1. Afroz, S., Islam, A. C., Stolerman, A., Greenstadt, R., & McCoy, D. (2014). Doppelgänger finder: Taking stylometry to the underground. In: 2014 I.E. Symposium on Security and Privacy (pp. 212-226). IEEE. doi:
10.1109/SP.2014.21
2. Bailey, J., Tomar, D., & Chu J. (2012). Paying for plagiarism.
http://go.turnitin.com/webcast/paying-for-plagiarism
Accessed 24 August 2016.
3. Budd, T., Sharp, C., & Mayhew, P. (2005). Offending in England and Wales: first results from the 2003 Crime and Justice Survey. London: Home Office.
4. Clare, J. (2016). Rational, motivated students and suitable units: Detecting suspected ghost-writing of unsupervised written assignments. Paper presented at the 29th Australian and New Zealand Society of Criminology conference, Hobart, Australia.
5. Clarke, R., & Lancaster, T. (2006). Eliminating the successor to plagiarism: Identifying the usage of contract cheating sites. Proceedings of the Second International Plagiarism Conference. Gateshead: United Kingdom.