{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T15:45:28Z","timestamp":1771688728605,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T00:00:00Z","timestamp":1517270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,30]]},"DOI":"10.1145\/3160489.3160502","type":"proceedings-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T13:30:47Z","timestamp":1515504647000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Informing students about academic integrity in programming"],"prefix":"10.1145","author":[{"family":"Simon","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Judy","family":"Sheard","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Michael","family":"Morgan","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Andrew","family":"Petersen","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"given":"Amber","family":"Settle","sequence":"additional","affiliation":[{"name":"DePaul University"}]},{"given":"Jane","family":"Sinclair","sequence":"additional","affiliation":[{"name":"University of Warwick, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2018,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2016.7877421"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.21913\/IJEI.v2i1.23"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-098-8_24"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.21913\/IJEI.v7i2.759"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2011.2112768"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Second International Plagiarism Conference.","author":"Clarke Robert","year":"2006","unstructured":"Robert Clarke and Thomas Lancaster . 2006 . Eliminating the successor to plagiarism? Identifying the usage of contract cheating sites . In Proceedings of the Second International Plagiarism Conference. Robert Clarke and Thomas Lancaster. 2006. Eliminating the successor to plagiarism? Identifying the usage of contract cheating sites. In Proceedings of the Second International Plagiarism Conference."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462497"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600800500283791"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/782941.783000"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595496.1562900"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46418-3_47"},{"key":"e_1_3_2_1_15_1","first-page":"19","article-title":"Cyber cheating in an information technology age","volume":"10","author":"Jones Karl O","year":"2008","unstructured":"Karl O Jones , Juliet Reid , and Rebecca Bartlett . 2008 . Cyber cheating in an information technology age . Digithum 10 (2008), 19 -- 29 . Karl O Jones, Juliet Reid, and Rebecca Bartlett. 2008. Cyber cheating in an information technology age. Digithum 10 (2008), 19--29.","journal-title":"Digithum"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 15th Australasian Computing Education Conference (ACE","author":"Le Nguyen Thanh Tri","year":"2013","unstructured":"Thanh Tri Le Nguyen , Angela Carbone , Judy Sheard , and Margot Schuhmacher . 2013 . Integrating source code plagiarism into a virtual learning environment: benefits for students and staff . In Proceedings of the 15th Australasian Computing Education Conference (ACE 2013). Australian Computer Society, Inc., 155--164. Thanh Tri Le Nguyen, Angela Carbone, Judy Sheard, and Margot Schuhmacher. 2013. Integrating source code plagiarism into a virtual learning environment: benefits for students and staff. In Proceedings of the 15th Australasian Computing Education Conference (ACE 2013). Australian Computer Society, Inc., 155--164."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5176\/2251-2195_CSEIT15.7"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Eighth Australasian Computing Education Conference (ACE","author":"Mann Samuel","year":"2006","unstructured":"Samuel Mann and Zelda Frew . 2006 . Similarity and originality in code: plagiarism and normal variation in student assignments . In Proceedings of the Eighth Australasian Computing Education Conference (ACE 2006). 143--150. Samuel Mann and Zelda Frew. 2006. Similarity and originality in code: plagiarism and normal variation in student assignments. In Proceedings of the Eighth Australasian Computing Education Conference (ACE 2006). 143--150."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-098-8_35"},{"key":"e_1_3_2_1_21_1","first-page":"1315","article-title":"Combating plagiarism using a community of practice approach","volume":"28","author":"McKay T Morton","year":"2014","unstructured":"T Morton McKay . 2014 . Combating plagiarism using a community of practice approach . South African Journal of Higher Education 28 , 4 (2014), 1315 -- 1331 . T Morton McKay. 2014. Combating plagiarism using a community of practice approach. South African Journal of Higher Education 28, 4 (2014), 1315--1331.","journal-title":"South African Journal of Higher Education"},{"key":"e_1_3_2_1_22_1","article-title":"A review on plagiarism detection tools","volume":"125","author":"Naik Ramesh R","year":"2015","unstructured":"Ramesh R Naik , Maheshkumar B Landge , and C Namrata Mahender . 2015 . A review on plagiarism detection tools . International Journal of Computer Applications 125 , 11 (2015). Ramesh R Naik, Maheshkumar B Landge, and C Namrata Mahender. 2015. A review on plagiarism detection tools. International Journal of Computer Applications 125, 11 (2015).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522248"},{"key":"e_1_3_2_1_24_1","volume-title":"International Journal of Innovation in Science and Mathematics Education (formerly CAL-laborate International) 20, 4","author":"O'Malley Michael","year":"2012","unstructured":"Michael O'Malley and Tim Sean Roberts . 2012. Plagiarism on the rise? Combating contract cheating in science courses . International Journal of Innovation in Science and Mathematics Education (formerly CAL-laborate International) 20, 4 ( 2012 ). Michael O'Malley and Tim Sean Roberts. 2012. Plagiarism on the rise? Combating contract cheating in science courses. International Journal of Innovation in Science and Mathematics Education (formerly CAL-laborate International) 20, 4 (2012)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602930301677"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jslw.2012.03.006"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2189835.2189842"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426636.2426638"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/858403.858418"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/637610.544468"},{"key":"e_1_3_2_1_31_1","volume-title":"Academic integrity in non-text based disciplines","unstructured":"Simon. 2016. Academic integrity in non-text based disciplines . In Handbook of Academic Integrity. Springer Science +Business Media, Singapore, 763--782. Simon. 2016. Academic integrity in non-text based disciplines. In Handbook of Academic Integrity. Springer Science+Business Media, Singapore, 763--782."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Sixth International Integrity and Plagiarism Conference (6IIPC).","author":"Cook Beth","year":"2014","unstructured":"Simon, Beth Cook , Angela Carbone , Chris Johnson , Chris Lawrence , Mario Minichiello , and Judy Sheard . 2014 . How well do academic integrity policies and procedures apply to non-text assessments? . In Proceedings of the Sixth International Integrity and Plagiarism Conference (6IIPC). Simon, Beth Cook, Angela Carbone, Chris Johnson, Chris Lawrence, Mario Minichiello, and Judy Sheard. 2014. How well do academic integrity policies and procedures apply to non-text assessments?. In Proceedings of the Sixth International Integrity and Plagiarism Conference (6IIPC)."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the Design Research Society Annual Conference. 1260--1273","author":"Cook Beth","year":"2014","unstructured":"Simon, Beth Cook , Mario Minichiello , and Chris Lawrence . 2014 . Academic integrity: differences between design assessments and essays . In Proceedings of the Design Research Society Annual Conference. 1260--1273 . Simon, Beth Cook, Mario Minichiello, and Chris Lawrence. 2014. Academic integrity: differences between design assessments and essays. In Proceedings of the Design Research Society Annual Conference. 1260--1273."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2526968.2526971"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Australasian Computer Science Week Multiconference (ACSW","author":"Judy Sheard Simon","year":"2016","unstructured":"Simon and Judy Sheard . 2016 . Academic integrity and computing assessments . In Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2016). 3. Simon and Judy Sheard. 2016. Academic integrity and computing assessments. In Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2016). 3."},{"key":"e_1_3_2_1_37_1","volume-title":"2016 ITiCSE Working Group Reports (ITiCSE-WGR '16)","author":"Sheard Judy","year":"2016","unstructured":"Simon, Judy Sheard , Michael Morgan , Andrew Petersen , Amber Settle , Jane Sinclair , Gerry Cross , and Charles Riedesel . 2016 . Negotiating the maze of academic integrity in computing education . In 2016 ITiCSE Working Group Reports (ITiCSE-WGR '16) . 57--80. Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair, Gerry Cross, and Charles Riedesel. 2016. Negotiating the maze of academic integrity in computing education. In 2016 ITiCSE Working Group Reports (ITiCSE-WGR '16). 57--80."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1515\/semi.2011.067"}],"event":{"name":"ACE 2018: 20th Australasian Computing Education Conference","location":"Brisbane Queensland Australia","acronym":"ACE 2018","sponsor":["The University of Newcastle, Australia","CORE - Computing Research and Education","Southern Cross UNIVERSITY Southern Cross UNIVERSITY","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 20th Australasian Computing Education Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3160489.3160502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3160489.3160502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:37Z","timestamp":1750213597000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3160489.3160502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,30]]},"references-count":37,"alternative-id":["10.1145\/3160489.3160502","10.1145\/3160489"],"URL":"https:\/\/doi.org\/10.1145\/3160489.3160502","relation":{},"subject":[],"published":{"date-parts":[[2018,1,30]]},"assertion":[{"value":"2018-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}