LTSN-ICS Plagiarism Workshop 2002 Prevention better than cure? The case for Plagiarism Detection H.C. Davis IAM: Learning Technologies E lectronics and.

Slides:



Advertisements
Similar presentations
Key Contacts Meeting. Assessment Types of assessment Making assessment fit for purpose –Aligning.
Advertisements

Faculty of Technology Computing and Information Systems Automated System for the Assessment of Programming Kingston University Dublin City University Karlsruhe.
Deterring and detecting plagiarism workshop Judy Cohen, UELT.
Extreme Programming Alexander Kanavin Lappeenranta University of Technology.
File Server Organization and Best Practices IT Partners June, 02, 2010.
Computer Security coursework 3 (part 2) Dr Alexei Vernitski.
Academic Honesty Perspectives and policies at Mälardalen University School of Innovation, Design and Engineering 2009.
Barry Gilmore Write from Wrong: Strategies for Addressing Student Plagiarism.
JAVA BASICS SYNTAX, ERRORS, AND DEBUGGING. OBJECTIVES FOR THIS UNIT Upon completion of this unit, you should be able to: Explain the Java virtual machine.
1 Strategies for Preventing Student Plagiarism Kam-Por Kwan, EDC x6287 EDC Lunchtime Session 30 March 2001.
Intro to CIT 594
Automatic Plagiarism detection Charlie Daly Jane Horgan Dublin City University.
Using the Java programming language compiler. Review of relevant material from previous lectures From previous lectures: A computer can only execute machine.
Build Your Own Website Introduction Introduction Phil Stone Phil Stone ICT tutor for Dudley Adult Community Learning ICT tutor for Dudley Adult Community.
Unit 2: Managing the development of self and others Life Science and Chemical Science Professionals Higher Apprenticeships Unit 2 Managing the development.
Chapter 2 How to Compile and Execute a Simple Program.
Assignment 3: A Team-based and Integrated Term Paper and Project Semester 1, 2012.
Computer Viruses Preetha Annamalai Niranjan Potnis.
Source Code and Text Plagiarism Detection Strategies
Academic Integrity Your choices matter!. Quickwrite: Select one of the following quotes regarding INTEGRITY and respond to it.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
Testovid - an environment for testing almost any aspect of student assignments I. Pribela, S. Tošić, M. Ivanović, Z. Budimac Risan, September 2007.
Booting. Booting is the process of powering it on and starting the operating system. power on your machine, and in a few minutes your computer will be.
Guidelines for Homework 6. Getting Started Homework 6 requires that you complete Homework 5. –All of HW5 must run on the GridFarm. –HW6 may run elsewhere.
Computer Security coursework 2 Dr Alexei Vernitski.
Welcome to CS 115! Introduction to Programming. Class URL
E- ASSESSMENT Why use it.. whatever it is? Phil Davies School of Computing University of Glamorgan.
1 Project Information and Acceptance Testing Integrating Your Code Final Code Submission Acceptance Testing Other Advice and Reminders.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Welcome to CS 115! Introduction to Programming. Class URL ~mjspra2/ 115summer/
CS 320 Assignment 1 Rewriting the MISC Osystem class to support loading machine language programs at addresses other than 0 1.
Fundamental Programming: Fundamental Programming K.Chinnasarn, Ph.D.
Managing Group-based Coursework in an e- Learning environment - M²AGIC™ Eur Ing Dr Peter Nicholl 31 May 2006.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
CS255 Communication Skills Aidan Mooney
Poon Yan Horn Jonathan 09/04/2010 School Of Computing National University of Singapore Student Submissions Integrity Diagnosis (SSID) A User-Centric Plagiarism.
Computer Security coursework 1 Dr Alexei Vernitski.
Intro to CS ACO 101 Lab Rat. Academic Integrity What does that mean in programming? Log into Blackboard and take the test titled “Applied Computing Course.
WELCOME to CS244 Brent M. Dingle, Ph.D Game Design and Development Program Mathematics, Statistics and Computer Science University of Wisconsin -
The Homepage My Campaign is where you can track your contacts information.
P.R.I.D.E. School Professional Day :45 am- 3:30 pm.
Separating the Interface from the Engine: Creating Custom Add-in Tasks for SAS Enterprise Guide ® Peter Eberhardt Fernwood Consulting Group Inc.
Computer Security coursework 3 (part 1) Dr Alexei Vernitski.
ECEG-3202 Computer Architecture and Organization Chapter 7 Reduced Instruction Set Computers.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Stepes of a computer infection. An infected.EXE file arrives as an attachment.
20081 Converting workspaces and using SALT & subversion to maintain them. V1.02.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
INTRODUCTION TO DATA STRUCTURES AND ALGORITHMS Thomas Kuehne School of Engineering and Computer Science, Victoria University of Wellington COMP T2.
Cite your stuff A simple guide to knowing what PLAGIARISM is and what you can do to avoid it.
Helpful Hints for Paper Writing Let’s get it right the first time…
PBL for the 21 st century. Begin with the end in mind Knowledge of science, history, literature, languages, etc. Time management Strong work ethic Respectful.
(1) Introduction to Robocode Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of Hawaii Honolulu.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
INTRODUCTION TO DATA STRUCTURES AND ALGORITHMS Thomas Kuehne School of Engineering and Computer Science, Victoria University of Wellington COMP T2.
Solutions of Case Study 4 & 6
Designing out Plagiarism
Tackling Plagiarism with Blended Assessment and Randomisation
Course Information Mark Stanovich Principles of Operating Systems
How to Fix Microsoft Office Error 2932 at Support Number
Software Development Jar Files for Applications and Libraries
Un</br>able’s MySecretSecrets
Academic integrity Plagiarism in written assignments is:
Chapter 1 Introduction(1.1)
Academic integrity Plagiarism in written assignments is:
Outline Chapter 2 (cont) OS Design OS structure
Fall 2018 CISC124 2/24/2019 CISC124 Quiz 1 marking is complete. Quiz average was about 40/60 or 67%. TAs are still grading assn 1. Assn 2 due this Friday,
Phil Davies School of Computing University of Glamorgan
Mrs. Vargas Chemistry Expectations Consequences Rules Honors
Contents Contents Contents Contents Sub Copy Contents Sub Copy
Presentation transcript:

LTSN-ICS Plagiarism Workshop 2002 Prevention better than cure? The case for Plagiarism Detection H.C. Davis IAM: Learning Technologies E lectronics and Computer Science University of Southampton

LTSN-ICS Plagiarism Workshop 2002 Structure of this Talk (Largely concerned with Source Code Plagiarism) What is plagiarism? The causes of plagiarism? Approaches to preventing plagiarism Detecting Source Code Plagiarism Case Study using JPlag

LTSN-ICS Plagiarism Workshop 2002 What is Plagiarism Obviously direct wholesale copying of source…but – How much source should be the same in well written solutions to a small problem? – What about buddying and team working? – How are we going to catch sub-contractors?

LTSN-ICS Plagiarism Workshop 2002 Some Thoughts It is very difficult to prove copying It is even more difficult to prove sub- contracting This talk assumes that our intention is to prevent plagiarism rather than to get involved in post-hoc legislatation

LTSN-ICS Plagiarism Workshop 2002 The causes of plagiarism? Over assessment Unrealistic expectations Strategic/cynical time management Cultural expectation Team working Fear of failure Laziness

LTSN-ICS Plagiarism Workshop 2002 Approaches to preventing plagiarism (1) Clear university/departmental policy Needs to define –What is plagiarism? –What will be done? –The borderline between acceptable collaboration and unacceptable plagiarism

LTSN-ICS Plagiarism Workshop 2002 Approaches to preventing plagiarism (2) Signed statements from students Give them the opportunity to admit to what they needed to borrow in order to complete the assignment

LTSN-ICS Plagiarism Workshop 2002

Approaches to preventing plagiarism (3) Logbooks and Time-stamped code development It is hard to reverse engineer this stuff (especially without learning!)

LTSN-ICS Plagiarism Workshop 2002 Approaches to preventing plagiarism (4) Reduce assessment load Diversify type of assessments –(peer marking and review, multiple choice questions, self assessed team assignments) Establishing a culture of learning (rather than mark grubbing)

LTSN-ICS Plagiarism Workshop 2002 Approaches to preventing plagiarism (5) Detection Naming and shaming

LTSN-ICS Plagiarism Workshop 2002 Detecting Source Code Plagiarism Must have all code on-line (floppies or hard copy not helpful) Simple searching for suspicious strings Scripts as above Simple byte code comparisons Specialised tools (JPLAG, MOSS, Coursemaster)

LTSN-ICS Plagiarism Workshop 2002 Case Study Using JPLAG Getting Started First get yourself registered with JPlag at ( Download the JPlag applet

LTSN-ICS Plagiarism Workshop Collect Student Assignments JPLAG expects one directory per student. That coursework can have subdirectories and JPLAG doesnt care what the files are called. At Soton we have a handin machine which supplies a ZIP file of exactly such a directory file with the students username as the directory name, so all you have to do is unpack it where you want it.

LTSN-ICS Plagiarism Workshop 2002

Run the Applet >c:\jdk1.3\bin\java –jar C:\jdk1.3\jplagapplet.jar After a few minutes you will be able to see the results

LTSN-ICS Plagiarism Workshop 2002