{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:19:12Z","timestamp":1760141952434,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185648","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"789-795","source":"Crossref","is-referenced-by-count":0,"title":["GenAI and Academic Integrity in Dialogue: Pros and Cons"],"prefix":"10.1109","author":[{"given":"Artem","family":"Artyukhov","sequence":"first","affiliation":[{"name":"Sumy State University,Marketing Department,Sumy,Ukraine"}]},{"given":"Oleksandr","family":"Dluhopolskyi","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Economics and Economic Theory,Ternopil,Ukraine"}]},{"given":"Oksana","family":"Adamyk","sequence":"additional","affiliation":[{"name":"Loughborough University,Loughborough Business School,UK"}]},{"given":"Nadiia","family":"Artyukhova","sequence":"additional","affiliation":[{"name":"Sumy State University,Sumy,Ukraine"}]},{"given":"Bogdan","family":"Adamyk","sequence":"additional","affiliation":[{"name":"Aston University,Aston Business School,Birmingham,UK"}]},{"given":"Oksana","family":"Liashenko","sequence":"additional","affiliation":[{"name":"Loughborough University,Loughborough Business School,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-023-00411-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-023-00427-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.37074\/jalt.2023.6.1.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.7759\/cureus.51961"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2023.8333"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4995\/head24.2024.17345"},{"key":"ref7","first-page":"1","article-title":"A learning agreement for generative ai use in university courses: a pilot study","author":"Beardsley","year":"2024","journal-title":"TechRxiv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.53761\/q3azde36"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.53761\/1.20.02.07"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-023-00133-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.55016\/ojs\/cpai.v7i1.77675"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.31234\/osf.io\/hwkgu","article-title":"Academic misconduct and generative artificial intelligence: university students\u2019 intentions, usage, and perceptions","author":"Tindle","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/educsci10110301"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40979-023-00142-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1108\/ijilt-11-2023-0213"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5753\/wics.2024.3170"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1276700"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.62411\/jcta.9447"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.26034\/fr.jehe.2023.4657"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4995\/eurocall2023.2023.16999"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.8896"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34411-4_32"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24750"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.55982\/openpraxis.16.2.649"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71801-4_2"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185648.pdf?arnumber=11185648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:24:22Z","timestamp":1760073862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185648","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}