{"id":"https://openalex.org/W4392542517","doi":"https://doi.org/10.1145/3626252.3630958","title":"Use of AI-driven Code Generation Models in Teaching and Learning Programming: a Systematic Literature Review","display_name":"Use of AI-driven Code Generation Models in Teaching and Learning Programming: a Systematic Literature Review","publication_year":2024,"publication_date":"2024-03-07","ids":{"openalex":"https://openalex.org/W4392542517","doi":"https://doi.org/10.1145/3626252.3630958"},"language":"en","primary_location":{"id":"doi:10.1145/3626252.3630958","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3626252.3630958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repository.tudelft.nl/file/File_63d2dc94-539c-4acf-a0a0-fd741ce96000","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094087836","display_name":"Doga Cambaz","orcid":"https://orcid.org/0009-0009-9715-3292"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Doga Cambaz","raw_affiliation_strings":["Delft University of Technology, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Delft, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102814659","display_name":"Xiaoling Zhang","orcid":"https://orcid.org/0000-0003-0951-0771"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Xiaoling Zhang","raw_affiliation_strings":["Delft University of Technology, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Delft, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5094087836"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":null,"apc_paid":null,"fwci":14.2623,"has_fulltext":true,"cited_by_count":35,"citation_normalized_percentile":{"value":0.98826602,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"172","last_page":"178"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11122","display_name":"Online Learning and Analytics","score":0.9399999976158142,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7611278295516968},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6312593817710876},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.6062077879905701},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.48144811391830444},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4373874366283417},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.4118945002555847},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.38495439291000366},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35495758056640625},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.3235437273979187},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2272167205810547},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.1738583743572235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10091894865036011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7611278295516968},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6312593817710876},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.6062077879905701},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.48144811391830444},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4373874366283417},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.4118945002555847},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.38495439291000366},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35495758056640625},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.3235437273979187},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2272167205810547},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.1738583743572235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10091894865036011},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3626252.3630958","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3626252.3630958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1","raw_type":"proceedings-article"},{"id":"pmh:oai:tudelft.nl:uuid:4071531b-2dd0-4001-b67c-6351761d4821","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4071531b-2dd0-4001-b67c-6351761d4821","pdf_url":"https://repository.tudelft.nl/file/File_63d2dc94-539c-4acf-a0a0-fd741ce96000","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"bachelor thesis"}],"best_oa_location":{"id":"pmh:oai:tudelft.nl:uuid:4071531b-2dd0-4001-b67c-6351761d4821","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4071531b-2dd0-4001-b67c-6351761d4821","pdf_url":"https://repository.tudelft.nl/file/File_63d2dc94-539c-4acf-a0a0-fd741ce96000","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"bachelor thesis"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.8700000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392542517.pdf"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W22904422","https://openalex.org/W1969084508","https://openalex.org/W2260869788","https://openalex.org/W4211263275","https://openalex.org/W4283705032","https://openalex.org/W4291476001","https://openalex.org/W4311426581","https://openalex.org/W4321162272","https://openalex.org/W4323033785","https://openalex.org/W4323655724","https://openalex.org/W4366420437","https://openalex.org/W4366808937","https://openalex.org/W4367191393","https://openalex.org/W4381982883","https://openalex.org/W4386099272"],"related_works":["https://openalex.org/W4213125952","https://openalex.org/W3153702491","https://openalex.org/W3008981372","https://openalex.org/W2206096527","https://openalex.org/W4226317003","https://openalex.org/W2048831961","https://openalex.org/W1606349578","https://openalex.org/W2149635184","https://openalex.org/W3006945192","https://openalex.org/W4389650601"],"abstract_inverted_index":{"The":[0,45],"recent":[1],"emergence":[2],"of":[3,18,31,39,70,98],"LLM-based":[4,22,60,99,167],"code":[5,23,61,100,168],"generation":[6,62,101,169],"models":[7,81,102,116,125,156,163,170],"can":[8,171],"potentially":[9],"transform":[10],"programming":[11,56,83],"education.":[12,165],"To":[13],"pinpoint":[14],"the":[15,27,50,71,80,86,93,115,124,155,182],"current":[16],"state":[17],"research":[19],"on":[20,48,154],"using":[21],"generators":[24],"to":[25,76],"support":[26],"teaching":[28,51],"and":[29,52,66,73,88,108,152,179],"learning":[30,53],"programming,":[32],"we":[33],"conducted":[34],"a":[35],"systematic":[36],"literature":[37],"review":[38,46],"21":[40],"papers":[41],"published":[42],"since":[43],"2018.":[44],"focuses":[47],"(1)":[49],"practices":[54],"in":[55,82],"education":[57],"that":[58,92,123,135],"utilized":[59],"models,":[63,72],"(2)":[64],"characteristics":[65],"(3)":[67],"performance":[68],"indicators":[69],"(4)":[74],"aspects":[75],"consider":[77],"when":[78,159],"utilizing":[79],"education,":[84],"including":[85],"risks":[87,142,147,183],"challenges.":[89],"We":[90,121],"found":[91],"most":[94],"commonly":[95],"reported":[96],"uses":[97],"for":[103,113,143,176],"teachers":[104],"are":[105,136,157,184],"generating":[106],"assignments":[107],"evaluating":[109],"student":[110],"work,":[111],"while":[112],"students,":[114],"function":[117],"as":[118,149],"virtual":[119],"tutors.":[120],"identified":[122],"exhibit":[126],"accuracy":[127],"limitations;":[128],"generated":[129],"content":[130],"often":[131],"contains":[132],"minor":[133],"errors":[134],"manageable":[137],"by":[138],"instructors":[139,180],"but":[140],"pose":[141],"novice":[144],"learners.":[145],"Moreover,":[146],"such":[148],"academic":[150],"misconduct":[151],"over-reliance":[153],"critical":[158],"considering":[160],"integrating":[161],"these":[162],"into":[164],"Overall,":[166],"be":[172],"an":[173],"assistive":[174],"tool":[175],"both":[177],"learners":[178],"if":[181],"mitigated.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
