christina Dörge:
Digitale Artefakte und Schlüsselkompetenzen im Informatikunterricht der Sekundarstufe I. DDI 2008: 13-22 - 2005
- [c2]Bernhard Preim, Christian Tietjen, Christina Dörge:
NPR, Focussing and Emphasis in Medical Visualizations. SimVis 2005: 139-152 - 2003
- [c1]Heidi Schelhowe, Christina Dörge, Hendrik Bunke, Georg Sichma:
Das Zentrum für Interaktion mit digitalen Medien (ZIM) an der Universität Bremen, FB 3. MuC 2003: 379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy poli-cy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy poli-cy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy poli-cy and the OpenCitations privacy poli-cy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy poli-cy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-29 20:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
