{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:49Z","timestamp":1750306309370,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Government Office for Learning and Teaching","award":["SP12-2312"],"award-info":[{"award-number":["SP12-2312"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1145\/2843043.2843060","type":"proceedings-article","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T20:06:43Z","timestamp":1454357203000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Academic integrity and computing assessments"],"prefix":"10.1145","author":[{"family":"Simon","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Judy","family":"Sheard","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Charles Darwin University 2015. Academic and scientific misconduct policy. http:\/\/www.cdu.edu.au\/governance\/policies\/pol-001.pdf. Viewed September 2015.  Charles Darwin University 2015. Academic and scientific misconduct policy. http:\/\/www.cdu.edu.au\/governance\/policies\/pol-001.pdf. Viewed September 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2011.2112768"},{"volume-title":"Second International Plagiarism Conference.","author":"Clarke R.","key":"e_1_3_2_1_3_1","unstructured":"Clarke , R. , and T. Lancaster , 2006. Eliminating the successor to plagiarism? Identifying the usage of contract cheating sites . Second International Plagiarism Conference. Clarke, R., and T. Lancaster, 2006. Eliminating the successor to plagiarism? Identifying the usage of contract cheating sites. Second International Plagiarism Conference."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_5_1","volume-title":"Ninth Australasian Computing Education Conference (ACE","author":"D'Souza D.","year":"2007","unstructured":"D'Souza , D. , M. Hamilton , and M. C. Harris , 2007. Software development marketplaces -- implications for plagiarism . Ninth Australasian Computing Education Conference (ACE 2007 ), 27--33. D'Souza, D., M. Hamilton, and M. C. Harris, 2007. Software development marketplaces -- implications for plagiarism. Ninth Australasian Computing Education Conference (ACE 2007), 27--33."},{"key":"e_1_3_2_1_6_1","volume-title":"Academic acknowledgement and plagiarism policy. www.jcu.edu.au\/student\/assessmentexams\/JCU_090852.html. Viewed","author":"James Cook University","year":"2015","unstructured":"James Cook University , 2015. Academic acknowledgement and plagiarism policy. www.jcu.edu.au\/student\/assessmentexams\/JCU_090852.html. Viewed September 2015 . James Cook University, 2015. Academic acknowledgement and plagiarism policy. www.jcu.edu.au\/student\/assessmentexams\/JCU_090852.html. Viewed September 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400701538062"},{"key":"e_1_3_2_1_9_1","volume-title":"Eighth Australasian Computing Education Conference (ACE","author":"Mann S.","year":"2006","unstructured":"Mann , S. , and Z. Frew , 2006. Similarity and originality in code: plagiarism and normal variation in student assignments . Eighth Australasian Computing Education Conference (ACE 2006 ), 143--150. Mann, S., and Z. Frew, 2006. Similarity and originality in code: plagiarism and normal variation in student assignments. Eighth Australasian Computing Education Conference (ACE 2006), 143--150."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327019EB1103_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999813"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/544414.544468"},{"key":"e_1_3_2_1_13_1","volume-title":"Seventh Australian Computing Education Conference (ACE","author":"Simon","year":"2005","unstructured":"Simon , 2005 . Electronic watermarks to help authenticate soft-copy exams . Seventh Australian Computing Education Conference (ACE 2005), 7--13. Simon, 2005. Electronic watermarks to help authenticate soft-copy exams. Seventh Australian Computing Education Conference (ACE 2005), 7--13."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2526968.2526971"},{"volume-title":"Sixth International Integrity and Plagiarism Conference (6IIPC).","author":"Simon B.","key":"e_1_3_2_1_15_1","unstructured":"Simon , B. Cook, A. Carbone , C. Johnson , C. Lawrence , M. Minichiello , and J. Sheard , 2014. How well do academic integrity policies and procedures apply to non-text assessments? Sixth International Integrity and Plagiarism Conference (6IIPC). Simon, B. Cook, A. Carbone, C. Johnson, C. Lawrence, M. Minichiello, and J. Sheard, 2014. How well do academic integrity policies and procedures apply to non-text assessments? Sixth International Integrity and Plagiarism Conference (6IIPC)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591755"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742633"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828977"},{"key":"e_1_3_2_1_20_1","unstructured":"Shalloway A. and J. R. Trott 2001. Design patterns explained: a new perspective on object-oriented design. Addison-Wesley.  Shalloway A. and J. R. Trott 2001. Design patterns explained: a new perspective on object-oriented design. Addison-Wesley."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/6592.6594"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066129.1066140"},{"key":"e_1_3_2_1_23_1","unstructured":"University of Western Australia 2015. University policy on academic conduct. www.teachingandlearning.uwa.edu.au\/staff\/policies\/conduct\/university-policy-on-academic-conduct-ethical-scholarship -academic-literacy-and-academic-misconduct. Viewed September 2015.  University of Western Australia 2015. University policy on academic conduct. www.teachingandlearning.uwa.edu.au\/staff\/policies\/conduct\/university-policy-on-academic-conduct-ethical-scholarship -academic-literacy-and-academic-misconduct. Viewed September 2015."},{"key":"e_1_3_2_1_24_1","unstructured":"Victoria University of Wellington 2015. Academic integrity and plagiarism. http:\/\/www.victoria.ac.nz\/students\/study\/exams\/integrity-plagiarism. Viewed September 2015.  Victoria University of Wellington 2015. Academic integrity and plagiarism. http:\/\/www.victoria.ac.nz\/students\/study\/exams\/integrity-plagiarism. Viewed September 2015."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1632149.1632168"},{"key":"e_1_3_2_1_26_1","volume-title":"Sixth Australasian Computing Education Conference (ACE","author":"Zobel J.","year":"2004","unstructured":"Zobel , J. , 2004 . \" Uni cheats racket\": a case study in plagiarism investigation . Sixth Australasian Computing Education Conference (ACE 2004), 357--365. Zobel, J., 2004. \"Uni cheats racket\": a case study in plagiarism investigation. Sixth Australasian Computing Education Conference (ACE 2004), 357--365."}],"event":{"name":"ACSW '16: Australasian Computer Science Week","acronym":"ACSW '16","location":"Canberra Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2843043.2843060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2843043.2843060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:48Z","timestamp":1750222428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2843043.2843060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":26,"alternative-id":["10.1145\/2843043.2843060","10.1145\/2843043"],"URL":"https:\/\/doi.org\/10.1145\/2843043.2843060","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]},"assertion":[{"value":"2016-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}