NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger; Reshmi Mitra – Information Systems Education Journal, 2025
The rapid rise of AI use is creating some very serious legal and ethical issues such as bias, discrimination, inequity, privacy violations, and--as creators everywhere fear--theft of protected intellectual property. Because AI platforms "learn" by scraping training materials available online or what is provided to them through their…
Descriptors: Copyrights, Plagiarism, Intellectual Property, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Schneider, Johannes; Bernstein, Abraham; Brocke, Jan vom; Damevski, Kostadin; Shepherd, David C. – IEEE Transactions on Learning Technologies, 2018
All methodologies for detecting plagiarism to date have focused on the final digital "outcome", such as a document or source code. Our novel approach takes the creation process into account using logged events collected by special software or by the macro recorders found in most office applications. We look at an author's interaction…
Descriptors: Plagiarism, Assignments, Programming, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karnalim, Oscar; Budi, Setia; Toba, Hapnes; Joy, Mike – Informatics in Education, 2019
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these…
Descriptors: Plagiarism, Computer Science Education, Comparative Analysis, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Peer reviewed Peer reviewed
Direct linkDirect link
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rafferty, Anna N., Ed.; Whitehill, Jacob, Ed.; Romero, Cristobal, Ed.; Cavalli-Sforza, Violetta, Ed. – International Educational Data Mining Society, 2020
The 13th iteration of the International Conference on Educational Data Mining (EDM 2020) was originally arranged to take place in Ifrane, Morocco. Due to the SARS-CoV-2 (coronavirus) epidemic, EDM 2020, as well as most other academic conferences in 2020, had to be changed to a purely online format. To facilitate efficient transmission of…
Descriptors: Educational Improvement, Teaching Methods, Information Retrieval, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Joy, Mike; Griffiths, Nathan; Boyatt, Russell – Journal on Educational Resources in Computing, 2005
Computer programming lends itself to automated assessment. With appropriate software tools, program correctness can be measured, along with an indication of quality according to a set of metrics. Furthermore, the regularity of program code allows plagiarism detection to be an integral part of the tools that support assessment. In this paper, we…
Descriptors: Plagiarism, Evaluation Methods, Programming, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Lancaster, Thomas; Culwin, Fintan – Computer Science Education, 2004
Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and…
Descriptors: Foreign Countries, Plagiarism, College Students, Student Evaluation