A range of information and resources are available to support unit coordinators and teaching staff to understand, identify and respond to potential academic integrity breaches.
An academic integrity breach involves any conduct that undermines the integrity of the University’s academic work and standards. Conduct may range from unintended and accidental failures to comply with academic standards or policies, to intentional acts to gain an advantage by unfair or dishonest means. Specific breach types are outlined in the University’s Academic Integrity Policy.
The University treats all suspected breaches seriously because of its commitment to upholding academic integrity.
Part 4 of the Academic Integrity Policy outlines the conduct that would amount to a breach of integrity. Part 5 outlines rules for ‘allowable assistance’ in assessments, including rules around automated writing tools and generative AI, as well as what constitutes legitimate cooperation with others.
Common behaviours associated with breaches of academic integrity include:
Plagiarism means presenting work that is not one’s own without acknowledging the original source of the work.
Plagiarism can include copying any material without correct referencing, regardless of the medium in which the original material was published. This includes material in hard copy (books, journals, theses etc), soft copy (internet, email attachments, e-journals etc), other digital formats (audio visual, MP3s etc) and live presentations (lectures, speeches etc).
The Academic Integrity Policy draws a distinction between plagiarism caused by a student's failure to understand appropriate referencing conventions and plagiarism that is dishonest.
Referencing is fundamental to academic integrity, as it enables students to distinguish between their own work and that of others. Developing strong referencing skills is crucial for student success. While no amount of plagiarism is acceptable, in the first instance, where a student has not understood the appropriate referencing conventions, the University will generally offer the student an opportunity to learn about referencing and potentially apply small mark penalties or an opportunity to correct the work.
Plagiarism may be considered dishonest when done knowingly or if a reasonable person can see that the student's original contribution to the work is overshadowed by the volume of copied or unacknowledged material.
The University encourages all students to build on the knowledge they have developed over the course of their studies. However, it does not permit students to recycle or resubmit work that has previously been assessed and for which credit has already been given.
Unit coordinators should seek to discuss with their students the difference between drawing on knowledge and ideas, and simply reusing previously submitted material.
Fabrication includes making up information, such as experimental or interview data. It can also include inventing sources by including citations to non-existent or incorrect sources.
With the rise of AI, we have seen an increase in cases relating to fabrication. AI-generated content often includes fabricated information or sources, which makes it difficult to determine the method of fabrication. Both scenarios are considered breaches of academic integrity and should be reported for investigation. If you suspect AI involvement, it is best to specify this as the alleged conduct.
Collusion involves engaging in illegitimate cooperation with one or more other students in the completion of assessable work.
Cooperation is not legitimate if it unfairly advantages a student, or group of students, over others. It can include students working in pairs or groups to write an essay or report that is meant to be an individual piece of work. It can also include sharing quiz or test questions and answers with other students or sharing written assignments like reports and essays. This typically results in similarities within the work, which may be evident with direct text matching or follows the same pattern or structure, and included the same information, argument and references to sources.
Exam cheating can include:
Contract cheating is a term used to describe a range of behaviours that involves students seeking inappropriate assistance from a third party for their academic work and assignments. In the past, contract cheating cases primarily involved students purchasing entire assignments from essay mills, but in recent years we have seen a rise in the use of external “tutoring” companies and more systematic forms of collusion.
There are a range of behaviours that fall under the umbrella of contract cheating, which include:
Several behaviours associated with contract cheating are considered to be personal misconduct and, in some cases, may be against the law. For instance, students may:
Generative AI is defined in the Academic Integrity Policy as “software applications built on artificial intelligence that can generate content and complete tasks in response to user prompts. Uses for their outputs include: improving or amending writing, including by translating, paraphrasing, clarifying or making stylistic changes; generating text, code, data, images, multimedia or 3D artefacts; or controlling other software.”
Misusing digital technologies including generative AI can breach the Academic Integrity Policy. Examples include:
To find more information about the use of AI in assessable work, visit AI and assessment
The proliferation of online document and file-sharing sites (for example, Course Hero, StuDocu, Chegg) where users to access materials by purchasing “credits” or uploading their own documents has resulted in a significant volume of University-related material appearing on these sites.
If a student uploads their completed assignments to such sites, this constitutes a breach of academic integrity, as it gives other students an unfair advantage and may enable cheating. Furthermore, posting the University’s copyrighted teaching materials, such as lecture slides or assignment briefs, constitutes a copyright infringement and is also considered an academic integrity breach.
If you can identify a student who has posted material, you can lodge an academic integrity report against that student. If you believe there has been an infringement of University copyright, please notify the Office of Educational Integrity by sending links and screenshots of the relevant material to [email protected]. The team will review the material and advise on the best course of action.
The following provides guidance on how to detect breaches and the process for reporting.
Unit coordinators and teaching staff are responsible for monitoring and responding to potential academic integrity breaches to ensure appropriate intervention and uphold academic standards. All suspected cases should be investigated to assure the integrity of assessable work and to educate students on acceptable practices.
If you are unsure whether a particular case needs to be reported, please seek advice from the unit coordinator, relevant faculty educational integrity team of the Office of Educational Integrity. If you suspect a student has submitted work that is not their own, please refer to additional guidance under handling suspected contract cheating or AI use.
Policy requires all written assignments to be submitted to similarity detection software. We use Turnitin for this purpose. Turnitin searches for matches against a massive database of content, including internet, published work and student papers previously submitted to Turnitin. After scanning the assignment, Turnitin generates a Similarity Report that provides an overall similarity percentage indicating the amount of matching text to sources in the Turnitin database. Each match is colour coded and numbered, with a detailed percentage of how much text is matched against the paper to the source identified by Turnitin. The percentage produced is dependent on the length of the document.
There is no specifed level of similarity or defined percentage which indicates a breach of academic integrity. A high percentage does not necessarily mean that there is an issue with a paper and some matched text is easily explained. Similarly, a low percentage does not mean that there are no issues with the paper and further investigation should be undertaken. Text matches give some indication as to how original the writing may be, but whether the student has engaged in plagiarism or other breach must always be determined by a marker or academic.
Each of the matches should be considered whether they may indicate a potential breach, for example verify if exact matches are appropriately cited and paraphrased content is sufficiently reworded, and the original source cited. Common phrases or technological terms may have been highlighted, and you will need to ensure whether this is universally accepted knowledge or technological terms which don’t require citation.
Turnitin allows filters to exclude quotes, bibliography sections, or small matches. However, we recommend not excluding any matches initially as this will alter what is identified and may miss potential matches which warrant further investigation.
Turnitin will prioritise matches to other student papers, but when drilling down, you can identify whether this may relate to the use of a common source.
Similarity to sources will help identify copied content or inadequate referencing. Identical or very similar assignments submitted by different students may indicate collusion, common use of third-party material or even external assistance.
A low similarity percentage does not necssarily mean that there are no issues with the paper and further investigation should be undertaken.
While it’s relatively common for students to submit work that is purely descriptive and lacking in analysis, or not quite on topic or that does not explicitly address an assignment question or brief, these can be indicators that the student has sought assistance or used AI to complete their work.
On its own, this is not sufficient evidence. However, as a marker, you should look for additional indicators that might suggest the student has potentially sought assistance, either through a third party or AI. Please refer to the indicators below for guidance.
Analysing document metadata for inconsistencies, such as creation dates or authorship, can reveal indicators that the work may not have been solely generated by the student. Unusual information in the file metadata, such as unexpected author names or very short time periods between file creation and completion are common indicators of contract cheating.
If you find irregularities, it is helpful to examine the assignment more closely for any additional concerns with the content, similarity, sources, and adherence to the assessment requirements. Please refer to the indicators below for guidance.
Review references and sources cited in assignments for authenticity and relevance.
The following checklist outlines potential indicators of suspected academic integrity breaches. Identifying such breaches requires the examiner’s judgement, who is aware of the responsibilities involved in academic assessment. Markers serve as the frontline in preventing and detecting these breaches. Tools like web searches and similarity detection software assist in making this judgment.
Often, identifying a suspected academic integrity breach is a gut feeling about a submission or due to indicators from various tools. This may be where the assessment does not meet the requirements.
| Conduct Type | Indicators | Recommended action |
|---|---|---|
| Plagiarism |
|
|
| Collusion (or illegitimate cooperation) |
|
|
| Contract cheating |
|
|
| Unapproved or misuse of digital technologies (such as AI) |
|
|
| Fabricating information, data or sources |
|
|
| Use of file-sharing platforms |
|
|
| Exam cheating |
|
|
If you suspect a student has engaged in a breach, report it for further action. Teaching staff should consult with their unit coordinator to determine how breaches should be managed within the unit. Minor plagiarism and recycling breaches can be resolved locally by unit coordinators and must be recorded via the formal reporting form, while all other cases must be reported for further investigation by the relevant teams.
It is important to gather all necessary evidence to support the suspicion of a breach. This typically includes the Turnitin Similarity report or other forms of similarity detection, as well as any additional supporting information, such as correspondence with the student. It’s important to provide a detailed analysis of the similarities when outlining the reason for referral. Since teaching staff are most familiar with the assessment requirements and unit content, they are best equipped to collect reliable evidence for academic integrity investigations. Generally, the more varied the evidence, the stronger the case will be.
It is not the role of the teaching staff member to determine the severity of a suspected breach. Each Faculty has an Educational Integrity Coordinator and nominated academics who are responsible for investigating suspected breaches. The Office of Educational Integrity will conduct preliminary investigations into suspected contract cheating or misuse of AI. The role of the person making the report is to provide as much information about their suspicions to enable the decision maker to assess the report.
See report an incident for more information.
If you suspect a student may have engaged in contract cheating or unapproved use of AI, you are encouraged to seek advice from their faculty’s educational integrity team and report suspected cases for further investigation. Reporting not only helps to address any integrity breach but also enables the University to understand the scale of the problem. If you become aware of organisations that potentially provide cheating services, you can report it by emailing [email protected].
The Office of Educational Integrity has a specialist investigative team who conduct a preliminary investigation using various tools, such as Turnitin’s Authorship tool to view all written submissions, assessing student logins amongst other things. The Authorship tool assesses all submissions made by the student to Turnitin, assessing the readability, metadata. The Office of Educational Integrity will also use Turnitin’s AI detection software to evaluate suspected misuse of AI.
As a unit coordinator, if you suspect that a student has submitted work that is not their own, you may invite the student to a meeting to discuss the submitted work. It’s important to note that at this stage, this is not yet an allegation; rather, the student is provided with an outline of the concerns regarding their work.
During the meeting, the unit coordinator should:
Note:
Some students may admit to wrongdoing at this point. In such cases, the unit coordinator may ask who completed the submission, the contact details of this person, and whether payment was involved.
After the meeting, the unit coordinator should send a brief account of the discussion and its outcome to the student. If the coordinator remains unsatisfied with the student’s explanation or suspects the work is not their own, the case can be referred for further investigation. This referral should include all relevant documentation and supporting evidence (e.g., emails sent to the student).
If the student declines the invitation to meet, the submission should still be referred, along with any available supporting documentation or evidence. Supporting evidence may include the examiner's general assessment of the student's participation and prior engagement with unit content in relation to the submission in question.
For advice and support, contact your faculty's educational integrity team.
Office of Educational Integrity
+61 2 8627 6512
[email protected]
For advice and support, contact your faculty's educational integrity team.
Office of Educational Integrity
+61 2 8627 6512
[email protected]