Proceedings of the 13th Koli Calling International Conference on Computing Education Research 2013
DOI: 10.1145/2526968.2526971
|View full text |Cite
|
Sign up to set email alerts
|

Academic integrity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Source code plagiarism and collusion occur when a person steals another person's source code and claims it as theirs [11,19,47]. Several automated detection techniques have been proposed to capture such a misbehavior [49].…”
Section: Related Workmentioning
confidence: 99%
“…Source code plagiarism and collusion occur when a person steals another person's source code and claims it as theirs [11,19,47]. Several automated detection techniques have been proposed to capture such a misbehavior [49].…”
Section: Related Workmentioning
confidence: 99%
“…Many tools such as MOSS, JPlag, Covet, and CloneDr are commonly used for source code plagiarism detection. However, they are not very suitable for source codes plagiarism detection especially from the perspective of Rapid Application Development tools, which automatically supply a major part of the anticipated solution (Simon et al, 2013). Additionally, in a corpus of student assignments, source-code files may have a similar semantic meaning.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Additionally, computer-based assessment of learning builds confidence in the minds of prospective employers concerning the ability of the student to meet the skills-set required of a computer programmer. However, applying computer-based assessment brings with it additional challenges not commonly found in a traditional paper based assessment settings (Simon, Cook, Sheard, Carbone, & Johnson, 2013). For instance, source codes widely available on the Internet can easily be downloaded and used covertly, or files containing source code of one student can be shared between students on the same intranet.…”
Section: Introductionmentioning
confidence: 99%
“…Jude Carroll from Oxford Brookes University in the United Kingdom, author of the widely used teaching resource, A Handbook for Deterring Plagiarism in Higher Education (2002), also provided a keynote address. The majority of the papers presented at the conference were by Australian LAS advisors, and the emphasis on plagiarism by international students, while still front and center of much of the discussion, was complemented by papers on integrity as a broader, educational issue (see Bell and Cumming-Thom 2003;Chanock 2003;Clerehan and Johnson 2003;Singh 2003). Ursula McGowan has consistently and comprehensively written about the need to reimagine both plagiarism and academic integrity as issues of scholarship and research pedagogy (McGowan 2002(McGowan , 2005a(McGowan , b, 2008.…”
Section: The "Educational Integrity" Movementmentioning
confidence: 99%