skip to main content
research-article

Plagiarism in Programming Assessments: A Systematic Review

Published:09 December 2019Publication History
Skip Abstract Section

Abstract

This article is a systematic review of work in the computing education literature on plagiarism. The goal of the review is to summarize the main results found in the literature and highlight areas that need further work. Despite the the large body of work on plagiarism, no systematic reviews have been published so far.

The reviewed papers were categorized and analyzed using a theoretical framework from the field of Fraud Deterrence named the Fraud Triangle. According to this framework, fraudulent behavior occurs when the person is under pressure, perceives the availability of an opportunity to commit fraud, and rationalizes the fraudulent behavior in a way that makes it seem not unethical to him or her.

The review found the largest amount of the reviewed papers to discuss ways for reducing the opportunity to plagiarize, as well as tools for detecting plagiarism. However, there is a clear lack of empirical work evaluating the deterrent efficacy of these strategies and tools. The reviewed papers also included mentions of a wide range of rationalizations used by computing students when justifying plagiarism, the most important of which are rationalizations that stem from confusion about what constitutes plagiarism. Finally, work on the relationship between pressure in computing courses and plagiarism was found to be very scarce and incommensurate with the significant contribution of this factor to plagiarism.

References

  1. James H. Adair and James L. Linderman. 1985. Computer ethics and academic honesty: Developing a survey instrument. In Proceedings of the 16th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’85). ACM, New York, NY, 93--98. DOI:https://doi.org/10.1145/323287.323296Google ScholarGoogle Scholar
  2. Alex Aiken. [n.d.]. MOSS: A System for Detecting Software Similarity. Retrieved on 04 December, 2019 from https://theory.stanford.edu/∼aiken/moss/.Google ScholarGoogle Scholar
  3. Z. A. Al-Khanjari, J. A. Fiaidhi, R. A. Al-Hinai, and N. S. Kutti. 2010. PlagDetect: A Java programming plagiarism detection tool. ACM Inroads 1, 4 (Dec. 2010), 66--71. DOI:https://doi.org/10.1145/1869746.1869766Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lubna S. Alam. 2004. Is plagiarism more prevalent in some forms of assessment than others. In Proceedings of the 21st Australian Society for Computers in Tertiary Education Conference (ASCILITE’04). 48--57.Google ScholarGoogle Scholar
  5. Ibrahim Albluwi. 2018. A closer look at the differences between graders in introductory computer science exams. IEEE Trans. Educ. 61, 3 (2018), 253--260.Google ScholarGoogle ScholarCross RefCross Ref
  6. W. Steve Albrecht, Keith R. Howe, and Marshall B. Romney. 1984. Deterring Fraud: The Internal Auditor’s Perspective. Institute of Internal Auditors Research Foundation, Altamonte Springs, FL.Google ScholarGoogle Scholar
  7. Joe Michael Allen, Frank Vahid, Kelly Downey, and Alex Daniel Edgcomb. 2018. Weekly programs in a CS1 class: Experiences with auto-graded many-small programs (MSP). In Proceedings of the ASEE Conference 8 Exposition.Google ScholarGoogle ScholarCross RefCross Ref
  8. Carole Ames. 1992. Classrooms: Goals, structures, and student motivation. J. Educ. Psychol. 84, 3 (1992), 261.Google ScholarGoogle ScholarCross RefCross Ref
  9. Eric M. Anderman and Fred Danner. 2008. Achievement goals and academic cheating. Rev. Int. de Psychol. Soc. 21, 1 (2008), 155--180.Google ScholarGoogle Scholar
  10. Albert Bandura. 2002. Selective moral disengagement in the exercise of moral agency. Journal of Moral Education 31, 2 (June 2002), 101--119. DOI:https://doi.org/10.1080/0305724022014322Google ScholarGoogle ScholarCross RefCross Ref
  11. D’Arcy Becker, Janice Connolly, Paula Lentz, and Joline Morrison. 2006. Using the business fraud triangle to predict academic dishonesty among business students. Academy of Educational Leadership Journal 10, 1 (2006), 37.Google ScholarGoogle Scholar
  12. K. Becker. 2006. How much choice is too much?. In Working Group Reports on ITiCSE on Innovation and Technology in Computer Science Education (ITiCSE-WGR’06). ACM, New York, NY, 78--82. DOI:https://doi.org/10.1145/1189215.1189176Google ScholarGoogle Scholar
  13. Jess Bidgood and Jeremy B. Merrill. 2017. As computer coding classes swell, so does cheating. https://www.nytimes.com/2017/05/29/us/computer-science-cheating.html.Google ScholarGoogle Scholar
  14. Lidija Bilic-Zulle, Josip Azman, Vedran Frkovic, and Mladen Petrovecki. 2008. Is there an effective approach to deterring students from plagiarizing? Sci. Eng. Ethics 14, 1 (2008), 139--147.Google ScholarGoogle ScholarCross RefCross Ref
  15. Elizabeth Boese. 2016. Just-in-time learning for the just Google it era. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE’16). ACM, New York, NY, 341--345. DOI:https://doi.org/10.1145/2839509.2844583Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. W. Bowyer and L. O. Hall. 1999. Experience using to detect cheating on programming assignments. In Proceedings of the 29th Frontiers in Education Conference. Designing the Future of Science and Engineering Education. IEEE Cat. No.99 CH37011, Vol. 3. 13B3/18--13B3/22 vol.3. DOI:https://doi.org/10.1109/FIE.1999.840376Google ScholarGoogle Scholar
  17. Steven Bradley. 2016. Managing plagiarism in programming assignments with blended assessment and randomisation. In Proceedings of the 16th Koli Calling International Conference on Computing Education Research (Koli Calling’16). ACM, New York, NY, 21--30. DOI:https://doi.org/10.1145/2999541.2999560Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Bear F. Braumoeller and Brian J. Gaines. 2001. Actions do speak louder than words: Deterring plagiarism with the use of plagiarism-detection software. PS: Polit. Sci. Polit. 34, 4 (2001), 835--839.Google ScholarGoogle ScholarCross RefCross Ref
  19. Stina Bridgeman, Michael T. Goodrich, Stephen G. Kobourov, and Roberto Tamassia. 2000. SAIL: A system for generating, archiving, and retrieving specialized assignments using LATEX. In Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education (SIGCSE’00). ACM, New York, NY, 300--304. DOI:https://doi.org/10.1145/330908.331874Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Debra D. Burke and Kenneth J. Sanney. 2018. Applying the fraud triangle to higher education: Ethical implications. J. Legal Stud. Educ. 35, 1 (2018), 5--43.Google ScholarGoogle ScholarCross RefCross Ref
  21. David Burt. 2010. Cheating confusion persists. https://yaledailynews.com/blog/2010/12/01/cheating-confusion-persists.Google ScholarGoogle Scholar
  22. Harry Cendrowski and James Martin. 2015. The Fraud Triangle. John Wiley 8 Sons, Ltd, Chapter 5, 41--46. DOI:https://doi.org/10.1002/9781119202165.ch5Google ScholarGoogle Scholar
  23. Freddie Choo and Kim Tan. 2008. The effect of fraud triangle factors on students? Cheating behaviors. In Advances in Accounting Education. Emerald Group Publishing Limited, 205--220.Google ScholarGoogle Scholar
  24. D. Chuda, P. Navrat, B. Kovacova, and P. Humay. 2012. The issue of (software) plagiarism: A student view. IEEE Trans. Educ. 55, 1 (Feb. 2012), 22--28. DOI:https://doi.org/10.1109/TE.2011.2112768Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Joshua K. Cieslewicz. 2012. The fraud model in international contexts: A call to include societal-level influences in the model. J. Forens. Investig. Acc. 4, 1 (2012), 214--254.Google ScholarGoogle Scholar
  26. Robert Clarke and Thomas Lancaster. 2013. Commercial aspects of contract cheating. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’13). ACM, New York, NY, 219--224. DOI:https://doi.org/10.1145/2462476.2462497Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. O. Clua and M. Feldgen. 2002. How to have the web playing on your side. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 3. S1H--S1H. DOI:https://doi.org/10.1109/FIE.2002.1158646Google ScholarGoogle Scholar
  28. Janet M. Cook. 1987. Defining ethical and unethical student behaviors using departmental regulations and sanctions. ACM SIGCSE Bull. 19, 1 (Feb. 1987), 462--468. DOI:https://doi.org/10.1145/31820.31806Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Arthur Coren. 2011. Turning a blind eye: Faculty who ignore student cheating. J. Acad. Ethics 9, 4 (2011), 291.Google ScholarGoogle ScholarCross RefCross Ref
  30. G. Cosma and M. Joy. 2008. Towards a definition of source-code plagiarism. IEEE Trans. Educ. 51, 2 (May 2008), 195--200. DOI:https://doi.org/10.1109/TE.2007.906776Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Georgina Cosma, Mike Joy, Jane Sinclair, Margarita Andreou, Dongyong Zhang, Beverley Cook, and Russell Boyatt. 2017. Perceptual comparison of source-code plagiarism within students from UK, China, and South Cyprus higher education institutions. Trans. Comput. Educ. 17, 2 (May 2017), 8:1--8:16. DOI:https://doi.org/10.1145/3059871Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Donald R. Cressey. 1953. Other People’s Money: A Study of the Social Psychology of Embezzlement. Free Press, New York, NY.Google ScholarGoogle Scholar
  33. Charlie Daly and Jane Horgan. 2005. Patterns of plagiarism. In Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’05). ACM, New York, NY, 383--387. DOI:https://doi.org/10.1145/1047344.1047473Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. Daly and J. M. Horgan. 2004. An automated learning system for Java programming. IEEE Trans. Educ. 47, 1 (Feb. 2004), 10--17. DOI:https://doi.org/10.1109/TE.2003.816064Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Martin Dick, Judy Sheard, Cathy Bareiss, Janet Carter, Donald Joyce, Trevor Harding, and Cary Laxer. 2002. Addressing student cheating: Definitions and solutions. In Working Group Reports from ITiCSE onInnovation and Technology in Computer Science Education (ITiCSE-WGR’02). ACM, New York, NY, 172--184. DOI:https://doi.org/10.1145/782941.783000Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Martin Dick, Judithe Sheard, and Maurie Hasen. 2008. Prevention is better than cure: Addressing cheating and plagiarism based on the it student perspective. In Student Plagiarism in an Online World: Problems and Solutions. IGI Global, 160--182.Google ScholarGoogle Scholar
  37. John L. Donaldson, Ann-Marie Lancaster, and Paula H. Sposato. 1981. A plagiarism detection system. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 21--25. DOI:https://doi.org/10.1145/800037.800955Google ScholarGoogle Scholar
  38. Jack Dorminey, A. Scott Fleming, Mary-Jo Kranacher, and Richard A. Riley. 2012. The evolution of fraud theory. Iss. Acc. Educ. 27, 2 (2012), 555--579. DOI:https://doi.org/10.2308/iace-50131Google ScholarGoogle Scholar
  39. Daryl D’Souza, Margaret Hamilton, and Michael C. Harris. 2007. Software development marketplaces: Implications for plagiarism. In Proceedings of the 9th Australasian Conference on Computing Education (ACE’07), Vol. 66. Australian Computer Society, Inc., 27--33. http://dl.acm.org/citation.cfm?id=1273672.1273676.Google ScholarGoogle Scholar
  40. Elaine S. Elliott and Carol S. Dweck. 1988. Goals: An approach to motivation and achievement. J. Person. Soc. Psychol. 54, 1 (1988), 5.Google ScholarGoogle ScholarCross RefCross Ref
  41. Steve Engels, Vivek Lakshmanan, and Michelle Craig. 2007. Plagiarism detection using feature-based neural networks. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’07). ACM, New York, NY, 34--38. DOI:https://doi.org/10.1145/1227310.1227324Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Joel Fenwick. 2017. Catching a few important fish: Internet mediated plagiarism. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 36--41. DOI:https://doi.org/10.1145/3013499.3013504Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. James B. Fenwick, Jr., Cindy Norris, Frank E. Barry, Josh Rountree, Cole J. Spicer, and Scott D. Cheek. 2009. Another look at the behaviors of novice programmers. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 296--300. DOI:https://doi.org/10.1145/1508865.1508973Google ScholarGoogle Scholar
  44. Ernest Ferguson. 1987. Conference grading of computer programs. In Proceedings of the 18th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’87). ACM, New York, NY, 361--365. DOI:https://doi.org/10.1145/31820.31787Google ScholarGoogle Scholar
  45. Sally A. Fincher and Anthony V. Robins. 2019. The Cambridge Handbook of Computing Education Research. Cambridge University Press.Google ScholarGoogle Scholar
  46. A. Garcia, S. Rodriguez, F. Rosales, and J. L. Pedraza. 2005. Automatic management of laboratory work in mass computer engineering courses. IEEE Trans. Educ. 48, 1 (Feb. 2005), 89--98. DOI:https://doi.org/10.1109/TE.2004.832874Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Matheus Gaudencio, Ayla Dantas, and Dalton D. S. Guerrero. 2014. Can computers compare student code solutions as well as teachers? In Proceedings of the 45th ACM Technical Symposium on Computer Science Education (SIGCSE’14). ACM, New York, NY, 21--26. DOI:https://doi.org/10.1145/2538862.2538973Google ScholarGoogle Scholar
  48. E. F. Gehringer. 2004. Reuse of homework and test questions: When, why, and how to maintain security? In Proceedings of the 34th Frontiers in Education Conference (FIE’04). S1F/24--S1F/29 Vol. 3. DOI:https://doi.org/10.1109/FIE.2004.1408702Google ScholarGoogle ScholarCross RefCross Ref
  49. J. Paul Gibson. 2009. Software reuse and plagiarism: A code of practice. In Proceedings of the 14th ACM SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’09). ACM, New York, NY, 55--59. DOI:https://doi.org/10.1145/1562877.1562900Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. David Gitchell and Nicholas Tran. 1999. Sim: A utility for detecting similarity in computer programs. In Proceedings of the 30th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’99). ACM, New York, NY, 266--270. DOI:https://doi.org/10.1145/299649.299783Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Neil Granitz and Dana Loewy. 2007. Applying ethical theories: Interpreting and responding to student plagiarism. J. Bus. Ethics 72, 3 (2007), 293--306.Google ScholarGoogle ScholarCross RefCross Ref
  52. Tony Greening, Judy Kay, and Bob Kummerfeld. 2004. Integrating ethical content into computing curricula. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 91--99. http://dl.acm.org/citation.cfm?id=979968.979981.Google ScholarGoogle Scholar
  53. Sam Grier. 1981. A tool that detects plagiarism in Pascal programs. In Proceedings of the 12th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’81). ACM, New York, NY, 15--20. DOI:https://doi.org/10.1145/800037.800954Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Dirk Grunwald, Elizabeth Boese, Rhonda Hoenigman, Andy Sayler, and Judith Stafford. 2015. Personalized attention @ scale: Talk isn’t cheap, but it’s effective. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (SIGCSE’15). ACM, New York, NY, 610--615. DOI:https://doi.org/10.1145/2676723.2677283Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Jurriaan Hage, Peter Rademaker, and Nikè van Vugt. 2011. Plagiarism detection for Java: A tool comparison. In Proceedings of the Computer Science Education Research Conference (CSERC’11). Open Universiteit, Heerlen, 33--46. http://dl.acm.org/citation.cfm?id=2043594.2043597.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jurriaan Hage, Brian Vermeer, and Gerben Verburg. 2013. Research paper: Plagiarism detection for Haskell with Holmes. In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC’13). Open Universiteit, Heerlen, 2:19--2:30. http://dl.acm.org/citation.cfm?id=2541917.2541919.Google ScholarGoogle Scholar
  57. Trevor S. Harding, Matthew J. Mayhew, Cynthia J. Finelli, and Donald D. Carpenter. 2007. The theory of planned behavior as a model of academic dishonesty in engineering and humanities undergraduates. Ethics Behav. 17, 3 (2007), 255--279.Google ScholarGoogle ScholarCross RefCross Ref
  58. Nina C. Heckler, Margaret Rice, and C. Hobson Bryan. 2013. Turnitin systems: A deterrent to plagiarism in college classrooms. J. Res. Technol. Educ. 45, 3 (2013), 229--248.Google ScholarGoogle ScholarCross RefCross Ref
  59. Arto Hellas, Juho Leinonen, and Petri Ihantola. 2017. Plagiarism in take-home exams: Help-seeking, collaboration, and systematic cheating. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 238--243. DOI:https://doi.org/10.1145/3059009.3059065Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Daniël Heres and Jurriaan Hage. 2017. A quantitative comparison of program plagiarism detection tools. In Proceedings of the 6th Computer Science Education Research Conference (CSERC’17). ACM, New York, NY, 73--82. DOI:https://doi.org/10.1145/3162087.3162101Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Richard C. Hollinger and Lonn Lanza-Kaduce. 2009. Academic dishonesty and the perceived effectiveness of countermeasures: An empirical survey of cheating at a major public university. NASPA J. 46, 4 (2009), 587--602. DOI:https://doi.org/10.2202/1949-6605.5033Google ScholarGoogle Scholar
  62. C. Jinshong Hwang and Darryl E. Gibson. 1982. Using an effective grading method for preventing plagiarism of programming assignments. In Proceedings of the 13th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’82). ACM, New York, NY, 50--59. DOI:https://doi.org/10.1145/800066.801339Google ScholarGoogle Scholar
  63. Eva Jereb, Matjaž Perc, Barbara Lämmlein, Janja Jerebic, Marko Urh, Iztok Podbregar, and Polona Šprajc. 2018. Factors influencing plagiarism in higher education: A comparison of German and Slovene students. PloS One 13, 8 (2018), e0202252.Google ScholarGoogle ScholarCross RefCross Ref
  64. Jeong-Hoon Ji, Gyun Woo, and Hwan-Gue Cho. 2007. A source code linearization technique for detecting plagiarized programs. In Proceedings of the 12th SIGCSE Conference on Innovation and Technology in Computer Science Education (ITiCSE’07). ACM, New York, NY, 73--77. DOI:https://doi.org/10.1145/1268784.1268807Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Edward L. Jones. 2001. Plagiarism monitoring and detection—towards an open discussion. In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, USA, 229--236. http://dl.acm.org/citation.cfm?id=374824.374827.Google ScholarGoogle Scholar
  66. M. Joy, G. Cosma, J. Y. Yau, and J. Sinclair. 2011. Source code plagiarism—A student perspective. IEEE Trans. Educ. 54, 1 (Feb. 2011), 125--132. DOI:https://doi.org/10.1109/TE.2010.2046664Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. M. Joy and M. Luck. 1999. Plagiarism in programming assignments. IEEE Trans. Educ. 42, 2 (May 1999), 129--133. DOI:https://doi.org/10.1109/13.762946Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Donald Joyce. 2007. Academic integrity and plagiarism: Australasian perspectives. Comput. Sci. Educ. 17, 3 (Sept. 2007), 187--200. DOI:https://doi.org/10.1080/08993400701538062Google ScholarGoogle ScholarCross RefCross Ref
  69. Kylie Jue. 2014. Stanford CS Department battles honor code violations. https://www.stanforddaily.com/2014/06/03/stanford-cs-department-battles-honor-code-violations.Google ScholarGoogle Scholar
  70. Dulal C. Kar. 2000. Detection of plagiarism in computer programming assignments. J. Comput. Sci. Coll. 15, 3 (Mar. 2000), 266--276. http://dl.acm.org/citation.cfm?id=1852563.1852601.Google ScholarGoogle Scholar
  71. Patricia Keith-Spiegel, Barbara G. Tabachnick, Bernard E. Whitley Jr., and Jennifer Washburn. 1998. Why professors ignore cheating: Opinions of a national sample of psychology instructors. Ethics Behav. 8, 3 (1998), 215--227. DOI:https://doi.org/10.1207/s15327019eb0803_3Google ScholarGoogle ScholarCross RefCross Ref
  72. Barbara Kitchenham. 2004. Procedures for Performing Systematic Reviews. Keele University Technical Report TR/SE-0401 (2004).Google ScholarGoogle Scholar
  73. Angelo Kyrilov and David C. Noelle. 2015. Binary instant feedback on programming exercises can reduce student engagement and promote cheating. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 122--126. DOI:https://doi.org/10.1145/2828959.2828968Google ScholarGoogle Scholar
  74. Thomas Lancaster and Fintan Culwin. 2004. A comparison of source code plagiarism detection engines. Comput. Sci. Educ. 14, 2 (June 2004), 101--112. DOI:https://doi.org/10.1080/08993400412331363843Google ScholarGoogle ScholarCross RefCross Ref
  75. John Lauerman. 2012. Harvard cheating probe under way for about 125. https://www.bloomberg.com/news/articles/2012-08-30/harvard-plagiarism-probe-under-way-for-about-125-students.Google ScholarGoogle Scholar
  76. Thanh Tri Le Nguyen, Angela Carbone, Judy Sheard, and Margot Schuhmacher. 2013. Integrating source code plagiarism into a virtual learning environment: Benefits for students and staff. In Proceedings of the 15th Australasian Computing Education Conference (ACE’13), Vol. 136. Australian Computer Society, Inc., 155--164. http://dl.acm.org/citation.cfm?id=2667199.2667216.Google ScholarGoogle Scholar
  77. Ed Lindoo. 2013. In an effort to reduce accidental plagiarism by computer science students. J. Comput. Sci. Coll. 29, 2 (Dec. 2013), 79--84. http://dl.acm.org/citation.cfm?id=2535418.2535429.Google ScholarGoogle Scholar
  78. Alberta Lipson and Norma McGavern. 1993. Undergraduate academic dishonesty at MIT. Results of a Study of Attitudes and Behavior of Undergraduates, Faculty, and Graduate Teaching Assistants. Technical report. ED368272. https://eric.ed.gov/?id=ED368272.Google ScholarGoogle Scholar
  79. Mark E. Lokanan. 2015. Challenges to the fraud triangle: Questions on its usefulness. In Proceedings of the Accounting Forum, Vol. 39. Taylor 8 Francis, 201--224.Google ScholarGoogle ScholarCross RefCross Ref
  80. Krista Longi, Juho Leinonen, Henrik Nygren, Joni Salmi, Arto Klami, and Arto Vihavainen. 2015. Identification of programmers from typing patterns. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 60--67. DOI:https://doi.org/10.1145/2828959.2828960Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Andrew Luxton-Reilly and Andrew Petersen. 2017. The compound nature of novice programming assessments. In Proceedings of the 19th Australasian Computing Education Conference. ACM, 26--35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Andrew Luxton-Reilly, Simon, Ibrahim Albluwi, Brett A. Becker, Michail Giannakos, Amruth N. Kumar, Linda Ott, James Paterson, Michael James Scott, Judy Sheard, and Claudia Szabo. 2018. Introductory programming: A systematic literature review. In Proceedings of the 23rd ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’18 Companion). ACM, New York, NY, 55--106. DOI:https://doi.org/10.1145/3293881.3295779Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. David J. Malan. 2018. Teaching academic honesty in CS50. https://medium.com/@cs50/teaching-academic-honesty-in-cs50-965653520caf#45b0.Google ScholarGoogle Scholar
  84. Samuel Mann and Zelda Frew. 2006. Similarity and originality in code: Plagiarism and normal variation in student assignments. In Proceedings of the 8th Australasian Conference on Computing Education (ACE’06), Vol. 52. Australian Computer Society, Inc., 143--150. http://dl.acm.org/citation.cfm?id=1151869.1151888.Google ScholarGoogle Scholar
  85. S. Manoharan. 2017. Personalized assessment as a means to mitigate plagiarism. IEEE Trans. Educ. 60, 2 (May 2017), 112--119. DOI:https://doi.org/10.1109/TE.2016.2604210Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Leonardo Mariani and Daniela Micucci. 2012. AuDeNTES: Automatic detection of tentative plagiarism according to a reference solution. Trans. Comput. Educ. 12, 1 (Mar. 2012), 2:1--2:26. DOI:https://doi.org/10.1145/2133797.2133799Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Helen Marsden, Marie Carroll, and James T. Neill. 2005. Who cheats at university? A self-report study of dishonest academic behaviours in a sample of Australian university students. Austr. J. Psychol. 57, 1 (2005), 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  88. Raina Mason and Simon. 2017. Introductory programming courses in Australasia in 2016. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 81--89. DOI:https://doi.org/10.1145/3013499.3013512Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Tony Mason, Ada Gavrilovska, and David A. Joyner. 2019. Collaboration versus cheating: Reducing code plagiarism in an online MS computer science program. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). ACM, New York, NY, 1004--1010. DOI:https://doi.org/10.1145/3287324.3287443Google ScholarGoogle Scholar
  90. Donald L. McCabe. 2005. Cheating among college and university students: A North American perspective. Int. J. Educ. Integ. 1, 1 (2005).Google ScholarGoogle ScholarCross RefCross Ref
  91. Donald L. McCabe, Kenneth D. Butterfield, and Linda Klebe Treviño. 2006. Academic dishonesty in graduate business programs: Prevalence, causes, and proposed action. Acad. Manag. Learn. Educ. 5, 3 (2006), 294--305.Google ScholarGoogle ScholarCross RefCross Ref
  92. Donald L McCabe, Linda Klebe Treviño, and Kenneth D. Butterfield. 2001. Cheating in academic institutions: A decade of research. Ethics Behav. 11, 3 (2001), 219--232.Google ScholarGoogle ScholarCross RefCross Ref
  93. Charlie Meyer, Cinda Heeren, Eric Shaffer, and Jon Tedesco. 2011. CoMoTo: The collaboration modeling toolkit. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 143--147. DOI:https://doi.org/10.1145/1999747.1999789Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Phatludi Modiba, Vreda Pieterse, and Bertram Haskins. 2016. Evaluating plagiarism detection software for introductory programming assignments. In Proceedings of the Computer Science Education Research Conference (CSERC’16). ACM, New York, NY, 37--46. DOI:https://doi.org/10.1145/2998551.2998558Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Tamera B. Murdock and Eric M. Anderman. 2006. Motivational perspectives on student cheating: Toward an integrated model of academic dishonesty. Educ. Psychol. 41, 3 (2006), 129--145.Google ScholarGoogle ScholarCross RefCross Ref
  96. Hannah Natanson. 2017. More than 60 Fall CS50 enrollees faced academic dishonesty charges. https://www.thecrimson.com/article/2017/5/3/cs50-cheating-cases-2017/.Google ScholarGoogle Scholar
  97. Sebastian Niezgoda and Thomas P. Way. 2006. SNITCH: A software tool for detecting cut and paste plagiarism. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’06). ACM, New York, NY, 51--55. DOI:https://doi.org/10.1145/1121341.1121359Google ScholarGoogle Scholar
  98. Clifford Nowell and Doug Laufer. 1997. Undergraduate student cheating in the fields of business and economics. J. Econ. Educ. 28, 1 (1997), 3--12.Google ScholarGoogle ScholarCross RefCross Ref
  99. K. J. Ottenstein. 1976. An algorithmic approach to the detection and prevention of plagiarism. SIGCSE Bull. 8, 4 (Dec. 1976), 30--41. DOI:https://doi.org/10.1145/382222.382462Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. A. Parker and J. O. Hamblen. 1989. Computer algorithms for plagiarism detection. IEEE Trans. Educ. 32, 2 (May 1989), 94--99. DOI:https://doi.org/10.1109/13.28038Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Stephanie C. Payne, Satoris S. Youngcourt, and J. Matthew Beaubien. 2007. A meta-analytic examination of the goal orientation nomological net. J. Appl. Psychol. 92, 1 (2007), 128.Google ScholarGoogle ScholarCross RefCross Ref
  102. Paul Phillips and Luc Cohen. 2014. Convictions of plagiarism in computer science courses on the rise. http://www.dailyprincetonian.com/article/2014/03/convictions-of-plagiarism-in-computer-science-courses-on-the-rise.Google ScholarGoogle Scholar
  103. Jonathan Pierce and Craig Zilles. 2017. Investigating student plagiarism patterns and correlations to grades. In Proceedings of the ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE’17). ACM, New York, NY, 471--476. DOI:https://doi.org/10.1145/3017680.3017797Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Jonathan Y. H. Poon, Kazunari Sugiyama, Yee Fan Tan, and Min-Yen Kan. 2012. Instructor-centric source code plagiarism detection and plagiarism corpus. In Proceedings of the 17th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’12). ACM, New York, NY, 122--127. DOI:https://doi.org/10.1145/2325296.2325328Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Asha Prihar and Carly Wanna. 2019. Cheating at Yale: Students get honest about academic dishonesty. https://yaledailynews.com/blog/2019/02/07/cheating-at-yale-students-get-honest-about-academic-dishonesty/.Google ScholarGoogle Scholar
  106. Charles P. Riedesel, Alison L. Clear, Gerry W. Cross, Janet M. Hughes, Simon, and Henry M. Walker. 2012. Academic integrity policies in a computing education context. In Proceedings of the Final Reports on Innovation and Technology in Computer Science Education 2012 Working Groups (ITiCSE-WGR’12). ACM, New York, NY, 1--15. DOI:https://doi.org/10.1145/2426636.2426638Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Charles P. Riedesel, Eric D. Manley, Susan Poser, and Jitender S. Deogun. 2009. A model academic ethics and integrity policy for computer science departments. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE’09). ACM, New York, NY, 357--361. DOI:https://doi.org/10.1145/1508865.1508994Google ScholarGoogle Scholar
  108. E. Roberts. 2002. Strategies for promoting academic integrity in CS courses. In Proceedings of the 32nd Frontiers in Education Conference, Vol. 2. F3G--F3G. DOI:https://doi.org/10.1109/FIE.2002.1158209Google ScholarGoogle ScholarCross RefCross Ref
  109. Sally S. Robinson and M. L. Soffa. 1980. An instructional aid for student programs. In Proceedings of the 11th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’80). ACM, New York, NY, 118--129. DOI:https://doi.org/10.1145/800140.804623Google ScholarGoogle Scholar
  110. F. Rosales, A. Garcia, S. Rodriguez, J. L. Pedraza, R. Mendez, and M. M. Nieto. 2008. Detection of plagiarism in programming assignments. IEEE Trans. Educ. 51, 2 (May 2008), 174--183. DOI:https://doi.org/10.1109/TE.2007.906778Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Mary Shaw, Anita Jones, Paul Knueven, John McDermott, Philip Miller, and David Notkin. 1980. Cheating policy in a computer science department. SIGCSE Bull. 12, 2 (July 1980), 72--76. DOI:https://doi.org/10.1145/989253.1165253Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Judy Sheard, Angela Carbone, and Martin Dick. 2003. Determination of factors which impact on IT students’ propensity to cheat. In Proceedings of the 5th Australasian Conference on Computing Education (ACE’03), Vol. 20. Australian Computer Society, Inc., 119--126. http://dl.acm.org/citation.cfm?id=858403.858418.Google ScholarGoogle Scholar
  113. Judy Sheard and Martin Dick. 2003. Influences on cheating practice of graduate students in IT courses: What are the factors? In Proceedings of the 8th Conference on Innovation and Technology in Computer Science Education (ITiCSE’03). ACM, New York, NY, 45--49. DOI:https://doi.org/10.1145/961511.961527Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Judy Sheard and Martin Dick. 2011. Computing student practices of cheating and plagiarism: A decade of change. In Proceedings of the 16th Joint Conference on Innovation and Technology in Computer Science Education (ITiCSE’11). ACM, New York, NY, 233--237. DOI:https://doi.org/10.1145/1999747.1999813Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Judy Sheard and Martin Dick. 2012. Directions and dimensions in managing cheating and plagiarism of IT students. In Proceedings of the 14th Australasian Computing Education Conference (ACE’12), Vol. 123. Australian Computer Society, Inc., 177--186. http://dl.acm.org/citation.cfm?id=2483716.2483737.Google ScholarGoogle Scholar
  116. Judy Sheard, Martin Dick, Selby Markham, Ian Macdonald, and Meaghan Walsh. 2002. Cheating and plagiarism: Perceptions and practices of first year IT students. In Proceedings of the 7th Conference on Innovation and Technology in Computer Science Education (ITiCSE’02). ACM, New York, NY, 183--187. DOI:https://doi.org/10.1145/544414.544468Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Judy Sheard, Simon, Matthew Butler, Katrina Falkner, Michael Morgan, and Amali Weerasinghe. 2017. Strategies for maintaining academic integrity in first-year computing courses. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’17). ACM, New York, NY, 244--249. DOI:https://doi.org/10.1145/3059009.3059064Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Simon. 2017. Designing programming assignments to reduce the likelihood of cheating. In Proceedings of the 19th Australasian Computing Education Conference (ACE’17). ACM, New York, NY, 42--47. DOI:https://doi.org/10.1145/3013499.3013507Google ScholarGoogle Scholar
  119. Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2013. Academic integrity: Differences between computing assessments and essays. In Proceedings of the 13th Koli Calling International Conference on Computing Education Research (Koli Calling’13). ACM, New York, NY, 23--32. DOI:https://doi.org/10.1145/2526968.2526971Google ScholarGoogle Scholar
  120. Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Academic integrity perceptions regarding computing assessments and essays. In Proceedings of the 10th Conference on International Computing Education Research (ICER’14). ACM, New York, NY, 107--114. DOI:https://doi.org/10.1145/2632320.2632342Google ScholarGoogle Scholar
  121. Simon, Beth Cook, Judy Sheard, Angela Carbone, and Chris Johnson. 2014. Student perceptions of the acceptability of various code-writing practices. In Proceedings of the Conference on Innovation 8 Technology in Computer Science Education (ITiCSE’14). ACM Press, 105--110. DOI:https://doi.org/10.1145/2591708.2591755Google ScholarGoogle Scholar
  122. Simon and Judy Sheard. 2015. Academic integrity and professional integrity in computing education. In Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE’15). ACM, New York, NY, 237--241. DOI:https://doi.org/10.1145/2729094.2742633Google ScholarGoogle Scholar
  123. Simon and Judy Sheard. 2015. In their own words: Students and academics write about academic integrity. In Proceedings of the 15th Koli Calling Conference on Computing Education Research (Koli Calling’15). ACM, New York, NY, 97--106. DOI:https://doi.org/10.1145/2828959.2828977Google ScholarGoogle Scholar
  124. Simon and Judy Sheard. 2016. Academic integrity and computing assessments. In Proceedings of the Australasian Computer Science Week Multiconference (ACSW’16). ACM, New York, NY, Article 3, 8 pages. DOI:https://doi.org/10.1145/2843043.2843060Google ScholarGoogle Scholar
  125. Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, and Jane Sinclair. 2018. Informing students about academic integrity in programming. In Proceedings of the 20th Australasian Computing Education Conference (ACE’18). ACM, New York, NY, 113--122. DOI:https://doi.org/10.1145/3160489.3160502Google ScholarGoogle Scholar
  126. Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair, Gerry Cross, and Charles Riedesel. 2016. Negotiating the maze of academic integrity in computing education. In Proceedings of the ITiCSE Working Group Reports (ITiCSE’16). ACM, New York, NY, 57--80. DOI:https://doi.org/10.1145/3024906.3024910Google ScholarGoogle Scholar
  127. Jaime Spacco, Davide Fossati, John Stamper, and Kelly Rivers. 2013. Towards improving programming habits to create better computer science course outcomes. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education. ACM, 243--248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Paul Stapleton. 2012. Gauging the effectiveness of anti-plagiarism software: An empirical study of second language graduate writers. J. Engl. Acad. Purp. 11, 2 (2012), 125--133.Google ScholarGoogle ScholarCross RefCross Ref
  129. Shauna D. Stephens. 2001. Using metrics to detect plagiarism (student paper). In Proceedings of the 7th Consortium for Computing in Small Colleges Central Plains Conference on the Journal of Computing in Small Colleges. Consortium for Computing Sciences in Colleges, 191--196. http://dl.acm.org/citation.cfm?id=374824.374777.Google ScholarGoogle Scholar
  130. Michael Stepp and Beth Simon. 2010. Introductory computing students’ conceptions of illegal student-student collaboration. In Proceedings of the 41st ACM Technical Symposium on Computer Science Education (SIGCSE’10). ACM, New York, NY, 295--299. DOI:https://doi.org/10.1145/1734263.1734365Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Narjes Tahaei and David C. Noelle. 2018. Automated plagiarism detection for computer programming exercises based on patterns of resubmission. In Proceedings of the ACM Conference on International Computing Education Research (ICER’18). ACM, New York, NY, 178--186. DOI:https://doi.org/10.1145/3230977.3231006Google ScholarGoogle Scholar
  132. Herbert H. Tsang, Alice Schmidt Hanbidge, and Tony Tin. 2018. Experiential learning through inter-university collaboration research project in academic integrity. In Proceedings of the 23rd Western Canadian Conference on Computing Education (WCCCE’18). ACM, New York, NY, 5:1--5:6. DOI:https://doi.org/10.1145/3209635.3209645Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. S. W. Turner and S. Uludag. 2013. Student perceptions of cheating in online and traditional classes. In Proceedings of the IEEE Frontiers in Education Conference (FIE’13). 1131--1137. DOI:https://doi.org/10.1109/FIE.2013.6685007Google ScholarGoogle Scholar
  134. Peter Vamplew and Julian Dermoudy. 2005. An anti-plagiarism editor for software development courses. In Proceedings of the 7th Australasian Conference on Computing Education (ACE’05), Vol.42. Australian Computer Society, Inc., 83--90. http://dl.acm.org/citation.cfm?id=1082424.1082435.Google ScholarGoogle Scholar
  135. Kristina L. Verco and Michael J. Wise. 1996. Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems. In Proceedings of the 1st Australasian Conference on Computer Science Education (ACSE’96). ACM, New York, NY, 81--88. DOI:https://doi.org/10.1145/369585.369598Google ScholarGoogle Scholar
  136. Dieter Vogts. 2009. Plagiarising of source code by novice programmers a “cry for help”? In Proceedings of the Research Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT’09). ACM, New York, NY, 141--149. DOI:https://doi.org/10.1145/1632149.1632168Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. Paula Wasley. 2007. 46 Students are disciplined for cheating at Indiana University’s Dental School. https://www.chronicle.com/article/46-Students-Are-Disciplined/122192.Google ScholarGoogle Scholar
  138. Michael J. Wise. 1996. YAP3: Improved detection of similarities in computer program and other texts. In Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education (SIGCSE’96). ACM, New York, NY, 130--134. DOI:https://doi.org/10.1145/236452.236525Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. David T. Wolfe and Dana R. Hermanson. 2004. The fraud diamond: Considering the four elements of fraud. CPA J. 74, 12 (2004), 38.Google ScholarGoogle Scholar
  140. V. Wright. 2010. Deterrence in Criminal Justice: Evaluating Certainty Vs. Severity of Punishment. Sentencing Project. https://www.sentencingproject.org/wp-content/uploads/2016/01/Deterrence-in-Criminal-Justice.pdf.Google ScholarGoogle Scholar
  141. Lisa Yan, Nick McKeown, Mehran Sahami, and Chris Piech. 2018. TMOSS: Using intermediate assignment work to understand excessive collaboration in large classes. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). ACM, New York, NY, 110--115. DOI:https://doi.org/10.1145/3159450.3159490Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Justin Zobel. 2004. “Uni cheats racket”: A case study in plagiarism investigation. In Proceedings of the 6th Australasian Conference on Computing Education (ACE’04), Vol. 30. Australian Computer Society, Inc., 357--365. http://dl.acm.org/citation.cfm?id=979968.980016.Google ScholarGoogle Scholar

Index Terms

  1. Plagiarism in Programming Assessments: A Systematic Review

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Computing Education
      ACM Transactions on Computing Education  Volume 20, Issue 1
      March 2020
      210 pages
      EISSN:1946-6226
      DOI:10.1145/3363561
      Issue’s Table of Contents

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 December 2019
      • Revised: 1 October 2019
      • Accepted: 1 October 2019
      • Received: 1 May 2019
      Published in toce Volume 20, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format