skip to main content
10.1145/1047344.1047473acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
Article

Patterns of plagiarism

Published:23 February 2005Publication History

ABSTRACT

We used a new technique to analyse how students plagiarise programs in an introductory programming course. This involved placing a watermark on a student's program and monitoring programs for the watermark during assignment submission. We obtained and analysed extensive and objective data on student plagiarising behaviour. In contrast to the standard plagiarism detection approaches based on pair comparison, the watermark based approach allows us to distinguish between the supplier and the recipient of the code. This gives us additional insight into student behaviour. We found that the dishonest students did not perform significantly worse than the honest students in the exams. However, when dishonest students are further classified into supplier and recipient, it emerged that the recipient students performed significantly worse than the suppliers.

References

  1. Aiken A. Moss: A system for detecting software plagiarism. Berkeley Computer Science Department. http://www.cs.berkeley.edu/~aiken/moss.htmlGoogle ScholarGoogle Scholar
  2. Aiken A. Personal communication (2004).Google ScholarGoogle Scholar
  3. Brassil, J. et al. Electronic Marking and Identification. IEEE Journal on Selected Areas in Communications V13 no 8 (1995), 1495--1504. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Carter J. Collaboration or Plagiarism: What happens when students work together? Proceedings of ITiCSE (June 1999), 52--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Culwin, F. MacLeod, A. and Lancaster, T. Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes and Tools, South Bank University Technical Report SBU-CISM-01-02. (2001).Google ScholarGoogle Scholar
  6. Daly, C. RoboProf and an introductory programming course Proceedings of ITiCSE (June 1999), 155--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Daly, C., Horgan, J. Automatic Plagiarism Detection. Proceedings of the International Conference in Applied Informatics (February 2001), 255--259. http://www.computing.dcu.ie/~cdaly/publications/2001/automaticPlagiarismDetection.pdfGoogle ScholarGoogle Scholar
  8. Daly C., Horgan J. M. An automated learning system for Java programming. IEEE Transactions on Education, (February 2004), 10--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Harris, J. Plagiarism in Computer Science Courses. Proceedings of the Conference on Ethics in the Computer Science Age. (November 1994), 133--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lancaster T., Culwin F. Towards an Error Free Plagiarism Detection System. Proceedings of ITiCSE. (June 2001), 57--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Plauger, P. J. Fingerprints, Embedded Systems Programming. (June 1994), 84--87.Google ScholarGoogle Scholar
  12. Prechelt, L., Malpohl, G., Philippsen M., JPlag: Finding Plagiarisms among a Set of Programs, Technical Report 2000-1, Fakultät für Informatik, Universität Karlsruhe, (2000).Google ScholarGoogle Scholar
  13. Reilly, J. Understanding statistics and its application in business, science and engineering. Folens, 1997.Google ScholarGoogle Scholar
  14. Roberts, E. Strategies for Promoting Academic Integrity in CS Courses. 32nd ASEE/IEEE Frontiers in Education (November 2002) http://fie.engrng.pitt.edu/fie2002/papers/1125.pdfGoogle ScholarGoogle Scholar
  15. Sheard J. et al. Cheating and Plagiarism: Perceptions and Practices of First Year IT Students. Proceedings of ITiCSE (June 2002), 183--187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wagner, N. Plagiarism by Student Programmers, http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.htmlGoogle ScholarGoogle Scholar
  17. Zobel J. "Uni cheats racket": a case study in plagiarism investigation. Proceedings of the sixth conference on Australian Computing Education. (2004), 357--365. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Patterns of plagiarism

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '05: Proceedings of the 36th SIGCSE technical symposium on Computer science education
      February 2005
      610 pages
      ISBN:1581139977
      DOI:10.1145/1047344

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 February 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader