{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T05:11:47Z","timestamp":1771909907537,"version":"3.50.1"},"reference-count":78,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Science Education"],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1080\/08993400701538062","type":"journal-article","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T05:05:13Z","timestamp":1188363913000},"page":"187-200","source":"Crossref","is-referenced-by-count":21,"title":["Academic Integrity and Plagiarism: Australasian perspectives"],"prefix":"10.1080","volume":"17","author":[{"given":"Donald","family":"Joyce","sequence":"first","affiliation":[{"name":"a Unitec, New Zealand"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2008,5,30]]},"reference":[{"key":"CIT0001","volume-title":"ASCILITE Conference","author":"Alam L. S."},{"key":"CIT0002","volume-title":"EDUCAUSE Conference","author":"Allan G."},{"key":"CIT0003","volume-title":"29th Australasian Computer Science Conference","author":"Arwin C."},{"key":"CIT0004","volume-title":"Australian Universities Quality Forum","author":"Baskett J."},{"key":"CIT0005","volume-title":"19th Annual Conference of the National Advisory Committee on Computing Qualifications","author":"Brook P."},{"key":"CIT0006","volume-title":"ASCILITE Conference","author":"Brooks C."},{"key":"CIT0007","volume-title":"2nd Australian Undergraduate Students' Computing Conference","author":"Burrows S."},{"key":"CIT0008","volume-title":"Paper presented at CPD Teaching Showcase Conference, University of Auckland, November 19","author":"Callagher L."},{"key":"CIT0009","volume-title":"A handbook for deterring plagiarism in higher education","author":"Carroll J.","year":"2002"},{"key":"CIT0010","volume-title":"Comparison of plagiarism software features","author":"Centre for the Study of Higher Education","year":"2003"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1207\/s15327701jlie0303_1"},{"key":"CIT0012","volume-title":"An indexing technique for efficiently detecting plagiarism in large volumes of source code","author":"Chawla M.","year":"2003"},{"key":"CIT0013","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Clerehan R."},{"key":"CIT0014","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Cohen J."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053293"},{"key":"CIT0016","first-page":"c3","author":"Cropp A.","year":"2002","journal-title":"Sunday Star Times"},{"issue":"2","key":"CIT0017","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1145\/782941.783000","volume":"35","author":"Dick M.","year":"2003","journal-title":"ACM SIGCSE Bulletin"},{"key":"CIT0018","volume-title":"2nd Asia-Pacific Educational Integrity Conference","author":"Dick M."},{"issue":"3","key":"CIT0019","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/507758.377474","volume":"33","author":"Dick M.","year":"2001","journal-title":"ACM SIGCSE Bulletin"},{"key":"CIT0020","volume-title":"International Conference on Computers in Education","author":"Dick M."},{"issue":"3","key":"CIT0021","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.2","volume":"2","author":"East J.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"CIT0022","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Eira C."},{"issue":"3","key":"CIT0023","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.3","volume":"2","author":"Emerson L.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"CIT0024","volume-title":"Issues in plagiarism for the new millenium: An assessment odyssey","author":"Gajadhar J.","year":"1998"},{"key":"CIT0025","volume-title":"E-fest Conference","author":"Goddard R."},{"issue":"3","key":"CIT0026","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.7","volume":"2","author":"Goddard R.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"issue":"3","key":"CIT0027","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.4","volume":"2","author":"Green D.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"CIT0028","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Green D."},{"key":"CIT0029","volume-title":"Attitude towards plagiarism in information systems in Australian universities","author":"Gururajan R.","year":"2004"},{"key":"CIT0030","volume-title":"International Conference on Computers in Education","author":"Hamilton M."},{"key":"CIT0031","volume-title":"Australian Association for Research in Education Conference","author":"Hasen M."},{"issue":"1","key":"CIT0032","first-page":"43","volume":"5","author":"Hawthorn D.","year":"2001","journal-title":"New Zealand Journal of Applied Computing and Information Technology"},{"key":"CIT0033","volume-title":"Punching plagiarism","author":"Hinds N.","year":"2004"},{"issue":"3","key":"CIT0034","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1002\/asi.10170","volume":"54","author":"Hoad T.","year":"2003","journal-title":"Journal of the American Society of Information Science and Technolgy"},{"key":"CIT0035","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Hornlund S."},{"key":"CIT0036","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Hussin V."},{"issue":"3","key":"CIT0037","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.5","volume":"2","author":"Johnson A.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"CIT0038","volume-title":"Netsafe Conference","author":"Joyce D."},{"key":"CIT0039","volume-title":"15th Annual Conference of the National Advisory Committee on Computing Qualifications","author":"Joyce D."},{"key":"CIT0040","first-page":"303","volume-title":"Proceedings of the 16th Annual Conference of the National Advisory Committee on Computing Qualifications","author":"Joyce D."},{"key":"CIT0041","volume-title":"Plagiarism: Prevention, Practice & Policy Conference","author":"Joyce D."},{"key":"CIT0042","first-page":"504","volume-title":"Proceedings of the 17th Annual Conference of the National Advisory Committee on Computing Qualifications","author":"Joyce D."},{"key":"CIT0043","first-page":"149","volume-title":"Proceedings of the Annual Conference of the Higher Education Academy\u2014Information and Computer Sciences","author":"Joyce D."},{"key":"CIT0044","first-page":"131","volume-title":"Proceedings of the 2nd International Plagiarism: Prevention, Practice & Policy Conference","author":"Joyce D."},{"issue":"3","key":"CIT0045","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1145\/1140123.1140259","volume":"38","author":"Joyce D.","year":"2006","journal-title":"ACM SIGCSE Bulletin"},{"key":"CIT0046","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Kennedy I."},{"key":"CIT0047","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Kett G."},{"issue":"7","key":"CIT0048","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/306549.306594","volume":"42","author":"Kock N.","year":"1999","journal-title":"Communications of the ACM"},{"key":"CIT0049","volume-title":"Proceedings of the HERDSA Conference","author":"Kuiper A."},{"issue":"2","key":"CIT0050","first-page":"28","volume":"5","author":"Le Heron D.","year":"2001","journal-title":"New Zealand Journal of Applied Computing and Information Technology"},{"key":"CIT0051","first-page":"143","volume-title":"Proceedings of the Eighth Australasian Computing Education Conference","author":"Mann S."},{"key":"CIT0052","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Marsden M."},{"key":"CIT0053","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Marsden H."},{"key":"CIT0054","volume-title":"ASCILITE Conference","author":"Marshall S."},{"issue":"2","key":"CIT0055","first-page":"15","volume":"16","author":"Martin B.","year":"2004","journal-title":"Nexus"},{"key":"CIT0056","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Melles G."},{"key":"CIT0057","first-page":"351","volume-title":"Proceedings of the 14th Annual Conference of the National Advisory Committee on Computing Qualifications","author":"Morrison T."},{"key":"CIT0058","volume-title":"ASCILITE Conference","author":"Mulcahy S."},{"key":"CIT0059","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Muller R."},{"key":"CIT0060","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Partridge L."},{"key":"CIT0061","volume-title":"Operational Research Society of New Zealand Conference","author":"Paynter J."},{"key":"CIT0062","volume-title":"Audit of academic integrity and plagiarism issues in Australia and New Zealand","author":"Phillips R.","year":"2005"},{"key":"CIT0063","volume-title":"Paper presented at Electronic Plagiarism Software: The Good, the Bad, the Reality Workshop","author":"Ryan S."},{"key":"CIT0064","volume-title":"Australian Universities Quality Forum","author":"Savage S."},{"key":"CIT0065","volume-title":"5th Australasian Computing Education Conference","author":"Sheard J."},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1145\/961290.961527"},{"key":"CIT0067","volume-title":"7th Annual Conference on Innovation and Technology in Computer Science Education","author":"Sheard J."},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1080\/0729436032000056526"},{"key":"CIT0069","volume-title":"2nd Asia\u00a0\u2013\u00a0Pacific Educational Integrity Conference","author":"Simon"},{"key":"CIT0070","volume-title":"ASCILITE Conference","author":"Stoney S."},{"issue":"3","key":"CIT0071","doi-asserted-by":"crossref","DOI":"10.53761\/1.2.3.10","volume":"2","author":"Sutherland-Smith W.","year":"2005","journal-title":"Journal of University Teaching and Learning Practice"},{"key":"CIT0072","volume-title":"Educational Integrity: Plagiarism and Other Perplexities Conference","author":"Taylor G."},{"key":"CIT0073","volume-title":"7th Australasian Computing Education Conference","author":"Vamplew P."},{"key":"CIT0074","volume-title":"Academic integrity conference to cover more than plagiarism","author":"Walker Teaching Resource Center","year":"2006"},{"key":"CIT0075","first-page":"231","volume-title":"Proceedings of the 9th Australian Computer Science Conference","author":"Whale G."},{"issue":"2","key":"CIT0076","doi-asserted-by":"crossref","DOI":"10.1093\/comjnl\/33.2.140","volume":"33","author":"Whale G.","year":"1990","journal-title":"The Computer Journal"},{"key":"CIT0077","volume-title":"6th Australasian Computing Education Conference","author":"Zobel J."},{"issue":"2","key":"CIT0078","volume":"45","author":"Zobel J.","year":"2002","journal-title":"Australian Universities Review"}],"container-title":["Computer Science Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08993400701538062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T17:06:17Z","timestamp":1708189577000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08993400701538062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":78,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2008,5,31]]},"published-print":{"date-parts":[[2007,9]]}},"alternative-id":["10.1080\/08993400701538062"],"URL":"https:\/\/doi.org\/10.1080\/08993400701538062","relation":{},"ISSN":["0899-3408","1744-5175"],"issn-type":[{"value":"0899-3408","type":"print"},{"value":"1744-5175","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,9]]}}}