{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:21:15Z","timestamp":1757312475558,"version":"3.40.5"},"reference-count":54,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:00:00Z","timestamp":1676937600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Computer Science Education"],"published-print":{"date-parts":[[2024,7,2]]},"DOI":"10.1080\/08993408.2023.2178063","type":"journal-article","created":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T18:14:01Z","timestamp":1677003241000},"page":"442-472","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Reporting less coincidental similarity to educate students about programming plagiarism and collusion"],"prefix":"10.1080","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4930-6249","authenticated-orcid":false,"given":"Oscar","family":"Karnalim","sequence":"first","affiliation":[{"name":"School of Information and Physical Sciences, University of Newcastle, University Drive, Callaghan, Australia"},{"name":"Faculty of Information Technology, Maranatha Christian University, Bandung, Indonesia"}]},{"family":"Simon","sequence":"additional","affiliation":[{"name":"Unaffiliated, Wyong, Australia"}]},{"given":"William","family":"Chivers","sequence":"additional","affiliation":[{"name":"School of Information and Physical Sciences, University of Newcastle, University Drive, Callaghan, Australia"}]}],"member":"301","published-online":{"date-parts":[[2023,2,21]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371156"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--31231"},{"key":"e_1_3_3_5_1","volume-title":"A taxonomy for learning, teaching, and assessing : A revision of Bloom\u2019s taxonomy of educational objectives","author":"Anderson L. W.","year":"2001","unstructured":"Anderson, L. W., Krathwohl, D. R., Airasian, P. W., Cruikshank, K. A., Mayer, R. E., Pintrich, P. R., Raths, J., & and Wittrock, M. C. (2001). A taxonomy for learning, teaching, and assessing : A revision of Bloom\u2019s taxonomy of educational objectives. Longman."},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.3926\/jotse.638"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310802205776"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999541.2999560"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Bradley S. (2020). Creative assessment in programming: Diversity and divergence. In Fourth Conference on Computing Education Practice (pp. 13:1\u201313:4). ACM.","DOI":"10.1145\/3372356.3372369"},{"key":"e_1_3_3_10_1","first-page":"207","volume-title":"Usability evaluation in industry","author":"Brooke J.","year":"1996","unstructured":"Brooke, J. (1996). SUS: A \u2018quick and dirty\u2019 usability scale. In P. W. Jordan, B. Thomas, IL. McClell, & B. Weerdmeester (Eds.), Usability evaluation in industry (pp. 207\u2013212). CRC."},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2011.2112768"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432413"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.10"},{"key":"e_1_3_3_15_1","first-page":"91","volume-title":"Sixth Australasian Conference on Computing Education","author":"Greening T.","year":"2004","unstructured":"Greening, T., Kay, J., & Kummerfeld, B. (2004). Integrating ethical content into computing curricula. In Sixth Australasian Conference on Computing Education, New Zealand (pp. 91\u201399). ACM."},{"key":"e_1_3_3_16_1","first-page":"33","volume-title":"2011 computer science education research conference","author":"Hage J.","year":"2011","unstructured":"Hage, J., Rademaker, P., & van Vugt, N. (2011). Plagiarism detection for Java: A tool comparison. In 2011 computer science education research conference (pp. 33\u201346). Open Universiteit, Heerlen."},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWME.2016.7496465"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3162087.3162101"},{"key":"e_1_3_3_19_1","first-page":"50","volume-title":"13th SIGCSE Technical Symposium on Computer Science Education","author":"Hwang C. J.","year":"1982","unstructured":"Hwang, C. J., & Gibson, D. E. (1982). Using an effective grading method for preventing plagiarism of programming assignments. In 13th SIGCSE Technical Symposium on Computer Science Education (pp. 50\u201359). ACM."},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.18552\/joaw.v1i1.10"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428029.3428064"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373165.3373171"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432436"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073703"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT52272.2021.00014"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON46332.2021.9454152"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3506717"},{"key":"e_1_3_3_29_1","first-page":"98","volume-title":"International Conference on Learning and Teaching in Computing and Engineering","author":"Le T.","year":"2013","unstructured":"Le, T., Carbone, A., Sheard, J., Schuhmacher, M., de Raadt, M., & Johnson, C. (2013). Educating computer programming students about plagiarism through use of a code similarity detection tool. In International Conference on Learning and Teaching in Computing and Engineering, Macau (pp. 98\u2013105). IEEE."},{"key":"e_1_3_3_30_1","first-page":"143","volume-title":"Eighth Australasian Computing Education Conference","author":"Mann S.","year":"2006","unstructured":"Mann, S., & Frew, Z. (2006). Similarity and originality in code: Plagiarism and normal variation in student assignments. In Eighth Australasian Computing Education Conference, Australia (pp. 143\u2013150). Australian Computer Society, Inc."},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2016.2604210"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-012-9367-6"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2017.8249481"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313290"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON46332.2021.9454112"},{"key":"e_1_3_3_36_1","volume-title":"The definitive ANTLR 4 reference","author":"Parr T.","year":"2013","unstructured":"Parr, T. (2013). The definitive ANTLR 4 reference. Pragmatic Bookshelf."},{"issue":"11","key":"e_1_3_3_37_1","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt L.","year":"2002","unstructured":"Prechelt, L., Malpohl, G., & Philippsen, M. (2002). Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science, 8(11), 1016\u20131038.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9564-7"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508865.1508994"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_3_42_1","volume-title":"Algorithms","author":"Sedgewick R.","year":"2011","unstructured":"Sedgewick, R., & Wayne, K. (2011). Algorithms (4th ed ed.). Pearson.","edition":"4"},{"key":"e_1_3_3_43_1","first-page":"119","volume-title":"Fifth Australasian Conference on Computing Education","author":"Sheard J.","year":"2003","unstructured":"Sheard, J., Carbone, A., & Dick, M. (2003). Determination of factors which impact on IT students\u2019 propensity to cheat. In Fifth Australasian Conference on Computing Education, Australia (pp. 119\u2013126). Australian Computer Society, Inc."},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3059009.3059064"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3013499.3013507"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2526968.2526971"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591755"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437800.3439201"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742633"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843060"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3160489.3160502"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024906.3024910"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2465594"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209635.3209645"}],"container-title":["Computer Science Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08993408.2023.2178063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T06:35:35Z","timestamp":1727159735000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08993408.2023.2178063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,21]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,7,2]]}},"alternative-id":["10.1080\/08993408.2023.2178063"],"URL":"https:\/\/doi.org\/10.1080\/08993408.2023.2178063","relation":{},"ISSN":["0899-3408","1744-5175"],"issn-type":[{"type":"print","value":"0899-3408"},{"type":"electronic","value":"1744-5175"}],"subject":[],"published":{"date-parts":[[2023,2,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ncse20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ncse20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-02-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}