{"id":"https://openalex.org/W6944251879","doi":"https://doi.org/10.18420/abp2023-4","title":"Wieviel \u00c4hnlichkeit ist in Programmierpr\u00fcfungen normal?","display_name":"Wieviel \u00c4hnlichkeit ist in Programmierpr\u00fcfungen normal?","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W6944251879","doi":"https://doi.org/10.18420/abp2023-4"},"language":"de","primary_location":{"id":"doi:10.18420/abp2023-4","is_oa":true,"landing_page_url":"https://doi.org/10.18420/abp2023-4","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/abp2023-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Olbricht, Christoph","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Olbricht, Christoph","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Schypula, Rafael","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schypula, Rafael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Striewe, Michael","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Striewe, Michael","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.51598802,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.3483999967575073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.3483999967575073,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.16820000112056732,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11492","display_name":"Academic integrity and plagiarism","score":0.1656000018119812,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.179299995303154},{"id":"https://openalex.org/keywords/gloom","display_name":"Gloom","score":0.14949999749660492},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.14169999957084656}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4975000023841858},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.2937999963760376},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.22139999270439148},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1842000037431717},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.179299995303154},{"id":"https://openalex.org/C2778246783","wikidata":"https://www.wikidata.org/wiki/Q5571261","display_name":"Gloom","level":2,"score":0.14949999749660492},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.14169999957084656},{"id":"https://openalex.org/C2984024099","wikidata":"https://www.wikidata.org/wiki/Q5470205","display_name":"Metal forming","level":2,"score":0.13109999895095825},{"id":"https://openalex.org/C111106434","wikidata":"https://www.wikidata.org/wiki/Q1072430","display_name":"Die (integrated circuit)","level":2,"score":0.1307000070810318},{"id":"https://openalex.org/C2986587452","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical analysis","level":2,"score":0.12139999866485596}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/abp2023-4","is_oa":true,"landing_page_url":"https://doi.org/10.18420/abp2023-4","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/abp2023-4","is_oa":true,"landing_page_url":"https://doi.org/10.18420/abp2023-4","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49443289637565613}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Werkzeuge":[0,65],"zur":[1,17,66],"Identifikation":[2,18],"von":[3,19,28],"Plagiaten":[4],"in":[5],"Programmieraufgabe":[6],"messen":[7],"h\u00e4ufig":[8],"die":[9,76,85,90,105],"\u00c4hnlichkeit":[10,27,92,106],"zwischen":[11],"Abgaben.":[12],"Die":[13,81],"Interpretation":[14],"dieser":[15],"Werte":[16],"Verdachts\u00acmomenten":[20],"ist":[21,33],"jedoch":[22],"schwierig,":[23],"da":[24,95],"eine":[25],"gewisse":[26],"Abgaben":[29,71],"unvermeidlich":[30],"ist.":[31],"Es":[32],"insbesondere":[34],"unklar,":[35],"welche":[36,49],"\u00c4hnlichkeitsverteilung":[37],"innerhalb":[38],"einer":[39,87],"Kohorte":[40],"ohne":[41,77],"Plagiate":[42],"als":[43,52],"normal":[44],"angesehen":[45],"werden":[46,55],"kann":[47],"und":[48],"Abweichungen":[50],"davon":[51],"Verdachtsmoment":[53],"genutzt":[54],"k\u00f6nnen.":[56,110],"Der":[57],"vorliegende":[58],"Beitrag":[59],"vergleicht":[60],"dazu":[61],"unter":[62,68],"Nutzung":[63],"zweier":[64],"Plagiatserkennung":[67],"Aufsicht":[69,78],"erstellte":[70],"zu":[72],"Pr\u00fcfungsaufgaben":[73],"mit":[74],"solchen,":[75],"entstanden":[79],"sind.":[80],"Ergebnisse":[82],"zeigen,":[83],"dass":[84],"Ermittlung":[86],"\u201eBaseline\u201c":[88],"f\u00fcr":[89],"erwartbare":[91],"schwierig":[93],"ist,":[94],"auch":[96],"schon":[97],"kleine":[98],"\u00c4nderungen":[99],"der":[100,107],"Aufgabenstellung":[101],"starke":[102],"Auswirkungen":[103],"auf":[104],"L\u00f6sungen":[108],"haben":[109]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
