Skip to main content

Advertisement

Log in

An Analysis of Student Privacy Rights in the Use of Plagiarism Detection Systems

  • Original Paper
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students’ rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect student privacy rights when implementing such systems. Student work is personal information, not the property of the educator or institution. The student has the right to be fully informed about how plagiarism detection works, and the fact that their work will be permanently archived as a result. Furthermore, plagiarism detection should not be used if the permanent archiving of a student’s work may expose him or her to future harm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. Andrea Foster presents a broad overview of the controversies surrounding student rights. Cynthia Townley and Mitch Parsell comment on privacy only in passing, as one motivation for their proposed remedies for student plagiarism.

  2. I use “archive” to mean a collection of documents that is systematic, centrally administered, and permanent. The copies of student work that might be inadvertently left behind on lab computers are not “archives,” but the electronic submission features of courseware sites (like BlackBoard) are.

  3. Claim rights are those rights that require someone else to act on our behalf. For example, one cannot exercise the right to a free primary education on one’s own. Everyone else in society has to contribute some money in order for this to happen. This is contrasted with liberties, which are rights that one has as long as others do not interfere. Religious freedom is one example of a liberty.

  4. Neither the authorship nor the date of this document are clear. Because it was posted on TurnItIn.com in 2008, authorship is attributed here to iParadigms LLC, the parent company of TurnItIn.com. The most likely date for the document is probably 2002 or 2003, since it talks about the Owasso decision as being “recent.”

  5. This document is no longer available from TurnItIn.com. Because the field of plagiarism deterrence is changing rapidly, many of the documents cited as evidence in this article have evolved over time. I use “as accessed on” in the bibliography entry to note the cases where I am referring to an older version of the document.

  6. The reader should understand that the issue is intentionally simplified here. A detailed legal understanding of the principles involved is not necessary for this discussion, as long as the reader is aware that “personal” information receives special privacy protections under US law.

  7. For example, Foster (2002) reports that UC San Diego required professors to inform students, though they did not have a uniform policy for what to do if students refused to comply. Townley and Parsell (2004) feel that it is not possible to get informed consent in this situation because of the unequal power structure in the student–teacher relationship. The Library at UMass Amherst recommends informing students through the syllabus, and provides standardized language for this purpose.

  8. Readers familiar with US contract law may feel that “detrimental reliance” is out of place here. The term is adopted from Richard Posner’s book (2007). I believe that he intentionally used this term to suggest that there is an implied contract between author and reader.

  9. Encyclopedia Britannica (2012) defines "duality" as the “principle whereby one true statement can be obtained from another by merely interchanging two words”. The definition has been reworded to emphasize the fact that the dual of a true statement might be false, and vice versa. Duality is most interesting, however, when both the statement and its dual are true.

  10. Posner argues that originality is most likely a bad thing in textbooks, course materials, and lecture slides, unless the professor happens to be the world’s foremost expert in the topic at hand (Posner 2007).

  11. These web sites have evolved over time. Here I am citing material that was available on the “as accessed on” date listed in the references.

  12. TurnItIn.com, in particular, makes a digital “fingerprint” of each document in its database, and uses these fingerprints to detect plagiarism. The idea is that the fingerprint is not enough, by itself, to reconstruct the original document. Document fingerprinting is a widely studied problem in document management. Many different techniques have been proposed for solving the problem. Schleimer et al. (2003), for example, propose storing patterns of letters that occur next to each other in the document, but which seldom appear together in everyday written English.

References

  • Associated Press. (2012) Ex-student convicted of hate crimes in Rutgers webcam spying wants jury’s verdict dismissed. Washington Post. 01 May 2012. http://wapo.st/IHOLpB. Accessed 03 May 2012.

  • Association of American Colleges and Universities. (1998) Statement on liberal learning. http://www.aacu.org/About/statements/liberal_learning.cfm. Accessed 02 May 2012.

  • A.V. et al. v iParadigms LLC, US District Court for the Eastern District of Virginia, Civil Action No. 07-0293. Accessed 03 May 2012.

  • Dedman, B. (2007) Reading Hillary Rodham’s hidden thesis. MSNBC.com. http://www.msnbc.msn.com/id/17388372/. Accessed 02 May 2012.

  • Encyclopedia Britannica Online. (2012) Duality. Accessed 02 May 2012.

  • Foster, A. (2002). Plagiarism-detection tool creates legal quandary. The chronicle of higher education. 17 May 2002, pp A37. http://chronicle.com/free/v48/i36/36a03701.htm. Accessed 02 May 2012.

  • Griswold v. Connecticut. (1965) 381 U.S. 479.

  • iParadigms LLC. (No date) TurnItin legal document. As Accessed 22 April 2008.

  • Miami University Liberal Education Council. (1987). Miami Plan Principles. http://www.miami.muohio.edu/liberal-ed/current-students/miami-plan-principles.html. Accessed 02 May 2012.

  • Murphy, P. (2004). New technology update: Electronic plagiarism detection. http://www.ucop.edu/tltc/news/2004/05/plagiarism.php. Accessed 02 May 2012.

  • OWASSO INDEPENDENT SCHOOL DIST. NO. I—011 V. FALVO. (2002) 534 U.S. 426.

  • Posner, R. A. (2007). The little book of plagiarism. New York: Pantheon Books.

    Google Scholar 

  • Schleimer, S., Wilkerson, D. S., & Aiken, A. (2003). Winnowing: Local algorithms for document fingerprinting. In The proceedings of the special interest group on management of data 2003 conference, pp 76–85.

  • Solove, D. (2008). Understanding privacy. Cambridge: Harvard University Press.

    Google Scholar 

  • Townley, C., & Parsell, M. (2004). Technology and academic virtue: Student plagiarism through the looking glass. Ethics and Information Technology, 6(4), 271–277.

    Article  Google Scholar 

  • United States Code (USC) Title 20, Sections 1090 and 1232g. As accessed on 03 May 2012.

  • University of Alabama in Huntsville Libraries. (2003) TurnItIn FAQ. http://lib.uah.edu/turnitin/faq.htm#confidential. Accessed 02 May 2012.

  • University of Maryland University College Libraries. (No date) Turnitin FAQ. http://www.umuc.edu/library/turnitin.shtml. As accessed 14 April 2008.

  • University of Massachusetts Amherst Libraries. (No date) Plagiarism detection service resources. http://www.library.umass.edu/tools/plagiarism/. As accessed 08 April 2008.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Brinkman.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brinkman, B. An Analysis of Student Privacy Rights in the Use of Plagiarism Detection Systems. Sci Eng Ethics 19, 1255–1266 (2013). https://doi.org/10.1007/s11948-012-9370-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-012-9370-y

Keywords

Navigation