{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:10:45Z","timestamp":1768421445336,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["2111323"],"award-info":[{"award-number":["2111323"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,2]]},"DOI":"10.1145\/3545945.3569731","type":"proceedings-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T23:40:27Z","timestamp":1677886827000},"page":"486-492","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Impact of Several Low-Effort Cheating-Reduction Methods in a CS1 Class"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5416-0032","authenticated-orcid":false,"given":"Frank","family":"Vahid","sequence":"first","affiliation":[{"name":"University of California, Riverside &amp; zyBooks, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9110-4339","authenticated-orcid":false,"given":"Kelly","family":"Downey","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5154-6810","authenticated-orcid":false,"given":"Ashley","family":"Pang","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8952-4430","authenticated-orcid":false,"given":"Chelsea","family":"Gordon","sequence":"additional","affiliation":[{"name":"Zybooks, Campbell, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Albluwi I. Plagiarism in programming assessments: a systematic review. ACM Transactions on Computing Education (TOCE). 2019 Dec 9;20(1):1--28.","DOI":"10.1145\/3371156"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/989253.1165253"},{"key":"e_1_3_2_1_3_1","unstructured":"O'Malley M Roberts TS. Plagiarism on the rise? Combating contract cheating in science courses. International Journal of Innovation in Science and Mathematics Education. 2012 Nov 15;20(4)."},{"key":"e_1_3_2_1_4_1","first-page":"41","article-title":"The Fraud Triangle. John Wiley 8 Sons, Ltd","volume":"5","author":"Cendrowski H.","year":"2015","unstructured":"Cendrowski H. and Martin J. 2015. The Fraud Triangle. John Wiley 8 Sons, Ltd, Chapter 5, 41--46.","journal-title":"Chapter"},{"key":"e_1_3_2_1_5_1","volume-title":"Kazerouni AM. Patterns of Academic Help-Seeking in Undergraduate Computing Students. In21st Koli Calling International Conference on Computing Education Research 2021 Nov 18 (pp. 1--10)","author":"Doebling A","unstructured":"Doebling A, Kazerouni AM. Patterns of Academic Help-Seeking in Undergraduate Computing Students. In21st Koli Calling International Conference on Computing Education Research 2021 Nov 18 (pp. 1--10)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Williams L Upchurch RL. In support of student pair-programming. ACM SIGCSE Bulletin. 2001 Feb 1;33(1):327--31.","DOI":"10.1145\/366413.364614"},{"key":"e_1_3_2_1_7_1","unstructured":"Urness T. Assessment using peer evaluations random pair assignment and collaborative programing in CS1. Journal of Computing Sciences in Colleges. 2009 Oct 1;25(1):87--93."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3013499.3013507"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education 2017 Jun 28 (pp. 244--249)","author":"Sheard J","unstructured":"Sheard J, Butler M, Falkner K, Morgan M, Weerasinghe A. Strategies for maintaining academic integrity in first-year computing courses. In Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education 2017 Jun 28 (pp. 244--249)."},{"key":"e_1_3_2_1_10_1","volume-title":"Conference grading of computer programs. In Proceedings of the 18th SIGCSE Technical Symposium on Computer Science Education (SIGCSE'87)","author":"Ernest Ferguson","year":"1987","unstructured":"Ernest Ferguson. 1987. Conference grading of computer programs. In Proceedings of the 18th SIGCSE Technical Symposium on Computer Science Education (SIGCSE'87). ACM, New York, NY, 361--365."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sukhodolsky J. How to Eliminate Cheating from an Introductory Computer Programming Course. International Journal of Computer Science Education in Schools. 2017 Oct 31;1(4):25--34.","DOI":"10.21585\/ijcses.v1i4.13"},{"key":"e_1_3_2_1_12_1","volume-title":"In2018 IEEE Global Engineering Education Conference (EDUCON) 2018 Apr 17 (pp. 1048--1056)","author":"Pawelczak D.","unstructured":"Pawelczak D. Benefits and drawbacks of source code plagiarism detection in engineering education. In2018 IEEE Global Engineering Education Conference (EDUCON) 2018 Apr 17 (pp. 1048--1056). IEEE."},{"key":"e_1_3_2_1_13_1","volume-title":"Detecting Possible Cheating In Programming Courses Using Drastic Code Change. ASEE","author":"Alzahrani F.","year":"2022","unstructured":"N. Alzahrani and F. Vahid. Detecting Possible Cheating In Programming Courses Using Drastic Code Change. ASEE 2022."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 50th ACM Technical Symposium on Computer Science Education (pp. 1004--1010)","author":"Mason T.","unstructured":"Mason, T., Gavrilovska, A. and Joyner, D.A., 2019, February. Collaboration versus cheating: Reducing code plagiarism in an online MS computer science program. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (pp. 1004--1010)."},{"key":"e_1_3_2_1_15_1","volume-title":"InProceedings of the 51st ACM Technical Symposium on Computer Science Education 2020 Feb 26 (pp. 282--288)","author":"Malan DJ","unstructured":"Malan DJ, Yu B, Lloyd D. Teaching academic honesty in CS50. InProceedings of the 51st ACM Technical Symposium on Computer Science Education 2020 Feb 26 (pp. 282--288)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2003 ACM SIGMOD international conference on Management of data (pp. 76--85)","author":"Schleimer S","unstructured":"Schleimer S, Wilkerson, DS, Aiken A. Winnowing: local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (pp. 76--85)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Novak M Joy M Kermek D. Source-code similarity detection and detection tools used in academia: a systematic review. ACM Transactions on Computing Education (TOCE). 2019 May 21;19(3):1--37.","DOI":"10.1145\/3313290"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Lewis CM. Twelve tips for creating a culture that supports all students in computing. ACM Inroads. 2017 Oct 27;8(4):17--20.","DOI":"10.1145\/3148524"},{"key":"e_1_3_2_1_19_1","volume-title":"www.zybooks.com","author":"Books","year":"2022","unstructured":"zyBooks, www.zybooks.com, 2022."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Westfall J Kenny DA Judd CM. Statistical power and optimal design in experiments in which samples of participants respond to samples of stimuli. Journal of Experimental Psychology: General. 2014 Oct;143(5):2020.","DOI":"10.1037\/xge0000014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ryan TP Morgan JP. Modern experimental design. Journal of Statistical Theory and Practice. 2007 Dec 1;1(3--4):501-6.","DOI":"10.1080\/15598608.2007.10411855"},{"key":"e_1_3_2_1_22_1","unstructured":"SIGCSE 2018 birds-of-a-feather group. GitHub Tutors Relatives and Friends: Combating the Wide Web of Plagiarism: the Discussion Continues. https:\/\/sigcse2018.sigcse.org."}],"event":{"name":"SIGCSE 2023: The 54th ACM Technical Symposium on Computer Science Education","location":"Toronto ON Canada","acronym":"SIGCSE 2023","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545945.3569731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:59Z","timestamp":1750183799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545945.3569731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":22,"alternative-id":["10.1145\/3545945.3569731","10.1145\/3545945"],"URL":"https:\/\/doi.org\/10.1145\/3545945.3569731","relation":{},"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"2023-03-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}