9,007 research outputs found
Can we detect contract cheating using existing assessment data? Applying crime prevention theory to an academic integrity issue
Objectives
Building on what is known about the non-random nature of crime problems and the explanatory capacity of opportunity theories of crime, this study explores the utility of using existing university administrative data to detect unusual patterns of performance consistent with a student having engaged in contract cheating (paying a third-party to produce unsupervised work on their behalf).
Methods
Results from an Australian university were analysed (N = 3798 results, N = 1459 students). Performances on unsupervised and supervised assessment items were converted to percentages and percentage point differences analysed at the academic discipline-, unit-, and student-level, looking for non-random patterns of unusually large differences.
Results
Non-random, unusual patterns, consistent with contract cheating, were found at the academic discipline-, unit-, and student-level, with approximately 2.1% of students producing multiple unusual patterns.
Conclusions
These findings suggest it may be possible to use existing administrative data to identify assessment items that provide suitable opportunities for contract cheating. This approach could be used in conjunction with targeted problem-prevention strategies (based on situational crime prevention) to reduce the vulnerability of academic assessment items to contract cheating. This approach is worthy of additional research as it has the potential to help academic institutions around the world manage contract cheating; a problem that currently threatens the validity and integrity of tertiary qualifications
Recommended from our members
Explaining smart heating systems to discourage fiddling with optimized behavior
Our work focuses on textual and graphical explanations for smart heating systems. We have started to investigate the opportunities for when to provide explanations, how we can design these explanations, and we have started to evaluate these explanations. We argue that explanations need to be carefully crafted to fit with their desired aim, in our case to encourage users' trust and reliance while minimizing user interactions
Recommended from our members
On reflection
How one nursery improved their support of children's communication and language skills as seen through the lens of the new Ofsted judgement 'Quality of education'. By Julie Kent, Caroline Farley and Sue Hobson
Probing dark energy with steerable wavelets through correlation of WMAP and NVSS local morphological measures
Using local morphological measures on the sphere defined through a steerable
wavelet analysis, we examine the three-year WMAP and the NVSS data for
correlation induced by the integrated Sachs-Wolfe (ISW) effect. The steerable
wavelet constructed from the second derivative of a Gaussian allows one to
define three local morphological measures, namely the signed-intensity,
orientation and elongation of local features. Detections of correlation between
the WMAP and NVSS data are made with each of these morphological measures. The
most significant detection is obtained in the correlation of the
signed-intensity of local features at a significance of 99.9%. By inspecting
signed-intensity sky maps, it is possible for the first time to see the
correlation between the WMAP and NVSS data by eye. Foreground contamination and
instrumental systematics in the WMAP data are ruled out as the source of all
significant detections of correlation. Our results provide new insight on the
ISW effect by probing the morphological nature of the correlation induced
between the cosmic microwave background and large scale structure of the
Universe. Given the current constraints on the flatness of the Universe, our
detection of the ISW effect again provides direct and independent evidence for
dark energy. Moreover, this new morphological analysis may be used in future to
help us to better understand the nature of dark energy.Comment: 12 pages, 10 figures, replaced to match version accepted by MNRA
Trust and Risk Relationship Analysis on a Workflow Basis: A Use Case
Trust and risk are often seen in proportion to each other; as such, high trust may induce low risk and vice versa. However, recent research argues that trust and risk relationship is implicit rather than proportional. Considering that trust and risk are implicit, this paper proposes for the first time a novel approach to view trust and risk on a basis of a W3C PROV provenance data model applied in a healthcare domain. We argue that high trust in healthcare domain can be placed in data despite of its high risk, and low trust data can have low risk depending on data quality attributes and its provenance. This is demonstrated by our trust and risk models applied to the BII case study data. The proposed theoretical approach first calculates risk values at each workflow step considering PROV concepts and second, aggregates the final risk score for the whole provenance chain. Different from risk model, trust of a workflow is derived by applying DS/AHP method. The results prove our assumption that trust and risk relationship is implicit
Bayes-X: a Bayesian inference tool for the analysis of X-ray observations of galaxy clusters
We present the first public release of our Bayesian inference tool, Bayes-X,
for the analysis of X-ray observations of galaxy clusters. We illustrate the
use of Bayes-X by analysing a set of four simulated clusters at z=0.2-0.9 as
they would be observed by a Chandra-like X-ray observatory. In both the
simulations and the analysis pipeline we assume that the dark matter density
follows a spherically-symmetric Navarro, Frenk and White (NFW) profile and that
the gas pressure is described by a generalised NFW (GNFW) profile. We then
perform four sets of analyses. By numerically exploring the joint probability
distribution of the cluster parameters given simulated Chandra-like data, we
show that the model and analysis technique can robustly return the simulated
cluster input quantities, constrain the cluster physical parameters and reveal
the degeneracies among the model parameters and cluster physical parameters. We
then analyse Chandra data on the nearby cluster, A262, and derive the cluster
physical profiles. To illustrate the performance of the Bayesian model
selection, we also carried out analyses assuming an Einasto profile for the
matter density and calculated the Bayes factor. The results of the model
selection analyses for the simulated data favour the NFW model as expected.
However, we find that the Einasto profile is preferred in the analysis of A262.
The Bayes-X software, which is implemented in Fortran 90, is available at
http://www.mrao.cam.ac.uk/facilities/software/bayesx/.Comment: 22 pages, 11 figure
Teacher fabrication as an impediment to professional learning and development: the external mentor antidote
Classifying LISA gravitational wave burst signals using Bayesian evidence
We consider the problem of characterisation of burst sources detected with
the Laser Interferometer Space Antenna (LISA) using the multi-modal nested
sampling algorithm, MultiNest. We use MultiNest as a tool to search for
modelled bursts from cosmic string cusps, and compute the Bayesian evidence
associated with the cosmic string model. As an alternative burst model, we
consider sine-Gaussian burst signals, and show how the evidence ratio can be
used to choose between these two alternatives. We present results from an
application of MultiNest to the last round of the Mock LISA Data Challenge, in
which we were able to successfully detect and characterise all three of the
cosmic string burst sources present in the release data set. We also present
results of independent trials and show that MultiNest can detect cosmic string
signals with signal-to-noise ratio (SNR) as low as ~7 and sine-Gaussian signals
with SNR as low as ~8. In both cases, we show that the threshold at which the
sources become detectable coincides with the SNR at which the evidence ratio
begins to favour the correct model over the alternative.Comment: 21 pages, 11 figures, accepted by CQG; v2 has minor changes for
consistency with accepted versio
Computational science and re-discovery: open-source implementations of ellipsoidal harmonics for problems in potential theory
We present two open-source (BSD) implementations of ellipsoidal harmonic
expansions for solving problems of potential theory using separation of
variables. Ellipsoidal harmonics are used surprisingly infrequently,
considering their substantial value for problems ranging in scale from
molecules to the entire solar system. In this article, we suggest two possible
reasons for the paucity relative to spherical harmonics. The first is
essentially historical---ellipsoidal harmonics developed during the late 19th
century and early 20th, when it was found that only the lowest-order harmonics
are expressible in closed form. Each higher-order term requires the solution of
an eigenvalue problem, and tedious manual computation seems to have discouraged
applications and theoretical studies. The second explanation is practical: even
with modern computers and accurate eigenvalue algorithms, expansions in
ellipsoidal harmonics are significantly more challenging to compute than those
in Cartesian or spherical coordinates. The present implementations reduce the
"barrier to entry" by providing an easy and free way for the community to begin
using ellipsoidal harmonics in actual research. We demonstrate our
implementation using the specific and physiologically crucial problem of how
charged proteins interact with their environment, and ask: what other
analytical tools await re-discovery in an era of inexpensive computation?Comment: 25 pages, 3 figure
- âŠ