{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:35:48Z","timestamp":1757313348882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,28]]},"DOI":"10.1145\/3059009.3059065","type":"proceedings-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T12:30:41Z","timestamp":1498653041000},"page":"238-243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Plagiarism in Take-home Exams"],"prefix":"10.1145","author":[{"given":"Arto","family":"Hellas","sequence":"first","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]},{"given":"Juho","family":"Leinonen","sequence":"additional","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]},{"given":"Petri","family":"Ihantola","sequence":"additional","affiliation":[{"name":"Tampere University of Technology, Tampere, Finland"}]}],"member":"320","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"297","article-title":"Plagiarism and programming: A survey of student attitudes","volume":"23","author":"Aasheim Cheryl L","year":"2012","unstructured":"Cheryl L Aasheim , Paige S Rutner , Lixin Li , and Susan R Williams . 2012 . Plagiarism and programming: A survey of student attitudes . Journal of Information Systems Education 23 , 3 (2012), 297 . Cheryl L Aasheim, Paige S Rutner, Lixin Li, and Susan R Williams. 2012. Plagiarism and programming: A survey of student attitudes. Journal of Information Systems Education 23, 3 (2012), 297.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787622.2787717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.11120\/ital.2007.06040183"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.1999.840376"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_7_1","volume-title":"Plagiarism Detection for Java: A Tool Comparison. In Computer Science Education Research Conference (CSERC '11)","author":"Hage Jurriaan","year":"2011","unstructured":"Jurriaan Hage , Peter Rademaker , and Nik\u00e8 van Vugt . 2011 . Plagiarism Detection for Java: A Tool Comparison. In Computer Science Education Research Conference (CSERC '11) . Open Universiteit, Heerlen, Open Univ., Heerlen, The Netherlands, The Netherlands, 33--46. Jurriaan Hage, Peter Rademaker, and Nik\u00e8 van Vugt. 2011. Plagiarism Detection for Java: A Tool Comparison. In Computer Science Education Research Conference (CSERC '11). Open Universiteit, Heerlen, Open Univ., Heerlen, The Netherlands, The Netherlands, 33--46."},{"key":"e_1_3_2_1_8_1","first-page":"45","article-title":"Presenting an alternative source code plagiarism detection framework for improving the teaching and learning of programming","volume":"12","author":"Hattingh Frederik","year":"2013","unstructured":"Frederik Hattingh , Albertus AK Buitendag , and Jacobus S Van Der Walt . 2013 . Presenting an alternative source code plagiarism detection framework for improving the teaching and learning of programming . Journal of Information Technology Education 12 (2013), 45 -- 58 . Frederik Hattingh, Albertus AK Buitendag, and Jacobus S Van Der Walt. 2013. Presenting an alternative source code plagiarism detection framework for improving the teaching and learning of programming. Journal of Information Technology Education 12 (2013), 45--58.","journal-title":"Journal of Information Technology Education"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1930464.1930480"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858796.2858798"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400412331363843"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2899472"},{"key":"e_1_3_2_1_14_1","volume-title":"OASIcs-OpenAccess Series in Informatics","volume":"38","author":"Martins V\u00edtor T","year":"2014","unstructured":"V\u00edtor T Martins , Daniela Fonte , Pedro Rangel Henriques , and Daniela da Cruz . 2014 . Plagiarism detection: A tool survey and comparison . In OASIcs-OpenAccess Series in Informatics , Vol. 38 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. V\u00edtor T Martins, Daniela Fonte, Pedro Rangel Henriques, and Daniela da Cruz. 2014. Plagiarism detection: A tool survey and comparison. In OASIcs-OpenAccess Series in Informatics, Vol. 38. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_15_1","unstructured":"Merriam-Webster Online. 2016. Merriam-Webster Online Dictionary. (2016). http:\/\/www.merriam-webster.com  Merriam-Webster Online. 2016. Merriam-Webster Online Dictionary. (2016). http:\/\/www.merriam-webster.com"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"e_1_3_2_1_17_1","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","unstructured":"Lutz Prechelt , Guido Malpohl , and Michael Philippsen . 2002 . Finding plagiarisms among a set of programs with JPlag . J. UCS 8 , 11 (2002), 1016 . Lutz Prechelt, Guido Malpohl, and Michael Philippsen. 2002. Finding plagiarisms among a set of programs with JPlag. J. UCS 8, 11 (2002), 1016.","journal-title":"J. UCS"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/1268354"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876034.2876037"},{"key":"e_1_3_2_1_21_1","volume-title":"Kostadin Damevski, and David C Shepherd.","author":"Schneider Johannes","year":"2016","unstructured":"Johannes Schneider , Avi Bernstein , Jan Vom Brocke , Kostadin Damevski, and David C Shepherd. 2016 . Detecting Plagiarism based on the Creation Process . arXiv preprint arXiv:1612.09183 (2016). Johannes Schneider, Avi Bernstein, Jan Vom Brocke, Kostadin Damevski, and David C Shepherd. 2016. Detecting Plagiarism based on the Creation Process. arXiv preprint arXiv:1612.09183 (2016)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/544414.544468"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843060"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(85)80046-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462501"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-9463-x"},{"key":"e_1_3_2_1_27_1","volume-title":"Educational Data Mining","author":"Yudelson Michael","year":"2014","unstructured":"Michael Yudelson , Roya Hosseini , Arto Vihavainen , and Peter Brusilovsky . 2014. Investigating automated student modeling in a Java MOOC . In Educational Data Mining 2014 . Michael Yudelson, Roya Hosseini, Arto Vihavainen, and Peter Brusilovsky. 2014. Investigating automated student modeling in a Java MOOC. In Educational Data Mining 2014."}],"event":{"name":"ITiCSE '17: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Bologna Italy","acronym":"ITiCSE '17"},"container-title":["Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3059009.3059065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3059009.3059065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:27Z","timestamp":1750218627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3059009.3059065"}},"subtitle":["Help-seeking, Collaboration, and Systematic Cheating"],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":26,"alternative-id":["10.1145\/3059009.3059065","10.1145\/3059009"],"URL":"https:\/\/doi.org\/10.1145\/3059009.3059065","relation":{},"subject":[],"published":{"date-parts":[[2017,6,28]]},"assertion":[{"value":"2017-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}