{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:11:56Z","timestamp":1776100316639,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Learning Technol."],"published-print":{"date-parts":[[2018,7,1]]},"DOI":"10.1109\/tlt.2017.2720171","type":"journal-article","created":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T18:18:18Z","timestamp":1498587498000},"page":"348-361","source":"Crossref","is-referenced-by-count":18,"title":["Detecting Plagiarism Based on the Creation Process"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6783-5852","authenticated-orcid":false,"given":"Johannes","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Abraham","family":"Bernstein","sequence":"additional","affiliation":[]},{"given":"Jan vom","family":"Brocke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7799-2026","authenticated-orcid":false,"given":"Kostadin","family":"Damevski","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Shepherd","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.12948\/issn14531305\/19.3.2015.10","article-title":"Stylometry metrics selection for creating a model for evaluating\n the writing style of authors according to their cultural orientation","volume":"19","author":"zurini","year":"2015","journal-title":"Informatica Economica"},{"key":"ref33","first-page":"105","article-title":"Experiences gamifying developer adoption of practices and tools","author":"snipes","year":"2014","journal-title":"Proc 36th Int Conf Softw Eng"},{"key":"ref32","article-title":"CodeSkimmer: A novel visualization tool for capturing, replaying,\n and understanding fine-grained change in software","author":"simmons","year":"2013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1097\/ACM.0b013e31819a8c3c"},{"key":"ref30","first-page":"58","article-title":"Computer intrusion: Detecting masquerades","volume":"16","author":"schonlau","year":"2001","journal-title":"J Statist Sci"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336767"},{"key":"ref36","first-page":"25","article-title":"Capturing and analyzing low-level events from the code editor","author":"yoon","year":"2011","journal-title":"Proc 3rd SIGPLAN Workshop Eval Usability Program Languages Tools"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/236462.236525"},{"key":"ref34","first-page":"109","article-title":"How\n novices tackle their first lines of code in an IDE: Analysis of programming session traces","author":"vihavainen","year":"2014","journal-title":"Proc Int Conf Comput Edu Res"},{"key":"ref10","first-page":"167","article-title":"User authentication using\n rhythm click characteristics for non-keyboard devices","volume":"13","author":"chang","year":"2011","journal-title":"Proc Conf Asia Agriculture Animal"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2011.2112768"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9112-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.223"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2592905"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1145\/2034691.2034741","article-title":"Citation pattern matching algorithms for citation-based plagiarism detection","author":"gipp","year":"2011","journal-title":"Proc ACM Symp Document Engineering"},{"key":"ref16","first-page":"395","article-title":"Accelerating text-based\n plagiarism detection using GPUs","author":"jiffriya","year":"2015","journal-title":"Proc 1st Int Conf Ind Inf Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"ref18","first-page":"1","article-title":"Using task context to improve programmer productivity","author":"kersten","year":"2006","journal-title":"Symp on Found of Soft Eng"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121951"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906778"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.143"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/377164"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2134847"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/10508406.2014.954750"},{"key":"ref29","first-page":"76","article-title":"Winnowing: Local algorithms for document fingerprinting","author":"schleimer","year":"2003","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2012.V4.447"},{"key":"ref8","first-page":"255","article-title":"De-anonymizing programmers via code\n stylometry","author":"caliskan-islam","year":"2015","journal-title":"Proc Usenix Secur Symp"},{"key":"ref7","first-page":"18","article-title":"Statistical methods to detect cheating on tests: A review of the\n literature","author":"bliss","year":"2012","journal-title":"Proc Nat Conf Bar Examiner"},{"key":"ref2","first-page":"145","article-title":"Intrinsic plagiarism detection using\n latent semantic indexing and stylometry","author":"alsallal","year":"2013","journal-title":"Proc Int Conf Develop Esyst Eng"},{"key":"ref9","first-page":"1577","article-title":"Software plagiarism detection: A graph-based approach","author":"chae","year":"2013","journal-title":"Proc Int Conf Inf Knowl Manage"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/2787622.2787717","article-title":"Exploring machine learning methods to\n automatically identify students in need of assistance","author":"ahadi","year":"2015","journal-title":"Proc Conf Int Comput Edu Res"},{"key":"ref20","article-title":"Computer-based plagiarism detection methods and tools: An overview","author":"lukashenko","year":"2007","journal-title":"Proc Int Conf Comput Syst Technol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023795"},{"key":"ref21","first-page":"1050","article-title":"Plagiarism-a\n survey","volume":"12","author":"maurer","year":"2006","journal-title":"J Universal Comput Sci"},{"key":"ref24","first-page":"34","article-title":"CitePlag: A\n citation-based plagiarism detection system prototype","author":"meuschke","year":"2012","journal-title":"Proc Int Plagiarism Conf"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.21913\/IJEI.v9i1.847","article-title":"State-of-the-art in detecting academic plagiarism","volume":"9","author":"meuschke","year":"2013","journal-title":"Int J Educ Integrity"},{"key":"ref26","first-page":"997","article-title":"An\n evaluation framework for plagiarism detection","author":"potthast","year":"2010","journal-title":"Proc 23rd Int Conf Comput Linguistics Posters"},{"key":"ref25","first-page":"796","article-title":"Review of source-code plagiarism detection in academia","author":"novak","year":"2016","journal-title":"Proc 39th Int Convention Inf Commun Tech Electron Microelectron"}],"container-title":["IEEE Transactions on Learning Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4620076\/8471278\/07959638.pdf?arnumber=7959638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:42:50Z","timestamp":1643193770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7959638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,1]]},"references-count":38,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tlt.2017.2720171","relation":{},"ISSN":["1939-1382","2372-0050"],"issn-type":[{"value":"1939-1382","type":"electronic"},{"value":"2372-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,1]]}}}