{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:20:36Z","timestamp":1765232436151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T00:00:00Z","timestamp":1468022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,9]]},"DOI":"10.1145\/3024906.3024910","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T13:39:43Z","timestamp":1486733983000},"page":"57-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Negotiating the Maze of Academic Integrity in Computing Education"],"prefix":"10.1145","author":[{"family":"Simon","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Judy","family":"Sheard","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Michael","family":"Morgan","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Andrew","family":"Petersen","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"given":"Amber","family":"Settle","sequence":"additional","affiliation":[{"name":"DePaul University, United States of America"}]},{"given":"Jane","family":"Sinclair","sequence":"additional","affiliation":[{"name":"University of Warwick, United Kingdom"}]},{"given":"Gerry","family":"Cross","sequence":"additional","affiliation":[{"name":"Mount Royal University, Canada"}]},{"given":"Charles","family":"Riedesel","sequence":"additional","affiliation":[{"name":"University of Nebraska - Lincoln, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2016,7,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACM code of ethics and professional conduct.","author":"ACM","year":"1992","unstructured":"ACM ( 1992 ). ACM code of ethics and professional conduct. Retrieved from https:\/\/www.acm.org\/about-acm\/acm-code-of-ethics-and-professional-conduct ACM (1992). ACM code of ethics and professional conduct. Retrieved from https:\/\/www.acm.org\/about-acm\/acm-code-of-ethics-and-professional-conduct"},{"key":"e_1_3_2_1_2_1","volume-title":"Is plagiarism more prevalent in some forms of assessment than others? Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference, 48--57","author":"Alam L.S.","year":"2004","unstructured":"Alam , L.S. ( 2004 ). Is plagiarism more prevalent in some forms of assessment than others? Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference, 48--57 . Alam, L.S. (2004). Is plagiarism more prevalent in some forms of assessment than others? Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference, 48--57."},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"28","article-title":"Industry perceptions of the competencies needed by computer programmers: technical, business, and soft skills","volume":"47","author":"Bailey J.","year":"2007","unstructured":"Bailey , J. & Mitchell , R.B. ( 2007 ). Industry perceptions of the competencies needed by computer programmers: technical, business, and soft skills . The Journal of Computer Information Systems , 47 ( 2 ), 28 -- 33 . Retrieved from http:\/\/search.proquest.com\/docview\/232576272?accountid=12528 Bailey, J. & Mitchell, R.B. (2007). Industry perceptions of the competencies needed by computer programmers: technical, business, and soft skills. The Journal of Computer Information Systems, 47(2), 28--33. Retrieved from http:\/\/search.proquest.com\/docview\/232576272?accountid=12528","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/0260293042000264226"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.21913\/IJEI.v2i1.23"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"138","article-title":"Does the computer programming student understand what constitutes plagiarism","volume":"13","author":"Baugh J.","year":"2012","unstructured":"Baugh , J. , Kovacs , P. , & Davis , G. ( 2012 ). Does the computer programming student understand what constitutes plagiarism ? Issues in Information Systems , 13 ( 2 ), 138 -- 145 . Baugh, J., Kovacs, P., & Davis, G. (2012). Does the computer programming student understand what constitutes plagiarism? Issues in Information Systems, 13(2), 138--145.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_7_1","volume-title":"Student dishonesty and its control in college","author":"Bowers W.J.","year":"1964","unstructured":"Bowers , W.J. ( 1964 ). Student dishonesty and its control in college . Columbia University , New York CRP-1672. Bowers, W.J. (1964). Student dishonesty and its control in college. Columbia University, New York CRP-1672."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734348"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518944"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462497"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053293"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.910350"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15328023top2202_6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445245"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.783000"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709424.1709461"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595496.1562900"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1080569911404695"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/199544.199601"},{"issue":"2","key":"e_1_3_2_1_23_1","first-page":"106","article-title":"Toward a theory of information technology professional competence","volume":"50","author":"Havelka D.","year":"2009","unstructured":"Havelka , D. & Merhout , J.W. ( 2009 ). Toward a theory of information technology professional competence . The Journal of Computer Information Systems , 50 ( 2 ), 106 -- 116 . Retrieved from http:\/\/search.proquest.com\/docview\/232573038?accountid=12528 Havelka, D. & Merhout, J.W. (2009). Toward a theory of information technology professional competence. The Journal of Computer Information Systems, 50(2), 106--116. Retrieved from http:\/\/search.proquest.com\/docview\/232573038?accountid=12528","journal-title":"The Journal of Computer Information Systems"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/00193089.1984.10533838"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/0729436980170304"},{"key":"e_1_3_2_1_26_1","first-page":"7.3","volume-title":"IEEE Code of Ethics","author":"IEEE","year":"2016","unstructured":"IEEE ( 2016 ). IEEE Code of Ethics . IEEE Policies , Section 7.8, page 7.3 . Retrieved 2 July 2016 from https:\/\/www.ieee.org\/documents\/ieee_policies.pdf IEEE (2016). IEEE Code of Ethics. IEEE Policies, Section 7.8, page 7.3. Retrieved 2 July 2016 from https:\/\/www.ieee.org\/documents\/ieee_policies.pdf"},{"key":"e_1_3_2_1_27_1","first-page":"19","article-title":"Cyber cheating in an information technology age","volume":"10","author":"Jones K.O.","year":"2008","unstructured":"Jones , K.O. , Reid , J. , & Bartlett , R. ( 2008 ). Cyber cheating in an information technology age . Digithum , 10 , 19 -- 29 . Jones, K.O., Reid, J., & Bartlett, R. (2008). Cyber cheating in an information technology age. Digithum, 10, 19--29.","journal-title":"Digithum"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"e_1_3_2_1_29_1","volume-title":"International Journal for Educational Integrity, 9(1).","author":"Joy M.","year":"2013","unstructured":"Joy , M. , Sinclair , J.E. , Boyatt , R. , Yau , J.K. , & Cosma , G. ( 2013 ). Student perspectives on source-code plagiarism . International Journal for Educational Integrity, 9(1). Retrieved from http:\/\/www.ojs.unisa.edu.au\/index.php\/IJEI\/issue\/view\/140 Joy, M., Sinclair, J.E., Boyatt, R., Yau, J.K., & Cosma, G. (2013). Student perspectives on source-code plagiarism. International Journal for Educational Integrity, 9(1). Retrieved from http:\/\/www.ojs.unisa.edu.au\/index.php\/IJEI\/issue\/view\/140"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/00907320410569699"},{"key":"e_1_3_2_1_31_1","volume-title":"8th Annual Higher Education Academy Conference for Information and Computer Sciences, 143--150","author":"Lancaster T.","year":"2007","unstructured":"Lancaster , T. & Clarke , R. ( 2007 ). Assessing contract cheating through auction sites -- a computing perspective . 8th Annual Higher Education Academy Conference for Information and Computer Sciences, 143--150 . Lancaster, T. & Clarke, R. (2007). Assessing contract cheating through auction sites -- a computing perspective. 8th Annual Higher Education Academy Conference for Information and Computer Sciences, 143--150."},{"key":"e_1_3_2_1_32_1","volume-title":"1st Annual Higher Education Academy Conference in Science, Technology, Engineering and Mathematics.","author":"Lancaster T.","year":"2012","unstructured":"Lancaster , T. & Clarke , R. ( 2012 ). Dealing with contract cheating: a question of attribution . 1st Annual Higher Education Academy Conference in Science, Technology, Engineering and Mathematics. Lancaster, T. & Clarke, R. (2012). Dealing with contract cheating: a question of attribution. 1st Annual Higher Education Academy Conference in Science, Technology, Engineering and Mathematics."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511609268","volume-title":"Cognition in Practice","author":"Lave J.","year":"1988","unstructured":"Lave , J. ( 1988 ). Cognition in Practice . Cambridge, UK : Cambridge University Press . Lave, J. (1988). Cognition in Practice. Cambridge, UK: Cambridge University Press."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815355","volume-title":"Situated Learning: Legitimate Peripheral Participation","author":"Lave J.","year":"1991","unstructured":"Lave , J. , & Wenger , E. ( 1991 ). Situated Learning: Legitimate Peripheral Participation . New York : Cambridge University Press . Lave, J., & Wenger, E. (1991). Situated Learning: Legitimate Peripheral Participation. New York: Cambridge University Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/LaTiCE.2013.37"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/349316.349558"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5176\/2251-2195_CSEIT15.7"},{"key":"e_1_3_2_1_38_1","volume-title":"8th Australasian Conference on Computing Education, 143--150","author":"Mann S.","year":"2006","unstructured":"Mann , S. & Frew , Z. ( 2006 ). Similarity and originality in code: plagiarism and normal variation in student assignments . 8th Australasian Conference on Computing Education, 143--150 . Mann, S. & Frew, Z. (2006). Similarity and originality in code: plagiarism and normal variation in student assignments. 8th Australasian Conference on Computing Education, 143--150."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327019EB1103_2"},{"issue":"4","key":"e_1_3_2_1_40_1","first-page":"1315","article-title":"Combating plagiarism using a community of practice approach","volume":"28","author":"McKay T.M.","year":"2014","unstructured":"McKay , T.M. ( 2014 ). Combating plagiarism using a community of practice approach . South African Journal of Higher Education , 28 ( 4 ), 1315 -- 1331 . McKay, T.M. (2014). Combating plagiarism using a community of practice approach. South African Journal of Higher Education, 28(4), 1315--1331.","journal-title":"South African Journal of Higher Education"},{"key":"e_1_3_2_1_41_1","volume-title":"Assessing learning in Australian universities","author":"McInnis R.","year":"2002","unstructured":"McInnis , R. & Devlin , M. ( 2002 ). Assessing learning in Australian universities . Centre for the Study of Higher Education, University of Melbourne .{29 Dec 2002, verified 23 Oct 2004} http:\/\/www.cshe.unimelb.edu.au\/assessinglearning. McInnis, R. & Devlin, M. (2002). Assessing learning in Australian universities. Centre for the Study of Higher Education, University of Melbourne.{29 Dec 2002, verified 23 Oct 2004} http:\/\/www.cshe.unimelb.edu.au\/assessinglearning."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/00193089.1984.10533862"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.48796"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jslw.2012.03.006"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2189835.2189842"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445351"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426636.2426638"},{"key":"e_1_3_2_1_48_1","volume-title":"F3G-14.","author":"Roberts E.","year":"2002","unstructured":"Roberts , E. ( 2002 ). Strategies for promoting academic integrity in CS courses. 32nd Frontiers in Education, 2 , F3G-14. Roberts, E. (2002). Strategies for promoting academic integrity in CS courses. 32nd Frontiers in Education, 2, F3G-14."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819054"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593849410074025"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999813"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/637610.544468"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/0729436032000056526"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2526968.2526971"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591755"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742633"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843060"},{"issue":"2","key":"e_1_3_2_1_59_1","first-page":"98","article-title":"Staff and student perceptions of plagiarism and cheating","volume":"20","author":"Wilkinson J.","year":"2009","unstructured":"Wilkinson , J. ( 2009 ). Staff and student perceptions of plagiarism and cheating . International Journal of Teaching and Learning in Higher Education , 20 ( 2 ), 98 -- 105 . Wilkinson, J. (2009). Staff and student perceptions of plagiarism and cheating. International Journal of Teaching and Learning in Higher Education, 20(2), 98--105.","journal-title":"International Journal of Teaching and Learning in Higher Education"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/169070.169383"},{"key":"e_1_3_2_1_61_1","volume-title":"Can we reliably determine intent in cases of plagiarism? International Journal for Educational Integrity, 5(2).","author":"Yorke J.","year":"2009","unstructured":"Yorke , J. , Lawson , K. , & McMahon , G. ( 2009 ). Can we reliably determine intent in cases of plagiarism? International Journal for Educational Integrity, 5(2). Retrieved from http:\/\/www.ojs.unisa.edu.au\/index.php\/IJEI\/article\/view\/612 Yorke, J., Lawson, K., & McMahon, G. (2009). Can we reliably determine intent in cases of plagiarism? International Journal for Educational Integrity, 5(2). Retrieved from http:\/\/www.ojs.unisa.edu.au\/index.php\/IJEI\/article\/view\/612"},{"key":"e_1_3_2_1_62_1","volume-title":"Sixth Australasian Conference on Computing Education, 357--365","author":"Zobel J.","year":"2004","unstructured":"Zobel , J. ( 2004 , January). Uni cheats racket: a case study in plagiarism investigation . Sixth Australasian Conference on Computing Education, 357--365 . Zobel, J. (2004, January). Uni cheats racket: a case study in plagiarism investigation. Sixth Australasian Conference on Computing Education, 357--365."}],"event":{"name":"ITiCSE '16: Innovation and Technology in Computer Science Education Conference 2016","sponsor":["Bilkent University Bilkent University","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Arequipa Peru","acronym":"ITiCSE '16"},"container-title":["Proceedings of the 2016 ITiCSE Working Group Reports"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3024906.3024910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3024906.3024910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:03Z","timestamp":1750273503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3024906.3024910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,9]]},"references-count":61,"alternative-id":["10.1145\/3024906.3024910","10.1145\/3024906"],"URL":"https:\/\/doi.org\/10.1145\/3024906.3024910","relation":{},"subject":[],"published":{"date-parts":[[2016,7,9]]},"assertion":[{"value":"2016-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}