in Computer
Plagiarism
Dr. Department
James
Science Courses
K. Harris
of Mathematics
and Computer
Francis
University
Marion
Florence,
Science
SC 29501
that you don’t care who does their own work. Accepting that grades really don’t matter. Accepting
Abstract
that you don’t care, period. Plagiarism been
of computer
a problem
copying,
vague
in higher
plagiarism,
plagiarism
by students,
instructors
and
of other
much
lack
less preferable)
is detection.
detecting
can be used
possible
concerning software
plagiarism.
how
to deal
monitors
with
to detect
The
History
This
host
first
The bounds of plagiarism
step
files
plagiarism
gives
and
program
syntax and program
semantics.
using
therefore
Plagiarism ignore
prefer
is an emotional
to look
the problem
the other
rather
you must make absolutely
than
topic. way,
sure plagiarism
First,
has occurred.
Then you must confront the student. The reactions range from pleading to th,reats of libel. You may have to appear in front of a disciplinary
semester.
can
knowingly
plagiarize
Wrong.
should be presented
should always be ready and willing
to discuss
Detection I have found that despite prevention,
their
They cheat themselves
of plagiarism
the issue with students [3]. It should be made clear that plagiarism is destructive to everyone and will not be tolerated. These measures help reduce the problem, but do not make it go away.
number
grades at the expense of students who are sincerely trying to do their own work.
Examples
Teachers
court
Students who
cheat others by inflating
their
and time should be spent discussing the issue in class.
usually consisting of both students, faculty and administrators, defending your position and most of the time feeling as though you’re on trial. Trust is broken between teacher and student. There is an adversarial relationship and the atmosphere in class is tense. So it’s probably better to look the other way, right?
must do exclusively
This is a well defined and easily understood Whatever your policies for plagiarism are,
they should be explained clearly in your syllabus and repeated several times in the beginning and during the
to
deal with it [1,2].
by
science courses,
in these courses are now
ie. each student
own work. boundary.
Most
choosing
computer
my assignments
restricted,
It is permitted
syntax, but not program
These are concepts not easily understood
students in introductory
plagiarism.
Introduction
teachers
semantics.
for students to discuss program
advice
and with
must be well defined.
This is not as simple as it may seem. In my progr amming classes I used the distinction between
(and
to aid in
paper
approach.
Prevention
the second
as a tool
You must take a reasonable
by
and a whole
to plagiarism.
is prevention,
innocent.
of
of enforcement
administrators,
contribute
metrics
of electronic as to what
acceptance
plagiarism
software
Ease
I am not saying that you
should go on a witch hunt, jumping to conclusion, taking an accusato~ posture and assuming guilt before
has long
by students
increasing
school
factors
in curbing
education.
understanding
constitutes
programs
of students plagiarize
anyway.
goes on, time becomes scarce, schoolwork by
and the plagiarism
denying their own education and they cheat the’ author by claiming the work to be theirs. It is not only our job as teachers to demand that plagiarism is unacceptable, but it is our ‘job to actively look for plagiarism. A passive attitude is equivalent to acceptance. Accepting
lectures
given earlier
become a thing of the past. complacent. comfortable have
many
do is look
You with papers
become your
for plagiarism.
increases, in the semester
You tend to become more
class,
to grade.
a good
As the semester
familiar
get into The
For
and
a pattern,
last thing
example,
and
you
most
wmt
to
semesters
I teach two introductory CS courses consisting of approximately 25 students in each. This would mean that I would have to compare 1225 pairs of programs to
Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association of Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. Ethics in Computer Age, Gatlinburg,TN USA @ 1994 ACM 0-89791 -644-1 /94/001 1...$3.50
ensure no plagiarism. Some plagiarism stands out like a sore thumb. The same obscure mistakes in two or more programs is a good example. Even so, it is not
133
especially period
if they are graded over a relatively
of time.
This is where automation
long
programs
can be
as the syntax is more rigid forcing
effective. Computers can be used to compare files for similarities or differences that can point to possible
and Feder’s
plagiarism. These “plagiarism detecting” programs should only be used as tools to point at statistical
identify
anomalies and trends. Only through further examination can one come to the conclusion plagiarism
has occurred.
automated
detectors
problems
“misconduct
similar
Care should be taken using
Plagimizing one problem
case of
the number
programming Accountability
should calmly and clearly discuss the situation
is the number
computer
one problem More
science with my
in most
needs to be done to curb
to those who do their own work. REFERENCES
with the
[1] White, Edward M. Too Many Campuses Want to Sweep Student Plagiarism Under the Rug. I!l!2
If the
then the penalty
in the syllabus should be imposed.
Chronicle
Education,
of Higher
v39, n25 (Feb. 24,
1993), pA44(l).
This
happens to several students early in the [2] Mooney, Carolyn J. Critics Question Higher Commitment and Effective= in Edumtion’s Dealing with Plagiarism. The Chronicle of Higher Education, v38, n23 (Feb. 12, 1992) pA13(2).
semester and sends a clear message to others that plagiarism
is not tolerated. Methods There
of Automated
are many methods
to help detect plagiarism
[7,8,9].
Detection
p54(3).
for similarities.
programs
to remove those programming
can be filtered
constructs
that students generally
going to plagiarize
(ie. variable
Sterling, Gary Plagiarism and the Worms of [3] Accountability. Education Di~est v57, n9 (May 1992)
for using computers One is to compare
pairs of source programs
Computer
[4]
change if they are
names, comments,
the copy (although
your grade book will generally
Also, comparing
absolutely
determine
Chronicle
has occurred
but it generally
harder
Forbes, Malcolm [5] v151, n12
do
Who Was 14,
S. No One is Safe.
Forbes
(June 7, 1993) p26(l). [6] Magner, Denise K. History Association to Probe Accusations of Plagiarism Against Stephen Oates. The Chronicle of Hi~her (June 2, 1993) pA12(3).
and
to find them in
a micro-computer environment. Comparing the history file to the source file can often determine absolutely that plagiarism has occurred. It can also determine if a program was copied electronically, or if it was copied on the keyboard. A novel method of detection is used by Glatt Plagiarism Services [7] for detecting plagiarism in English papers and involves removing every fifth word. Students should then be able to reconstruct the text.
of Higher
Historian
Faces New Complaint. I!x2 n32 (Apr. Education v39,
and
therefore more analysis is needed. Another is to compare a history file with the source program. History files can usually be provided by mainframe mini computers,
Denise K.
1993) PA19(2).
two source files cannot if plagiarism
Magner,
Accused of Plagiarism
etc.).
The remaining text is tokertized and a string matching algorithm is used to compare pairs of files for the longest matching substrings. Comparing two source files can point to similar files, but cannot tell which is
original
classes.
If a group of students them individually. You
student and give them a chance to explain.
that).
programs
plagiarism. It should never be swept under the rug or accepted as part of the status quo. It is simply not fair
Once it has been determined without a doubt that plagiarism has occurred, the student should be
generally
computer
in my introductory
classes, and I would guess from discussions colleagues,
is not satisfacto~,
to help
text [6, 8]. Conclusions
Dr. Stephen Oates [4,5,6].
explanation
Stewatt
used to prosecute
that
than they solve as in the plagiarism
prescribed
machine”
Dr. Stephen Oates uses language semantics
as they can very often cause more
confronted as soon as possible. is involved, it is best to confront
certain
10 DO).
fifth words (ie. FOR i = 1
This may not work as well for computer
134
Education
[7] Eng, Paul M. Bits and Bytes. n3197 (Jan 28, 1991), p70.
v39, n39
Business Week
Anderson, Christopher Robocops: Stewart and [8] Feder’s mechanized misconduct search. Nature v350 1991) p454(2). n6318 (Apr. 11,
[9] Wheeler, David L. Computer Networks Said to Offer New Opportunities for Plagiarists;
Are but
Scientists and Journal Editors Say Technology Offers Opportunities For Catching Them Too. The Chronicle of HiRher
Education
v39 n43
(June
30, 1993)
pA17(2).
135