Skip to main content
Intranet

Breaches: types and identification

A range of information and resources are available to support unit coordinators and teaching staff to understand, identify and respond to potential academic integrity breaches.

What is an academic integrity breach?

An academic integrity breach involves any conduct that undermines the integrity of the University’s academic work and standards. Conduct may range from unintended and accidental failures to comply with academic standards or policies, to intentional acts to gain an advantage by unfair or dishonest means. Specific breach types are outlined in the University’s Academic Integrity Policy.

The University treats all suspected breaches seriously because of its commitment to upholding academic integrity.

Breach types

Part 4 of the Academic Integrity Policy outlines the conduct that would amount to a breach of integrity. Part 5 outlines rules for ‘allowable assistance’ in assessments, including rules around automated writing tools and generative AI, as well as what constitutes legitimate cooperation with others.

Common behaviours associated with breaches of academic integrity include:

  • Plagiarism
  • Recycling/resubmitting work
  • Fabricating information
  • Collusion or illegitimate cooperation
  • Exam cheating
  • Unapproved use of digital technologies including generative AI
  • Use of document sharing sites

Plagiarism

Plagiarism means presenting work that is not one’s own without acknowledging the original source of the work.

Plagiarism can include copying any material without correct referencing, regardless of the medium in which the original material was published. This includes material in hard copy (books, journals, theses etc), soft copy (internet, email attachments, e-journals etc), other digital formats (audio visual, MP3s etc) and live presentations (lectures, speeches etc).

The Academic Integrity Policy draws a distinction between plagiarism caused by a student's failure to understand appropriate referencing conventions and plagiarism that is dishonest.

Referencing is fundamental to academic integrity, as it enables students to distinguish between their own work and that of others. Developing strong referencing skills is crucial for student success. While no amount of plagiarism is acceptable, in the first instance, where a student has not understood the appropriate referencing conventions, the University will generally offer the student an opportunity to learn about referencing and potentially apply small mark penalties or an opportunity to correct the work.

Plagiarism may be considered dishonest when done knowingly or if a reasonable person can see that the student's original contribution to the work is overshadowed by the volume of copied or unacknowledged material.

Recycling

The University encourages all students to build on the knowledge they have developed over the course of their studies. However, it does not permit students to recycle or resubmit work that has previously been assessed and for which credit has already been given.

Unit coordinators should seek to discuss with their students the difference between drawing on knowledge and ideas, and simply reusing previously submitted material.

Fabricating information

Fabrication includes making up information, such as experimental or interview data. It can also include inventing sources by including citations to non-existent or incorrect sources.

With the rise of AI, we have seen an increase in cases relating to fabrication. AI-generated content often includes fabricated information or sources, which makes it difficult to determine the method of fabrication. Both scenarios are considered breaches of academic integrity and should be reported for investigation. If you suspect AI involvement, it is best to specify this as the alleged conduct.

Collusion or illegitimate cooperation

Collusion involves engaging in illegitimate cooperation with one or more other students in the completion of assessable work.

Cooperation is not legitimate if it unfairly advantages a student, or group of students, over others. It can include students working in pairs or groups to write an essay or report that is meant to be an individual piece of work. It can also include sharing quiz or test questions and answers with other students or sharing written assignments like reports and essays. This typically results in similarities within the work, which may be evident with direct text matching or follows the same pattern or structure, and included the same information, argument and references to sources.

Exam cheating

Exam cheating can include:

  • taking prohibited materials into an exam, such as cheat notes, textbooks, or unapproved phones, tablets or calculators
  • communicating with or copying from another student during an exam, or attempting to do so
  • using electronic devices, such as a smartphone or smartwatch, to access information related to the exam while it is in progress
  • discussing an exam with someone else outside the exam venue while it is in progress
  •  allowing another person or service to complete or contribute to all or part of an examination
  • removing confidential examination papers from an exam venue.

Contract cheating

Contract cheating is a term used to describe a range of behaviours that involves students seeking inappropriate assistance from a third party for their academic work and assignments. In the past, contract cheating cases primarily involved students purchasing entire assignments from essay mills, but in recent years we have seen a rise in the use of external “tutoring” companies and more systematic forms of collusion.

There are a range of behaviours that fall under the umbrella of contract cheating, which include:

  • purchasing a completed assignment from a "ghostwriting" company
  • paying a private tutor or tutoring company to coach them on how to complete an assignment
  • submitting "model" assignment answers provided by a private tutor or tutoring company
  • buying, selling or trading completed assignments via "study notes" websites or social media platforms like Facebook and WeChat
  • hiring someone to sit an exam for them or who have sat an exam for someone else
  • sharing assignment questions and answers or marked essays and reports with peers or a third party
  • having a friend, partner or family member write part or all an assignment on their behalf.

Several behaviours associated with contract cheating are considered to be personal misconduct and, in some cases, may be against the law. For instance, students may:

  • upload teaching materials such as unit of study outlines, lecture slides and assignment questions to document-sharing websites to access documents uploaded by other students, including marked assignments
  • illicitly sell or provide teaching materials to private tutoring or ghostwriting companies
  • share Unikey login credentials to private tutoring and ghostwriting companies so that they can access teaching materials hosted in Canvas
  • book University venues on behalf of private tutoring companies who illegally use teaching materials to deliver their own commercial, for-profit services.

Unapproved use of digital technologies including generative AI

Generative AI is defined in the Academic Integrity Policy as “software applications built on artificial intelligence that can generate content and complete tasks in response to user prompts. Uses for their outputs include: improving or amending writing, including by translating, paraphrasing, clarifying or making stylistic changes; generating text, code, data, images, multimedia or 3D artefacts; or controlling other software.” 

Misusing digital technologies including generative AI can breach the Academic Integrity Policy. Examples include: 

  • using generative AI tools in a ‘secure’ (supervised) task like an exam - unless express permission to use AI for the task has been given to the whole class in the unit outline;
  • even where AI is allowed, such as in an ‘open’, unsupervised task, submitting AI-generated work without appropriate acknowledgment can amount to a breach; or
  • inputting University teaching or course materials, content generated by another student, Intellectual Property from external partners, or any person’s personal or health information into AI tools.

To find more information about the use of AI in assessable work, visit AI and assessment

Use of document sharing sites

The proliferation of online document and file-sharing sites (for example, Course Hero, StuDocu, Chegg) where users to access materials by purchasing “credits” or uploading their own documents has resulted in a significant volume of University-related material appearing on these sites.

If a student uploads their completed assignments to such sites, this constitutes a breach of academic integrity, as it gives other students an unfair advantage and may enable cheating. Furthermore, posting the University’s copyrighted teaching materials, such as lecture slides or assignment briefs, constitutes a copyright infringement and is also considered an academic integrity breach.

If you can identify a student who has posted material, you can lodge an academic integrity report against that student. If you believe there has been an infringement of University copyright, please notify the Office of Educational Integrity by sending links and screenshots of the relevant material to [email protected]. The team will review the material and advise on the best course of action.

Identifying potential breaches, including contract cheating and AI misuse

The following provides guidance on how to detect breaches and the process for reporting.

Unit coordinators and teaching staff are responsible for monitoring and responding to potential academic integrity breaches to ensure appropriate intervention and uphold academic standards. All suspected cases should be investigated to assure the integrity of assessable work and to educate students on acceptable practices.

If you are unsure whether a particular case needs to be reported, please seek advice from the unit coordinator, relevant faculty educational integrity team of the Office of Educational Integrity. If you suspect a student has submitted work that is not their own, please refer to additional guidance under handling suspected contract cheating or AI use.

Methods to detect breaches

While technology and tools can assist in detecting breaches, academic judgment is crucial in the initial detection process.

Policy requires all written assignments to be submitted to similarity detection software. We use Turnitin for this purpose.  Turnitin searches for matches against a massive database of content, including internet, published work and student papers previously submitted to Turnitin. After scanning the assignment, Turnitin generates a Similarity Report that provides an overall similarity percentage indicating the amount of matching text to sources in the Turnitin database. Each match is colour coded and numbered, with a detailed percentage of how much text is matched against the paper to the source identified by Turnitin. The percentage produced is dependent on the length of the document.

There is no specifed level of similarity or defined percentage which indicates a breach of academic integrity. A high percentage does not necessarily mean that there is an issue with a paper and some matched text is easily explained. Similarly, a low percentage does not mean that there are no issues with the paper and further investigation should be undertaken. Text matches give some indication as to how original the writing may be, but whether the student has engaged in plagiarism or other breach must always be determined by a marker or academic.

Each of the matches should be considered whether they may indicate a potential breach, for example verify if exact matches are appropriately cited and paraphrased content is sufficiently reworded, and the original source cited. Common phrases or technological terms may have been highlighted, and you will need to ensure whether this is universally accepted knowledge or technological terms which don’t require citation.

Turnitin allows filters to exclude quotes, bibliography sections, or small matches. However, we recommend not excluding any matches initially as this will alter what is identified and may miss potential matches which warrant further investigation.

Turnitin will prioritise matches to other student papers, but when drilling down, you can identify whether this may relate to the use of a common source.

Similarity to sources will help identify copied content or inadequate referencing. Identical or very similar assignments submitted by different students may indicate collusion, common use of third-party material or even external assistance. 

A low similarity percentage does not necssarily mean that there are no issues with the paper and further investigation should be undertaken.

  • Turnitin does not detect similarity unless it is a word-for-word or close match with the source, potentially missing some forms of plagiarism. It may only highlight small matches to the source if word substitution has been used to rework the text, even though the paper follows the same structure, order of ideas, and similar wording throughout. 
  • A zero (0) percent similarity index may be a sign that a paper needs to be inspected. This can sometimes be the result of a student attempted to avoid detection or there is an issue with the file. For example, Turnitin is unable to generate a similarity report for images of text which may indicate an attempt to evade similarity detection.

While it’s relatively common for students to submit work that is purely descriptive and lacking in analysis, or not quite on topic or that does not explicitly address an assignment question or brief, these can be indicators that the student has sought assistance or used AI to complete their work.

On its own, this is not sufficient evidence. However, as a marker, you should look for additional indicators that might suggest the student has potentially sought assistance, either through a third party or AI. Please refer to the indicators below for guidance. 

Analysing document metadata for inconsistencies, such as creation dates or authorship, can reveal indicators that the work may not have been solely generated by the student. Unusual information in the file metadata, such as unexpected author names or very short time periods between file creation and completion are common indicators of contract cheating.

If you find irregularities, it is helpful to examine the assignment more closely for any additional concerns with the content, similarity, sources, and adherence to the assessment requirements. Please refer to the indicators below for guidance. 

Review references and sources cited in assignments for authenticity and relevance. 

Potential indicators

The following checklist outlines potential indicators of suspected academic integrity breaches. Identifying such breaches requires the examiner’s judgement, who is aware of the responsibilities involved in academic assessment. Markers serve as the frontline in preventing and detecting these breaches. Tools like web searches and similarity detection software assist in making this judgment.

Often, identifying a suspected academic integrity breach is a gut feeling about a submission or due to indicators from various tools. This may be where the assessment does not meet the requirements.

Conduct Type Indicators Recommended action
Plagiarism
  • Text matches identified in similarity report
  • Unusual phrasing, mismatched or abrupt shifts in tone, vocabulary, and sentence structure 
  • Different font types, sizes, or even paragraph spacing can suggest content has been copied and pasted 
  • Sentences that seem overly complex or out of the student’s usual writing ability
  • Look for high similarity scores and assess matched sources
  • Look for portions that lack citation or seem too similar to source material
  • Verify any direct quotations or paraphrased content against the source
  • Verify the accuracy and relevance of each source listed in the bibliography. Sources should directly support the content of the document
  • Pick unique or distinctive phrases and search for them online to see if they match any existing document (if not highlighted by Turnitin).
Collusion (or illegitimate cooperation)
  • Large matches of text across papers
  • Similar errors or work across multiple submissions
  • Identical answers, particularly if same errors, within mathematical units
  • Similar structure, ideas and wording throughout
  • Identical reference list
  • Review similarity scores – note viewing full source view in Turnitin may identify further similarities that have not been picked up by Turnitin due to paraphrasing
  • Investigate shared mistakes or identical content. Large scale similarities across submission within the unit may indicate external assistance rather than collusion.
Contract cheating
  • Similarity scores – very low text match (0%) or a high match to multiple sources
  • Quality beyond student’s known capabilities
  • The student is unable to explain the content or the process they followed to produce the work
  • Unusual information in file metadata (e.g unexpected author names or very short time periods between file creation and completion)
  • Use of methodology, references or content not discussed in unit
  • Use a template not provided (e.g. running head, coversheet with student details or incomplete placeholders like "insert name here"
  • Referencing irregularities like the use of obscure or outdated sources that appear only once, a reference list without corresponding in-text citations, mismatched in-text citations and the reference list, inappropriate/ irrelevant  or falsified sources, or access dates predating the student’s enrolment.
  • Reflections are impersonal or unexpected life examples for the student

 

  • Check against other submissions made by the student in that unit of study (if previous submissions available)
  • Reports from whistleblowers should be referred to the Office of Educational Integrity due to concerns for student wellbeing. Avoid engaging with third-party reporters.
  • Check for discrepancies in file properties and student’s explanation
  • Unit coordinators may wish to meet with the student to discuss concerns - see handling contract cheating below.
Unapproved or misuse of digital technologies (such as AI)
  • Unusual phrasing, mismatched writing style
  • Perfect, grammatically correct writing or unusual word choices or phrasing
  • Repetition of phrases or sentences
  • Lack of context or inconsistencies / inaccuracies in context
  • Review and check
  • Note: Unit coordinators may wish to meet with the student to discuss their concerns - see handling contract cheating below

 

Fabricating information, data or sources
  • Data that doesn’t align with research methodology
  • Incorrect or erroneous references, cannot locate the source
  • Verify the authenticity of the data provided
  • Locate the original source and confirm the information matches the cited details.
  • Check the citation style and ensure consistency
  • Ensure the source’s publication date is accurate
  • Compare in-text citations with the bibliography list.
  • Consider whether AI may have been used to generate content, including references. 
Use of file-sharing platforms
  • Matched sources include file-sharing websites (e.g., CourseHero.com, Chegg.com, Studocu)
  • Turnitin will match to material on document sharing websites only what is visible on publicly available. It won't match to full documents on the sites.
Exam cheating
  • Suspicious behaviour during exams, unauthorised materials
  • Similarity between student's answers, including similar errors or wording.
  • Discrepancies in the student's performance during an in-person exam vs. their submitted work
  • Be vigilant for unusual behaviour or prohibited items during tests.

What to do next if you suspect a breach

If you suspect a student has engaged in a breach, report it for further action. Teaching staff should consult with their unit coordinator to determine how breaches should be managed within the unit. Minor plagiarism and recycling breaches can be resolved locally by unit coordinators and must be recorded via the formal reporting form, while all other cases must be reported for further investigation by the relevant teams.

It is important to gather all necessary evidence to support the suspicion of a breach. This typically includes the Turnitin Similarity report or other forms of similarity detection, as well as any additional supporting information, such as correspondence with the student. It’s important to provide a detailed analysis of the similarities when outlining the reason for referral. Since teaching staff are most familiar with the assessment requirements and unit content, they are best equipped to collect reliable evidence for academic integrity investigations. Generally, the more varied the evidence, the stronger the case will be.

It is not the role of the teaching staff member to determine the severity of a suspected breach. Each Faculty has an Educational Integrity Coordinator and nominated academics who are responsible for investigating suspected breaches. The Office of Educational Integrity will conduct preliminary investigations into suspected contract cheating or misuse of AI. The role of the person making the report is to provide as much information about their suspicions to enable the decision maker to assess the report.

 See report an incident for more information.

Handling suspected contract cheating or AI misuse

If you suspect a student may have engaged in contract cheating or unapproved use of AI, you are encouraged to seek advice from their faculty’s educational integrity team and report suspected cases for further investigation. Reporting not only helps to address any integrity breach but also enables the University to understand the scale of the problem. If you become aware of organisations that potentially provide cheating services, you can report it by emailing [email protected].

The Office of Educational Integrity has a specialist investigative team who conduct a preliminary investigation using various tools, such as Turnitin’s Authorship tool to view all written submissions, assessing student logins amongst other things.  The Authorship tool assesses all submissions made by the student to Turnitin, assessing the readability, metadata. The Office of Educational Integrity will also use Turnitin’s AI detection software to evaluate suspected misuse of AI.

As a unit coordinator, if you suspect that a student has submitted work that is not their own, you may invite the student to a meeting to discuss the submitted work. It’s important to note that at this stage, this is not yet an allegation; rather, the student is provided with an outline of the concerns regarding their work.

During the meeting, the unit coordinator should:

  • Explain how the concerns were identified.
  • Ask the student to summarise the main argument or focus of their submission.
  • Request the student to describe one or two content-specific examples from their submission, especially if the material was not explicitly covered in the unit or handled in the same manner.
  • Ask the student to write a paragraph outlining their responses to the above, generating a writing sample for comparison.

Note:

Some students may admit to wrongdoing at this point. In such cases, the unit coordinator may ask who completed the submission, the contact details of this person, and whether payment was involved.

After the meeting, the unit coordinator should send a brief account of the discussion and its outcome to the student. If the coordinator remains unsatisfied with the student’s explanation or suspects the work is not their own, the case can be referred for further investigation. This referral should include all relevant documentation and supporting evidence (e.g., emails sent to the student).

If the student declines the invitation to meet, the submission should still be referred, along with any available supporting documentation or evidence. Supporting evidence may include the examiner's general assessment of the student's participation and prior engagement with unit content in relation to the submission in question.

Additional resources