13 research outputs found

    The Effectiveness of Low-Level Structure-based Approach Toward Source Code Plagiarism Level Taxonomy

    Full text link
    Low-level approach is a novel way to detect source code plagiarism. Such approach is proven to be effective when compared to baseline approach (i.e., an approach which relies on source code token subsequence matching) in controlled environment. We evaluate the effectiveness of state of the art in low-level approach based on Faidhi \& Robinson's plagiarism level taxonomy; real plagiarism cases are employed as dataset in this work. Our evaluation shows that state of the art in low-level approach is effective to handle most plagiarism attacks. Further, it also outperforms its predecessor and baseline approach in most plagiarism levels.Comment: The 6th International Conference on Information and Communication Technolog

    Dynamic Thresholding Mechanisms for IR-Based Filtering in Efficient Source Code Plagiarism Detection

    Full text link
    To solve time inefficiency issue, only potential pairs are compared in string-matching-based source code plagiarism detection; wherein potentiality is defined through a fast-yet-order-insensitive similarity measurement (adapted from Information Retrieval) and only pairs which similarity degrees are higher or equal to a particular threshold is selected. Defining such threshold is not a trivial task considering the threshold should lead to high efficiency improvement and low effectiveness reduction (if it is unavoidable). This paper proposes two thresholding mechanisms---namely range-based and pair-count-based mechanism---that dynamically tune the threshold based on the distribution of resulted similarity degrees. According to our evaluation, both mechanisms are more practical to be used than manual threshold assignment since they are more proportional to efficiency improvement and effectiveness reduction.Comment: The 2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS

    An Observational Analysis of the Range and Extent of Contract Cheating from Online Courses Found on Agency Websites

    Get PDF
    Although online courses can provide access to higher education through e-learning systems which would not otherwise be available for students, they also pose challenges for academic integrity. Paramount to this is contract cheating, where students have been observed paying other people to complete work for them to complete their online courses. This paper analyses attempts by students at contract cheating using Transtutors.com, which is a billed as a site for homework support. A sample of 174 online assignments found on Transtutors.com are analysed and traced back to 17 online universities. Assignments from online institutions are demonstrated to be a particular problem for contract cheating detectives, since notifying staff at those institutions of attempts by their students to cheat has proved to be difficult or impossible. The paper concludes by looking at the wider issues posed by online contract cheating and the opportunities for automated detection within this field

    An Initial Analysis of the Contextual Information Available within Auction Posts on Contract Cheating Agency Websites

    Get PDF
    The advantages of using contextual information in order to detect contract cheating attempts by students have not yet been fully explored in the academic literature. Contract cheating occurs when a student uses a third party to produce assessed work for them. This paper focuses on contract cheating using agency websites, where an auction type process is used by students to select a contractor to have the assessed work produced for them, often at a financially advantageous price. Currently, the process of finding contract cheating on agency sites is manually intensive, with a detective required to investigate and attribute each cheating attempt. This paper aims to formally identify the context internally and externally available for contract cheating posts on an agency website. The paper is offered as a starting point for academics interested in producing an automated intelligent contextually-aware tool to detect contract cheating

    Software Piracy Forensics: Impact and Implications of Post‐Piracy Modifications

    Get PDF
    Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so as to present the findings in a more intelligible form to the judicial authorities. Keywords: Piracy, post-piracy modifications, software piracy, source code, copyright, software copyright infringement, software piracy forensics, database forensics, MIS forensics, AFC, SCAP, technical expert, substantial similarity test, CDA

    Tools and Environments

    Get PDF
    Teaching and learning how to build software are central aspects of computing education, and the tools which we use to support this are themselves a focus of research and innovation. This chapter considers tools designed or predominately used for education; from software development environments to automatic assessment tools, visualization, and educational games platforms. It looks at not just the history and state-of-the-art of these tools, but also at the challenges and opportunities in researching with and about them
    corecore