Michael DiDiego Draft Personal Research Opinion Paper

Slides:



Advertisements
Similar presentations
Request Dispatching for Cheap Energy Prices in Cloud Data Centers
Advertisements

SpringerLink Training Kit
Luminosity measurements at Hadron Colliders
From Word Embeddings To Document Distances
Choosing a Dental Plan Student Name
Virtual Environments and Computer Graphics
Chương 1: CÁC PHƯƠNG THỨC GIAO DỊCH TRÊN THỊ TRƯỜNG THẾ GIỚI
THỰC TIỄN KINH DOANH TRONG CỘNG ĐỒNG KINH TẾ ASEAN –
D. Phát triển thương hiệu
NHỮNG VẤN ĐỀ NỔI BẬT CỦA NỀN KINH TẾ VIỆT NAM GIAI ĐOẠN
Điều trị chống huyết khối trong tai biến mạch máu não
BÖnh Parkinson PGS.TS.BS NGUYỄN TRỌNG HƯNG BỆNH VIỆN LÃO KHOA TRUNG ƯƠNG TRƯỜNG ĐẠI HỌC Y HÀ NỘI Bác Ninh 2013.
Nasal Cannula X particulate mask
Evolving Architecture for Beyond the Standard Model
HF NOISE FILTERS PERFORMANCE
Electronics for Pedestrians – Passive Components –
Parameterization of Tabulated BRDFs Ian Mallett (me), Cem Yuksel
L-Systems and Affine Transformations
CMSC423: Bioinformatic Algorithms, Databases and Tools
Some aspect concerning the LMDZ dynamical core and its use
Bayesian Confidence Limits and Intervals
实习总结 (Internship Summary)
Current State of Japanese Economy under Negative Interest Rate and Proposed Remedies Naoyuki Yoshino Dean Asian Development Bank Institute Professor Emeritus,
Front End Electronics for SOI Monolithic Pixel Sensor
Face Recognition Monday, February 1, 2016.
Solving Rubik's Cube By: Etai Nativ.
CS284 Paper Presentation Arpad Kovacs
انتقال حرارت 2 خانم خسرویار.
Summer Student Program First results
Theoretical Results on Neutrinos
HERMESでのHard Exclusive生成過程による 核子内クォーク全角運動量についての研究
Wavelet Coherence & Cross-Wavelet Transform
yaSpMV: Yet Another SpMV Framework on GPUs
Creating Synthetic Microdata for Higher Educational Use in Japan: Reproduction of Distribution Type based on the Descriptive Statistics Kiyomi Shirakawa.
MOCLA02 Design of a Compact L-­band Transverse Deflecting Cavity with Arbitrary Polarizations for the SACLA Injector Sep. 14th, 2015 H. Maesaka, T. Asaka,
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Fuel cell development program for electric vehicle
Overview of TST-2 Experiment
Optomechanics with atoms
داده کاوی سئوالات نمونه
Inter-system biases estimation in multi-GNSS relative positioning with GPS and Galileo Cecile Deprez and Rene Warnant University of Liege, Belgium  
ლექცია 4 - ფული და ინფლაცია
10. predavanje Novac i financijski sustav
Wissenschaftliche Aussprache zur Dissertation
FLUORECENCE MICROSCOPY SUPERRESOLUTION BLINK MICROSCOPY ON THE BASIS OF ENGINEERED DARK STATES* *Christian Steinhauer, Carsten Forthmann, Jan Vogelsang,
Particle acceleration during the gamma-ray flares of the Crab Nebular
Interpretations of the Derivative Gottfried Wilhelm Leibniz
Advisor: Chiuyuan Chen Student: Shao-Chun Lin
Widow Rockfish Assessment
SiW-ECAL Beam Test 2015 Kick-Off meeting
On Robust Neighbor Discovery in Mobile Wireless Networks
Chapter 6 并发:死锁和饥饿 Operating Systems: Internals and Design Principles
You NEED your book!!! Frequency Distribution
Y V =0 a V =V0 x b b V =0 z
Fairness-oriented Scheduling Support for Multicore Systems
Climate-Energy-Policy Interaction
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Ch48 Statistics by Chtan FYHSKulai
The ABCD matrix for parabolic reflectors and its application to astigmatism free four-mirror cavities.
Measure Twice and Cut Once: Robust Dynamic Voltage Scaling for FPGAs
Online Learning: An Introduction
Factor Based Index of Systemic Stress (FISS)
What is Chemistry? Chemistry is: the study of matter & the changes it undergoes Composition Structure Properties Energy changes.
THE BERRY PHASE OF A BOGOLIUBOV QUASIPARTICLE IN AN ABRIKOSOV VORTEX*
Quantum-classical transition in optical twin beams and experimental applications to quantum metrology Ivano Ruo-Berchera Frascati.
The Toroidal Sporadic Source: Understanding Temporal Variations
FW 3.4: More Circle Practice
ارائه یک روش حل مبتنی بر استراتژی های تکاملی گروه بندی برای حل مسئله بسته بندی اقلام در ظروف
Decision Procedures Christoph M. Wintersteiger 9/11/2017 3:14 PM
Limits on Anomalous WWγ and WWZ Couplings from DØ
Presentation transcript:

The Assault on Academic Integrity Through the Internet and Social Media Michael DiDiego Draft Personal Research Opinion Paper Wilmington University May 18, 2017

Figure 1 The Dewitt-Clinton, One of the Earliest Railroad Carriages Figure 1 The Dewitt-Clinton, One of the Earliest Railroad Carriages (The Dewitt Clinton, 2017)

Prelude The computer with the information age has arrived in the station. Whether we like it or not we may be going down the tracks with it even though our destination may be still unknown. We are all in the mist of the information age.

Do You Know? THE ASSAULT ON ACADEMIC INTEGRITY Data is traveling fast. Specifically, it can travel at data transfer rates of 1 to 10 gigabytes per second (gbps). Just think how quickly we can browse the internet to find a question’s answer. Do you know when such a search by a student is cheating?

The Internet and Social Media presentation modules INTEGRITY PERSPECTIVE (paper pages 6 – 12) ETHICAL DILEMMA (12-15) THE SITES (15-21) SOLUTIONS (21-27)

Integrity Perspective basics VISION OF INTEGRITY ACADEMIC INTEGRITY SITE INTEGRITY DISPLACED

Integrity Perspective Basics EDUCATOR Grading Assessment Checking information (data) Evaluating Data for Results Verifying Data’s Veracity EDUCATOR & SYSTEM PROFESSIONAL Common Concern Integrity of Data Information System & Control Association (ISACA) Share Insight for Solutions Next ---Vision of Integrity

is our primary purpose, and responsiveness to community needs is key” “We are committed to being a university where respect for each other is paramount, integrity guides all our choices, providing educational opportunity is our primary purpose, and responsiveness to community needs is key” (Wilmington University Mission, Vision, & Values, 2017).

Academic integrity site The International Center for Academic Integrity (ICAI) was founded to combat cheating, plagiarism, and academic dishonesty in higher education. Its mission has since expanded to include the cultivation of cultures of integrity in academic communities throughout the world. ICAI offers assessment services, resources, and consultations to its member institutions, and facilitates conversations on academic integrity topics each year at its annual conference. (ICAI, 2016a)

INTEGRITY DISPLACED (ICAI, 2016b)

Ethical Leadership through Cybersecurity How do we deal with the dilemma of compressed time and increasing workloads? Well, for some students they have found the solution. They just maximize the use of their internet (cyber) resources. They google the answer and paste the results. No need then to buy or read the book. This is their shortcut. Not only do they save time but they can get a good grade too. We should recognize that cybersecurity is our job as well as information technology (Hasib, 2015). We should avoid thinking that we can avoid using technological approaches and tools because the traditional methods are enough. We need to recognize that electronic devices in our modern classrooms can negate the effectiveness of even traditional proctoring. A humorous example of electronic cheating in the classroom can be seen on YouTube (Japan Exam Cheating Technology, 2016).

Degree is Recognition of Student Achievement Not Enough to cut, paste & copy To demonstrate ACQUIRED KNOWLEDGE SOLUTION ALIGNMENT OF GOALS, OBJECTIVES AND POLICY OF THE INSTITUTION By Engagement, Convergence & Strategic Leadership Collaboration

Cheat Sites & Social Media Top 8

Student’s Testimonials – Approach on Integrity One site, “No Need to Study,” boast that they have a pool of experienced academic tutors to take classes and complete course work for any student. They even have handy video references that show satisfied clients plugging the cheat sites results. These clients, students, brag how easy it was to pay someone else to take their online classes. One student who previously failed a course stated: but “the quizzes were just way too difficult” so he searched for a solution. “They got it done, and they did really, really well,” he continues. “They absolutely killed my final math and app classes with a 90 percent, and I can definitely tell you I never got a 90 percent before on anything” (Newton, 2015, p2).

Site’s Price & Social Cost Easy A’s for a Price Big Business Poised to be $100 billion industry “No Need to Study” cite offers: Online English Literature Class at Columbia University for $1225.15 RINGER GUARNTEES B OR BETTER (Newton, 2015) DEGREE VALUE DIMINISHED THROUGH CREDIBILITY ISSUE Identity-fraud schemes Pay for grade Do not work At least with traditional degree Assumption you personally went to class (Newton, 2015)

Ensuring Institutional Reputation

Known Academic Strategies Documented Strategy with associated policies and procedures Use a holistic approach to integrate emerging technologies Develop risk assessment and a project plan to address issues such as: Smear Campaign Assault on Institution Reputation Social Media proliferating academic cheating (ISACA, 2010)

Control Objectives for Information and related Technology (COBIT) Enabling a Holistic Approach, Slide 24 (IT Governance Institute, 2012)

Considers Goals for Culture Ethics & Behavior • Organizational ethics, determined by the values by which the enterprise wants to live • Individual ethics, determined by the personal values of each individual in the enterprise and depending to an important extent on external factors such as religion, ethnicity, socioeconomic background, geography and personal experiences

SOCIAL MEDIA AN OLD PROBLEM Even to Martin (1973) over 4 decades ago, the legal and societal environment is the most problematic. Accordingly, he wrote and illustrated (when discussing the control environment): “The outermost layer (in concentric circles of IT security) is by far the most problematical. When the computer and telecommunications revolution has run its full course (and today it is only just beginning), society will be very different. Many contorls will no doubt have evolved, seeking to maximize the benefits and minimize the dangers of a technology of which George Orwell never dreamed.” (Martin, 1973, p. 7))

Your new data center can look like this: ”Stay seamlessly connected with available built-in 4G LTE Wi-Fi.®† Connect up to seven devices to easily access apps, stream music or work on the go, on a signal that’s more powerful than your smartphone” (Chevrolet, 2017). If you choose to connect to a cloud infrastructure platform, you can have a data center more powerful than what existed in 1973.

CONCLUSION Again, in my opinion we need to restore our foundation with a solid builder. Time is needed for a new advocate to protect our integrity: The Dean of the Internet and Social Media.

References