in Computer Science Courses Abstract ... - Semantic Scholar

Report 2 Downloads 144 Views
in Computer

Plagiarism

Dr. Department

James

Science Courses

K. Harris

of Mathematics

and Computer

Francis

University

Marion

Florence,

Science

SC 29501

that you don’t care who does their own work. Accepting that grades really don’t matter. Accepting

Abstract

that you don’t care, period. Plagiarism been

of computer

a problem

copying,

vague

in higher

plagiarism,

plagiarism

by students,

instructors

and

of other

much

lack

less preferable)

is detection.

detecting

can be used

possible

concerning software

plagiarism.

how

to deal

monitors

with

to detect

The

History

This

host

first

The bounds of plagiarism

step

files

plagiarism

gives

and

program

syntax and program

semantics.

using

therefore

Plagiarism ignore

prefer

is an emotional

to look

the problem

the other

rather

you must make absolutely

than

topic. way,

sure plagiarism

First,

has occurred.

Then you must confront the student. The reactions range from pleading to th,reats of libel. You may have to appear in front of a disciplinary

semester.

can

knowingly

plagiarize

Wrong.

should be presented

should always be ready and willing

to discuss

Detection I have found that despite prevention,

their

They cheat themselves

of plagiarism

the issue with students [3]. It should be made clear that plagiarism is destructive to everyone and will not be tolerated. These measures help reduce the problem, but do not make it go away.

number

grades at the expense of students who are sincerely trying to do their own work.

Examples

Teachers

court

Students who

cheat others by inflating

their

and time should be spent discussing the issue in class.

usually consisting of both students, faculty and administrators, defending your position and most of the time feeling as though you’re on trial. Trust is broken between teacher and student. There is an adversarial relationship and the atmosphere in class is tense. So it’s probably better to look the other way, right?

must do exclusively

This is a well defined and easily understood Whatever your policies for plagiarism are,

they should be explained clearly in your syllabus and repeated several times in the beginning and during the

to

deal with it [1,2].

by

science courses,

in these courses are now

ie. each student

own work. boundary.

Most

choosing

computer

my assignments

restricted,

It is permitted

syntax, but not program

These are concepts not easily understood

students in introductory

plagiarism.

Introduction

teachers

semantics.

for students to discuss program

advice

and with

must be well defined.

This is not as simple as it may seem. In my progr amming classes I used the distinction between

(and

to aid in

paper

approach.

Prevention

the second

as a tool

You must take a reasonable

by

and a whole

to plagiarism.

is prevention,

innocent.

of

of enforcement

administrators,

contribute

metrics

of electronic as to what

acceptance

plagiarism

software

Ease

I am not saying that you

should go on a witch hunt, jumping to conclusion, taking an accusato~ posture and assuming guilt before

has long

by students

increasing

school

factors

in curbing

education.

understanding

constitutes

programs

of students plagiarize

anyway.

goes on, time becomes scarce, schoolwork by

and the plagiarism

denying their own education and they cheat the’ author by claiming the work to be theirs. It is not only our job as teachers to demand that plagiarism is unacceptable, but it is our ‘job to actively look for plagiarism. A passive attitude is equivalent to acceptance. Accepting

lectures

given earlier

become a thing of the past. complacent. comfortable have

many

do is look

You with papers

become your

for plagiarism.

increases, in the semester

You tend to become more

class,

to grade.

a good

As the semester

familiar

get into The

For

and

a pattern,

last thing

example,

and

you

most

wmt

to

semesters

I teach two introductory CS courses consisting of approximately 25 students in each. This would mean that I would have to compare 1225 pairs of programs to

Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association of Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. Ethics in Computer Age, Gatlinburg,TN USA @ 1994 ACM 0-89791 -644-1 /94/001 1...$3.50

ensure no plagiarism. Some plagiarism stands out like a sore thumb. The same obscure mistakes in two or more programs is a good example. Even so, it is not

133

especially period

if they are graded over a relatively

of time.

This is where automation

long

programs

can be

as the syntax is more rigid forcing

effective. Computers can be used to compare files for similarities or differences that can point to possible

and Feder’s

plagiarism. These “plagiarism detecting” programs should only be used as tools to point at statistical

identify

anomalies and trends. Only through further examination can one come to the conclusion plagiarism

has occurred.

automated

detectors

problems

“misconduct

similar

Care should be taken using

Plagimizing one problem

case of

the number

programming Accountability

should calmly and clearly discuss the situation

is the number

computer

one problem More

science with my

in most

needs to be done to curb

to those who do their own work. REFERENCES

with the

[1] White, Edward M. Too Many Campuses Want to Sweep Student Plagiarism Under the Rug. I!l!2

If the

then the penalty

in the syllabus should be imposed.

Chronicle

Education,

of Higher

v39, n25 (Feb. 24,

1993), pA44(l).

This

happens to several students early in the [2] Mooney, Carolyn J. Critics Question Higher Commitment and Effective= in Edumtion’s Dealing with Plagiarism. The Chronicle of Higher Education, v38, n23 (Feb. 12, 1992) pA13(2).

semester and sends a clear message to others that plagiarism

is not tolerated. Methods There

of Automated

are many methods

to help detect plagiarism

[7,8,9].

Detection

p54(3).

for similarities.

programs

to remove those programming

can be filtered

constructs

that students generally

going to plagiarize

(ie. variable

Sterling, Gary Plagiarism and the Worms of [3] Accountability. Education Di~est v57, n9 (May 1992)

for using computers One is to compare

pairs of source programs

Computer

[4]

change if they are

names, comments,

the copy (although

your grade book will generally

Also, comparing

absolutely

determine

Chronicle

has occurred

but it generally

harder

Forbes, Malcolm [5] v151, n12

do

Who Was 14,

S. No One is Safe.

Forbes

(June 7, 1993) p26(l). [6] Magner, Denise K. History Association to Probe Accusations of Plagiarism Against Stephen Oates. The Chronicle of Hi~her (June 2, 1993) pA12(3).

and

to find them in

a micro-computer environment. Comparing the history file to the source file can often determine absolutely that plagiarism has occurred. It can also determine if a program was copied electronically, or if it was copied on the keyboard. A novel method of detection is used by Glatt Plagiarism Services [7] for detecting plagiarism in English papers and involves removing every fifth word. Students should then be able to reconstruct the text.

of Higher

Historian

Faces New Complaint. I!x2 n32 (Apr. Education v39,

and

therefore more analysis is needed. Another is to compare a history file with the source program. History files can usually be provided by mainframe mini computers,

Denise K.

1993) PA19(2).

two source files cannot if plagiarism

Magner,

Accused of Plagiarism

etc.).

The remaining text is tokertized and a string matching algorithm is used to compare pairs of files for the longest matching substrings. Comparing two source files can point to similar files, but cannot tell which is

original

classes.

If a group of students them individually. You

student and give them a chance to explain.

that).

programs

plagiarism. It should never be swept under the rug or accepted as part of the status quo. It is simply not fair

Once it has been determined without a doubt that plagiarism has occurred, the student should be

generally

computer

in my introductory

classes, and I would guess from discussions colleagues,

is not satisfacto~,

to help

text [6, 8]. Conclusions

Dr. Stephen Oates [4,5,6].

explanation

Stewatt

used to prosecute

that

than they solve as in the plagiarism

prescribed

machine”

Dr. Stephen Oates uses language semantics

as they can very often cause more

confronted as soon as possible. is involved, it is best to confront

certain

10 DO).

fifth words (ie. FOR i = 1

This may not work as well for computer

134

Education

[7] Eng, Paul M. Bits and Bytes. n3197 (Jan 28, 1991), p70.

v39, n39

Business Week

Anderson, Christopher Robocops: Stewart and [8] Feder’s mechanized misconduct search. Nature v350 1991) p454(2). n6318 (Apr. 11,

[9] Wheeler, David L. Computer Networks Said to Offer New Opportunities for Plagiarists;

Are but

Scientists and Journal Editors Say Technology Offers Opportunities For Catching Them Too. The Chronicle of HiRher

Education

v39 n43

(June

30, 1993)

pA17(2).

135