{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T15:45:29Z","timestamp":1771688729710,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T00:00:00Z","timestamp":1550793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,22]]},"DOI":"10.1145\/3287324.3287443","type":"proceedings-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T22:12:13Z","timestamp":1550873533000},"page":"1004-1010","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Collaboration Versus Cheating"],"prefix":"10.1145","author":[{"given":"Tony","family":"Mason","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Ada","family":"Gavrilovska","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"David A.","family":"Joyner","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10734-016-0025-9"},{"key":"e_1_3_2_1_2_1","volume-title":"MOSS: A System for Detecting Software Similarity","author":"Aiken Alex","year":"1994","unstructured":"Alex Aiken . 1994 . MOSS: A System for Detecting Software Similarity . http:\/\/theory.stanford.edu\/ aiken\/moss\/ (Accessed January 6, 2018). Alex Aiken. 1994. MOSS: A System for Detecting Software Similarity. http:\/\/theory.stanford.edu\/ aiken\/moss\/ (Accessed January 6, 2018)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ruth Baker-Gardner and Cherry-Ann Smart. 2017. Ignorance or Intent?: A Case Study of Plagiarism in Higher Education among LIS Students in the Caribbean. In Handbook of Research on Academic Misconduct in Higher Education. IGI Global 182--205.  Ruth Baker-Gardner and Cherry-Ann Smart. 2017. Ignorance or Intent?: A Case Study of Plagiarism in Higher Education among LIS Students in the Caribbean. In Handbook of Research on Academic Misconduct in Higher Education. IGI Global 182--205.","DOI":"10.4018\/978-1-5225-1610-1.ch008"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7308-0_15"},{"key":"e_1_3_2_1_5_1","volume-title":"24th USENIX Security Symposium (USENIX Security), Washington, DC .","author":"Caliskan-Islam Aylin","year":"2015","unstructured":"Aylin Caliskan-Islam , Richard Harang , Andrew Liu , Arvind Narayanan , Clare Voss , Fabian Yamaguchi , and Rachel Greenstadt . 2015 a. De-anonymizing programmers via code stylometry . In 24th USENIX Security Symposium (USENIX Security), Washington, DC . Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. 2015a. De-anonymizing programmers via code stylometry. In 24th USENIX Security Symposium (USENIX Security), Washington, DC ."},{"key":"e_1_3_2_1_6_1","volume-title":"When coding style survives compilation: De-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546","author":"Caliskan-Islam Aylin","year":"2015","unstructured":"Aylin Caliskan-Islam , Fabian Yamaguchi , Edwin Dauber , Richard Harang , Konrad Rieck , Rachel Greenstadt , and Arvind Narayanan . 2015b. When coding style survives compilation: De-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546 ( 2015 ). Aylin Caliskan-Islam, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, and Arvind Narayanan. 2015b. When coding style survives compilation: De-anonymizing programmers from executable binaries. arXiv preprint arXiv:1512.08546 (2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/10508422.2015.1136219"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591755"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810239"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724660.2728663"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3059871"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.02.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2304\/plat.2013.12.3.282"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047473"},{"key":"e_1_3_2_1_16_1","unstructured":"Tomche Delev and Dejan Gjorgjevikj. 2017. Comparison of string matching based algorithms for plagiarism detection of source code. (2017).  Tomche Delev and Dejan Gjorgjevikj. 2017. Comparison of string matching based algorithms for plagiarism detection of source code. (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201712802019"},{"key":"e_1_3_2_1_18_1","volume-title":"Plagiarism: Moving from punitive to pro-active approaches.","author":"Eaton Sarah E","year":"2017","unstructured":"Sarah E Eaton , Melanie Guglielmin , and Benedict Otoo . 2017 . Plagiarism: Moving from punitive to pro-active approaches. (2017). Sarah E Eaton, Melanie Guglielmin, and Benedict Otoo. 2017. Plagiarism: Moving from punitive to pro-active approaches. (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2015.1033612"},{"key":"e_1_3_2_1_20_1","volume-title":"genchang1234\/How-to-cheat-in-computer-science-101. https:\/\/github.com\/genchang1234\/How-to-cheat-in-computer-science-101 (accessed","year":"2018","unstructured":"genchang1234. 2015. genchang1234\/How-to-cheat-in-computer-science-101. https:\/\/github.com\/genchang1234\/How-to-cheat-in-computer-science-101 (accessed January 6, 2018 ). genchang1234. 2015. genchang1234\/How-to-cheat-in-computer-science-101. https:\/\/github.com\/genchang1234\/How-to-cheat-in-computer-science-101 (accessed January 6, 2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1562877.1562900"},{"key":"e_1_3_2_1_22_1","volume-title":"Guide to Submitting a DMCA Takedown Notice. https:\/\/help.github.com\/articles\/guide-to-submitting-a-dmca-takedown-notice\/ (Accessed","author":"Inc. GitHub. 2018.","year":"2018","unstructured":"Inc. GitHub. 2018. Guide to Submitting a DMCA Takedown Notice. https:\/\/help.github.com\/articles\/guide-to-submitting-a-dmca-takedown-notice\/ (Accessed January 20, 2018 ). Inc. GitHub. 2018. Guide to Submitting a DMCA Takedown Notice. https:\/\/help.github.com\/articles\/guide-to-submitting-a-dmca-takedown-notice\/ (Accessed January 20, 2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Can Online Delivery Increase Access to Education?","author":"Goodman Joshua","year":"2017","unstructured":"Joshua Goodman , Julia Melkers , and Amanda Pallais . 2017. Can Online Delivery Increase Access to Education? ( 2017 ). Joshua Goodman, Julia Melkers, and Amanda Pallais. 2017. Can Online Delivery Increase Access to Education? (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800954"},{"key":"e_1_3_2_1_25_1","article-title":"Academic honesty and online courses","volume":"40","author":"Grijalva Therese C","year":"2006","unstructured":"Therese C Grijalva , Clifford Nowell , and Joe Kerkvliet . 2006 . Academic honesty and online courses . College Student Journal , Vol. 40 , 1 (2006). Therese C Grijalva, Clifford Nowell, and Joe Kerkvliet. 2006. Academic honesty and online courses. College Student Journal, Vol. 40, 1 (2006).","journal-title":"College Student Journal"},{"key":"e_1_3_2_1_26_1","unstructured":"Dani\u00ebl Heres. 2017. Source Code Plagiarism Detection using Machine Learning . Master's thesis.  Dani\u00ebl Heres. 2017. Source Code Plagiarism Detection using Machine Learning . Master's thesis."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/378403"},{"key":"e_1_3_2_1_28_1","volume-title":"Standing in the shadow of giants: Plagiarists, authors, collaborators . Number 2","author":"Howard Rebecca Moore","unstructured":"Rebecca Moore Howard . 1999. Standing in the shadow of giants: Plagiarists, authors, collaborators . Number 2 . Greenwood Publishing Group . Rebecca Moore Howard. 1999. Standing in the shadow of giants: Plagiarists, authors, collaborators . Number 2. Greenwood Publishing Group."},{"key":"e_1_3_2_1_29_1","volume-title":"Share, & Build Careers. stackoverflow.com (Accessed","author":"Stack Exchange Inc. 2018.","year":"2018","unstructured":"Stack Exchange Inc. 2018. Stack Overflow - Where Developers Learn , Share, & Build Careers. stackoverflow.com (Accessed January 21, 2018 ). Stack Exchange Inc. 2018. Stack Overflow - Where Developers Learn, Share, & Build Careers. stackoverflow.com (Accessed January 21, 2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2017.147"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876034.2893383"},{"key":"e_1_3_2_1_32_1","unstructured":"Brian W Kernighan and Dennis M Ritchie. 2006. The C programming language .  Brian W Kernighan and Dennis M Ritchie. 2006. The C programming language ."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.2015070104"},{"key":"e_1_3_2_1_34_1","volume-title":"Stanford finds cheating - especially among computer science students - on the rise. https:\/\/tinyurl.com\/yan2sull (accessed","author":"Krieger Lisa M.","year":"2017","unstructured":"Lisa M. Krieger . 2016. Stanford finds cheating - especially among computer science students - on the rise. https:\/\/tinyurl.com\/yan2sull (accessed January 6, 2017 ) originally published February 6, 2010. Lisa M. Krieger. 2016. Stanford finds cheating - especially among computer science students - on the rise. https:\/\/tinyurl.com\/yan2sull (accessed January 6, 2017) originally published February 6, 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2012.709495"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/00986280902739768"},{"key":"e_1_3_2_1_37_1","unstructured":"Hermann A Maurer Frank Kappe and Bilal Zaka. 2006. Plagiarism-a survey. (2006).  Hermann A Maurer Frank Kappe and Bilal Zaka. 2006. Plagiarism-a survey. (2006)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983962"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_16"},{"key":"e_1_3_2_1_40_1","unstructured":"Holmes Miss and J Evelyn. 2017. Development and Leadership of a Faculty-led Academic Integrity Education Program at an Ontario College. (2017).  Holmes Miss and J Evelyn. 2017. Development and Leadership of a Faculty-led Academic Integrity Education Program at an Ontario College. (2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"Hannah Natanson. 2017. More than 60 Fall CS50 Enrollees Faced Academic Dishonesty Charges. http:\/\/www.thecrimson.com\/article\/2017\/5\/3\/cs50-cheating-cases-2017\/ (Accessed January 6 2018).  Hannah Natanson. 2017. More than 60 Fall CS50 Enrollees Faced Academic Dishonesty Charges. http:\/\/www.thecrimson.com\/article\/2017\/5\/3\/cs50-cheating-cases-2017\/ (Accessed January 6 2018)."},{"key":"e_1_3_2_1_42_1","unstructured":"University of Ontario. 2016. Why is Academic Integrity and Honesty Important? https:\/\/secure.apa.uoit.ca\/academic_integrity\/module1\/Module13.html  University of Ontario. 2016. Why is Academic Integrity and Honesty Important? https:\/\/secure.apa.uoit.ca\/academic_integrity\/module1\/Module13.html"},{"key":"e_1_3_2_1_43_1","volume-title":"Why Piazza Works. https:\/\/piazza.com\/product\/overview Accessed","author":"Inc. Piazza. 2017.","year":"2017","unstructured":"Inc. Piazza. 2017. Why Piazza Works. https:\/\/piazza.com\/product\/overview Accessed December 31, 2017 . Inc. Piazza. 2017. Why Piazza Works. https:\/\/piazza.com\/product\/overview Accessed December 31, 2017."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017797"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.072"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.03.003"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876034.2893435"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024906.3024910"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3160489.3160502"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14434\/jotlt.v6.n1.19528"},{"key":"e_1_3_2_1_51_1","volume-title":"An intervention aimed at reducing plagiarism in undergraduate nursing students. Nurse education in practice","author":"Smedley Alison","year":"2015","unstructured":"Alison Smedley , Tonia Crawford , and Linda Cloete . 2015. An intervention aimed at reducing plagiarism in undergraduate nursing students. Nurse education in practice , Vol. 15 , 3 ( 2015 ), 168--173. Alison Smedley, Tonia Crawford, and Linda Cloete. 2015. An intervention aimed at reducing plagiarism in undergraduate nursing students. Nurse education in practice, Vol. 15, 3 (2015), 168--173."},{"key":"e_1_3_2_1_52_1","first-page":"1334","article-title":"Past and present engineering students' views on academic dishonesty at a middle-eastern university","volume":"31","author":"Tabsh Sami W","year":"2015","unstructured":"Sami W Tabsh , Hany A El-Kadi , and A Abdelfatah . 2015 . Past and present engineering students' views on academic dishonesty at a middle-eastern university . International Journal of Engineering Education , Vol. 31 , 5 (2015), 1334 -- 1342 . Sami W Tabsh, Hany A El-Kadi, and A Abdelfatah. 2015. Past and present engineering students' views on academic dishonesty at a middle-eastern university. International Journal of Engineering Education, Vol. 31, 5 (2015), 1334--1342.","journal-title":"International Journal of Engineering Education"},{"key":"e_1_3_2_1_53_1","volume-title":"A Code Plagiarism Detection System Based on Abstract Syntax Tree and a High Level Fuzzy Petri Net. DEStech Transactions on Materials Science and Engineering mmme","author":"Victor RL","year":"2016","unstructured":"RL Victor and Farica P PUTRI. 2016. A Code Plagiarism Detection System Based on Abstract Syntax Tree and a High Level Fuzzy Petri Net. DEStech Transactions on Materials Science and Engineering mmme ( 2016 ). RL Victor and Farica P PUTRI. 2016. A Code Plagiarism Detection System Based on Abstract Syntax Tree and a High Level Fuzzy Petri Net. DEStech Transactions on Materials Science and Engineering mmme (2016)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2655759.2655769"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159490"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0187204"},{"key":"e_1_3_2_1_57_1","volume-title":"EdMedia: World Conference on Educational Media and Technology. Association for the Advancement of Computing in Education (AACE), 1372--1377","author":"Zhang Youdan","year":"2013","unstructured":"Youdan Zhang . 2013 . Benefiting from MOOC . In EdMedia: World Conference on Educational Media and Technology. Association for the Advancement of Computing in Education (AACE), 1372--1377 . Youdan Zhang. 2013. Benefiting from MOOC. In EdMedia: World Conference on Educational Media and Technology. Association for the Advancement of Computing in Education (AACE), 1372--1377."}],"event":{"name":"SIGCSE '19: The 50th ACM Technical Symposium on Computer Science Education","location":"Minneapolis MN USA","acronym":"SIGCSE '19","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 50th ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287324.3287443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:55Z","timestamp":1750208515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287324.3287443"}},"subtitle":["Reducing Code Plagiarism in an Online MS Computer Science Program"],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":56,"alternative-id":["10.1145\/3287324.3287443","10.1145\/3287324"],"URL":"https:\/\/doi.org\/10.1145\/3287324.3287443","relation":{},"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"2019-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}