[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1047344.1047473acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Patterns of plagiarism

Published: 23 February 2005 Publication History

Abstract

We used a new technique to analyse how students plagiarise programs in an introductory programming course. This involved placing a watermark on a student's program and monitoring programs for the watermark during assignment submission. We obtained and analysed extensive and objective data on student plagiarising behaviour. In contrast to the standard plagiarism detection approaches based on pair comparison, the watermark based approach allows us to distinguish between the supplier and the recipient of the code. This gives us additional insight into student behaviour. We found that the dishonest students did not perform significantly worse than the honest students in the exams. However, when dishonest students are further classified into supplier and recipient, it emerged that the recipient students performed significantly worse than the suppliers.

References

[1]
Aiken A. Moss: A system for detecting software plagiarism. Berkeley Computer Science Department. http://www.cs.berkeley.edu/~aiken/moss.html
[2]
Aiken A. Personal communication (2004).
[3]
Brassil, J. et al. Electronic Marking and Identification. IEEE Journal on Selected Areas in Communications V13 no 8 (1995), 1495--1504.
[4]
Carter J. Collaboration or Plagiarism: What happens when students work together? Proceedings of ITiCSE (June 1999), 52--55.
[5]
Culwin, F. MacLeod, A. and Lancaster, T. Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes and Tools, South Bank University Technical Report SBU-CISM-01-02. (2001).
[6]
Daly, C. RoboProf and an introductory programming course Proceedings of ITiCSE (June 1999), 155--158.
[7]
Daly, C., Horgan, J. Automatic Plagiarism Detection. Proceedings of the International Conference in Applied Informatics (February 2001), 255--259. http://www.computing.dcu.ie/~cdaly/publications/2001/automaticPlagiarismDetection.pdf
[8]
Daly C., Horgan J. M. An automated learning system for Java programming. IEEE Transactions on Education, (February 2004), 10--17.
[9]
Harris, J. Plagiarism in Computer Science Courses. Proceedings of the Conference on Ethics in the Computer Science Age. (November 1994), 133--135.
[10]
Lancaster T., Culwin F. Towards an Error Free Plagiarism Detection System. Proceedings of ITiCSE. (June 2001), 57--60.
[11]
Plauger, P. J. Fingerprints, Embedded Systems Programming. (June 1994), 84--87.
[12]
Prechelt, L., Malpohl, G., Philippsen M., JPlag: Finding Plagiarisms among a Set of Programs, Technical Report 2000-1, Fakultät für Informatik, Universität Karlsruhe, (2000).
[13]
Reilly, J. Understanding statistics and its application in business, science and engineering. Folens, 1997.
[14]
Roberts, E. Strategies for Promoting Academic Integrity in CS Courses. 32nd ASEE/IEEE Frontiers in Education (November 2002) http://fie.engrng.pitt.edu/fie2002/papers/1125.pdf
[15]
Sheard J. et al. Cheating and Plagiarism: Perceptions and Practices of First Year IT Students. Proceedings of ITiCSE (June 2002), 183--187.
[16]
Wagner, N. Plagiarism by Student Programmers, http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html
[17]
Zobel J. "Uni cheats racket": a case study in plagiarism investigation. Proceedings of the sixth conference on Australian Computing Education. (2004), 357--365.

Cited By

View all
  • (2023)Beyond Question Shuffling: Randomization Techniques in Programming Assessment2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10342976(1-9)Online publication date: 18-Oct-2023
  • (2022)A Qualitative Study of Experienced Course Coordinators’ Perspectives on Assessment in Introductory Programming Courses for Non-CS MajorsACM Transactions on Computing Education10.1145/351713422:4(1-29)Online publication date: 15-Sep-2022
  • (2021)Designing for Student-Directedness: How K–12 Teachers Utilize Peers to Support ProjectsACM Transactions on Computing Education10.1145/347651522:2(1-18)Online publication date: 1-Nov-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science education
February 2005
610 pages
ISBN:1581139977
DOI:10.1145/1047344
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 February 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automatic evaluation
  2. introductory computer programming
  3. plagiarism
  4. watermarks

Qualifiers

  • Article

Conference

SIGCSE05
Sponsor:
SIGCSE05: Technical Symposium on Computer Science Education
February 23 - 27, 2005
Missouri, St. Louis, USA

Acceptance Rates

Overall Acceptance Rate 1,595 of 4,542 submissions, 35%

Upcoming Conference

SIGCSE TS 2025
The 56th ACM Technical Symposium on Computer Science Education
February 26 - March 1, 2025
Pittsburgh , PA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)2
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Beyond Question Shuffling: Randomization Techniques in Programming Assessment2023 IEEE Frontiers in Education Conference (FIE)10.1109/FIE58773.2023.10342976(1-9)Online publication date: 18-Oct-2023
  • (2022)A Qualitative Study of Experienced Course Coordinators’ Perspectives on Assessment in Introductory Programming Courses for Non-CS MajorsACM Transactions on Computing Education10.1145/351713422:4(1-29)Online publication date: 15-Sep-2022
  • (2021)Designing for Student-Directedness: How K–12 Teachers Utilize Peers to Support ProjectsACM Transactions on Computing Education10.1145/347651522:2(1-18)Online publication date: 1-Nov-2021
  • (2019)Plagiarism in Programming AssessmentsACM Transactions on Computing Education10.1145/337115620:1(1-28)Online publication date: 9-Dec-2019
  • (2019)Collaboration Versus CheatingProceedings of the 50th ACM Technical Symposium on Computer Science Education10.1145/3287324.3287443(1004-1010)Online publication date: 22-Feb-2019
  • (2018)Introductory programming: a systematic literature reviewProceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education10.1145/3293881.3295779(55-106)Online publication date: 2-Jul-2018
  • (2015)Assessing Process and ProductInnovation in Teaching and Learning in Information and Computer Sciences10.11120/ital.2007.060401836:4(183-202)Online publication date: 15-Dec-2015
  • (2013)Integrating source code plagiarism into a virtual learning environmentProceedings of the Fifteenth Australasian Computing Education Conference - Volume 13610.5555/2667199.2667216(155-164)Online publication date: 29-Jan-2013
  • (2012)A coding style-based plagiarism detectionProceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning (IMCL)10.1109/IMCL.2012.6396471(180-186)Online publication date: Nov-2012
  • (2010)Work in progress — Programming assignment summary for analysis, qualitative assessment and continuous improvement in CS1 — CS32010 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2010.5673488(T1G-1-T1G-3)Online publication date: Oct-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media