{"id":"https://openalex.org/W4323033826","doi":"https://doi.org/10.1145/3545945.3569805","title":"Plagiarism Deterrence in CS1 Through Keystroke Data","display_name":"Plagiarism Deterrence in CS1 Through Keystroke Data","publication_year":2023,"publication_date":"2023-03-02","ids":{"openalex":"https://openalex.org/W4323033826","doi":"https://doi.org/10.1145/3545945.3569805"},"language":"en","primary_location":{"id":"doi:10.1145/3545945.3569805","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545945.3569805","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545945.3569805","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3545945.3569805","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055999457","display_name":"Kaden Hart","orcid":"https://orcid.org/0000-0003-4622-0693"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kaden Hart","raw_affiliation_strings":["Utah State University, Logan, UT, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, Logan, UT, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007114304","display_name":"Chad D. Mano","orcid":"https://orcid.org/0000-0002-9933-9703"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chad Mano","raw_affiliation_strings":["Utah State University, Logan, UT, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, Logan, UT, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080249229","display_name":"John Edwards","orcid":"https://orcid.org/0000-0002-0882-312X"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Edwards","raw_affiliation_strings":["Utah State University, Logan, UT, USA"],"affiliations":[{"raw_affiliation_string":"Utah State University, Logan, UT, USA","institution_ids":["https://openalex.org/I121980950"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055999457"],"corresponding_institution_ids":["https://openalex.org/I121980950"],"apc_list":null,"apc_paid":null,"fwci":4.1381,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94917802,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"493","last_page":"499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.8970800638198853},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7838492393493652},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.7729347944259644},{"id":"https://openalex.org/keywords/grading","display_name":"Grading (engineering)","score":0.6163866519927979},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.505174458026886},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.4619927704334259},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.4593183994293213},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44368797540664673},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4421998858451843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43287819623947144},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3771003782749176},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.33069300651550293},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.08471867442131042},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08372804522514343}],"concepts":[{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.8970800638198853},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7838492393493652},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.7729347944259644},{"id":"https://openalex.org/C2777286243","wikidata":"https://www.wikidata.org/wiki/Q5591926","display_name":"Grading (engineering)","level":2,"score":0.6163866519927979},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.505174458026886},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.4619927704334259},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.4593183994293213},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44368797540664673},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4421998858451843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43287819623947144},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3771003782749176},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.33069300651550293},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.08471867442131042},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08372804522514343},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C147176958","wikidata":"https://www.wikidata.org/wiki/Q77590","display_name":"Civil engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3545945.3569805","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545945.3569805","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545945.3569805","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_stures-1024","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_stures/25","pdf_url":null,"source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Student Research","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3545945.3569805","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3545945.3569805","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3545945.3569805","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4323033826.pdf","grobid_xml":"https://content.openalex.org/works/W4323033826.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1967151513","https://openalex.org/W2023735971","https://openalex.org/W2033554340","https://openalex.org/W2036955327","https://openalex.org/W2044490101","https://openalex.org/W2111295912","https://openalex.org/W2158244854","https://openalex.org/W2162336214","https://openalex.org/W2264893711","https://openalex.org/W2275142089","https://openalex.org/W2296170693","https://openalex.org/W2460341519","https://openalex.org/W2463194977","https://openalex.org/W2469269292","https://openalex.org/W2579698096","https://openalex.org/W2906891466","https://openalex.org/W3123243326","https://openalex.org/W4214951692","https://openalex.org/W4256256860","https://openalex.org/W4281564584"],"related_works":["https://openalex.org/W47352601","https://openalex.org/W2981957539","https://openalex.org/W4287378204","https://openalex.org/W2545422590","https://openalex.org/W4240705470","https://openalex.org/W2945311252","https://openalex.org/W631546281","https://openalex.org/W4206501676","https://openalex.org/W88292646","https://openalex.org/W2266220644"],"abstract_inverted_index":{"Recent":[0],"work":[1],"in":[2,44,54,71,120,127],"computing":[3],"education":[4],"has":[5],"explored":[6],"the":[7,14,24,35,40,45,57,121],"idea":[8,32],"of":[9,16,42,47,66,88,107,123],"analyzing":[10],"and":[11,112],"grading":[12,53],"using":[13],"process":[15,41],"writing":[17],"a":[18,67,86,128],"computer":[19],"program":[20],"rather":[21],"than":[22],"just":[23],"final":[25,58],"submitted":[26,51,74],"code.":[27,59],"We":[28,60,77],"build":[29],"on":[30,37],"this":[31,102],"by":[33],"investigating":[34],"effect":[36],"plagiarism":[38],"when":[39,80],"coding,":[43],"form":[46,122],"keystroke":[48,75,115],"logs,":[49],"is":[50,118],"for":[52],"addition":[55],"to":[56,84,99],"report":[61],"results":[62],"from":[63],"two":[64],"terms":[65],"university":[68],"CS1":[69],"course":[70],"which":[72],"students":[73,81],"logs.":[76],"find":[78],"that":[79],"are":[82,96],"required":[83],"submit":[85],"log":[87],"keystrokes":[89],"together":[90],"with":[91],"their":[92],"written":[93],"code":[94],"they":[95],"less":[97],"likely":[98],"plagiarize.":[100],"In":[101],"paper":[103],"we":[104],"explore":[105],"issues":[106],"implementation,":[108],"adoption,":[109],"deterrence,":[110],"anxiety,":[111],"privacy.":[113],"Our":[114],"logging":[116],"software":[117],"available":[119],"an":[124],"IDE":[125],"plugin":[126,130],"public":[129],"repository.":[131]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
