C. van Noortwijk - Plagiarism & Fraud 1 Plagiarism and Fraud in Education Kees van Noortwijk Erasmus University Rotterdam Centre for Computers and Law.

Slides:



Advertisements
Similar presentations
The University Academic Integrity Initiative. The University The University of Bath is one of the UKs leading universities with a vibrant and innovative.
Advertisements

Business School How to Interpret Turnitin Reports Lindsay Williams Senior Lecturer in Business and Management.
Use of Plagiarism Detection Services at JNU Manorama Tripathi Central Library JNU, New Delhi.
GTCC Writing Centers.  Quotation/Quoting ◦ Verbatim  Paraphrase  Summary  Citation/Citing  Documentation  Bibliography  Works Cited/References.
Academic Honesty Perspectives and policies at Mälardalen University School of Innovation, Design and Engineering 2009.
CITE. PLAGIARISM: THE CUT AND PASTE GENERATION April Faculty Meeting.
© 2010 Blackboard Inc. All rights reserved. Blackboard Learn 9.1 SafeAssign.
Thou Shalt Not Steal! Learning About Plagiarism What is plagiarism? Plagiarism is handing in someone else’s work to your teacher and putting your name.
Plagiarism Citing and listing academic references.
PLAGIARISM LESSON This was a 5-7 minute lesson conducted in classrooms after the Marauder 5 student created presentation. Its purpose was to review and.
Plagiarism. Plagiarism or not? You have too much work to do and your English essay is due. Instead of doing this essay, you hand in an essay on the same.
1 SESSION 3 FORMAL ASSESSMENT TASKS CAT and IT FORMS OF ASSESSMENT.
1 Referencing, avoiding plagiarism and using Turnitin Laura Jeffrey (University Library) Mike Cameron (Learning Technologies Team) 16th July 2009.
1 Referencing, avoiding plagiarism and using Turnitin Mike Cameron (Learning Technologies Team) Nicola Siminson (University Library) 23 rd July 2008.
Directorate of Human Resources Student plagiarism Deterring, detecting and dealing with it Jude Carroll.
1 Plagiarism Policy Penalty Guidelines How to Avoid Plagiarism.
HOW TO USE YOUR TURNITIN REPORT I think it is a very positive tool that enhances student learning. It can be used for the purposes of developing and learning.
Using Turnitin K. Robins and K. McCourt. Aims of Session To be aware of the benefits of using Turnitin for formative feedback; To be able to set up Turnitin.
Skillful writing and prevention of plagiarism with Turnitin Orientation material for teachers Minna Vänskä, Educational Developer Strategic Support.
Understanding plagiarists and preventing plagiarism Caleb Owens Fiona White School of Psychology.
PLAGIARISM Sixth Form Induction.
Carmen Genuardi, Librarian R esearch S trategies: From Information Consumers to Information PRODUCERS… YES YOU CAN! WELCOME!
BIT 285: ( Web) Application Programming Lecture 14 : Thursday, February 19, 2015 SQL Database and LINQ Instructor: Craig Duckett.
Plagiarism—the challenge and solutions A workshop for sharing ideas- 24 May 2003.
Plagiarism What it is and how to avoid it Designed by Kristina Ryan Library & Learning Resources June 18, 2011.
Week 1: Find resources, Summarize, paraphrase, thesis, and outline Week 2: Research and Write, incorporate evidence and transitions (1/2 done) Week 3:
D.R. Jones Judy Kaul Case Western Reserve University School of Law Library Plagiarism Detection Software2.
EleUM (Electronic Learning Environment University Maastricht)
Designing in and designing out: strategies for deterring student plagiarism through course and task design Jude Carroll, Oxford Brookes University 22 April.
Digital Assessment Training Trainer: Name
 The Master Technology Teacher demonstrates knowledge of how to communicate in different formats for diverse audiences.
© 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1 Product Design Finalization; Inspections.
All My Own Work: Module 3: Plagiarism Source:
Lecture 1 Management Information Systems BUAD 283 Welcome to the Online Course! Instructor: Glen J. Coulthard Thought For the Day: “As a computer, I find.
Academic Integrity in the 21 st Century Collegiate Environment.
Plagiarism Guidelines What is plagiarism?. Academic Honesty “Honesty by individuals and social groups is a basic value essential to a fair and just society.
INF Development of IT competence in organisations Welcome! 1 10 ECTS credits Builds on basic informatics competence MemeCenter.com.
The Chattahoochee Way Academic Integrity (Don’t cheat.)
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom 1 Copyright © 2003 Stevens Institute of Technology, CIESE, All Rights Reserved.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Genius Hour: Biweekly Objectives SS Literacy. Genius Hour Biweekly Objectives During the Genius Hour Independent Research Project, students will review.
C. van Noortwijk - CEIL 1 CEIL Community of Experts on Internet Law Kees van Noortwijk Erasmus University Rotterdam Centre for Computers and Law.
Living Online Module Lesson 27 — Evaluating Online Information
Scholarship Skills Andrew Black 1 Lecture 1 Scholarship Skills Andrew P Black Winter 2013 All material © 1996–2012 David Maier, Tim Sheard, Andrew Black,
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
E-Safety Challenge College. Learning Objectives Discuss the term plagiarism when using the Internet and it’s relevance to school work.
Moodle Lesson Stanisław Waberski, CKU Siedlce Kaunas, 30 March 2011.
©2006 Richard Watson Todd Dealing with Large Classes b b The Research, the Problems and some Solutions b b Richard Watson Todd b b KMUTT.
CSS THE MISSING MANUAL Introduction. Benefits of CSS Style sheets offer more formatting choices than are offered in straight HTML  EXAMPLE: When you.
Chantira Chiaranai, RN, PhD Institute of Nursing Suranaree University of Technology Electronic Learning Portfolio: An Innovation Emphasizing Self-directed.
PLAGIARISM Dr Cordelia Beattie School Academic Misconduct Officer.
PLAGIARISM Dr Cordelia Beattie School Academic Misconduct Officer.
E D U C A T I O N A L T E C H N O L O G Y U N I T CAD P. Y. Thomas Educational Technology Unit Centre for Academic Development PlagScan: Originality Checker.
Module 4 REFERENCING AND AVOIDING PLAGIARISM Part 5 Making your work consistent, reliable and accurate.
How to Turnitin Dr Stephen Rankin Lecturer in Academic Writing and Literacy Murdoch University A 6 step guide for submitting your assignments to Turnitin.
March 2013 Turnitin A Plagiarism Check Software for Kenyatta University.
INTRODUCTION TO COLLEGE WRITING Writing Workshop September 24 & 25, 2015.
Computing Honours Project (COMP10034) Lecture 1 Module Introduction & Overview.
PLAGIARISM Dr Cordelia Beattie School Academic Misconduct Officer.
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Introduction to Algorithms
How does turnitin.com work? How will I be using it in my classes?
Turnitin ; software for originality check
Scholastica C. Ukwoma, Ph.D
Overview of Informatics
Click the EBSCO link on Moodle
Overview of Informatics
Summative Reports Data Interpretation
Introduction to Algorithms
Presentation transcript:

C. van Noortwijk - Plagiarism & Fraud 1 Plagiarism and Fraud in Education Kees van Noortwijk Erasmus University Rotterdam Centre for Computers and Law

C. van Noortwijk - Plagiarism & Fraud 2 Overview Description of the problem Importance of the problem Possible measures against it –Organisational –Technical Some specific tools –Fraud Finder software / services –Portfolio-based solutions

C. van Noortwijk - Plagiarism & Fraud 3 The problem of Plagiarism & Fraud Plagiarism: use of other people’s words or ideas without giving proper credit Fraud (in education): plagiarism and other forms of copying in situations where this is expressly forbidden (examination, individual assignment)

C. van Noortwijk - Plagiarism & Fraud 4 How important is this problem? Plagiarism –students are unaware they should acknowledge properly – happens very often Fraud –First year students share assignments –Recent experience: 600 assignments, 50 ‘suspect pairs’ (= 100 students); 20 marked as Fraud –Thesis: several examples of complete copies

C. van Noortwijk - Plagiarism & Fraud 5 Why all the recent attention? Information technology –has made it easier (Copy and Paste 100 pages at the touch of a button) –has changed the scale (internet as a global source) –can even provide tools to mask fraudulent actions Education –renewed attention for individual, written work –more essays, less multiple choice questions –information retrieval skills are encouraged

C. van Noortwijk - Plagiarism & Fraud 6 Non-technical counter measures Make subject explicit Give guidelines for proper acknowledgment Exercise an ‘honour code’ Design exams & assignments carefully Etc.

C. van Noortwijk - Plagiarism & Fraud 7 Technical counter measures Three main categories: 1.Check student work ‘externally’ against every available electronic source (internet) 2.Check student work ‘internally’ against that of other students (i.e. compare exams / assignments) 3.Check the consistency of all productions by every single student

C. van Noortwijk - Plagiarism & Fraud 8 1. External checking By hand find a characteristic phrase and try to find this using Google By means of a (usually commercial) service upload one or more documents, receive a report on suspicious elements –Safe Assignments –Turnitin –Urkund –Ephorus Etc.

C. van Noortwijk - Plagiarism & Fraud 9 2. Internal checking Closed set of documents Finding and displaying similar pairs/sets Let the teacher decide if a similarity constitutes fraud/plagiarism Especially useful for assignments Software: –Wcopyfind –CopyCatch –Codas Fraud Finder

C. van Noortwijk - Plagiarism & Fraud 10 The ‘Fraud Finder’ Programme Document pairs compared Similarity score Document pairs ranked according to score Used to detect plagiarism / fraud

C. van Noortwijk - Plagiarism & Fraud 11 Results of ‘Fraud Finder’ Ordered list of pairs Indication of re-occurrence of assignments Fraud score Possibility to open both documents and inspect them

C. van Noortwijk - Plagiarism & Fraud Consistency checking Verify authorship by comparison Has been performed (mostly by hand) by linguists and statisticians for over 50 years Characteristics: word use, syntax elements, etc. Needed: –‘Portfolio’ of all written work of a student –‘Background database’ with work by others

C. van Noortwijk - Plagiarism & Fraud 13 Tool for consistency checking Examples / Counter examples Earlier work by this student: + Work by other students: - New essay / thesis: unmarked Calculate document scores, evaluate position of the new essay

C. van Noortwijk - Plagiarism & Fraud 14 Conclusion Plagiarism & Fraud have become a serious problem IT can play a role in the ‘invocation’ IT can also play a role in fighting it Technical means can be effective, but need to be embedded in the educational policy of the institution Conventional means are still important as well