{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:38:29Z","timestamp":1773693509257,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Council of Finland","award":["356114"],"award-info":[{"award-number":["356114"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,5]]},"DOI":"10.1145\/3649165.3690100","type":"proceedings-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T18:23:41Z","timestamp":1733163821000},"page":"137-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Synthetic Students: A Comparative Study of Bug Distribution Between Large Language Models and Computing Students"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2781-6619","authenticated-orcid":false,"given":"Stephen","family":"MacNeil","sequence":"first","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8876-3506","authenticated-orcid":false,"given":"Magdalena","family":"Rogalska","sequence":"additional","affiliation":[{"name":"Temple University, Philadelphia, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6829-9449","authenticated-orcid":false,"given":"Juho","family":"Leinonen","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5150-9806","authenticated-orcid":false,"given":"Paul","family":"Denny","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6502-209X","authenticated-orcid":false,"given":"Arto","family":"Hellas","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3720-8896","authenticated-orcid":false,"given":"Xandria","family":"Crosland","sequence":"additional","affiliation":[{"name":"Western Governors University, Salt Lake City, Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3160489.3160490"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677258"},{"key":"e_1_3_2_1_3_1","volume-title":"The Silicone Ceiling: Auditing GPT's Race and Gender Biases in Hiring. arXiv preprint arXiv:2405.04412","author":"Armstrong Lena","year":"2024","unstructured":"Lena Armstrong, Abbey Liu, Stephen MacNeil, and Dana\u00eb Metaxa. 2024. The Silicone Ceiling: Auditing GPT's Race and Gender Biases in Hiring. arXiv preprint arXiv:2405.04412 (2024)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372508"},{"key":"e_1_3_2_1_5_1","volume-title":"Matt Littlefield Sami Sarsa, and Stephen MacNeil","author":"Bernstein Seth","year":"2024","unstructured":"Seth Bernstein, Paul Denny, Juho Leinonen, Lauren Kan, Arto Hellas, Matt Littlefield Sami Sarsa, and Stephen MacNeil. 2024. \"Like a Nesting Doll\": Analyzing Recursion Analogies Generated by CS Students using Large Language Models. arXiv preprint arXiv:2403.09409 (2024)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649405.3659504"},{"key":"e_1_3_2_1_7_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994154"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11052158"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499314"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325318"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999807"},{"key":"e_1_3_2_1_13_1","volume-title":"Desirable Characteristics for AI Teaching Assistants in Programming Education. arXiv preprint arXiv:2405.14178","author":"Denny Paul","year":"2024","unstructured":"Paul Denny, Stephen MacNeil, Jaromir Savelka, Leo Porter, and Andrew Luxton-Reilly. 2024. Desirable Characteristics for AI Teaching Assistants in Programming Education. arXiv preprint arXiv:2405.14178 (2024)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341525.3387384"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636243.3636256"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3160489.3160493"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/math10152733"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the 8th Australasian Computing Education Conf.","author":"Fincher Sally","year":"2006","unstructured":"Sally Fincher, Anthony Robins, Bob Baker, Ilona Box, Quintin Cutts, Michael de Raadt, Patricia Haden, John Hamer, et al. 2006. Predictors of success in a first programming course. In Proc. of the 8th Australasian Computing Education Conf."},{"key":"e_1_3_2_1_19_1","volume-title":"De-identification of Personal Information:.US Department of Commerce","author":"Garfinkel Simson","unstructured":"Simson Garfinkel. 2015. De-identification of Personal Information:.US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_3_2_1_20_1","unstructured":"Xu Guo and Yiqiang Chen. 2024. Generative AI for Synthetic Data Generation: Methods Challenges and the Future. arxiv: 2403.04190 [cs.LG]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580688"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295783"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858796.2858798"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151600"},{"key":"e_1_3_2_1_25_1","volume-title":"Bug Catalogue: I. Technical Report","author":"Johnson W. Lewis","year":"1983","unstructured":"W. Lewis Johnson, Elliot Soloway, Benjamin Cutler, and Steven Draper. 1983. Bug Catalogue: I. Technical Report. Yale University, YaleU\/CSD\/RR #286."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24358"},{"key":"e_1_3_2_1_27_1","volume-title":"Bias out-of-the-box: An empirical analysis of intersectional occupational biases in popular generative language models. Advances in neural information processing systems","author":"Kirk Hannah Rose","year":"2021","unstructured":"Hannah Rose Kirk, Yennie Jun, Filippo Volpin, Haider Iqbal, Elias Benussi, Frederic Dreyer, Aleksandar Shtedritski, and Yuki Asano. 2021. Bias out-of-the-box: An empirical analysis of intersectional occupational biases in popular generative language models. Advances in neural information processing systems, Vol. 34 (2021)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287381"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587102.3588785"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569770"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051457.3051458"},{"key":"e_1_3_2_1_32_1","volume-title":"Generative Students: Using LLM-Simulated Student Profiles to Support Question Item Evaluation. arXiv preprint arXiv:2405.11591","author":"Lu Xinyi","year":"2024","unstructured":"Xinyi Lu and Xu Wang. 2024. Generative Students: Using LLM-Simulated Student Profiles to Support Question Item Evaluation. arXiv preprint arXiv:2405.11591 (2024)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295779"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636243.3636245"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569785"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3573051.3593393"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597307"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456565.3460053"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606763"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526113.3545616"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373165.3373169"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1151869.1151891"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501385.3543957"},{"key":"e_1_3_2_1_44_1","article-title":"Empirical Evaluation of Deep Learning Models for Knowledge Tracing: Of Hyperparameters and Metrics on Performance and Replicability","volume":"14","author":"Sarsa Sami","year":"2022","unstructured":"Sami Sarsa, Juho Leinonen, Arto Hellas, et al. 2022. Empirical Evaluation of Deep Learning Models for Knowledge Tracing: Of Hyperparameters and Metrics on Performance and Replicability. Journal of Educational Data Mining, Vol. 14, 2 (2022).","journal-title":"Journal of Educational Data Mining"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564421"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828963"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/182.358436"},{"key":"e_1_3_2_1_48_1","volume-title":"What do novices know about programming? In Directions in Human-Computer Interactions","author":"Soloway Elliot","unstructured":"Elliot Soloway, Kate Ehrlich, Jeffrey G. Bonar, and Judith Greenspan. 1982. What do novices know about programming? In Directions in Human-Computer Interactions. Vol. 6. Ablex Publishing, 27--54."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/6138.6145"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534973"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE58773.2023.10342898"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674683.2674692"}],"event":{"name":"SIGCSE Virtual 2024: 1st ACM Virtual Global Computing Education Conference","location":"Virtual Event NC USA","acronym":"SIGCSE Virtual 2024","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM Virtual Global Computing Education Conference V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649165.3690100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649165.3690100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:54:02Z","timestamp":1755892442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649165.3690100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"references-count":52,"alternative-id":["10.1145\/3649165.3690100","10.1145\/3649165"],"URL":"https:\/\/doi.org\/10.1145\/3649165.3690100","relation":{},"subject":[],"published":{"date-parts":[[2024,12,5]]},"assertion":[{"value":"2024-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}