Abstract
Many Internet services depend on the integrity of their users, even when these users have strong incentives to behave dishonestly. Drawing on experiments in two different online contexts, this study measures the prevalence of cheating and evaluates two different methods for deterring it. Our first experiment investigates cheating behavior in a pair of online exams spanning 632 students in India. Our second experiment examines dishonest behavior on Mechanical Turk through an online task with 2,378 total participants. Using direct measurements that are not dependent on self-reports, we detect significant rates of cheating in both environments. We confirm that honor codes--despite frequent use in massive open online courses (MOOCs)--lead to only a small and insignificant reduction in online cheating behaviors. To overcome these challenges, we propose a new intervention: a stern warning that spells out the potential consequences of cheating. We show that the warning leads to a significant (about twofold) reduction in cheating, consistent across experiments. We also characterize the demographic correlates of cheating on Mechanical Turk. Our findings advance the understanding of cheating in online environments, and suggest that replacing traditional honor codes with warnings could be a simple and effective way to deter cheating in online courses and online labor marketplaces.
- Mauro Andreolini, Alessandro Bulgarelli, Michele Colajanni, and Francesca Mazzoni. 2005. Honeyspam: Honeypots fighting spam at the source. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop. USENIX Association, 77--83. Google ScholarDigital Library
- Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling. 2006. The Nepenthes platform: An efficient approach to collect malware. In Recent Advances in Intrusion Detection. Springer, New York, 165--184. Google ScholarDigital Library
- Adam J. Berinsky, Gregory A. Huber, and Gabriel S. Lenz. 2012. Evaluating online labor markets for experimental research: Amazon.com's Mechanical Turk. Political Anal. 20, 3, 351--368.Google ScholarCross Ref
- Bear F. Braumoeller and Brian J. Gaines. 2001. Actions do speak louder than words: Deterring plagiarism with the use of plagiarism-detection software. Political Sci. Politics 34, 04, 835--839.Google Scholar
- Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Edu. Psychol. Meas. 20, 1, 37--46.Google ScholarCross Ref
- Henry Corrigan-Gibbs, Nakull Gupta, Curtis Northcutt, Edward Cutrell, and William Thies. 2015. Measuring and maximizing the effectiveness of honor codes in online courses. In Learning @ Scale. ACM, 223--228. Google ScholarDigital Library
- 2014. Coursera Student Support Center: What is the Honor Code? Retrieved 20 September 2014 from http://help.coursera.org/customer/portal/articles/1164381-what-is-the-h onor-code-.Google Scholar
- Thomas Crampton. 2007. Scamming the e-mail scammers. New York Times (Jul. 2007).Google Scholar
- Djellel Eddine Difallah, Gianluca Demartini, and Philippe Cudré-Mauroux. 2012. Mechanical cheat: Spamming schemes and adversarial techniques on crowdsourcing platforms. In CrowdSearch. 26--30.Google Scholar
- Jennifer Dirmeyer and Alexander C. Cartwright. 2012. Commentary: Honor codes work where honesty has already taken root. The Chronicle of Higher Education (Sep. 2012).Google Scholar
- Julie S. Downs, Mandy B. Holbrook, Steve Sheng, and Lorrie Faith Cranor. 2010. Are your participants gaming the system?: Screening Mechanical Turk workers. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2399--2402. Google ScholarDigital Library
- edX 2014. edX Honor Code Pledge. Retrieved 20 September 2014 from https://www.edx.org/edx-terms-service.Google Scholar
- Carsten Eickhoff and Arjen P. de Vries. 2013. Increasing cheat robustness of crowdsourcing tasks. Inf. Retrieval 16, 2, 121--137. Google ScholarDigital Library
- Federal Rules of Evidence. 1975. Rule 603. Oath or Affirmation to Testify Truthfully. Public Law 93-595, §1, 88 Stat. 1934. (Jan. 1975).Google Scholar
- Gerlinde Fellner, Rupert Sausgruber, and Christian Traxler. 2013. Testing enforcement strategies in the field: Threat, moral appeal and social information. J. Eur. Economic Assoc. 11, 3, 634--660.Google ScholarCross Ref
- Urs Fischbacher and Franziska Föllmi-Heusi. 2013. Lies in disguise—an experimental study on cheating. J. Eur. Economic Assoc. 11, 3, 525--547.Google ScholarCross Ref
- Ujwal Gadiraju, Ricardo Kawase, Stefan Dietze, and Gianluca Demartini. 2015. Understanding malicious behavior in crowdsourcing platforms: The case of online surveys. In Proceedings ACM Conference on Human Factors in Computing Systems. ACM, 1631--1640. Google ScholarDigital Library
- Francesca Gino, Maurice E. Schweitzer, Nicole L. Mead, and Dan Ariely. 2011. Unable to resist temptation: How self-control depletion promotes unethical behavior. Org. Behav. Hum. Decision Processes 115, 2, 191--203.Google ScholarCross Ref
- Joseph K. Goodman, Cynthia E. Cryder, and Amar Cheema. 2013. Data collection in a flat world: The strengths and weaknesses of Mechanical Turk samples. J. Behav. Decision Making 26, 3, 213--224.Google ScholarCross Ref
- Philip J. Guo and Katharina Reinecke. 2014. Demographic differences in how students navigate through MOOCs. In Learning @ Scale. ACM, 21--30. Google ScholarDigital Library
- Kevin A. Hallgren. 2012. Computing inter-rater reliability for observational data: An overview and tutorial. Tutor. Quant. Methods for Psychol. 8, 1, 23--34.Google ScholarCross Ref
- Sture Holm. 1979. A simple sequentially rejective multiple test procedure. Scandinavian J. Stat. 6, 2, 65--70.Google Scholar
- Eric Hoover. 2002. Honor for Honor's Sake? The Chronicle of Higher Education (May 2002).Google Scholar
- John J. Horton, David G. Rand, and Richard J. Zeckhauser. 2011. The online laboratory: Conducting experiments in a real labor market. Exp. Economics 14, 3, 399--425.Google ScholarCross Ref
- Daniel Houser, Stefan Vetter, and Joachim Winter. 2012. Fairness and cheating. Eur. Economic Rev. 56, 8, 1645--1655.Google ScholarCross Ref
- Nicolas Jacquemet, Robert-Vincent Joule, Stéphane Luchini, and Jason F. Shogren. 2013. Preference elicitation under oath. J. Environ. Economics Manage. 65, 1, 110--132.Google ScholarCross Ref
- Aniket Kittur, Ed H. Chi, and Bongwon Suh. 2008. Crowdsourcing user studies with Mechanical Turk. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 453--456. Google ScholarDigital Library
- Aniket Kittur, Jeffrey V. Nickerson, Michael Bernstein, Elizabeth Gerber, Aaron Shaw, John Zimmerman, Matt Lease, and John Horton. 2013. The future of crowd work. In Proceedings of the Conference on Computer Supported Cooperative Work. ACM, 1301--1318. Google ScholarDigital Library
- Xuanchong Li, Kai-min Chang, Yueran Yuan, and Alexander Hauptmann. 2015. Massive open online proctor: Protecting the credibility of MOOCs certificates. In Proceedings of the Conference on Computer Supported Cooperative Work. ACM, 1129--1137. Google ScholarDigital Library
- Frank M. LoSchiavo and Mark A. Shatz. 2011. The impact of an honor code on cheating in online courses. MERLOT Journal of Online Learning and Teaching 7, 2, 179--184.Google Scholar
- Howard Markel. 2004. “I Swear by Apollo”--on Taking the Hippocratic Oath. New Eng. J. Med. 350, 20, 2026--2029.Google ScholarCross Ref
- David F. Mastin, Jennifer Peszka, and Deborah R. Lilly. 2009. Online academic integrity. Teach. Psychol. 36, 3, 174--178.Google ScholarCross Ref
- Nina Mazar, On Amir, and Dan Ariely. 2008. The dishonesty of honest people: A theory of self-concept maintenance. J. Marketing Res. 45, 6, 633--644.Google ScholarCross Ref
- Donald L. McCabe and Linda Klebe Trevino. 1993. Academic dishonesty: Honor codes and other contextual influences. J. Higher Educ. 64, 5, 522--538.Google Scholar
- Donald L. McCabe, Linda Klebe Trevino, and Kenneth D. Butterfield. 1999. Academic integrity in honor code and non-honor code environments: A qualitative investigation. J. Higher Educ. 70, 2, 211--234.Google Scholar
- Nicole L. Mead, Roy F. Baumeister, Francesca Gino, Maurice E. Schweitzer, and Dan Ariely. 2009. Too tired to tell the truth: Self-control resource depletion and dishonesty. J. Exp. Soc. Psychol. 45, 3, 594--597.Google ScholarCross Ref
- Mechanical Turk Blog. 2012. Mechanical Turk Blog: Improving Quality with Qualifications—Tips for API Requesters. Retrieved from: http://mechanicalturk.typepad.com/blog/2012/08/. (Aug. 2012).Google Scholar
- David Oleson, Alexander Sorokin, Greg P. Laughlin, Vaughn Hester, John Le, and Lukas Biewald. 2011. Programmatic gold: Targeted and scalable quality assurance in crowdsourcing. In Human Computation. 43--48.Google Scholar
- Gabriele Paolacci and Jesse Chandler. 2014. Inside the Turk: Understanding Mechanical Turk as a participant pool. Current Directions Psychol. Sci. 23, 3, 184--188.Google ScholarCross Ref
- Niels Provos. 2004. A virtual honeypot framework. In USENIX Security Symposium, Vol. 173. 1--14. Google ScholarDigital Library
- Gerald J. Pruckner and Rupert Sausgruber. 2013. Honesty on the streets: A field study on newspaper purchasing. J. Eur. Economic Assoc. 11, 3, 661--679.Google ScholarCross Ref
- John T. E. Richardson. 1994. The analysis of 2 × 1 and 2 × 2 contingency tables: An historical review. Stat. Methods Med. Res. 3, 2, 107--133.Google ScholarCross Ref
- Kevin W. Rockmann and Gregory B. Northcraft. 2008. To be or not to be trusted: The influence of media richness on defection and deception. Org. Behav. Hum. Decision Processes 107, 2, 106--122.Google ScholarCross Ref
- Stephen Mark Rosenbaum, Stephan Billinger, and Nils Stieglitz. 2014. Let's be honest: A review of experimental evidence of honesty and truth-telling. J. Economic Psychol. 45, 181--196.Google ScholarCross Ref
- Joel Ross, Lilly Irani, M. Six Silberman, Andrew Zaldivar, and Bill Tomlinson. 2010. Who are the crowdworkers?: Shifting demographics in Mechanical Turk. In Proceedings of the Extended Abstracts on Human Factors in Computing Systems. 2863--2872. Google ScholarDigital Library
- Shaul Shalvi, Ori Eldar, and Yoella Bereby-Meyer. 2012. Honesty requires time (and lack of justifications). Psychol. Sci. 23, 10, 1264--1270.Google ScholarCross Ref
- Lisa L. Shu, Francesca Gino, and Max H. Bazerman. 2011a. Dishonest deed, clear conscience: When cheating leads to moral disengagement and motivated forgetting. Personality Soc. Psychol. Bull. 37, 3, 330--349.Google ScholarCross Ref
- Lisa L. Shu, Nina Mazar, Francesca Gino, Dan Ariely, and Max H. Bazerman. 2011b. When to Sign on the Dotted Line?: Signing First Makes Ethics Salient and Decreases Dishonest Self-reports. Technical Report 11-117. Harvard Business School.Google Scholar
- Debra Pogrund Stark and Jessica M. Choplin. 2009. A license to deceive: Enforcing contractual myths despite consumer psychological realities. New York Univ. J. Law Business 5, 2, 617--744.Google Scholar
- Siddharth Suri, Daniel G Goldstein, and Winter A Mason. 2011. Honesty in an online labor market. In Human Computation. 61--66.Google Scholar
- Alex B. Van Zant and Laura J. Kray. 2014. “I can't lie to your face”: Minimal face-to-face interaction promotes honesty. J. Exp. Soc. Psychol. 55, 1, 234--238.Google ScholarCross Ref
- Kathleen D. Vohs and Jonathan W. Schooler. 2008. The value of believing in free will encouraging a belief in determinism increases cheating. Psychol. Sci. 19, 1, 49--54.Google ScholarCross Ref
- Luis von Ahn and Laura Dabbish. 2004. Labeling images with a computer game. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 319--326. Google ScholarDigital Library
- Luis von Ahn, Ruoran Liu, and Manuel Blum. 2006. Peekaboom: A game for locating objects in images. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 55--64. Google ScholarDigital Library
- Greg Walsh and Jennifer Golbeck. 2010. Curator: A game with a purpose for collection recommendation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2079--2082. Google ScholarDigital Library
- Chen-Bo Zhong, Vanessa K. Bohns, and Francesca Gino. 2010. Good lamps are the best police darkness increases dishonesty and self-interested behavior. Psychol. Sci. 21, 3, 311--314.Google ScholarCross Ref
Index Terms
- Deterring Cheating in Online Environments
Recommendations
Visual secret sharing with cheating prevention revisited
Visual secret sharing (VSS) is a variant form of secret sharing, and is efficient since secret decoding only depends on the human vision system. However, cheating in VSS, first showed by Horng et al., is a significant issue like a limelight. Since then, ...
Linear k,n secret sharing scheme with cheating detection
Linear k,n secret sharing scheme with the capability of detecting cheating is considered in this paper. Linear k,n secret sharing scheme is a class of k,n secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an ...
Properties and constraints of cheating-immune secret sharing schemes
Special issue: Coding and cryptographyA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in ...
Comments