{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:05:11Z","timestamp":1773882311250,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T00:00:00Z","timestamp":1654732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2022,9,30]]},"abstract":"<jats:p>To help address programming plagiarism and collusion, students should be informed about acceptable practices and about program similarity, both coincidental and non-coincidental. However, current approaches are usually manual, brief, and delivered well before students are in a situation where they might commit academic misconduct. This article presents an assessment submission system with automated, personalized, and timely formative feedback that can be used in institutions that apply some leniency in early instances of plagiarism and collusion. If a student\u2019s submission shares coincidental or non-coincidental similarity with other submissions, then personalized similarity reports are generated for the involved submissions and the students are expected to explain the similarity and resubmit the work. Otherwise, a report simulating similarities is sent just to the author of the submitted program to enhance their knowledge. Results from two quasi-experiments involving two academic semesters suggest that students with our approach are more aware of programming plagiarism and collusion, including the futility of some program disguises. Further, their submitted programs have lower similarity even at the level of program flow, suggesting that they are less likely to have engaged in programming plagiarism and collusion. Student behavior while using the system is also analyzed based on the statistics of the generated reports and student justifications for the reported similarities.<\/jats:p>","DOI":"10.1145\/3506717","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T17:04:53Z","timestamp":1645722293000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Educating Students about Programming Plagiarism and Collusion via Formative Feedback"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4930-6249","authenticated-orcid":false,"given":"Oscar","family":"Karnalim","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia and Universitas Kristen Maranatha, Bandung, West Java, Indonesia"}]},{"family":"Simon","sequence":"additional","affiliation":[{"name":"Unaffiliated, Australia"}]},{"given":"William","family":"Chivers","sequence":"additional","affiliation":[{"name":"University of Newcastle, Callaghan, New South Wales, Australia"}]},{"given":"Billy Susanto","family":"Panca","sequence":"additional","affiliation":[{"name":"Universitas Kristen Maranatha, Bandung, West Java, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2022,6,9]]},"reference":[{"key":"e_1_3_2_2_2"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--31231"},{"key":"e_1_3_2_4_2","volume-title":"A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom\u2019s Taxonomy of Educational Objectives","author":"Anderson Lorin W.","year":"2001","unstructured":"Lorin W. Anderson, David R. Krathwohl, Peter W. Airasian, Kathleen A. Cruikshank, Richard E. Mayer, Paul R. Pintrich, James Raths, and Merlin C. Wittrock. 2001. A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom\u2019s Taxonomy of Educational Objectives. Longman."},{"key":"e_1_3_2_5_2"},{"key":"e_1_3_2_6_2"},{"key":"e_1_3_2_7_2"},{"key":"e_1_3_2_8_2"},{"key":"e_1_3_2_9_2","volume-title":"Search Engines: Information Retrieval in Practice","author":"Croft W. Bruce","year":"2010","unstructured":"W. Bruce Croft, Donald Metzler, and Trevor Strohman. 2010. Search Engines: Information Retrieval in Practice. Addison-Wesley."},{"key":"e_1_3_2_10_2"},{"key":"e_1_3_2_11_2"},{"issue":"13","key":"e_1_3_2_12_2","first-page":"1708","article-title":"Cross-language source code re-use detection using latent semantic analysis","volume":"21","author":"Flores Enrique","year":"2015","unstructured":"Enrique Flores, Alberto Barr\u00f3n-Cede\u00f1o, Lidia Moreno, and Paolo Rosso. 2015. Cross-language source code re-use detection using latent semantic analysis. J. Univ. Comput. Sci. 21, 13 (2015), 1708\u20131725.","journal-title":"J. Univ. Comput. Sci."},{"key":"e_1_3_2_13_2"},{"key":"e_1_3_2_14_2"},{"key":"e_1_3_2_15_2"},{"key":"e_1_3_2_16_2","first-page":"91","volume-title":"Proceedings of the 6th Australasian Conference on Computing Education","author":"Greening Tony","year":"2004","unstructured":"Tony Greening, Judy Kay, and Bob Kummerfeld. 2004. Integrating ethical content into computing curricula. In Proceedings of the 6th Australasian Conference on Computing Education. 91\u201399."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-015-0367-y"},{"key":"e_1_3_2_18_2"},{"key":"e_1_3_2_19_2"},{"key":"e_1_3_2_20_2"},{"key":"e_1_3_2_21_2"},{"key":"e_1_3_2_22_2"},{"key":"e_1_3_2_23_2"},{"key":"e_1_3_2_24_2"},{"key":"e_1_3_2_25_2"},{"key":"e_1_3_2_26_2"},{"key":"e_1_3_2_27_2"},{"key":"e_1_3_2_28_2"},{"key":"e_1_3_2_29_2"},{"key":"e_1_3_2_30_2"},{"key":"e_1_3_2_31_2"},{"key":"e_1_3_2_32_2"},{"key":"e_1_3_2_33_2"},{"key":"e_1_3_2_34_2","first-page":"51","volume-title":"Proceedings of the 17th International Conference on Computers in Education","author":"Le Nguyen-Thinh","year":"2009","unstructured":"Nguyen-Thinh Le, Wolfgang Menzel, and Niels Pinkwart. 2009. Evaluation of a constraint-based homework assistance system for logic programming. In Proceedings of the 17th International Conference on Computers in Education. 51\u201358."},{"key":"e_1_3_2_35_2"},{"key":"e_1_3_2_36_2"},{"key":"e_1_3_2_37_2"},{"key":"e_1_3_2_38_2","first-page":"125","volume-title":"Handbook of Research on Educational Communications and Technology","author":"Narciss Susanne","year":"2008","unstructured":"Susanne Narciss. 2008. Feedback strategies for interactive learning tasks. In Handbook of Research on Educational Communications and Technology. 125\u2013144."},{"key":"e_1_3_2_39_2"},{"key":"e_1_3_2_40_2"},{"key":"e_1_3_2_41_2"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.5555\/2501720"},{"issue":"11","key":"e_1_3_2_43_2","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","unstructured":"Lutz Prechelt, Guido Malpohl, and Michael Philippsen. 2002. Finding plagiarisms among a set of programs with JPlag. J. Univ. Comput. Sci. 8, 11 (2002), 1016\u20131038.","journal-title":"J. Univ. Comput. Sci."},{"key":"e_1_3_2_44_2"},{"key":"e_1_3_2_45_2"},{"key":"e_1_3_2_46_2"},{"key":"e_1_3_2_47_2"},{"key":"e_1_3_2_48_2","volume-title":"Algorithms (4th ed.)","author":"Sedgewick Robert","year":"2011","unstructured":"Robert Sedgewick and Kevin Wayne. 2011. Algorithms (4th ed.). Pearson."},{"key":"e_1_3_2_49_2"},{"key":"e_1_3_2_50_2"},{"key":"e_1_3_2_51_2"},{"key":"e_1_3_2_52_2"},{"key":"e_1_3_2_53_2"},{"key":"e_1_3_2_54_2"},{"key":"e_1_3_2_55_2"},{"key":"e_1_3_2_56_2"},{"key":"e_1_3_2_57_2"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.5555\/1434921.1434923"},{"key":"e_1_3_2_59_2"},{"key":"e_1_3_2_60_2"},{"key":"e_1_3_2_61_2"}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3506717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3506717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:50Z","timestamp":1750191110000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3506717"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,9]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9,30]]}},"alternative-id":["10.1145\/3506717"],"URL":"https:\/\/doi.org\/10.1145\/3506717","relation":{},"ISSN":["1946-6226","1946-6226"],"issn-type":[{"value":"1946-6226","type":"print"},{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,9]]},"assertion":[{"value":"2021-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}