
Simon
Person information
- affiliation: University of Newcastle, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]Lauri Malmi, Judy Sheard, Päivi Kinnunen, Simon, Jane E. Sinclair:
Computing education theories: what are they and how are they used? Inroads 11(1): 54-64 (2020) - [c78]Oscar Karnalim
, Simon:
Syntax Trees and Information Retrieval to Improve Code Similarity Detection. ACE 2020: 48-55 - [c77]Simon:
Twenty-Two Years of ACE. ACE 2020: 203-210 - [c76]Lauri Malmi, Judy Sheard, Päivi Kinnunen, Simon, Jane E. Sinclair:
Theories and Models of Emotions, Attitudes, and Self-Efficacy in the Context of Programming Education. ICER 2020: 36-47 - [c75]Zacharoula K. Papamitsiou, Michail N. Giannakos, Simon, Andrew Luxton-Reilly:
Computing Education Research Landscape through an Analysis of Keywords. ICER 2020: 102-112 - [c74]Judy Sheard, Simon:
ITiCSE, Australia, and New Zealand: What's the Story? ITiCSE 2020: 1-2 - [c73]Simon, Oscar Karnalim, Judy Sheard, Ilir Dema, Amey Karkare, Juho Leinonen, Michael Liut, Renée McCauley:
Choosing Code Segments to Exclude from Code Similarity Detection. ITiCSE (Working Group Reports) 2020: 1-19 - [c72]Simon, Judy Sheard:
Twenty-Four Years of ITiCSE Papers. ITiCSE 2020: 5-11 - [c71]Simon:
Twenty-Four Years of ITiCSE Authors. ITiCSE 2020: 205-211 - [c70]Simon, Oscar Karnalim
, Judy Sheard, Ilir Dema, Amey Karkare, Juho Leinonen
, Michael Liut, Renée McCauley:
Selection of Code Segments for Exclusion from Code Similarity Detection. ITiCSE 2020: 500-501 - [c69]Oscar Karnalim
, Simon, William J. Chivers:
Preprocessing for Source Code Similarity Detection in Introductory Programming. Koli Calling 2020: 3:1-3:10 - [c68]Oscar Karnalim
, Simon:
Disguising Code to Help Students Understand Code Similarity. Koli Calling 2020: 13:1-13:5
2010 – 2019
- 2019
- [c67]Simon, Trina S. Myers, Dianna L. Hardy, Raina Mason
:
Variations on a Theme: Academic Integrity and Program Code. ACE 2019: 56-63 - [c66]Kate Sanders, Judy Sheard, Brett A. Becker, Anna Eckerdal, Sally Hamouda, Simon:
Inferential Statistics in Computing Education Research: A Methodological Review. ICER 2019: 177-185 - [c65]Lauri Malmi, Judy Sheard, Päivi Kinnunen, Simon, Jane E. Sinclair:
Computing Education Theories: What Are They and How Are They Used? ICER 2019: 187-197 - [c64]Simon, Brett A. Becker
, Sally Hamouda, Robert McCartney, Kate Sanders, Judy Sheard:
Visual Portrayals of Data and Results at ITiCSE. ITiCSE 2019: 51-57 - [c63]Simon, Andrew Luxton-Reilly, Vangel V. Ajanovski
, Eric Fouh, Christabel Gonsalvez, Juho Leinonen
, Jack Parkinson
, Matthew Poole, Neena Thota:
Pass Rates in Introductory Programming and in other STEM Disciplines. ITiCSE (Working Group Reports) 2019: 53-71 - [c62]Simon, Andrew Luxton-Reilly
, Vangel V. Ajanovski
, Eric Fouh, Chris Gonsalvez, Juho Leinonen
, Jack Parkinson
, Matthew Poole
, Neena Thota:
Pass Rates in STEM Disciplines Including Computing. ITiCSE 2019: 267-268 - [c61]Claudia Szabo, Judy Sheard, Andrew Luxton-Reilly, Simon, Brett A. Becker, Linda M. Ott:
Fifteen Years of Introductory Programming in Schools: A Global Overview of K-12 Initiatives. Koli Calling 2019: 8:1-8:9 - [c60]Oscar Karnalim
, Simon, William J. Chivers:
Similarity Detection Techniques for Academic Source Code Plagiarism and Collusion: A Review. TALE 2019: 1-8 - [e4]Simon, Andrew Luxton-Reilly:
Proceedings of the Twenty-First Australasian Computing Education Conference, Sydney, NSW, Australia, January 29-31, 2019. ACM 2019, ISBN 978-1-4503-6622-9 [contents] - 2018
- [j10]Matti Tedre
, Simon, Lauri Malmi
:
Changing aims of computing education: a historical survey. Comput. Sci. Educ. 28(2): 158-186 (2018) - [c59]Mihaela Sabin, Paul Snow, Simon, John Impagliazzo, Alison Clear, Yan Timanovsky:
Representative names of computing degree programs worldwide. ACE 2018: 105-112 - [c58]Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane E. Sinclair:
Informing students about academic integrity in programming. ACE 2018: 113-122 - [c57]Andrew Luxton-Reilly
, Simon, Ibrahim Albluwi, Brett A. Becker
, Michail N. Giannakos, Amruth N. Kumar, Linda M. Ott, James Paterson, Michael James Scott, Judy Sheard, Claudia Szabo:
Introductory programming: a systematic literature review. ITiCSE (Companion) 2018: 55-106 - [c56]Andrew Luxton-Reilly
, Simon, Ibrahim Albluwi, Brett A. Becker
, Michail N. Giannakos, Amruth N. Kumar
, Linda M. Ott, James Paterson, Michael James Scott, Judy Sheard, Claudia Szabo:
A review of introductory programming research 2003-2017. ITiCSE 2018: 342-343 - [c55]Kate Sanders, Sally Hamouda, Brett A. Becker
, Anna Eckerdal, Robert McCartney, Judy Sheard, Simon:
How statistics are used in computing education research. ITiCSE 2018: 381 - [c54]Simon, Raina Mason
, Tom Crick, James H. Davenport
, Ellen Murphy:
Language Choice in Introductory Programming Courses at Australasian and UK Universities. SIGCSE 2018: 852-857 - [e3]Raina Mason, Simon:
Proceedings of the 20th Australasian Computing Education Conference, Brisbane, QLD, Australia, January 30 - February 02, 2018. ACM 2018, ISBN 978-1-4503-6340-2 [contents] - 2017
- [c53]Simon:
Designing Programming Assignments to Reduce the Likelihood of Cheating. ACE 2017: 42-47 - [c52]Raina Mason, Simon:
Introductory Programming Courses in Australasia in 2016. ACE 2017: 81-89 - [c51]Andrew Luxton-Reilly
, Brett A. Becker
, Yingjun Cao, Roger McDermott, Claudio Mirolo, Andreas Mühling
, Andrew Petersen, Kate Sanders, Simon, Jacqueline L. Whalley:
Developing Assessments to Determine Mastery of Programming Fundamentals. ITiCSE-WGR 2017: 47-69 - [c50]Judy Sheard, Simon, Matthew Butler
, Katrina Falkner, Michael Morgan, Amali Weerasinghe:
Strategies for Maintaining Academic Integrity in First-Year Computing Courses. ITiCSE 2017: 244-249 - [c49]Andrew Luxton-Reilly, Brett A. Becker, Yingjun Cao, Roger McDermott, Claudio Mirolo, Andreas Mühling, Andrew Petersen, Kate Sanders, Simon, Jacqueline L. Whalley:
Developing Assessments to Determine Mastery of Programming Fundamentals. ITiCSE 2017: 388 - 2016
- [c48]Simon, Judy Sheard:
Academic integrity and computing assessments. ACSW 2016: 3 - [c47]Raina Mason
, Simon, Graham Cooper, Barry Wilks:
Flipping the Assessment of Cognitive Load: Why and How. ICER 2016: 43-52 - [c46]Simon, Judy Sheard, Daryl J. D'Souza, Peter Klemperer, Leo Porter, Juha Sorva, Martijn Stegeman, Daniel Zingaro:
Benchmarking Introductory Programming Exams: Some Preliminary Results. ICER 2016: 103-111 - [c45]Simon:
A Picture of the Growing ICER Community. ICER 2016: 153-159 - [c44]Simon, Judy Sheard, Michael Morgan, Andrew Petersen
, Amber Settle, Jane E. Sinclair, Gerry W. Cross, Charles Riedesel:
Negotiating the Maze of Academic Integrity in Computing Education. ITiCSE-WGR 2016: 57-80 - [c43]Simon, Judy Sheard, Daryl J. D'Souza, Peter Klemperer, Leo Porter, Juha Sorva, Martijn Stegeman, Daniel Zingaro:
Benchmarking Introductory Programming Exams: How and Why. ITiCSE 2016: 154-159 - [c42]Cara Tang, Elizabeth K. Hawthorne, Cindy S. Tucker, Ernesto Cuadros-Vargas, Diana Cukierman, Simon, Ming Zhang:
Global Perspectives on the Role of Two-Year/Technical/Junior Colleges in Computing Education. ITiCSE 2016: 204-205 - [c41]Simon:
The koli calling community. Koli Calling 2016: 101-109 - 2015
- [c40]Raina Mason, Graham Cooper, Simon, Barry Wilks:
Using Cognitive Load Theory to select an Environment for Teaching Mobile Apps Development. ACE 2015: 47-56 - [c39]Michael Morgan, Judy Sheard, Matthew Butler, Katrina Falkner, Simon, Amali Weerasinghe:
Teaching in First-Year ICT Education in Australia: Research and Practice. ACE 2015: 81-90 - [c38]Judy Sheard, Michael Morgan, Matthew Butler, Katrina Falkner, Simon, Amali Weerasinghe:
Assessment in First-Year ICT Education in Australia: Research and Practice. ACE 2015: 91-99 - [c37]Matthew Butler, Judy Sheard, Michael Morgan, Katrina Falkner, Simon, Amali Weerasinghe:
Understanding the Teaching Context of First Year ICT Education in Australia. ACE 2015: 101-109 - [c36]Simon, Judy Sheard, Daryl J. D'Souza, Mike Lopez, Andrew Luxton-Reilly, Iwan Handoyo Putro, Phil Robbins, Donna Teague, Jacqueline L. Whalley:
How (not) to write an introductory programming exam. ACE 2015: 137-146 - [c35]Simon
, Alison Clear, Janet Carter, Gerry W. Cross, Atanas Radenski, Liviana Tudor, Eno Tõnisson
:
What's in a Name?: International Interpretations of Computing Education Terminology. ITiCSE-WGR 2015: 173-186 - [c34]Simon
, Judy Sheard:
Academic Integrity and Professional Integrity in Computing Education. ITiCSE 2015: 237-241 - [c33]Matthew Butler
, Michael Morgan, Judy Sheard, Simon, Katrina E. Falkner
, Amali Weerasinghe:
Initiatives to Increase Engagement in First-Year ICT. ITiCSE 2015: 308-313 - [c32]Alison Clear, Janet Carter, Amruth Kumar
, Cary Laxer, Simon
, Ernesto Cuadros-Vargas:
Global Perspectives on Assessing Educational Performance and Quality. ITiCSE 2015: 326-327 - [c31]Simon, Judy Sheard:
In their own words: students and academics write about academic integrity. Koli Calling 2015: 97-106 - 2014
- [c30]Simon, David Cornforth:
Teaching Mobile Apps for Windows Devices Using TouchDevelop. ACE 2014: 75-82 - [c29]Judy Sheard, Simon, Julian R. Dermoudy, Daryl J. D'Souza, Minjie Hu, Dale Parsons:
Benchmarking a set of exam questions for introductory programming. ACE 2014: 113-121 - [c28]Teresa Busjahn, Carsten Schulte, Bonita Sharif, Simon, Andrew Begel, Michael Hansen, Roman Bednarik
, Paul Orlov
, Petri Ihantola
, Galina Shchekotova, Maria Antropova:
Eye tracking in computing education. ICER 2014: 3-10 - [c27]Lauri Malmi, Judy Sheard, Simon
, Roman Bednarik
, Juha Helminen, Päivi Kinnunen, Ari Korhonen
, Niko Myller, Juha Sorva, Ahmad Taherkhani:
Theoretical underpinnings of computing education research: what is the evidence? ICER 2014: 27-34 - [c26]Simon
, Beth Cook, Judy Sheard, Angela Carbone, Chris W. Johnson:
Academic integrity perceptions regarding computing assessments and essays. ICER 2014: 107-114 - [c25]Simon, Beth Cook, Judy Sheard, Angela Carbone, Chris W. Johnson:
Student perceptions of the acceptability of various code-writing practices. ITiCSE 2014: 105-110 - [c24]Simon
, Susan Snowdon:
Multiple-choice vs free-text code-explaining examination questions. Koli Calling 2014: 91-97 - [e2]Simon, Päivi Kinnunen:
Proceedings of the 14th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 20-23, 2014. ACM 2014, ISBN 978-1-4503-3065-7 [contents] - 2013
- [j9]Richard Gluga, Judy Kay, Raymond Lister, Simon
, Sabina Kleitman
:
Mastering cognitive development theory in computer science education. Comput. Sci. Educ. 23(1): 24-57 (2013) - [j8]Timothy M. Lynar
, Simon
, Ric D. Herbert, William J. Chivers:
Reducing energy consumption in distributed computing through economic resource allocation. Int. J. Grid Util. Comput. 4(4): 231-241 (2013) - [j7]Simon:
The Australasian chapter of SIGCSE. ACM SIGCSE Bull. 45(4): 6 (2013) - [c23]Angela Carbone, Jason Ceddia, Simon, Daryl J. D'Souza, Raina Mason:
Student concerns in introductory programming courses. ACE 2013: 41-50 - [c22]Richard Gluga, Judy Kay, Raymond Lister, Simon, Michael Charleston, James Harland, Donna Teague:
A conceptual model for reflecting on expected learning vs. demonstrated student performance. ACE 2013: 77-86 - [c21]Judy Sheard, Simon, Angela Carbone, Donald Chinn, Tony Clear, Malcolm Corney, Daryl J. D'Souza, Joel Fenwick, James Harland, Mikko-Jussi Laakso, Donna Teague:
How difficult are exams?: a framework for assessing the complexity of introductory programming exams. ACE 2013: 145-154 - [c20]Judy Sheard, Simon
, Angela Carbone, Daryl J. D'Souza, Margaret Hamilton:
Assessment of programming: pedagogical foundations of exams. ITiCSE 2013: 141-146 - [c19]Simon
, Beth Cook, Judy Sheard, Angela Carbone, Chris W. Johnson:
Academic integrity: differences between computing assessments and essays. Koli Calling 2013: 23-32 - [c18]Simon
:
Soloway's Rainfall Problem Has Become Harder. LaTiCE 2013: 130-135 - [e1]Mikko-Jussi Laakso, Simon:
13th Koli Calling International Conference on Computing Education Research, Koli Calling '13, Koli, Finland, November 14-17, 2013. ACM 2013, ISBN 978-1-4503-2482-3 [contents] - 2012
- [c17]Simon, Daryl J. D'Souza, Judy Sheard, James Harland, Angela Carbone, Mikko-Jussi Laakso:
Can computing academics assess the difficulty of programming examination questions? Koli Calling 2012: 160-163 - 2011
- [j6]Timothy M. Lynar
, Ric D. Herbert, Simon Chivers
, William J. Chivers:
Resource allocation to conserve energy in distributed computing. Int. J. Grid Util. Comput. 2(1): 1-10 (2011) - [c16]Judy Sheard, Simon, Angela Carbone, Donald Chinn, Mikko-Jussi Laakso, Tony Clear
, Michael de Raadt, Daryl J. D'Souza, James Harland, Raymond Lister, Anne Philpott, Geoff Warburton:
Exploring programming assessment instruments: a classification scheme for examination questions. ICER 2011: 33-38 - [c15]Simon
, Susan Snowdon:
Explaining program code: giving students the answer helps - but only just. ICER 2011: 93-100 - [c14]Simon
:
Assignment and sequence: why some students can't recognise a simple swap. Koli Calling 2011: 10-15 - 2010
- [j5]Timothy M. Lynar, Simon
, Ric D. Herbert, William J. Chivers:
Clustering Obsolete Computers to Reduce E-Waste. Int. J. Inf. Syst. Soc. Chang. 1(1): 1-10 (2010) - [c13]Lauri Malmi, Judy Sheard, Simon
, Roman Bednarik
, Juha Helminen, Ari Korhonen
, Niko Myller, Juha Sorva, Ahmad Taherkhani:
Characterizing research in computing education: a preliminary analysis of the literature. ICER 2010: 3-12 - [c12]Timothy M. Lynar
, Ric D. Herbert, Simon
, William J. Chivers:
Reducing grid energy consumption through choice of resource allocation method. IPDPS Workshops 2010: 1-7
2000 – 2009
- 2009
- [j4]Simon:
Informatics in Education and Koli Calling: a Comparative Analysis. Informatics Educ. 8(1): 101-114 (2009) - [j3]Raymond Lister, Tony Clear, Simon
, Dennis J. Bouvier, Paul Carter, Anna Eckerdal, Jana Jacková
, Mike Lopez, Robert McCartney, Phil Robbins, Otto Seppälä, Errol Thompson:
Naturally occurring data as research instrument: analyzing examination responses to study the novice programmer. ACM SIGCSE Bull. 41(4): 156-173 (2009) - [c11]Timothy M. Lynar, Ric D. Herbert, William J. Chivers, Simon:
A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers. AusGrid 2009: 69-75 - [c10]Timothy M. Lynar, Ric D. Herbert, Simon, William J. Chivers:
Impact of Node ranking on Outcomes of grid Resource allocation. GCA 2009: 17-22 - [c9]Judy Sheard, Simon
, Margaret Hamilton, Jan Lönnberg:
Analysis of research into the teaching and learning of programming. ICER 2009: 93-104 - 2008
- [c8]Simon
, Angela Carbone, Michael de Raadt, Raymond Lister, Margaret Hamilton, Judy Sheard:
Classifying computing education papers: process and results. ICER 2008: 161-172 - 2007
- [j2]Simon
:
A Classification of Recent Australasian Computing Education Publications. Comput. Sci. Educ. 17(3): 155-169 (2007) - [j1]Simon, Michael de Raadt, Anne Venables:
Variation in Approaches to Lab Practical Classes among Computing Academics. Informatics Educ. 6(1): 215-230 (2007) - 2006
- [c7]Simon, Michael de Raadt, Ken Sutton, Anne Venables:
The distinctive role of lab practical classes in computing education. Koli Calling 2006: 54-60 - 2005
- [c6]Simon:
Electronic Watermarks to Help Authenticate Soft-copy Exams. ACE 2005: 7-13 - 2004
- [c5]Simon:
The Cryptic Crossword Puzzle as a Useful Analogue in Teaching Programming. ACE 2004: 299-303 - 2003
- [c4]Simon:
An IT degree combining the expertise of University and TAFE. ACE 2003: 35-40
1990 – 1999
- 1998
- [c3]Peter Summons, Simon:
Authentication strategies for online assessments. ACSE 1998: 101-105 - 1997
- [c2]Michael Houle, Simon:
Social and ethical education in computing using virtual environments. ACSE 1997: 24-31
1970 – 1979
- 1979
- [c1]J. A. Campbell, Simon:
Symbolic computing with compression of data structures. EUROSAM 1979: 503-513
Coauthor Index
aka: Judy Sheard

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-22 23:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint