Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Cheating | 5 |
Computer Science Education | 5 |
Plagiarism | 5 |
Programming | 5 |
Assignments | 3 |
Student Surveys | 2 |
Attitude Change | 1 |
College Faculty | 1 |
College Students | 1 |
Computer Software | 1 |
Consciousness Raising | 1 |
More ▼ |
Source
IEEE Transactions on Learning… | 2 |
Informatics in Education | 1 |
Journal of Information… | 1 |
Online Submission | 1 |
Author
Aasheim, Cheryl L. | 1 |
Bernstein, Abraham | 1 |
Brocke, Jan vom | 1 |
Chivers, William | 1 |
Damevski, Kostadin | 1 |
Karnalim, Oscar | 1 |
Kermek, Dragutin | 1 |
Li, Lixin | 1 |
Novak, Matija | 1 |
Rutner, Paige S. | 1 |
Schneider, Johannes | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Karnalim, Oscar; Simon; Chivers, William – IEEE Transactions on Learning Technologies, 2023
We have recently developed an automated approach to reduce students' rationalization of programming plagiarism and collusion by informing them about the matter and reporting uncommon similarities to them for each of their submissions. Although the approach has benefits, it does not greatly engage students, which might limit those benefits. To…
Descriptors: Gamification, Programming, Plagiarism, Cooperative Learning
Schneider, Johannes; Bernstein, Abraham; Brocke, Jan vom; Damevski, Kostadin; Shepherd, David C. – IEEE Transactions on Learning Technologies, 2018
All methodologies for detecting plagiarism to date have focused on the final digital "outcome", such as a document or source code. Our novel approach takes the creation process into account using logged events collected by special software or by the macro recorders found in most office applications. We look at an author's interaction…
Descriptors: Plagiarism, Assignments, Programming, Computer Software
Kermek, Dragutin; Novak, Matija – Informatics in Education, 2016
In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…
Descriptors: Plagiarism, Programming, Assignments, Cheating
Sukhodolsky, Jacob – Online Submission, 2017
The problem of Computer Science students' cheating in their homework assignments so far has been handled mainly through administrative punishment of the cheaters. The success of such an approach depends to a large degree on the ability of the instructor to recognize the fact of cheating, which is a complicated task. With a large number of students…
Descriptors: Computer Science Education, Cheating, Ethics, Homework
Aasheim, Cheryl L.; Rutner, Paige S.; Li, Lixin; Williams, Susan R. – Journal of Information Systems Education, 2012
This paper examines student attitudes towards a number of behaviors which range from acceptable means of seeking help on assignments to unacceptable behaviors such as copying from another student or paying someone to complete an assignment. Attitudes regarding such behaviors are compared based on the type of assignment (programming assignment,…
Descriptors: Internet, Feedback (Response), Information Systems, Student Surveys