Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Plagiarism in Programming Assessments: A Systematic Review

Published: 09 December 2019 Publication History

Abstract

This article is a systematic review of work in the computing education literature on plagiarism. The goal of the review is to summarize the main results found in the literature and highlight areas that need further work. Despite the the large body of work on plagiarism, no systematic reviews have been published so far.
The reviewed papers were categorized and analyzed using a theoretical framework from the field of Fraud Deterrence named the Fraud Triangle. According to this framework, fraudulent behavior occurs when the person is under pressure, perceives the availability of an opportunity to commit fraud, and rationalizes the fraudulent behavior in a way that makes it seem not unethical to him or her.
The review found the largest amount of the reviewed papers to discuss ways for reducing the opportunity to plagiarize, as well as tools for detecting plagiarism. However, there is a clear lack of empirical work evaluating the deterrent efficacy of these strategies and tools. The reviewed papers also included mentions of a wide range of rationalizations used by computing students when justifying plagiarism, the most important of which are rationalizations that stem from confusion about what constitutes plagiarism. Finally, work on the relationship between pressure in computing courses and plagiarism was found to be very scarce and incommensurate with the significant contribution of this factor to plagiarism.

References

[1]
James H. Adair and James L. Linderman. 1985. Computer ethics and academic honesty: Developing a survey instrument. In Proceedings of the 16th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’85). ACM, New York, NY, 93--98.
[2]
Alex Aiken. [n.d.]. MOSS: A System for Detecting Software Similarity. Retrieved on 04 December, 2019 from https://theory.stanford.edu/∼aiken/moss/.
[3]
Z. A. Al-Khanjari, J. A. Fiaidhi, R. A. Al-Hinai, and N. S. Kutti. 2010. PlagDetect: A Java programming plagiarism detection tool. ACM Inroads 1, 4 (Dec. 2010), 66--71.
[4]
Lubna S. Alam. 2004. Is plagiarism more prevalent in some forms of assessment than others. In Proceedings of the 21st Australian Society for Computers in Tertiary Education Conference (ASCILITE’04). 48--57.
[5]
Ibrahim Albluwi. 2018. A closer look at the differences between graders in introductory computer science exams. IEEE Trans. Educ. 61, 3 (2018), 253--260.
[6]
W. Steve Albrecht, Keith R. Howe, and Marshall B. Romney. 1984. Deterring Fraud: The Internal Auditor’s Perspective. Institute of Internal Auditors Research Foundation, Altamonte Springs, FL.
[7]
Joe Michael Allen, Frank Vahid, Kelly Downey, and Alex Daniel Edgcomb. 2018. Weekly programs in a CS1 class: Experiences with auto-graded many-small programs (MSP). In Proceedings of the ASEE Conference 8 Exposition.
[8]
Carole Ames. 1992. Classrooms: Goals, structures, and student motivation. J. Educ. Psychol. 84, 3 (1992), 261.
[9]
Eric M. Anderman and Fred Danner. 2008. Achievement goals and academic cheating. Rev. Int. de Psychol. Soc. 21, 1 (2008), 155--180.
[10]
Albert Bandura. 2002. Selective moral disengagement in the exercise of moral agency. Journal of Moral Education 31, 2 (June 2002), 101--119.
[11]
D’Arcy Becker, Janice Connolly, Paula Lentz, and Joline Morrison. 2006. Using the business fraud triangle to predict academic dishonesty among business students. Academy of Educational Leadership Journal 10, 1 (2006), 37.
[12]
K. Becker. 2006. How much choice is too much?. In Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education (ITiCSE-WGR’06). ACM, New York, NY, 78--82.
[13]
Jess Bidgood and Jeremy B. Merrill. 2017. As computer coding classes swell, so does cheating. https://www.nytimes.com/2017/05/29/us/computer-science-cheating.html.
[14]
Lidija Bilic-Zulle, Josip Azman, Vedran Frkovic, and Mladen Petrovecki. 2008. Is there an effective approach to deterring students from plagiarizing? Sci. Eng. Ethics 14, 1 (2008), 139--147.
[15]
Elizabeth Boese. 2016. Just-in-time learning for the just Google it era. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE’16). ACM, New York, NY, 341--345.
[16]
K. W. Bowyer and L. O. Hall. 1999. Experience using to detect cheating on programming assignments. In Proceedings of the 29th Frontiers in Education Conference. Designing the Future of Science and Engineering Education. IEEE Cat. No.99 CH37011, Vol. 3. 13B3/18--13B3/22 vol.3.
[17]
Steven Bradley. 2016. Managing plagiarism in programming assignments with blended assessment and randomisation. In Proceedings of the 16th Koli Calling International Conference on Computing Education Research (Koli Calling’16). ACM, New York, NY, 21--30.
[18]
Bear F. Braumoeller and Brian J. Gaines. 2001. Actions do speak louder than words: Deterring plagiarism with the use of plagiarism-detection software. PS: Polit. Sci. Polit. 34, 4 (2001), 835--839.
[19]
Stina Bridgeman, Michael T. Goodrich, Stephen G. Kobourov, and Roberto Tamassia. 2000. SAIL: A system for generating, archiving, and retrieving specialized assignments using LATEX. In Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education (SIGCSE’00). ACM, New York, NY, 300--304.
[20]
Debra D. Burke and Kenneth J. Sanney. 2018. Applying the fraud triangle to higher education: Ethical implications. J. Legal Stud. Educ. 35, 1 (2018), 5--43.
[21]
David Burt. 2010. Cheating confusion persists. https://yaledailynews.com/blog/2010/12/01/cheating-confusion-persists.
[22]
Harry Cendrowski and James Martin. 2015. The Fraud Triangle. John Wiley 8 Sons, Ltd, Chapter 5, 41--46.
[23]
Freddie Choo and Kim Tan. 2008. The effect of fraud triangle factors on students? Cheating behaviors. In Advances in Accounting Education. Emerald Group Publishing Limited, 205--220.
[24]
D. Chuda, P. Navrat, B. Kovacova, and P. Humay. 2012. The issue of (software) plagiarism: A student view. IEEE Trans. Educ. 55, 1 (Feb. 2012), 22--28.
[25]
Joshua K. Cieslewicz. 2012. The fraud model in international contexts: A call to include societal-level influences in the model. J. Forens. Investig. Acc. 4, 1 (2012), 214--254.
[26]
Robert Clarke and Thomas Lancaster. 2013. Commercial aspects of contract cheating. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’13). ACM, New York, NY, 219--224.
[27]
O. Clua and M. Feldgen. 2002. How to have the web playing on your side. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 3. S1H--S1H.
[28]
Janet M. Cook. 1987. Defining ethical and unethical student behaviors using departmental regulations and sanctions. ACM SIGCSE Bull. 19, 1 (Feb. 1987), 462--468.
[29]
Arthur Coren. 2011. Turning a blind eye: Faculty who ignore student cheating. J. Acad. Ethics 9, 4 (2011), 291.
[30]
G. Cosma and M. Joy. 2008. Towards a definition of source-code plagiarism. IEEE Trans. Educ. 51, 2 (May 2008), 195--200.
[31]
Georgina Cosma, Mike Joy, Jane Sinclair, Margarita Andreou, Dongyong Zhang, Beverley Cook, and Russell Boyatt. 2017. Perceptual comparison of source-code plagiarism within students from UK, China, and South Cyprus higher education institutions. Trans. Comput. Educ. 17, 2 (May 2017), 8:1--8:16.
[32]
Donald R. Cressey. 1953. Other People’s Money: A Study of the Social Psychology of Embezzlement. Free Press, New York, NY.
[33]
Charlie Daly and Jane Horgan. 2005. Patterns of plagiarism. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’05). ACM, New York, NY, 383--387.
[34]
C. Daly and J. M. Horgan. 2004. An automated learning system for Java programming. IEEE Trans. Educ. 47, 1 (Feb. 2004), 10--17.
[35]
Martin Dick, Judy Sheard, Cathy Bareiss, Janet Carter, Donald Joyce, Trevor Harding, and Cary Laxer. 2002. Addressing student cheating: Definitions and solutions. In Working Group Reports from ITiCSE onInnovation and Technology in Computer Science Education (ITiCSE-WGR’02). ACM, New York, NY, 172--184.
[36]
Martin Dick, Judithe Sheard, and Maurie Hasen. 2008. Prevention is better than cure: Addressing cheating and plagiarism based on the it student perspective. In Student Plagiarism in an Online World: Problems and Solutions. IGI Global, 160--182.
[37]
John L. Donaldson, Ann-Marie Lancaster, and Paula H. Sposato. 1981. A plagiarism detection system. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 21--25.
[38]
Jack Dorminey, A. Scott Fleming, Mary-Jo Kranacher, and Richard A. Riley. 2012. The evolution of fraud theory. Iss. Acc. Educ. 27, 2 (2012), 555--579.
[39]
Daryl D’Souza, Margaret Hamilton, and Michael C. Harris. 2007. Software development marketplaces: Implications for plagiarism. In Proceedings of the 9th Australasian Conference on Computing Education (ACE’07), Vol. 66. Australian Computer Society, Inc., 27--33. http://dl.acm.org/citation.cfm?id=1273672.1273676.
[40]
Elaine S. Elliott and Carol S. Dweck. 1988. Goals: An approach to motivation and achievement. J. Person. Soc. Psychol. 54, 1 (1988), 5.
[41]
Steve Engels, Vivek Lakshmanan, and Michelle Craig. 2007. Plagiarism detection using feature-based neural networks. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’07). ACM, New York, NY, 34--38.
[42]
Joel Fenwick. 2017. Catching a few important fish: Internet mediated plagiarism. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 36--41.
[43]
James B. Fenwick, Jr., Cindy Norris, Frank E. Barry, Josh Rountree, Cole J. Spicer, and Scott D. Cheek. 2009. Another look at the behaviors of novice programmers. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 296--300.
[44]
Ernest Ferguson. 1987. Conference grading of computer programs. In Proceedings of the 18th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’87). ACM, New York, NY, 361--365.
[45]
Sally A. Fincher and Anthony V. Robins. 2019. The Cambridge Handbook of Computing Education Research. Cambridge University Press.
[46]
A. Garcia, S. Rodriguez, F. Rosales, and J. L. Pedraza. 2005. Automatic management of laboratory work in mass computer engineering courses. IEEE Trans. Educ. 48, 1 (Feb. 2005), 89--98.
[47]
Matheus Gaudencio, Ayla Dantas, and Dalton D. S. Guerrero. 2014. Can computers compare student code solutions as well as teachers? In Proceedings of the 45th ACM Technical Symposium on Computer Science Education (SIGCSE’14). ACM, New York, NY, 21--26.
[48]
E. F. Gehringer. 2004. Reuse of homework and test questions: When, why, and how to maintain security? In Proceedings of the 34th Frontiers in Education Conference (FIE’04). S1F/24--S1F/29 Vol. 3.
[49]
J. Paul Gibson. 2009. Software reuse and plagiarism: A code of practice. In Proceedings of the 14th ACM SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’09). ACM, New York, NY, 55--59.
[50]
David Gitchell and Nicholas Tran. 1999. Sim: A utility for detecting similarity in computer programs. In Proceedings of the 30th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’99). ACM, New York, NY, 266--270.
[51]
Neil Granitz and Dana Loewy. 2007. Applying ethical theories: Interpreting and responding to student plagiarism. J. Bus. Ethics 72, 3 (2007), 293--306.
[52]
Tony Greening, Judy Kay, and Bob Kummerfeld. 2004. Integrating ethical content into computing curricula. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 91--99. http://dl.acm.org/citation.cfm?id=979968.979981.
[53]
Sam Grier. 1981. A tool that detects plagiarism in Pascal programs. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 15--20.
[54]
Dirk Grunwald, Elizabeth Boese, Rhonda Hoenigman, Andy Sayler, and Judith Stafford. 2015. Personalized attention @ scale: Talk isn’t cheap, but it’s effective. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (SIGCSE’15). ACM, New York, NY, 610--615.
[55]
Jurriaan Hage, Peter Rademaker, and Nikè van Vugt. 2011. Plagiarism detection for Java: A tool comparison. In Proceedings of the Computer Science Education Research Conference (CSERC’11). Open Universiteit, Heerlen, 33--46. http://dl.acm.org/citation.cfm?id=2043594.2043597.
[56]
Jurriaan Hage, Brian Vermeer, and Gerben Verburg. 2013. Research paper: Plagiarism detection for Haskell with Holmes. In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC’13). Open Universiteit, Heerlen, 2:19--2:30. http://dl.acm.org/citation.cfm?id=2541917.2541919.
[57]
Trevor S. Harding, Matthew J. Mayhew, Cynthia J. Finelli, and Donald D. Carpenter. 2007. The theory of planned behavior as a model of academic dishonesty in engineering and humanities undergraduates. Ethics Behav. 17, 3 (2007), 255--279.
[58]
Nina C. Heckler, Margaret Rice, and C. Hobson Bryan. 2013. Turnitin systems: A deterrent to plagiarism in college classrooms. J. Res. Technol. Educ. 45, 3 (2013), 229--248.
[59]
Arto Hellas, Juho Leinonen, and Petri Ihantola. 2017. Plagiarism in take-home exams: Help-seeking, collaboration, and systematic cheating. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 238--243.
[60]
Daniël Heres and Jurriaan Hage. 2017. A quantitative comparison of program plagiarism detection tools. In Proceedings of the 6th Computer Science Education Research Conference (CSERC’17). ACM, New York, NY, 73--82.
[61]
Richard C. Hollinger and Lonn Lanza-Kaduce. 2009. Academic dishonesty and the perceived effectiveness of countermeasures: An empirical survey of cheating at a major public university. NASPA J. 46, 4 (2009), 587--602.
[62]
C. Jinshong Hwang and Darryl E. Gibson. 1982. Using an effective grading method for preventing plagiarism of programming assignments. In Proceedings of the 13th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’82). ACM, New York, NY, 50--59.
[63]
Eva Jereb, Matjaž Perc, Barbara Lämmlein, Janja Jerebic, Marko Urh, Iztok Podbregar, and Polona Šprajc. 2018. Factors influencing plagiarism in higher education: A comparison of German and Slovene students. PloS One 13, 8 (2018), e0202252.
[64]
Jeong-Hoon Ji, Gyun Woo, and Hwan-Gue Cho. 2007. A source code linearization technique for detecting plagiarized programs. In Proceedings of the 12th SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’07). ACM, New York, NY, 73--77.
[65]
Edward L. Jones. 2001. Plagiarism monitoring and detection—towards an open discussion. In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, USA, 229--236. http://dl.acm.org/citation.cfm?id=374824.374827.
[66]
M. Joy, G. Cosma, J. Y. Yau, and J. Sinclair. 2011. Source code plagiarism—A student perspective. IEEE Trans. Educ. 54, 1 (Feb. 2011), 125--132.
[67]
M. Joy and M. Luck. 1999. Plagiarism in programming assignments. IEEE Trans. Educ. 42, 2 (May 1999), 129--133.
[68]
Donald Joyce. 2007. Academic integrity and plagiarism: Australasian perspectives. Comput. Sci. Educ. 17, 3 (Sept. 2007), 187--200.
[69]
Kylie Jue. 2014. Stanford CS Department battles honor code violations. https://www.stanforddaily.com/2014/06/03/stanford-cs-department-battles-honor-code-violations.
[70]
Dulal C. Kar. 2000. Detection of plagiarism in computer programming assignments. J. Comput. Sci. Coll. 15, 3 (Mar. 2000), 266--276. http://dl.acm.org/citation.cfm?id=1852563.1852601.
[71]
Patricia Keith-Spiegel, Barbara G. Tabachnick, Bernard E. Whitley Jr., and Jennifer Washburn. 1998. Why professors ignore cheating: Opinions of a national sample of psychology instructors. Ethics Behav. 8, 3 (1998), 215--227.
[72]
Barbara Kitchenham. 2004. Procedures for Performing Systematic Reviews. Keele University Technical Report TR/SE-0401 (2004).
[73]
Angelo Kyrilov and David C. Noelle. 2015. Binary instant feedback on programming exercises can reduce student engagement and promote cheating. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 122--126.
[74]
Thomas Lancaster and Fintan Culwin. 2004. A comparison of source code plagiarism detection engines. Comput. Sci. Educ. 14, 2 (June 2004), 101--112.
[75]
John Lauerman. 2012. Harvard cheating probe under way for about 125. https://www.bloomberg.com/news/articles/2012-08-30/harvard-plagiarism-probe-under-way-for-about-125-students.
[76]
Thanh Tri Le Nguyen, Angela Carbone, Judy Sheard, and Margot Schuhmacher. 2013. Integrating source code plagiarism into a virtual learning environment: Benefits for students and staff. In Proceedings of the 15th Australasian Computing Education Conference (ACE’13), Vol. 136. Australian Computer Society, Inc., 155--164. http://dl.acm.org/citation.cfm?id=2667199.2667216.
[77]
Ed Lindoo. 2013. In an effort to reduce accidental plagiarism by computer science students. J. Comput. Sci. Coll. 29, 2 (Dec. 2013), 79--84. http://dl.acm.org/citation.cfm?id=2535418.2535429.
[78]
Alberta Lipson and Norma McGavern. 1993. Undergraduate academic dishonesty at MIT. Results of a Study of Attitudes and Behavior of Undergraduates, Faculty, and Graduate Teaching Assistants. Technical report. ED368272. https://eric.ed.gov/?id=ED368272.
[79]
Mark E. Lokanan. 2015. Challenges to the fraud triangle: Questions on its usefulness. In Proceedings of the Accounting Forum, Vol. 39. Taylor 8 Francis, 201--224.
[80]
Krista Longi, Juho Leinonen, Henrik Nygren, Joni Salmi, Arto Klami, and Arto Vihavainen. 2015. Identification of programmers from typing patterns. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 60--67.
[81]
Andrew Luxton-Reilly and Andrew Petersen. 2017. The compound nature of novice programming assessments. In Proceedings of the 19th Australasian Computing Education Conference. ACM, 26--35.
[82]
Andrew Luxton-Reilly, Simon, Ibrahim Albluwi, Brett A. Becker, Michail Giannakos, Amruth N. Kumar, Linda Ott, James Paterson, Michael James Scott, Judy Sheard, and Claudia Szabo. 2018. Introductory programming: A systematic literature review. In Proceedings of the 23rd ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’18 Companion). ACM, New York, NY, 55--106.
[83]
David J. Malan. 2018. Teaching academic honesty in CS50. https://medium.com/@cs50/teaching-academic-honesty-in-cs50-965653520caf#45b0.
[84]
Samuel Mann and Zelda Frew. 2006. Similarity and originality in code: Plagiarism and normal variation in student assignments. In Proceedings of the 8th Australasian Conference on Computing Education (ACE’06), Vol. 52. Australian Computer Society, Inc., 143--150. http://dl.acm.org/citation.cfm?id=1151869.1151888.
[85]
S. Manoharan. 2017. Personalized assessment as a means to mitigate plagiarism. IEEE Trans. Educ. 60, 2 (May 2017), 112--119.
[86]
Leonardo Mariani and Daniela Micucci. 2012. AuDeNTES: Automatic detection of tentative plagiarism according to a reference solution. Trans. Comput. Educ. 12, 1 (Mar. 2012), 2:1--2:26.
[87]
Helen Marsden, Marie Carroll, and James T. Neill. 2005. Who cheats at university? A self-report study of dishonest academic behaviours in a sample of Australian university students. Austr. J. Psychol. 57, 1 (2005), 1--10.
[88]
Raina Mason and Simon. 2017. Introductory programming courses in Australasia in 2016. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 81--89.
[89]
Tony Mason, Ada Gavrilovska, and David A. Joyner. 2019. Collaboration versus cheating: Reducing code plagiarism in an online MS computer science program. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). ACM, New York, NY, 1004--1010.
[90]
Donald L. McCabe. 2005. Cheating among college and university students: A North American perspective. Int. J. Educ. Integ. 1, 1 (2005).
[91]
Donald L. McCabe, Kenneth D. Butterfield, and Linda Klebe Treviño. 2006. Academic dishonesty in graduate business programs: Prevalence, causes, and proposed action. Acad. Manag. Learn. Educ. 5, 3 (2006), 294--305.
[92]
Donald L McCabe, Linda Klebe Treviño, and Kenneth D. Butterfield. 2001. Cheating in academic institutions: A decade of research. Ethics Behav. 11, 3 (2001), 219--232.
[93]
Charlie Meyer, Cinda Heeren, Eric Shaffer, and Jon Tedesco. 2011. CoMoTo: The collaboration modeling toolkit. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 143--147.
[94]
Phatludi Modiba, Vreda Pieterse, and Bertram Haskins. 2016. Evaluating plagiarism detection software for introductory programming assignments. In Proceedings of the Computer Science Education Research Conference (CSERC’16). ACM, New York, NY, 37--46.
[95]
Tamera B. Murdock and Eric M. Anderman. 2006. Motivational perspectives on student cheating: Toward an integrated model of academic dishonesty. Educ. Psychol. 41, 3 (2006), 129--145.
[96]
Hannah Natanson. 2017. More than 60 Fall CS50 enrollees faced academic dishonesty charges. https://www.thecrimson.com/article/2017/5/3/cs50-cheating-cases-2017/.
[97]
Sebastian Niezgoda and Thomas P. Way. 2006. SNITCH: A software tool for detecting cut and paste plagiarism. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’06). ACM, New York, NY, 51--55.
[98]
Clifford Nowell and Doug Laufer. 1997. Undergraduate student cheating in the fields of business and economics. J. Econ. Educ. 28, 1 (1997), 3--12.
[99]
K. J. Ottenstein. 1976. An algorithmic approach to the detection and prevention of plagiarism. SIGCSE Bull. 8, 4 (Dec. 1976), 30--41.
[100]
A. Parker and J. O. Hamblen. 1989. Computer algorithms for plagiarism detection. IEEE Trans. Educ. 32, 2 (May 1989), 94--99.
[101]
Stephanie C. Payne, Satoris S. Youngcourt, and J. Matthew Beaubien. 2007. A meta-analytic examination of the goal orientation nomological net. J. Appl. Psychol. 92, 1 (2007), 128.
[102]
Paul Phillips and Luc Cohen. 2014. Convictions of plagiarism in computer science courses on the rise. http://www.dailyprincetonian.com/article/2014/03/convictions-of-plagiarism-in-computer-science-courses-on-the-rise.
[103]
Jonathan Pierce and Craig Zilles. 2017. Investigating student plagiarism patterns and correlations to grades. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE’17). ACM, New York, NY, 471--476.
[104]
Jonathan Y. H. Poon, Kazunari Sugiyama, Yee Fan Tan, and Min-Yen Kan. 2012. Instructor-centric source code plagiarism detection and plagiarism corpus. In Proceedings of the 17th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’12). ACM, New York, NY, 122--127.
[105]
Asha Prihar and Carly Wanna. 2019. Cheating at Yale: Students get honest about academic dishonesty. https://yaledailynews.com/blog/2019/02/07/cheating-at-yale-students-get-honest-about-academic-dishonesty/.
[106]
Charles P. Riedesel, Alison L. Clear, Gerry W. Cross, Janet M. Hughes, Simon, and Henry M. Walker. 2012. Academic integrity policies in a computing education context. In Proceedings of the Final Reports on Innovation and Technology in Computer Science Education 2012 Working Groups (ITiCSE-WGR’12). ACM, New York, NY, 1--15.
[107]
Charles P. Riedesel, Eric D. Manley, Susan Poser, and Jitender S. Deogun. 2009. A model academic ethics and integrity policy for computer science departments. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 357--361.
[108]
E. Roberts. 2002. Strategies for promoting academic integrity in CS courses. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 2. F3G--F3G.
[109]
Sally S. Robinson and M. L. Soffa. 1980. An instructional aid for student programs. In Proceedings of the 11th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’80). ACM, New York, NY, 118--129.
[110]
F. Rosales, A. Garcia, S. Rodriguez, J. L. Pedraza, R. Mendez, and M. M. Nieto. 2008. Detection of plagiarism in programming assignments. IEEE Trans. Educ. 51, 2 (May 2008), 174--183.
[111]
Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller, and David Notkin. 1980. Cheating policy in a computer science department. SIGCSE Bull. 12, 2 (July 1980), 72--76.
[112]
Judy Sheard, Angela Carbone, and Martin Dick. 2003. Determination of factors which impact on IT students’ propensity to cheat. In Proceedings of the 5th Australasian Conference on Computing Education (ACE’03), Vol. 20. Australian Computer Society, Inc., 119--126. http://dl.acm.org/citation.cfm?id=858403.858418.
[113]
Judy Sheard and Martin Dick. 2003. Influences on cheating practice of graduate students in IT courses: What are the factors? In Proceedings of the 8th Conference on Innovation and Technology in Computer Science Education (ITiCSE’03). ACM, New York, NY, 45--49.
[114]
Judy Sheard and Martin Dick. 2011. Computing student practices of cheating and plagiarism: A decade of change. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 233--237.
[115]
Judy Sheard and Martin Dick. 2012. Directions and dimensions in managing cheating and plagiarism of IT students. In Proceedings of the 14th Australasian Computing Education Conference (ACE’12), Vol. 123. Australian Computer Society, Inc., 177--186. http://dl.acm.org/citation.cfm?id=2483716.2483737.
[116]
Judy Sheard, Martin Dick, Selby Markham, Ian Macdonald, and Meaghan Walsh. 2002. Cheating and plagiarism: Perceptions and practices of first year IT students. In Proceedings of the 7th Conference on Innovation and Technology in Computer Science Education (ITiCSE’02). ACM, New York, NY, 183--187.
[117]
Judy Sheard, Simon, Matthew Butler, Katrina Falkner, Michael Morgan, and Amali Weerasinghe. 2017. Strategies for maintaining academic integrity in first-year computing courses. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 244--249.
[118]
Simon. 2017. Designing programming assignments to reduce the likelihood of cheating. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 42--47.
[119]
Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2013. Academic integrity: Differences between computing assessments and essays. In Proceedings of the 13th Koli Calling International Conference on Computing Education Research (Koli Calling’13). ACM, New York, NY, 23--32.
[120]
Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Academic integrity perceptions regarding computing assessments and essays. In Proceedings of the 10th Conference on International Computing Education Research (ICER’14). ACM, New York, NY, 107--114.
[121]
Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Student perceptions of the acceptability of various code-writing practices. In Proceedings of the Conference on Innovation 8 Technology in Computer Science Education (ITiCSE’14). ACM Press, 105--110.
[122]
Simon and Judy Sheard. 2015. Academic integrity and professional integrity in computing education. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’15). ACM, New York, NY, 237--241.
[123]
Simon and Judy Sheard. 2015. In their own words: Students and academics write about academic integrity. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 97--106.
[124]
Simon and Judy Sheard. 2016. Academic integrity and computing assessments. In Proceedings of the Australasian Computer Science Week Multiconference (ACSW’16). ACM, New York, NY, Article 3, 8 pages.
[125]
Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, and Jane Sinclair. 2018. Informing students about academic integrity in programming. In Proceedings of the 20th Australasian Computing Education Conference (ACE’18). ACM, New York, NY, 113--122.
[126]
Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair, Gerry Cross, and Charles Riedesel. 2016. Negotiating the maze of academic integrity in computing education. In Proceedings of the ITiCSE Working Group Reports (ITiCSE’16). ACM, New York, NY, 57--80.
[127]
Jaime Spacco, Davide Fossati, John Stamper, and Kelly Rivers. 2013. Towards improving programming habits to create better computer science course outcomes. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education. ACM, 243--248.
[128]
Paul Stapleton. 2012. Gauging the effectiveness of anti-plagiarism software: An empirical study of second language graduate writers. J. Engl. Acad. Purp. 11, 2 (2012), 125--133.
[129]
Shauna D. Stephens. 2001. Using metrics to detect plagiarism (student paper). In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, 191--196. http://dl.acm.org/citation.cfm?id=374824.374777.
[130]
Michael Stepp and Beth Simon. 2010. Introductory computing students’ conceptions of illegal student-student collaboration. In Proceedings of the 41st ACM Technical Symposium on Computer Science Education (SIGCSE’10). ACM, New York, NY, 295--299.
[131]
Narjes Tahaei and David C. Noelle. 2018. Automated plagiarism detection for computer programming exercises based on patterns of resubmission. In Proceedings of the ACM Conference on International Computing Education Research (ICER’18). ACM, New York, NY, 178--186.
[132]
Herbert H. Tsang, Alice Schmidt Hanbidge, and Tony Tin. 2018. Experiential learning through inter-university collaboration research project in academic integrity. In Proceedings of the 23rd Western Canadian Conference on Computing Education (WCCCE’18). ACM, New York, NY, 5:1--5:6.
[133]
S. W. Turner and S. Uludag. 2013. Student perceptions of cheating in online and traditional classes. In Proceedings of the IEEE Frontiers in Education Conference (FIE’13). 1131--1137.
[134]
Peter Vamplew and Julian Dermoudy. 2005. An anti-plagiarism editor for software development courses. In Proceedings of the 7th Australasian Conference on Computing Education (ACE’05), Vol.42. Australian Computer Society, Inc., 83--90. http://dl.acm.org/citation.cfm?id=1082424.1082435.
[135]
Kristina L. Verco and Michael J. Wise. 1996. Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems. In Proceedings of the 1st Australasian Conference on Computer Science Education (ACSE’96). ACM, New York, NY, 81--88.
[136]
Dieter Vogts. 2009. Plagiarising of source code by novice programmers a “cry for help”? In Proceedings of the Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT’09). ACM, New York, NY, 141--149.
[137]
Paula Wasley. 2007. 46 Students are disciplined for cheating at Indiana University’s Dental School. https://www.chronicle.com/article/46-Students-Are-Disciplined/122192.
[138]
Michael J. Wise. 1996. YAP3: Improved detection of similarities in computer program and other texts. In Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’96). ACM, New York, NY, 130--134.
[139]
David T. Wolfe and Dana R. Hermanson. 2004. The fraud diamond: Considering the four elements of fraud. CPA J. 74, 12 (2004), 38.
[140]
V. Wright. 2010. Deterrence in Criminal Justice: Evaluating Certainty Vs. Severity of Punishment. Sentencing Project. https://www.sentencingproject.org/wp-content/uploads/2016/01/Deterrence-in-Criminal-Justice.pdf.
[141]
Lisa Yan, Nick McKeown, Mehran Sahami, and Chris Piech. 2018. TMOSS: Using intermediate assignment work to understand excessive collaboration in large classes. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). ACM, New York, NY, 110--115.
[142]
Justin Zobel. 2004. “Uni cheats racket”: A case study in plagiarism investigation. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 357--365. http://dl.acm.org/citation.cfm?id=979968.980016.

Cited By

View all
  • (2024)Style Anomalies Can Suggest Cheating in CS1 ProgramsProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653626(381-387)Online publication date: 3-Jul-2024
  • (2024)Influence of Personality Traits on Plagiarism Through Collusion in Programming AssignmentsProceedings of the 2024 ACM Conference on International Computing Education Research - Volume 110.1145/3632620.3671121(143-153)Online publication date: 12-Aug-2024
  • (2024)Instructor Perceptions of AI Code Generation Tools - A Multi-Institutional Interview StudyProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630880(1223-1229)Online publication date: 7-Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computing Education
ACM Transactions on Computing Education  Volume 20, Issue 1
March 2020
210 pages
EISSN:1946-6226
DOI:10.1145/3363561
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 December 2019
Accepted: 01 October 2019
Revised: 01 October 2019
Received: 01 May 2019
Published in TOCE Volume 20, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Introductory programming
  2. academic integrity
  3. cheating
  4. plagiarism

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)178
  • Downloads (Last 6 weeks)22
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Style Anomalies Can Suggest Cheating in CS1 ProgramsProceedings of the 2024 on Innovation and Technology in Computer Science Education V. 110.1145/3649217.3653626(381-387)Online publication date: 3-Jul-2024
  • (2024)Influence of Personality Traits on Plagiarism Through Collusion in Programming AssignmentsProceedings of the 2024 ACM Conference on International Computing Education Research - Volume 110.1145/3632620.3671121(143-153)Online publication date: 12-Aug-2024
  • (2024)Instructor Perceptions of AI Code Generation Tools - A Multi-Institutional Interview StudyProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630880(1223-1229)Online publication date: 7-Mar-2024
  • (2024)Detecting ChatGPT-Generated Code Submissions in a CS1 Course Using Machine Learning ModelsProceedings of the 55th ACM Technical Symposium on Computer Science Education V. 110.1145/3626252.3630826(526-532)Online publication date: 7-Mar-2024
  • (2024)AssignmentWatch: An Automated Detection and Alert Tool for Reducing Academic Misconduct Associated With File-Sharing WebsitesIEEE Transactions on Learning Technologies10.1109/TLT.2023.323491417(310-318)Online publication date: 1-Jan-2024
  • (2024)A Support Tool for Instructors to Better Understand How Students Work on Assignments in Small Classes2024 12th International Conference on Information and Education Technology (ICIET)10.1109/ICIET60671.2024.10542769(494-500)Online publication date: 18-Mar-2024
  • (2024)Academic dishonesty in university nursing students: A scoping reviewInternational Journal of Nursing Studies10.1016/j.ijnurstu.2024.104752154(104752)Online publication date: Jul-2024
  • (2024)Content Specialists’ Anti-Plagiarism Pedagogical Interventions: A Thematic ReviewJournal of Academic Ethics10.1007/s10805-024-09589-6Online publication date: 28-Dec-2024
  • (2024)A Bibliometric Analysis on Academic IntegrityJournal of Academic Ethics10.1007/s10805-024-09519-622:4(665-687)Online publication date: 4-Mar-2024
  • (2024)Identifying AI Generated Code with Parallel KNN Weight Outlier DetectionAdvanced Technologies and the University of the Future10.1007/978-3-031-71530-3_29(459-470)Online publication date: 17-Dec-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media