Abstract
This article is a systematic review of work in the computing education literature on plagiarism. The goal of the review is to summarize the main results found in the literature and highlight areas that need further work. Despite the the large body of work on plagiarism, no systematic reviews have been published so far.
The reviewed papers were categorized and analyzed using a theoretical framework from the field of Fraud Deterrence named the Fraud Triangle. According to this framework, fraudulent behavior occurs when the person is under pressure, perceives the availability of an opportunity to commit fraud, and rationalizes the fraudulent behavior in a way that makes it seem not unethical to him or her.
The review found the largest amount of the reviewed papers to discuss ways for reducing the opportunity to plagiarize, as well as tools for detecting plagiarism. However, there is a clear lack of empirical work evaluating the deterrent efficacy of these strategies and tools. The reviewed papers also included mentions of a wide range of rationalizations used by computing students when justifying plagiarism, the most important of which are rationalizations that stem from confusion about what constitutes plagiarism. Finally, work on the relationship between pressure in computing courses and plagiarism was found to be very scarce and incommensurate with the significant contribution of this factor to plagiarism.
- James H. Adair and James L. Linderman. 1985. Computer ethics and academic honesty: Developing a survey instrument. In Proceedings of the 16th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’85). ACM, New York, NY, 93--98. DOI:https://doi.org/10.1145/323287.323296Google Scholar
- Alex Aiken. [n.d.]. MOSS: A System for Detecting Software Similarity. Retrieved on 04 December, 2019 from https://theory.stanford.edu/∼aiken/moss/.Google Scholar
- Z. A. Al-Khanjari, J. A. Fiaidhi, R. A. Al-Hinai, and N. S. Kutti. 2010. PlagDetect: A Java programming plagiarism detection tool. ACM Inroads 1, 4 (Dec. 2010), 66--71. DOI:https://doi.org/10.1145/1869746.1869766Google ScholarDigital Library
- Lubna S. Alam. 2004. Is plagiarism more prevalent in some forms of assessment than others. In Proceedings of the 21st Australian Society for Computers in Tertiary Education Conference (ASCILITE’04). 48--57.Google Scholar
- Ibrahim Albluwi. 2018. A closer look at the differences between graders in introductory computer science exams. IEEE Trans. Educ. 61, 3 (2018), 253--260.Google ScholarCross Ref
- W. Steve Albrecht, Keith R. Howe, and Marshall B. Romney. 1984. Deterring Fraud: The Internal Auditor’s Perspective. Institute of Internal Auditors Research Foundation, Altamonte Springs, FL.Google Scholar
- Joe Michael Allen, Frank Vahid, Kelly Downey, and Alex Daniel Edgcomb. 2018. Weekly programs in a CS1 class: Experiences with auto-graded many-small programs (MSP). In Proceedings of the ASEE Conference 8 Exposition.Google ScholarCross Ref
- Carole Ames. 1992. Classrooms: Goals, structures, and student motivation. J. Educ. Psychol. 84, 3 (1992), 261.Google ScholarCross Ref
- Eric M. Anderman and Fred Danner. 2008. Achievement goals and academic cheating. Rev. Int. de Psychol. Soc. 21, 1 (2008), 155--180.Google Scholar
- Albert Bandura. 2002. Selective moral disengagement in the exercise of moral agency. Journal of Moral Education 31, 2 (June 2002), 101--119. DOI:https://doi.org/10.1080/0305724022014322Google ScholarCross Ref
- D’Arcy Becker, Janice Connolly, Paula Lentz, and Joline Morrison. 2006. Using the business fraud triangle to predict academic dishonesty among business students. Academy of Educational Leadership Journal 10, 1 (2006), 37.Google Scholar
- K. Becker. 2006. How much choice is too much?. In Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education (ITiCSE-WGR’06). ACM, New York, NY, 78--82. DOI:https://doi.org/10.1145/1189215.1189176Google Scholar
- Jess Bidgood and Jeremy B. Merrill. 2017. As computer coding classes swell, so does cheating. https://www.nytimes.com/2017/05/29/us/computer-science-cheating.html.Google Scholar
- Lidija Bilic-Zulle, Josip Azman, Vedran Frkovic, and Mladen Petrovecki. 2008. Is there an effective approach to deterring students from plagiarizing? Sci. Eng. Ethics 14, 1 (2008), 139--147.Google ScholarCross Ref
- Elizabeth Boese. 2016. Just-in-time learning for the just Google it era. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE’16). ACM, New York, NY, 341--345. DOI:https://doi.org/10.1145/2839509.2844583Google ScholarDigital Library
- K. W. Bowyer and L. O. Hall. 1999. Experience using to detect cheating on programming assignments. In Proceedings of the 29th Frontiers in Education Conference. Designing the Future of Science and Engineering Education. IEEE Cat. No.99 CH37011, Vol. 3. 13B3/18--13B3/22 vol.3. DOI:https://doi.org/10.1109/FIE.1999.840376Google Scholar
- Steven Bradley. 2016. Managing plagiarism in programming assignments with blended assessment and randomisation. In Proceedings of the 16th Koli Calling International Conference on Computing Education Research (Koli Calling’16). ACM, New York, NY, 21--30. DOI:https://doi.org/10.1145/2999541.2999560Google ScholarDigital Library
- Bear F. Braumoeller and Brian J. Gaines. 2001. Actions do speak louder than words: Deterring plagiarism with the use of plagiarism-detection software. PS: Polit. Sci. Polit. 34, 4 (2001), 835--839.Google ScholarCross Ref
- Stina Bridgeman, Michael T. Goodrich, Stephen G. Kobourov, and Roberto Tamassia. 2000. SAIL: A system for generating, archiving, and retrieving specialized assignments using LATEX. In Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education (SIGCSE’00). ACM, New York, NY, 300--304. DOI:https://doi.org/10.1145/330908.331874Google ScholarDigital Library
- Debra D. Burke and Kenneth J. Sanney. 2018. Applying the fraud triangle to higher education: Ethical implications. J. Legal Stud. Educ. 35, 1 (2018), 5--43.Google ScholarCross Ref
- David Burt. 2010. Cheating confusion persists. https://yaledailynews.com/blog/2010/12/01/cheating-confusion-persists.Google Scholar
- Harry Cendrowski and James Martin. 2015. The Fraud Triangle. John Wiley 8 Sons, Ltd, Chapter 5, 41--46. DOI:https://doi.org/10.1002/9781119202165.ch5Google Scholar
- Freddie Choo and Kim Tan. 2008. The effect of fraud triangle factors on students? Cheating behaviors. In Advances in Accounting Education. Emerald Group Publishing Limited, 205--220.Google Scholar
- D. Chuda, P. Navrat, B. Kovacova, and P. Humay. 2012. The issue of (software) plagiarism: A student view. IEEE Trans. Educ. 55, 1 (Feb. 2012), 22--28. DOI:https://doi.org/10.1109/TE.2011.2112768Google ScholarDigital Library
- Joshua K. Cieslewicz. 2012. The fraud model in international contexts: A call to include societal-level influences in the model. J. Forens. Investig. Acc. 4, 1 (2012), 214--254.Google Scholar
- Robert Clarke and Thomas Lancaster. 2013. Commercial aspects of contract cheating. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’13). ACM, New York, NY, 219--224. DOI:https://doi.org/10.1145/2462476.2462497Google ScholarDigital Library
- O. Clua and M. Feldgen. 2002. How to have the web playing on your side. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 3. S1H--S1H. DOI:https://doi.org/10.1109/FIE.2002.1158646Google Scholar
- Janet M. Cook. 1987. Defining ethical and unethical student behaviors using departmental regulations and sanctions. ACM SIGCSE Bull. 19, 1 (Feb. 1987), 462--468. DOI:https://doi.org/10.1145/31820.31806Google ScholarDigital Library
- Arthur Coren. 2011. Turning a blind eye: Faculty who ignore student cheating. J. Acad. Ethics 9, 4 (2011), 291.Google ScholarCross Ref
- G. Cosma and M. Joy. 2008. Towards a definition of source-code plagiarism. IEEE Trans. Educ. 51, 2 (May 2008), 195--200. DOI:https://doi.org/10.1109/TE.2007.906776Google ScholarDigital Library
- Georgina Cosma, Mike Joy, Jane Sinclair, Margarita Andreou, Dongyong Zhang, Beverley Cook, and Russell Boyatt. 2017. Perceptual comparison of source-code plagiarism within students from UK, China, and South Cyprus higher education institutions. Trans. Comput. Educ. 17, 2 (May 2017), 8:1--8:16. DOI:https://doi.org/10.1145/3059871Google ScholarDigital Library
- Donald R. Cressey. 1953. Other People’s Money: A Study of the Social Psychology of Embezzlement. Free Press, New York, NY.Google Scholar
- Charlie Daly and Jane Horgan. 2005. Patterns of plagiarism. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’05). ACM, New York, NY, 383--387. DOI:https://doi.org/10.1145/1047344.1047473Google ScholarDigital Library
- C. Daly and J. M. Horgan. 2004. An automated learning system for Java programming. IEEE Trans. Educ. 47, 1 (Feb. 2004), 10--17. DOI:https://doi.org/10.1109/TE.2003.816064Google ScholarDigital Library
- Martin Dick, Judy Sheard, Cathy Bareiss, Janet Carter, Donald Joyce, Trevor Harding, and Cary Laxer. 2002. Addressing student cheating: Definitions and solutions. In Working Group Reports from ITiCSE onInnovation and Technology in Computer Science Education (ITiCSE-WGR’02). ACM, New York, NY, 172--184. DOI:https://doi.org/10.1145/782941.783000Google ScholarDigital Library
- Martin Dick, Judithe Sheard, and Maurie Hasen. 2008. Prevention is better than cure: Addressing cheating and plagiarism based on the it student perspective. In Student Plagiarism in an Online World: Problems and Solutions. IGI Global, 160--182.Google Scholar
- John L. Donaldson, Ann-Marie Lancaster, and Paula H. Sposato. 1981. A plagiarism detection system. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 21--25. DOI:https://doi.org/10.1145/800037.800955Google Scholar
- Jack Dorminey, A. Scott Fleming, Mary-Jo Kranacher, and Richard A. Riley. 2012. The evolution of fraud theory. Iss. Acc. Educ. 27, 2 (2012), 555--579. DOI:https://doi.org/10.2308/iace-50131Google Scholar
- Daryl D’Souza, Margaret Hamilton, and Michael C. Harris. 2007. Software development marketplaces: Implications for plagiarism. In Proceedings of the 9th Australasian Conference on Computing Education (ACE’07), Vol. 66. Australian Computer Society, Inc., 27--33. http://dl.acm.org/citation.cfm?id=1273672.1273676.Google Scholar
- Elaine S. Elliott and Carol S. Dweck. 1988. Goals: An approach to motivation and achievement. J. Person. Soc. Psychol. 54, 1 (1988), 5.Google ScholarCross Ref
- Steve Engels, Vivek Lakshmanan, and Michelle Craig. 2007. Plagiarism detection using feature-based neural networks. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’07). ACM, New York, NY, 34--38. DOI:https://doi.org/10.1145/1227310.1227324Google ScholarDigital Library
- Joel Fenwick. 2017. Catching a few important fish: Internet mediated plagiarism. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 36--41. DOI:https://doi.org/10.1145/3013499.3013504Google ScholarDigital Library
- James B. Fenwick, Jr., Cindy Norris, Frank E. Barry, Josh Rountree, Cole J. Spicer, and Scott D. Cheek. 2009. Another look at the behaviors of novice programmers. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 296--300. DOI:https://doi.org/10.1145/1508865.1508973Google Scholar
- Ernest Ferguson. 1987. Conference grading of computer programs. In Proceedings of the 18th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’87). ACM, New York, NY, 361--365. DOI:https://doi.org/10.1145/31820.31787Google Scholar
- Sally A. Fincher and Anthony V. Robins. 2019. The Cambridge Handbook of Computing Education Research. Cambridge University Press.Google Scholar
- A. Garcia, S. Rodriguez, F. Rosales, and J. L. Pedraza. 2005. Automatic management of laboratory work in mass computer engineering courses. IEEE Trans. Educ. 48, 1 (Feb. 2005), 89--98. DOI:https://doi.org/10.1109/TE.2004.832874Google ScholarDigital Library
- Matheus Gaudencio, Ayla Dantas, and Dalton D. S. Guerrero. 2014. Can computers compare student code solutions as well as teachers? In Proceedings of the 45th ACM Technical Symposium on Computer Science Education (SIGCSE’14). ACM, New York, NY, 21--26. DOI:https://doi.org/10.1145/2538862.2538973Google Scholar
- E. F. Gehringer. 2004. Reuse of homework and test questions: When, why, and how to maintain security? In Proceedings of the 34th Frontiers in Education Conference (FIE’04). S1F/24--S1F/29 Vol. 3. DOI:https://doi.org/10.1109/FIE.2004.1408702Google ScholarCross Ref
- J. Paul Gibson. 2009. Software reuse and plagiarism: A code of practice. In Proceedings of the 14th ACM SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’09). ACM, New York, NY, 55--59. DOI:https://doi.org/10.1145/1562877.1562900Google ScholarDigital Library
- David Gitchell and Nicholas Tran. 1999. Sim: A utility for detecting similarity in computer programs. In Proceedings of the 30th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’99). ACM, New York, NY, 266--270. DOI:https://doi.org/10.1145/299649.299783Google ScholarDigital Library
- Neil Granitz and Dana Loewy. 2007. Applying ethical theories: Interpreting and responding to student plagiarism. J. Bus. Ethics 72, 3 (2007), 293--306.Google ScholarCross Ref
- Tony Greening, Judy Kay, and Bob Kummerfeld. 2004. Integrating ethical content into computing curricula. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 91--99. http://dl.acm.org/citation.cfm?id=979968.979981.Google Scholar
- Sam Grier. 1981. A tool that detects plagiarism in Pascal programs. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 15--20. DOI:https://doi.org/10.1145/800037.800954Google ScholarDigital Library
- Dirk Grunwald, Elizabeth Boese, Rhonda Hoenigman, Andy Sayler, and Judith Stafford. 2015. Personalized attention @ scale: Talk isn’t cheap, but it’s effective. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (SIGCSE’15). ACM, New York, NY, 610--615. DOI:https://doi.org/10.1145/2676723.2677283Google ScholarDigital Library
- Jurriaan Hage, Peter Rademaker, and Nikè van Vugt. 2011. Plagiarism detection for Java: A tool comparison. In Proceedings of the Computer Science Education Research Conference (CSERC’11). Open Universiteit, Heerlen, 33--46. http://dl.acm.org/citation.cfm?id=2043594.2043597.Google ScholarDigital Library
- Jurriaan Hage, Brian Vermeer, and Gerben Verburg. 2013. Research paper: Plagiarism detection for Haskell with Holmes. In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC’13). Open Universiteit, Heerlen, 2:19--2:30. http://dl.acm.org/citation.cfm?id=2541917.2541919.Google Scholar
- Trevor S. Harding, Matthew J. Mayhew, Cynthia J. Finelli, and Donald D. Carpenter. 2007. The theory of planned behavior as a model of academic dishonesty in engineering and humanities undergraduates. Ethics Behav. 17, 3 (2007), 255--279.Google ScholarCross Ref
- Nina C. Heckler, Margaret Rice, and C. Hobson Bryan. 2013. Turnitin systems: A deterrent to plagiarism in college classrooms. J. Res. Technol. Educ. 45, 3 (2013), 229--248.Google ScholarCross Ref
- Arto Hellas, Juho Leinonen, and Petri Ihantola. 2017. Plagiarism in take-home exams: Help-seeking, collaboration, and systematic cheating. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 238--243. DOI:https://doi.org/10.1145/3059009.3059065Google ScholarDigital Library
- Daniël Heres and Jurriaan Hage. 2017. A quantitative comparison of program plagiarism detection tools. In Proceedings of the 6th Computer Science Education Research Conference (CSERC’17). ACM, New York, NY, 73--82. DOI:https://doi.org/10.1145/3162087.3162101Google ScholarDigital Library
- Richard C. Hollinger and Lonn Lanza-Kaduce. 2009. Academic dishonesty and the perceived effectiveness of countermeasures: An empirical survey of cheating at a major public university. NASPA J. 46, 4 (2009), 587--602. DOI:https://doi.org/10.2202/1949-6605.5033Google Scholar
- C. Jinshong Hwang and Darryl E. Gibson. 1982. Using an effective grading method for preventing plagiarism of programming assignments. In Proceedings of the 13th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’82). ACM, New York, NY, 50--59. DOI:https://doi.org/10.1145/800066.801339Google Scholar
- Eva Jereb, Matjaž Perc, Barbara Lämmlein, Janja Jerebic, Marko Urh, Iztok Podbregar, and Polona Šprajc. 2018. Factors influencing plagiarism in higher education: A comparison of German and Slovene students. PloS One 13, 8 (2018), e0202252.Google ScholarCross Ref
- Jeong-Hoon Ji, Gyun Woo, and Hwan-Gue Cho. 2007. A source code linearization technique for detecting plagiarized programs. In Proceedings of the 12th SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’07). ACM, New York, NY, 73--77. DOI:https://doi.org/10.1145/1268784.1268807Google ScholarDigital Library
- Edward L. Jones. 2001. Plagiarism monitoring and detection—towards an open discussion. In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, USA, 229--236. http://dl.acm.org/citation.cfm?id=374824.374827.Google Scholar
- M. Joy, G. Cosma, J. Y. Yau, and J. Sinclair. 2011. Source code plagiarism—A student perspective. IEEE Trans. Educ. 54, 1 (Feb. 2011), 125--132. DOI:https://doi.org/10.1109/TE.2010.2046664Google ScholarDigital Library
- M. Joy and M. Luck. 1999. Plagiarism in programming assignments. IEEE Trans. Educ. 42, 2 (May 1999), 129--133. DOI:https://doi.org/10.1109/13.762946Google ScholarDigital Library
- Donald Joyce. 2007. Academic integrity and plagiarism: Australasian perspectives. Comput. Sci. Educ. 17, 3 (Sept. 2007), 187--200. DOI:https://doi.org/10.1080/08993400701538062Google ScholarCross Ref
- Kylie Jue. 2014. Stanford CS Department battles honor code violations. https://www.stanforddaily.com/2014/06/03/stanford-cs-department-battles-honor-code-violations.Google Scholar
- Dulal C. Kar. 2000. Detection of plagiarism in computer programming assignments. J. Comput. Sci. Coll. 15, 3 (Mar. 2000), 266--276. http://dl.acm.org/citation.cfm?id=1852563.1852601.Google Scholar
- Patricia Keith-Spiegel, Barbara G. Tabachnick, Bernard E. Whitley Jr., and Jennifer Washburn. 1998. Why professors ignore cheating: Opinions of a national sample of psychology instructors. Ethics Behav. 8, 3 (1998), 215--227. DOI:https://doi.org/10.1207/s15327019eb0803_3Google ScholarCross Ref
- Barbara Kitchenham. 2004. Procedures for Performing Systematic Reviews. Keele University Technical Report TR/SE-0401 (2004).Google Scholar
- Angelo Kyrilov and David C. Noelle. 2015. Binary instant feedback on programming exercises can reduce student engagement and promote cheating. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 122--126. DOI:https://doi.org/10.1145/2828959.2828968Google Scholar
- Thomas Lancaster and Fintan Culwin. 2004. A comparison of source code plagiarism detection engines. Comput. Sci. Educ. 14, 2 (June 2004), 101--112. DOI:https://doi.org/10.1080/08993400412331363843Google ScholarCross Ref
- John Lauerman. 2012. Harvard cheating probe under way for about 125. https://www.bloomberg.com/news/articles/2012-08-30/harvard-plagiarism-probe-under-way-for-about-125-students.Google Scholar
- Thanh Tri Le Nguyen, Angela Carbone, Judy Sheard, and Margot Schuhmacher. 2013. Integrating source code plagiarism into a virtual learning environment: Benefits for students and staff. In Proceedings of the 15th Australasian Computing Education Conference (ACE’13), Vol. 136. Australian Computer Society, Inc., 155--164. http://dl.acm.org/citation.cfm?id=2667199.2667216.Google Scholar
- Ed Lindoo. 2013. In an effort to reduce accidental plagiarism by computer science students. J. Comput. Sci. Coll. 29, 2 (Dec. 2013), 79--84. http://dl.acm.org/citation.cfm?id=2535418.2535429.Google Scholar
- Alberta Lipson and Norma McGavern. 1993. Undergraduate academic dishonesty at MIT. Results of a Study of Attitudes and Behavior of Undergraduates, Faculty, and Graduate Teaching Assistants. Technical report. ED368272. https://eric.ed.gov/?id=ED368272.Google Scholar
- Mark E. Lokanan. 2015. Challenges to the fraud triangle: Questions on its usefulness. In Proceedings of the Accounting Forum, Vol. 39. Taylor 8 Francis, 201--224.Google ScholarCross Ref
- Krista Longi, Juho Leinonen, Henrik Nygren, Joni Salmi, Arto Klami, and Arto Vihavainen. 2015. Identification of programmers from typing patterns. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 60--67. DOI:https://doi.org/10.1145/2828959.2828960Google ScholarDigital Library
- Andrew Luxton-Reilly and Andrew Petersen. 2017. The compound nature of novice programming assessments. In Proceedings of the 19th Australasian Computing Education Conference. ACM, 26--35.Google ScholarDigital Library
- Andrew Luxton-Reilly, Simon, Ibrahim Albluwi, Brett A. Becker, Michail Giannakos, Amruth N. Kumar, Linda Ott, James Paterson, Michael James Scott, Judy Sheard, and Claudia Szabo. 2018. Introductory programming: A systematic literature review. In Proceedings of the 23rd ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’18 Companion). ACM, New York, NY, 55--106. DOI:https://doi.org/10.1145/3293881.3295779Google ScholarDigital Library
- David J. Malan. 2018. Teaching academic honesty in CS50. https://medium.com/@cs50/teaching-academic-honesty-in-cs50-965653520caf#45b0.Google Scholar
- Samuel Mann and Zelda Frew. 2006. Similarity and originality in code: Plagiarism and normal variation in student assignments. In Proceedings of the 8th Australasian Conference on Computing Education (ACE’06), Vol. 52. Australian Computer Society, Inc., 143--150. http://dl.acm.org/citation.cfm?id=1151869.1151888.Google Scholar
- S. Manoharan. 2017. Personalized assessment as a means to mitigate plagiarism. IEEE Trans. Educ. 60, 2 (May 2017), 112--119. DOI:https://doi.org/10.1109/TE.2016.2604210Google ScholarDigital Library
- Leonardo Mariani and Daniela Micucci. 2012. AuDeNTES: Automatic detection of tentative plagiarism according to a reference solution. Trans. Comput. Educ. 12, 1 (Mar. 2012), 2:1--2:26. DOI:https://doi.org/10.1145/2133797.2133799Google ScholarDigital Library
- Helen Marsden, Marie Carroll, and James T. Neill. 2005. Who cheats at university? A self-report study of dishonest academic behaviours in a sample of Australian university students. Austr. J. Psychol. 57, 1 (2005), 1--10.Google ScholarCross Ref
- Raina Mason and Simon. 2017. Introductory programming courses in Australasia in 2016. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 81--89. DOI:https://doi.org/10.1145/3013499.3013512Google ScholarDigital Library
- Tony Mason, Ada Gavrilovska, and David A. Joyner. 2019. Collaboration versus cheating: Reducing code plagiarism in an online MS computer science program. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). ACM, New York, NY, 1004--1010. DOI:https://doi.org/10.1145/3287324.3287443Google Scholar
- Donald L. McCabe. 2005. Cheating among college and university students: A North American perspective. Int. J. Educ. Integ. 1, 1 (2005).Google ScholarCross Ref
- Donald L. McCabe, Kenneth D. Butterfield, and Linda Klebe Treviño. 2006. Academic dishonesty in graduate business programs: Prevalence, causes, and proposed action. Acad. Manag. Learn. Educ. 5, 3 (2006), 294--305.Google ScholarCross Ref
- Donald L McCabe, Linda Klebe Treviño, and Kenneth D. Butterfield. 2001. Cheating in academic institutions: A decade of research. Ethics Behav. 11, 3 (2001), 219--232.Google ScholarCross Ref
- Charlie Meyer, Cinda Heeren, Eric Shaffer, and Jon Tedesco. 2011. CoMoTo: The collaboration modeling toolkit. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 143--147. DOI:https://doi.org/10.1145/1999747.1999789Google ScholarDigital Library
- Phatludi Modiba, Vreda Pieterse, and Bertram Haskins. 2016. Evaluating plagiarism detection software for introductory programming assignments. In Proceedings of the Computer Science Education Research Conference (CSERC’16). ACM, New York, NY, 37--46. DOI:https://doi.org/10.1145/2998551.2998558Google ScholarDigital Library
- Tamera B. Murdock and Eric M. Anderman. 2006. Motivational perspectives on student cheating: Toward an integrated model of academic dishonesty. Educ. Psychol. 41, 3 (2006), 129--145.Google ScholarCross Ref
- Hannah Natanson. 2017. More than 60 Fall CS50 enrollees faced academic dishonesty charges. https://www.thecrimson.com/article/2017/5/3/cs50-cheating-cases-2017/.Google Scholar
- Sebastian Niezgoda and Thomas P. Way. 2006. SNITCH: A software tool for detecting cut and paste plagiarism. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’06). ACM, New York, NY, 51--55. DOI:https://doi.org/10.1145/1121341.1121359Google Scholar
- Clifford Nowell and Doug Laufer. 1997. Undergraduate student cheating in the fields of business and economics. J. Econ. Educ. 28, 1 (1997), 3--12.Google ScholarCross Ref
- K. J. Ottenstein. 1976. An algorithmic approach to the detection and prevention of plagiarism. SIGCSE Bull. 8, 4 (Dec. 1976), 30--41. DOI:https://doi.org/10.1145/382222.382462Google ScholarDigital Library
- A. Parker and J. O. Hamblen. 1989. Computer algorithms for plagiarism detection. IEEE Trans. Educ. 32, 2 (May 1989), 94--99. DOI:https://doi.org/10.1109/13.28038Google ScholarDigital Library
- Stephanie C. Payne, Satoris S. Youngcourt, and J. Matthew Beaubien. 2007. A meta-analytic examination of the goal orientation nomological net. J. Appl. Psychol. 92, 1 (2007), 128.Google ScholarCross Ref
- Paul Phillips and Luc Cohen. 2014. Convictions of plagiarism in computer science courses on the rise. http://www.dailyprincetonian.com/article/2014/03/convictions-of-plagiarism-in-computer-science-courses-on-the-rise.Google Scholar
- Jonathan Pierce and Craig Zilles. 2017. Investigating student plagiarism patterns and correlations to grades. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE’17). ACM, New York, NY, 471--476. DOI:https://doi.org/10.1145/3017680.3017797Google ScholarDigital Library
- Jonathan Y. H. Poon, Kazunari Sugiyama, Yee Fan Tan, and Min-Yen Kan. 2012. Instructor-centric source code plagiarism detection and plagiarism corpus. In Proceedings of the 17th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’12). ACM, New York, NY, 122--127. DOI:https://doi.org/10.1145/2325296.2325328Google ScholarDigital Library
- Asha Prihar and Carly Wanna. 2019. Cheating at Yale: Students get honest about academic dishonesty. https://yaledailynews.com/blog/2019/02/07/cheating-at-yale-students-get-honest-about-academic-dishonesty/.Google Scholar
- Charles P. Riedesel, Alison L. Clear, Gerry W. Cross, Janet M. Hughes, Simon, and Henry M. Walker. 2012. Academic integrity policies in a computing education context. In Proceedings of the Final Reports on Innovation and Technology in Computer Science Education 2012 Working Groups (ITiCSE-WGR’12). ACM, New York, NY, 1--15. DOI:https://doi.org/10.1145/2426636.2426638Google ScholarDigital Library
- Charles P. Riedesel, Eric D. Manley, Susan Poser, and Jitender S. Deogun. 2009. A model academic ethics and integrity policy for computer science departments. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 357--361. DOI:https://doi.org/10.1145/1508865.1508994Google Scholar
- E. Roberts. 2002. Strategies for promoting academic integrity in CS courses. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 2. F3G--F3G. DOI:https://doi.org/10.1109/FIE.2002.1158209Google ScholarCross Ref
- Sally S. Robinson and M. L. Soffa. 1980. An instructional aid for student programs. In Proceedings of the 11th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’80). ACM, New York, NY, 118--129. DOI:https://doi.org/10.1145/800140.804623Google Scholar
- F. Rosales, A. Garcia, S. Rodriguez, J. L. Pedraza, R. Mendez, and M. M. Nieto. 2008. Detection of plagiarism in programming assignments. IEEE Trans. Educ. 51, 2 (May 2008), 174--183. DOI:https://doi.org/10.1109/TE.2007.906778Google ScholarDigital Library
- Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller, and David Notkin. 1980. Cheating policy in a computer science department. SIGCSE Bull. 12, 2 (July 1980), 72--76. DOI:https://doi.org/10.1145/989253.1165253Google ScholarDigital Library
- Judy Sheard, Angela Carbone, and Martin Dick. 2003. Determination of factors which impact on IT students’ propensity to cheat. In Proceedings of the 5th Australasian Conference on Computing Education (ACE’03), Vol. 20. Australian Computer Society, Inc., 119--126. http://dl.acm.org/citation.cfm?id=858403.858418.Google Scholar
- Judy Sheard and Martin Dick. 2003. Influences on cheating practice of graduate students in IT courses: What are the factors? In Proceedings of the 8th Conference on Innovation and Technology in Computer Science Education (ITiCSE’03). ACM, New York, NY, 45--49. DOI:https://doi.org/10.1145/961511.961527Google ScholarDigital Library
- Judy Sheard and Martin Dick. 2011. Computing student practices of cheating and plagiarism: A decade of change. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 233--237. DOI:https://doi.org/10.1145/1999747.1999813Google ScholarDigital Library
- Judy Sheard and Martin Dick. 2012. Directions and dimensions in managing cheating and plagiarism of IT students. In Proceedings of the 14th Australasian Computing Education Conference (ACE’12), Vol. 123. Australian Computer Society, Inc., 177--186. http://dl.acm.org/citation.cfm?id=2483716.2483737.Google Scholar
- Judy Sheard, Martin Dick, Selby Markham, Ian Macdonald, and Meaghan Walsh. 2002. Cheating and plagiarism: Perceptions and practices of first year IT students. In Proceedings of the 7th Conference on Innovation and Technology in Computer Science Education (ITiCSE’02). ACM, New York, NY, 183--187. DOI:https://doi.org/10.1145/544414.544468Google ScholarDigital Library
- Judy Sheard, Simon, Matthew Butler, Katrina Falkner, Michael Morgan, and Amali Weerasinghe. 2017. Strategies for maintaining academic integrity in first-year computing courses. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 244--249. DOI:https://doi.org/10.1145/3059009.3059064Google ScholarDigital Library
- Simon. 2017. Designing programming assignments to reduce the likelihood of cheating. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 42--47. DOI:https://doi.org/10.1145/3013499.3013507Google Scholar
- Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2013. Academic integrity: Differences between computing assessments and essays. In Proceedings of the 13th Koli Calling International Conference on Computing Education Research (Koli Calling’13). ACM, New York, NY, 23--32. DOI:https://doi.org/10.1145/2526968.2526971Google Scholar
- Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Academic integrity perceptions regarding computing assessments and essays. In Proceedings of the 10th Conference on International Computing Education Research (ICER’14). ACM, New York, NY, 107--114. DOI:https://doi.org/10.1145/2632320.2632342Google Scholar
- Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Student perceptions of the acceptability of various code-writing practices. In Proceedings of the Conference on Innovation 8 Technology in Computer Science Education (ITiCSE’14). ACM Press, 105--110. DOI:https://doi.org/10.1145/2591708.2591755Google Scholar
- Simon and Judy Sheard. 2015. Academic integrity and professional integrity in computing education. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’15). ACM, New York, NY, 237--241. DOI:https://doi.org/10.1145/2729094.2742633Google Scholar
- Simon and Judy Sheard. 2015. In their own words: Students and academics write about academic integrity. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 97--106. DOI:https://doi.org/10.1145/2828959.2828977Google Scholar
- Simon and Judy Sheard. 2016. Academic integrity and computing assessments. In Proceedings of the Australasian Computer Science Week Multiconference (ACSW’16). ACM, New York, NY, Article 3, 8 pages. DOI:https://doi.org/10.1145/2843043.2843060Google Scholar
- Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, and Jane Sinclair. 2018. Informing students about academic integrity in programming. In Proceedings of the 20th Australasian Computing Education Conference (ACE’18). ACM, New York, NY, 113--122. DOI:https://doi.org/10.1145/3160489.3160502Google Scholar
- Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair, Gerry Cross, and Charles Riedesel. 2016. Negotiating the maze of academic integrity in computing education. In Proceedings of the ITiCSE Working Group Reports (ITiCSE’16). ACM, New York, NY, 57--80. DOI:https://doi.org/10.1145/3024906.3024910Google Scholar
- Jaime Spacco, Davide Fossati, John Stamper, and Kelly Rivers. 2013. Towards improving programming habits to create better computer science course outcomes. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education. ACM, 243--248.Google ScholarDigital Library
- Paul Stapleton. 2012. Gauging the effectiveness of anti-plagiarism software: An empirical study of second language graduate writers. J. Engl. Acad. Purp. 11, 2 (2012), 125--133.Google ScholarCross Ref
- Shauna D. Stephens. 2001. Using metrics to detect plagiarism (student paper). In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, 191--196. http://dl.acm.org/citation.cfm?id=374824.374777.Google Scholar
- Michael Stepp and Beth Simon. 2010. Introductory computing students’ conceptions of illegal student-student collaboration. In Proceedings of the 41st ACM Technical Symposium on Computer Science Education (SIGCSE’10). ACM, New York, NY, 295--299. DOI:https://doi.org/10.1145/1734263.1734365Google ScholarDigital Library
- Narjes Tahaei and David C. Noelle. 2018. Automated plagiarism detection for computer programming exercises based on patterns of resubmission. In Proceedings of the ACM Conference on International Computing Education Research (ICER’18). ACM, New York, NY, 178--186. DOI:https://doi.org/10.1145/3230977.3231006Google Scholar
- Herbert H. Tsang, Alice Schmidt Hanbidge, and Tony Tin. 2018. Experiential learning through inter-university collaboration research project in academic integrity. In Proceedings of the 23rd Western Canadian Conference on Computing Education (WCCCE’18). ACM, New York, NY, 5:1--5:6. DOI:https://doi.org/10.1145/3209635.3209645Google ScholarDigital Library
- S. W. Turner and S. Uludag. 2013. Student perceptions of cheating in online and traditional classes. In Proceedings of the IEEE Frontiers in Education Conference (FIE’13). 1131--1137. DOI:https://doi.org/10.1109/FIE.2013.6685007Google Scholar
- Peter Vamplew and Julian Dermoudy. 2005. An anti-plagiarism editor for software development courses. In Proceedings of the 7th Australasian Conference on Computing Education (ACE’05), Vol.42. Australian Computer Society, Inc., 83--90. http://dl.acm.org/citation.cfm?id=1082424.1082435.Google Scholar
- Kristina L. Verco and Michael J. Wise. 1996. Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems. In Proceedings of the 1st Australasian Conference on Computer Science Education (ACSE’96). ACM, New York, NY, 81--88. DOI:https://doi.org/10.1145/369585.369598Google Scholar
- Dieter Vogts. 2009. Plagiarising of source code by novice programmers a “cry for help”? In Proceedings of the Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT’09). ACM, New York, NY, 141--149. DOI:https://doi.org/10.1145/1632149.1632168Google ScholarDigital Library
- Paula Wasley. 2007. 46 Students are disciplined for cheating at Indiana University’s Dental School. https://www.chronicle.com/article/46-Students-Are-Disciplined/122192.Google Scholar
- Michael J. Wise. 1996. YAP3: Improved detection of similarities in computer program and other texts. In Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’96). ACM, New York, NY, 130--134. DOI:https://doi.org/10.1145/236452.236525Google ScholarDigital Library
- David T. Wolfe and Dana R. Hermanson. 2004. The fraud diamond: Considering the four elements of fraud. CPA J. 74, 12 (2004), 38.Google Scholar
- V. Wright. 2010. Deterrence in Criminal Justice: Evaluating Certainty Vs. Severity of Punishment. Sentencing Project. https://www.sentencingproject.org/wp-content/uploads/2016/01/Deterrence-in-Criminal-Justice.pdf.Google Scholar
- Lisa Yan, Nick McKeown, Mehran Sahami, and Chris Piech. 2018. TMOSS: Using intermediate assignment work to understand excessive collaboration in large classes. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). ACM, New York, NY, 110--115. DOI:https://doi.org/10.1145/3159450.3159490Google ScholarDigital Library
- Justin Zobel. 2004. “Uni cheats racket”: A case study in plagiarism investigation. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 357--365. http://dl.acm.org/citation.cfm?id=979968.980016.Google Scholar
Index Terms
- Plagiarism in Programming Assessments: A Systematic Review
Recommendations
Electronic media, creativity and plagiarism
This article provides an introduction to plagiarism and the numerous negative aspects associated with it. Some examples from history have also been provided along with their outcomes. There are different types of plagiarism with varying legal and social ...
Predicting and Explaining Cyber Ethics with Ethical Theories
People face multiple decisions that have ethical dimensions and are often unable to resolve appropriately those ethical dilemmas in the use of the cyberspace. Individuals find it difficult to explain the rationale behind their moral judgments in their ...
Introductory computing students' conceptions of illegal student-student collaboration
SIGCSE '10: Proceedings of the 41st ACM technical symposium on Computer science educationAcademic integrity and cheating are issues of specific importance in computing courses due to the restricted nature of much of our assigned work. Additionally, use of valued pedagogical and professional practices such as pair programming can muddy the ...
Comments