14
Academic Integrity and Plagiarism: Australasian perspectives Donald Joyce* Unitec, New Zealand This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences. The paper begins with a description of how the reviewed items were selected, then dates and types of publication are analysed, key concepts and terms are listed, perspectives and themes are identified, and the referenced literature is reviewed by theme. 1. Introduction In recent years the related issues of academic integrity and plagiarism have received a lot of attention from teachers, educational administrators and the media. Many observers see the heightened interest in promoting academic integrity and reducing plagiarism as a reaction to the impacts of a changing student population and the widespread adoption of electronic technologies (like the Internet) which can be used for many purposes, including plagiarism and its detection or deterrence. This paper attempts to provide an overview of Australasian perspectives on academic integrity and plagiarism, with a particular focus on articles and papers related to computing education. The target audience includes academics researching cultural, educational, or technical issues, administrators developing and implement- ing academic integrity policies, and teachers seeking guidance about how best to promote academic integrity and deter plagiarism. The next four sections cover methodology, dates and types of publication, terminology, and perspectives and themes. The remaining sections review the referenced literature by theme and present some conclusions. *School of Computing and Information Technology, Unitec, Private Bag 92025, Auckland, New Zealand. E-mail: [email protected] Computer Science Education Vol. 17, No. 3, September 2007, pp. 187 – 200 ISSN 0899-3408 (print)/ISSN 1744-5175 (online)/07/030187-14 Ó 2007 Taylor & Francis DOI: 10.1080/08993400701538062

Academic Integrity and Plagiarism: Australasian perspectives

  • Upload
    donald

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Academic Integrity and Plagiarism: Australasian perspectives

Academic Integrity and Plagiarism:

Australasian perspectives

Donald Joyce*Unitec, New Zealand

This paper reviews nearly 80 published items concerned with promoting academic integrity and

reducing plagiarism. Nearly all of them were published in the last seven years and have authors

based in Australasia. Most of them have authors from computing departments and many were

published in computing journals or presented at computing conferences. The paper begins with a

description of how the reviewed items were selected, then dates and types of publication are

analysed, key concepts and terms are listed, perspectives and themes are identified, and the

referenced literature is reviewed by theme.

1. Introduction

In recent years the related issues of academic integrity and plagiarism have received a

lot of attention from teachers, educational administrators and the media. Many

observers see the heightened interest in promoting academic integrity and reducing

plagiarism as a reaction to the impacts of a changing student population and the

widespread adoption of electronic technologies (like the Internet) which can be used

for many purposes, including plagiarism and its detection or deterrence.

This paper attempts to provide an overview of Australasian perspectives on

academic integrity and plagiarism, with a particular focus on articles and papers

related to computing education. The target audience includes academics researching

cultural, educational, or technical issues, administrators developing and implement-

ing academic integrity policies, and teachers seeking guidance about how best to

promote academic integrity and deter plagiarism. The next four sections cover

methodology, dates and types of publication, terminology, and perspectives and

themes. The remaining sections review the referenced literature by theme and present

some conclusions.

*School of Computing and Information Technology, Unitec, Private Bag 92025, Auckland,

New Zealand. E-mail: [email protected]

Computer Science Education

Vol. 17, No. 3, September 2007, pp. 187 – 200

ISSN 0899-3408 (print)/ISSN 1744-5175 (online)/07/030187-14

� 2007 Taylor & Francis

DOI: 10.1080/08993400701538062

Page 2: Academic Integrity and Plagiarism: Australasian perspectives

2. Methodology

At an early stage in the preparation of this paper, in order to see ‘‘what was on the

Internet,’’ Google searches were conducted using all possible combinations of the key

words ‘‘academic integrity,’’ ‘‘educational integrity,’’ ‘‘cheating’’ and ‘‘plagiarism’’

with ‘‘Australasia,’’ ‘‘Australia’’ and ‘‘New Zealand.’’ These searches located a

number of relevant papers in journals and conference proceedings, particularly those

of the Asia – Pacific Educational Integrity Conference, the Australasian Computer

Science Conference and the Annual Conference of the National Advisory Committee

on Computing Qualifications.

After adding relevant items referenced in other articles and papers and eliminating

items that did not have authors based in Australasia or did not specifically address

plagiarism (or those aspects of academic integrity that relate to the proper

acknowledgement of sources), 136 items remained: a book, the transcript of a

television programme (on ‘‘The Newcastle plagiarism scandal’’), 11 newspaper

articles and 123 academic papers. Many of the academic papers (more than 50) had

been presented at one of the two Asia – Pacific Educational Integrity Conferences

(held in 2003 and 2005) and there was considerable overlap in content.

In the interests of producing a review that focuses on computing education, the

reference list has been pruned to 78 items, most of which have authors from

computing departments and were published in computing journals or presented at

computing conferences. A small number of other items have been included when

explaining key concepts or identifying issues. Nearly all articles and papers are

concerned with tertiary education, however, Cropp (2002) and Taylor (2003) focus

on secondary schools, and Joyce (2006a) and Kennedy (2005) discuss the situation in

primary schools.

2.1. Dates and Types of Publication

The 78 items include four papers from 1986, 1990, 1998, and 1999. There has been a

flurry of publication in the last six years: 5 in 2001, 7 in 2002, 15 in 2003, 18 in 2004,

23 in 2005, and 6 in 2006. Only one book is included in the references (Carroll,

2002); the author is a regular visitor to Australasia and has presented at Australasia

conferences, and it is an excellent and often cited resource. Most of the items were

presented at conferences (18 in all, including 9 that are focused on computing or the

use of computers in education; see Appendix). The rest of the academic papers were

published in journals (10 in all, including five that are focused on computing or the

use of computers in education; see Appendix).

2.2. Terminology

The language used by authors often suggests that they have taken a particular stance

on the issues surrounding academic integrity and plagiarism. A selection of the key

concepts found in the items reviewed in this paper is presented in Table 1, along with

188 D. Joyce

Page 3: Academic Integrity and Plagiarism: Australasian perspectives

indicative citations. The table is followed by a brief discussion of the most commonly

used concepts (the negative terms ‘‘plagiarism’’ and ‘‘cheating,’’ and the positive

terms ‘‘academic integrity’’ and ‘‘educational integrity’’) that may assist readers in

their own analysis of the literature.

‘‘Plagiarism’’ appears in the titles of 47 of the 78 items. Martin (2004) identified

four types of plagiarism: ‘‘plagiarism of authorship,’’ ‘‘plagiarism of ideas,’’

‘‘plagiarism of sources’’ and ‘‘word-by-word plagiarism.’’ Several authors (see, for

example, Cohen, 2003) have written about ‘‘inadvertent’’ or ‘‘unintentional’’

plagiarism, while Arwin and Tahaghoghi (2006) addressed the problem of

‘‘interlingual plagiarism’’ in the context of computer programs. Collberg and

Kobourov (2005) discussed ‘‘self-plagiarism,’’ where the author(s) ‘‘recycles’’ the

content of one paper in another (as was found to be the case with two of the original

136 items that were considered for this review; these two nearly identical papers were

presented at two different conferences in the same week and are not included in the

references of this review). ‘‘Cheating’’ appears in the titles of 16 of the 78 items.

Many authors use the terms ‘‘cheating’’ and ‘‘plagiarism’’ interchangeably, but

Marsden (2003) defined cheating as ‘‘non-plagiaristic dishonesty.’’

‘‘Academic integrity’’ appears in the titles of 10 of the 78 items. It has also been

adopted by a consortium of more than 400 American colleges and universities who

have established the Center for Academic Integrity, which ‘‘strives to teach five

fundamental values to campuses across the nation: honesty, trust, fairness, respect,

and responsibility’’ (Walker Teaching Resource Center, 2006). The aspect of

academic integrity that this review focuses on is ‘‘proper acknowledgment of sources’’

Table 1. Concepts and citations

Concept Citations

Academic integrity Emerson, Rees, and MacKay (2005), Mulcahy and Goodacre

(2004), Muller (2005), Partridge and McNamara (2005),

Phillips (2005)

Academic plagiarism Kock (1999)

Acknowledgment of sources East (2005), Melles (2003)

Appropriation Clerehan and Johnson (2003)

Attribution East (2005), Hussin and Hanisch (2003)

Authenticity Gajadhar (1998)

Cheating Marsden (2003)

Coderivative documents Hoad and Zobel (2003)

Educational integrity Sutherland-Smith and Carr (2005)

Inappropriate copying Kuiper (2005)

Intertextuality Chandrasoma, Thompson, and Pennycook (2004), Eira (2005)

Originality East (2005), Johnson and Clerehan (2005), Mann and Frew

(2006)

Plagiarism Arwin and Tahaghoghi (2006), Cohen (2003), Collberg and

Kobourov (2005), Martin (2004)

Unacknowledged copying Melles (2003)

Academic Integrity and Plagiarism 189

Page 4: Academic Integrity and Plagiarism: Australasian perspectives

(East, 2005; Melles, 2003). ‘‘Educational integrity’’ appears in the title of only one of

the 78 items, despite featuring prominently in the names of the two conferences

where many of the papers appeared and in the title of the International Journal for

Educational Integrity. According to one of the (anonymous) reviewers of this review

‘‘this term is used in Australia to differentiate the work here from the Center for

Academic Integrity in the USA, and also to encourage researchers and practitioners

from all levels of education (not just tertiary) to investigate and focus on integrity.’’

3. Perspectives and Themes

Close examination of the academic papers reveals some marked differences in the

perspectives of the authors. Many of these differences can be categorized in terms of

distinctions like academic/administrative, educational/disciplinary, positive/negative,

and proactive/reactive. Some authors have highlighted these different perspectives in

their papers, for example ‘‘policy against cheating or policy for learning’’ (Martin,

2004) and ‘‘teach-them-to-be-good or catch-them-at-it’’ (Taylor, 2003). However,

these distinctions are often subjective and need not be seen as oppositions; many

authors have looked at the issues from several perspectives and some papers (see,

for example, Allan, Callagher, Connors, Joyce, & Rees, 2005) are the result of

collaborations between academics and administrative staff.

A more objective framework for viewing the literature was adopted for this review,

based on the following nine themes (the numbers in parentheses indicates how many

of the 78 items had a major focus on that theme):

. assessment design (8);

. attitudes and perceptions (26);

. cultural differences (9);

. detection and prevalence (21);

. discipline and penalties (6);

. education and support (19);

. ethics, morality and values (5);

. evaluation of software (16);

. policies and processes (10).

These themes are explored further in the following sections. It should be noted that

most papers focus on more than one theme and some papers (see, for example, Alam,

2004; Dick et al., 2003) cover nearly all of them to a lesser or greater extent.

3.1. Assessment Design

Several authors (see, for example, Goddard & Rudzki, 2004; Hawthorn, 2001; Le

Heron, 2001; Stoney & McMahon, 2004) have argued that assessments can and

should be designed to minimize the likelihood of cheating and/or plagiarism. Alam

(2004) offered 11 suggestions, including minimizing the number of assessments,

190 D. Joyce

Page 5: Academic Integrity and Plagiarism: Australasian perspectives

coordinating their timing, having more in-class assessments, encouraging critical

thinking, making clear what is expected, clarifying when collaboration ends and

collusion begins, not recycling assignments, breaking up large assignments into

components and requiring progress reports, and providing samples of accepted

standard and academic conventions. Dick et al. (2003) and Hornlund (2003)

suggested that individualized assessments be created, and Gajadhar (1998)

recommended using case studies and scenarios.

3.2. Attitudes and Perceptions

Many authors take the view that it is important to understand how staff and students

perceive issues concerned with academic integrity and plagiarism. Particularly

relevant for computing educators are the series of papers in which Dick, Sheard and

their collaborators explored the motivation, perspectives, and practices of computing

students (Dick et al., 2003; Dick, Sheard, & Hasen, 2005; Dick, Sheard, & Markham,

2001a, 2001b; Sheard, Carbone, & Dick, 2002; Sheard & Dick, 2003; Sheard, Dick,

Markham, Macdonald, & Walsh, 2002; Sheard, Markham, & Dick, 2003). Other

researchers who focus on attitudes of computing students include Alam (2004),

Brook and Sewell (2006), Green, Lindemann, Marshall, and Wilkinson (2005a,

2005b), Gururajan and Roberts (2004), Hawthorn (2001), Joyce (2003), Le Heron

(2001), Marshall and Garry (2005), Paynter and Mills (2004), Savage (2004), Zobel

(2004), and Zobel and Hamilton (2002). Of these, Alam, Dick et al., Green et al.,

Hawthorn, Joyce, and Savage also discussed the views of staff. Goddard and Rudzki

(2005), Joyce (2002a, 2002b), Ryan (2004), and Sutherland-Smith and Carr (2005)

reported on staff perspectives on plagiarism detection software.

3.3. Cultural Differences

The rapid increase in cultural/ethnic diversity in Australasian tertiary institutions has

led to the publication of a lot of articles and papers that focus on perceived differences

in attitudes towards ‘‘textual borrowings.’’ Nine of the academic papers specifically

relate to computing students (Alam, 2004; Baskett, Collings, & Preston, 2004; Brook

& Sewell, 2006; Dick et al., 2003; Green et al., 2005a, 2005b; Hawthorn, 2001;

Marshall & Garry, 2005; Zobel & Hamilton, 2002). Most conclude that differences in

attitudes do exist and suggest that special efforts may be needed to help some

international students (and new immigrants) to understand what is required in the

Australasian academic context.

3.4. Detection and Prevalence

Many papers describe the experiences that the authors and their institutions have had

with software designed to detect plagiarism in (or ‘‘check the originality of’’) written

assignments or essays (see, for example, Allan et al., 2005; Mulcahy & Goodacre,

2004). Others focus on special purpose software to detect plagiarism in computer

Academic Integrity and Plagiarism 191

Page 6: Academic Integrity and Plagiarism: Australasian perspectives

programs (see, for example, Arwin & Tahaghoghi, 2006; Burrows, Tahaghoghi, &

Zobel, 2004; Chawla, 2003; Vamplew & Dermoudy, 2005; Whale, 1986, 1990).

Phillips (2005) compared detection practices across Australasian tertiary institutions.

Emerson, Rees, and MacKay (2005), Joyce (2004a, 2004b, 2005), and Mann and

Frew (2006) have pointed out that it is dangerous to rely totally on software for

plagiarism detection. Most electronic originality checkers can only highlight sections

of text or code that can be located elsewhere (e.g. in electronic books and journals, in

other students’ assignments or on the Internet) and human interpretation is required

to decide, first, whether plagiarism has occurred, second, whether it was intentional

or unintentional, and, third, what is the appropriate response. There is also a concern

that students may copy from non-electronic sources or use techniques such as

systematic word replacement or translation from another language (human or

computer) to disguise plagiarized material (Arwin & Tahaghoghi, 2006; Joyce,

2004a). Joyce (2005) suggested that ‘‘the staff member should also apply some of the

traditional methods . . . to pick up instances of plagiarism that have not been detected

by the software.’’

Most papers that discuss the prevalence of plagiarism refer to the results of surveys

conducted by other authors in which students were asked to say how often they had

cheated or plagiarized in different contexts (see, for example, Dick et al., 2003;

Emerson et al., 2005; Marsden, 2003). Alam (2004) and Paynter and Mills (2004)

conducted such surveys of computing students and analysed the percentages of

students plagiarizing across different forms of assessment. Alam also computed

correlations between plagiarism and demographic, situational, and perceptual factors.

A different approach was taken by Hasen and Huppert (2005) and by Simon (2005),

who conducted experiments to identify how many students cheated in particular

assessments (an essay and an online examination, respectively). Zobel and Hamilton

(2002) reported ‘‘a significant reduction in the number of students caught cheating’’

following the introduction of ‘‘rigorous systems for detecting and penalising

plagiarism.’’

3.5. Discipline and Penalties

Phillips (2005) compared disciplinary approaches across Australasian tertiary

institutions. Dick et al. (2003) listed 11 common responses to ‘‘suspected or

apparent cases of cheating,’’ ranging from ‘‘no action’’ to ‘‘retract degree and notify

others.’’ Joyce (2002a) reported a situation where three students were found to have

colluded on three assignments. Two of them admitted their role, but the third denied

his culpability even after the others had implicated him in his presence. All three were

suspended for 12 months. Zobel (2004) described a case (the ‘‘Uni Cheats Racket’’)

where a tutor at one institution wrote assignments and sat exams for students at

another institution. The police were called in and the tutor and one student were

convicted by the local court, but the tutor subsequently resumed his activities.

Paynter and Mills (2004) provided two lists of penalties: lighter ones that can be

imposed by a department, school, or faculty and heavier ones that can only be

192 D. Joyce

Page 7: Academic Integrity and Plagiarism: Australasian perspectives

imposed by an institute-wide disciplinary committee. Kuiper (2005) explained the

role of the university proctor in dealing with ‘‘matters of dishonest academic

practice.’’

3.6. Education and Support

Since 2003 there has been a strong trend to focus more on education and support and

less on detection and discipline. Many authors argue that academics cannot expect

students to arrive at Australasian tertiary institutions with a clear understanding of

academic conventions concerning acknowledgement of sources. They stress the need

for raising the awareness and skill levels of students through induction programmes

and reinforcing their learnings through workshops and feedback on assessments (see,

for example, Baskett et al., 2004; Hamilton, Tahaghoghi, & Walker, 2004; Joyce,

2004a, 2004b, 2005). Another common strategy is to develop online learning

resources (see, for example, Brooks & Ellis, 2005; Callagher, Smith, & Mitchell,

2004; Hussin & Hanisch, 2003; Kett, 2003; Partridge & McNamara, 2005).

Several authors (see, for example, Alam, 2004; Allan et al., 2005; Dick et al.,

2003; Joyce, 2006a, 2006b; Mulcahy & Goodacre, 2004) have pointed out the need

to educate and support staff as well as students. Phillips (2005) summarized

learning activities and resources that are used with staff and students across

Australasian tertiary institutions and Muller (2005) assessed ‘‘the perceived value of

web-based academic integrity resources for staff.’’ Hawthorn (2001) advocated the

adoption of ‘‘teaching approaches that get students to make use of resources in the

computing environment in a way that develops their learning while discouraging

cheating.’’

3.7. Ethics, Morality and Values

Many academics consider plagiarism to be immoral or unethical and this influences

their attitude towards researchers and students who plagiarize. Hawthorn (2001)

discussed whether student cheating should be seen as part of a general moral and

social decline in wider society and concluded that ‘‘we are not immune to the joys of

the moral high ground but this may affect our accuracy.’’ Dick et al. (2003) observed

that ‘‘some academics perceive willingness to do anything to pass a course as a

reflection of this moral and social decline.’’ Brook and Sewell (2006) noted that ‘‘the

social, political and sporting milieu are shot through with examples of people getting

ahead by cheating,’’ but argued that social and cultural factors should not be used as

an excuse for plagiarism. Gajadhar (1998) argued that ‘‘these core ethical issues

[plagiarism and authenticity] need addressing immediately and proactively.’’ In order

to ‘‘better understand how students make decisions to cheat,’’ Dick et al. (2003)

proposed a model of moral decision-making that takes into account demographic,

personal, situational, societal, and technological factors. Marsden (2005) asked

whether Australian universities should consider adopting honour codes like those

common in American academic institutions.

Academic Integrity and Plagiarism 193

Page 8: Academic Integrity and Plagiarism: Australasian perspectives

3.8. Evaluation of Software

Many academics still rely on Internet search engines like Google to search the

Internet for suspicious sections of text (Dick et al., 2003; Joyce, 2005). However, a lot

of purpose built software has been written to detect plagiarism, including a Perl

program written by a 13-year-old boy (Hinds, 2004). The Centre for the Study of

Higher Education (2003) and Morrison (2001) compared some of the available

software, while Hasen and Huppert (2005) reported the results of a trial of a program

called Damocles. Hoad and Zobel (2003) evaluated two families of methods for

identifying ‘‘coderivative documents,’’ one based on information retrieval techniques

and the other on hashing. Arwin and Tahaghoghi (2006) analysed the performance of

a tool which can ‘‘detect plagiarism involving multiple languages using intermediate

program code produced by a compiler suite.’’

Turnitin (http://turnitin.com/static/index.html) is widely used in Australasia and

has been the subject of a number of comparisons and trials. It compares the text of

submitted documents with each other and with a selection of web sites, journals, and

electronic books and highlights significant matches. Emerson et al. (2005) and

Goddard and Rudzki (2004, 2005) concluded that the reports provided by Turnitin

require careful study before determining whether plagiarism has occurred and, if so,

how serious it is. Green et al. (2005a, 2005b) and Savage (2004) reported on staff and

student reactions/responses to a trial of Turnitin. Their studies found that different

groups of students responded differently and that staff and students expressed a

number of concerns, although staff were generally positive. Sutherland-Smith and

Carr (2005) explored staff perspectives about the effectiveness and usability of

Turnitin and concluded that ‘‘such software should not be considered a panacea for

plagiarism.’’ Brook and Sewell (2006) found that changing about 10% of a document

will completely defeat the techniques used by Turnitin.

3.9. Policies and Processes

Joyce (2004a, 2004b, 2005) and Kuiper (2005) emphasized the importance of having

appropriate procedures in place to deal with suspected cases of plagiarism (or other

forms of ‘‘academic misconduct’’). Allan et al. (2005) and Phillips (2005) compared

policies and processes across Australasian tertiary institutions. Mulcahy and

Goodacre (2004) discussed several legal issues, including copyright and intellectual

property rights, whether student agreement to the use of plagiarism detection

software could be considered consent under coercion, and the status of Turnitin

reports as evidence in plagiarism cases. Phillips (2005) observed that ‘‘academic

integrity policies tend to focus on academic integrity for students, without addressing

staff issues at all, including the need for ethical behaviour and appropriate

assessment.’’ Dick et al. (2003) argued that ‘‘without support from all academics,

an institution’s policies are limited in their effectiveness’’ and reported a variety of

suggestions for improvements in institutional processes. Zobel (2004) noted the

importance of requiring that ‘‘staff report cases centrally and thus not collude with

194 D. Joyce

Page 9: Academic Integrity and Plagiarism: Australasian perspectives

students in cover-ups,’’ conducting formal hearings, maintaining careful records and

operating a system of central coordination.

4. Conclusions

Staff in tertiary institutions were concerned about academic integrity, cheating, and

plagiarism long before computers and access to the Internet became widespread.

However, it does seem that there has been a dramatic increase in public airing of these

concerns in the last 6 years. Many observers and researchers suggest that

technological changes, rapid expansion of tertiary education, and greater diversity

in the student population are significant contributing factors in the apparent growth

in academic misconduct. Some point to perceived changes in ethical standards in

wider society and argue that educational institutions should introduce more stringent

disciplinary processes and harsher penalties. We should note, however, that the

development of software that can identify ‘‘borrowed words’’ and plagiarized

programs may have led to much higher rates of detection, revealing the extent of a

problem that was previously largely hidden from view. Also many articles and papers

have talked about cultural differences in relation to ethnicity but have overlooked

another important difference: most staff are ‘‘digital immigrants’’ whereas most

students are ‘‘digital natives,’’ used to freely accessing and sharing electronic

information, so there may be a clash of perceptions and values as well as a

technological gap.

What seems certain is that academic and administrative staff will need to

continue spending precious time and resources in meeting the challenges posed by

a lack of understanding of academic conventions and by the availability of electronic

tools and resources that can be misused. As many authors have suggested, there is

no single remedy, so we must ensure that we give equal emphasis to the necessary

ingredients: assessment design, education of staff and students, detection tools,

academic integrity policies, and disciplinary processes. Hopefully this review may

serve as a map of the wide territory covered by the many publications produced

by Australasian academics and adminstrators in recent years. The references in

those publications can be used as ‘‘signposts’’ to the very extensive worldwide

literature.

Acknowledgements

The author gratefully acknowledges the advice provided by the reviewers and editors

of this paper.

References

Alam, L. S. (2004). Is plagiarism more prevalent in some forms of assessment than others?

ASCILITE Conference. Retrieved March 21, 2007, from www.ascilite.org.au/conferences/

perth04/procs/alam.html‘‘\t’’top

Academic Integrity and Plagiarism 195

Page 10: Academic Integrity and Plagiarism: Australasian perspectives

Allan, G., Callagher, L., Connors, M., Joyce, D., & Rees, M. (2005). Some Australasian

perspectives on academic integrity in the Internet age. EDUCAUSE Conference. Retrieved

March 21, 2007, from www.copyright.mq.edu.au/pdf/austperspect.pdf

Arwin, C., & Tahaghoghi, S. M. M. (2006). Plagiarism detection across programming languages.

29th Australasian Computer Science Conference. Retrieved March 21, 2007, from http://portal.

acm.org/citation.cfm?id¼1151699.1151730&coll¼&dl¼acm&CFID¼15151515&CFTOKEN¼6184618

Baskett, J., Collings, P., & Preston, H. (2004). Plagiarism or support? What should be the focus for

our changing graduate coursework cohort? Australian Universities Quality Forum. Retrieved

March 21, 2007, from www.auqa.edu.au/auqf/2004/program/papers/Collings.pdf

Brook, P., & Sewell, A. (2006). Trouble at t’paper mill. In S. Mann & N. Bridgeman (Eds.), 19th

Annual Conference of the National Advisory Committee on Computing Qualifications. Wellington:

NACCQ.

Brooks, C., & Ellis, J. (2005). Fidelity to scholarly practice: Academic honesty and information

literacy in the Faculty of Arts. ASCILITE Conference. Retrieved March 21, 2007, from

www.ascilite.org.au/conferences/brisbane05/blogs/proceedings/11_Brooks.pdf

Burrows, S., Tahaghoghi, S. M. M., & Zobel, J. (2004). Efficient and effective plagiarism detection

for large code repositories. 2nd Australian Undergraduate Students’ Computing Conference.

Retrieved March 21, 2007, from www.cs.berkeley.edu/*benr/publications/auscc04/papers/

burrows-auscc04.pdf

Callagher, L., Smith, P., & Mitchell, L. (2004). From vexation to motivation—e-learning to counter

plagiarism. Paper presented at CPD Teaching Showcase Conference, University of Auckland,

November 19.

Carroll, J. (2002). A handbook for deterring plagiarism in higher education. Oxford: Oxford Brookes

University.

Centre for the Study of Higher Education. (2003). Comparison of plagiarism software features.

Retrieved March 21, 2007, from www.cshe.unimelb.edu.au/assessinglearning/03/plag3.html

Chandrasoma, R., Thompson, C., & Pennycook, A. (2004). Beyond plagiarism: Transgressive and

nontransgressive intertextuality. Journal of Language, Identity & Education, 3(3), 171 – 193.

Retrieved March 21, 2007, from www.leaonline.com/doi/abs/10.1207/s15327701jlie0303_1?

cookieSet¼1&journalCode¼jlie

Chawla, M. (2003). An indexing technique for efficiently detecting plagiarism in large volumes of source

code. Honours thesis, RMIT University, Melbourne, Australia.

Clerehan, R., & Johnson, A. (2003). Ending the war on plagiarism: Appropriation in context.

Educational Integrity: Plagiarism and Other Perplexities Conference. Retrieved March 21, 2007,

from www.unisa.edu.au/educationalintegrity/apeic2003/Breakout%20program.htm

Cohen, J. (2003). Addressing inadvertent plagiarism: A practical strategy to help non-English

speaking background (NESB) students. Educational Integrity: Plagiarism and Other Perplexities

Conference. Retrieved March 21, 2007, from www.unisa.edu.au/educationalintegrity/apeic2003/

Breakout%20program.htm

Collberg, C., & Kobourov, S. (2005). Self-plagiarism in computer science. Communications of the

ACM, 48(4), 88 – 94.

Cropp, A. (2002, August 25). Modern cheating 101: Confessions of a copycat. Sunday Star Times,

p. c3.

Dick, M., Sheard, J., Bareiss, C., Carter, J., Joyce, D., Harding, T. et al. (2003). Addressing

student cheating: Definitions and solutions. ACM SIGCSE Bulletin, 35(2), 172 – 184.

Dick, M., Sheard, J., & Hasen, M. (2005). What to do about cheating? Using the student pers-

pective to develop curriculum to address the problem. 2nd Asia-Pacific Educational Integrity

Conference. Retrieved March 21, 2007, from www.newcastle.edu.au/conference/apeic/

papers.html

Dick, M., Sheard, J., & Markham, S. (2001a). Is it okay to cheat?—The views of postgraduate

students. ACM SIGCSE Bulletin, 33(3), 61 – 64.

196 D. Joyce

Page 11: Academic Integrity and Plagiarism: Australasian perspectives

Dick, M., Sheard, J., & Markham, S. (2001b). The reasons for student cheating: A survey of

postgraduate students. International Conference on Computers in Education. Retrieved March 30,

2003, from www.icce2001.org/cd/pdf/p08/Au102.pdf

East, J. (2005). Proper acknowledgment? Journal of University Teaching and Learning Practice, 2(3).

Retrieved March 21, 2007, from www.jutlp.uow.edu.au/2005_v02_i03a/pdf/east_005.pdf

Eira, C. (2005). Obligatory intertextuality and proscribed plagiarism: Intersections and contra-

dictions for research writing. 2nd Asia – Pacific Educational Integrity Conference. Retrieved March

21, 2007, from www.newcastle.edu.au/conference/apeic/papers.html

Emerson, L., Rees, M., & MacKay, B. (2005). Scaffolding academic integrity: Creating a learning

context for teaching referencing skills. Journal of University Teaching and Learning Practice,

2(3). Retrieved March 21, 2007, from http://jutlp.uow.edu.au/2005_v02_i03a/emerson005.

html

Gajadhar, J. (1998). Issues in plagiarism for the new millenium: An assessment odyssey. Retrieved March

21, 2007, from http://ultibase.rmit.edu.au/Articles/dec98/gajad1.htm

Goddard, R., & Rudzki, R. (2004). The problems of plagiarism and their detection using software.

E-fest Conference. Retrieved March 21, 2007, from www.efest.org.nz/2004/doc/Robert_

Goddard_Paper.DOC

Goddard, R., & Rudzki, R. (2005). Using an electronic text-matching tool (Turnitin) to detect

plagiarism in a New Zealand university. Journal of University Teaching and Learning Practice, 2(3).

Retrieved March 21, 2007, from http://jutlp.uow.edu.au/2005_v02_i03b/goddard006.html

Green, D., Lindemann, I., Marshall, K., & Wilkinson, G. (2005a). Student perceptions of a trial of

electronic text matching software: A preliminary investigation. Journal of University Teaching

and Learning Practice, 2(3). Retrieved March 21, 2007, from http://jutlp.uow.edu.au/

2005_v02_i03a/green005.html

Green, D., Lindemann, I., Marshall, K., & Wilkinson, G. (2005b). Staff and student reactions to a

trial of electronic text matching software. 2nd Asia – Pacific Educational Integrity Conference.

Retrieved March 21, 2007, from www.newcastle.edu.au/conference/apeic/papers.html

Gururajan, R., & Roberts, D. (2004). Attitude towards plagiarism in information systems in Australian

universities. Retrieved March 21, 2007, from http://eprints.usq.edu.au/archive/00000856/01/

Gururajan_Roberts.pdf

Hamilton, M., Tahaghoghi, S. M. M., & Walker, C. (2004). Educating students about plagiarism

avoidance—a computer science perspective. International Conference on Computers in Education.

Retrieved March 21, 2007, from http://goanna.cs.rmit.edu.au/*mh/Papers/157_Hamilton.pdf

Hasen, M., & Huppert, M. (2005). The trial of Damocles: An investigation into the incidence of

plagiarism at an Australian university. Australian Association for Research in Education Conference.

Retrieved March 21, 2007, from www.aare.edu.au/05pap/has05273.pdf

Hawthorn, D. (2001). Helping cheats prosper. New Zealand Journal of Applied Computing and

Information Technology, 5(1). 43 – 48. Retrieved March 21, 2007, from www.in-site.co.nz/

misc_links/papers/hawthorn139.pdf

Hinds, N. (2004). Punching plagiarism. Retrieved March 21, 2007, from www.rsnz.org/education/

dream/2004/hinds.php

Hoad, T., & Zobel, J. (2003). Methods for identifying versioned and plagiarised documents. Journal of

the American Society of Information Science and Technolgy, 54(3), 203 – 215. Retrieved

March 21, 2007, from http://portal.acm.org/citation.cfm?id¼766444&dl¼acm&coll¼&CFID¼15151515&CFTOKEN¼6184618

Hornlund, S. (2003). Spreadsheets can help reduce plagiarism. Educational Integrity: Plagiarism

and Other Perplexities Conference. Retrieved March 21, 2007, from www.unisa.edu.au/

educationalintegrity/apeic2003/Breakout%20program.htm

Hussin, V., & Hanisch, J. (2003). Reducing student plagiarism through targeting the assessment

task and embedding online learning development. Educational Integrity: Plagiarism and Other

Perplexities Conference. Retrieved March 21, 2007, from www.unisa.edu.au/educationalintegrity/

apeic2003/Breakout%20program.htm

Academic Integrity and Plagiarism 197

Page 12: Academic Integrity and Plagiarism: Australasian perspectives

Johnson, A., & Clerehan, R. (2005). A rheme of one’s own: How ‘original’ do we expect students to

be? Journal of University Teaching and Learning Practice, 2(3). Retrieved March 21, 2007, from

http://jutlp.uow.edu.au/2005_v02_i03a/johnson005.html

Joyce, D. (2002a). Responding to electronic cheating. Netsafe Conference. Retrieved March 21,

2007, from www.netsafe.org.nz/Doc_Library/netsafepapers_donaldjoyce_cheating.pdf

Joyce, D. (2002b). Cheating, outsourcing, plagiarism: A growing problem? 15th Annual Conference

of the National Advisory Committee on Computing Qualifications. Retrieved March 21, 2007, from

http://site.tekotago.ac.nz/staticdata/papers02/papers/joyce245.pdf

Joyce, D. (2003). Checking originality and preventing plagiarism. In S. Mann (Ed.), Proceedings of

the 16th Annual Conference of the National Advisory Committee on Computing Qualifications

(pp. 303 – 306). Palmerston North: NACCQ.

Joyce, D. (2004a). Reducing plagiarism: A three-pronged approach. Plagiarism: Prevention, Practice

& Policy Conference. Retrieved March 21, 2007, from www.jiscpas.ac.uk/documents/abstracts/

2004abstract13.pdf

Joyce, D. (2004b). Plagiarism: Meeting new challenges. In S. Mann & T. Clear (Eds.), Proceedings

of the 17th Annual Conference of the National Advisory Committee on Computing Qualifications

(p. 504). Christchurch: NACCQ.

Joyce, D. (2005). Academic integrity, educational practice and ICT. Proceedings of the Annual

Conference of the Higher Education Academy—Information and Computer Sciences (p. 149). York:

Higher Education Academy.

Joyce, D. (2006a). Promoting academic integrity among staff and students. In F. Duggan (Ed.),

Proceedings of the 2nd International Plagiarism: Prevention, Practice & Policy Conference (pp. 131 –

136). Newcastle upon Tyne: Northumbria University Press.

Joyce, D. (2006b). Raising awareness about academic integrity. ACM SIGCSE Bulletin, 38(3), 350.

Kennedy, I. (2005). Homework—is this a project for plagiarism? 2nd Asia – Pacific Educational

Integrity Conference. Retrieved March 21, 2007, from www.newcastle.edu.au/conference/apeic/

papers.html

Kett, G. (2003). Assessing the referencing practices of first year computer science students.

Educational Integrity: Plagiarism and Other Perplexities Conference. Retrieved March 21, 2007,

from www.unisa.edu.au/educationalintegrity/apeic2003/Breakout%20program.htm

Kock, N. (1999). A case of academic plagiarism. Communications of the ACM, 42(7), 96 – 104.

Kuiper, A. (2005). Proctors, plagiarism and problems: A case study in developing procedures for

dealing with dishonest academic practice. Proceedings of the HERDSA Conference. Retrieved

March 21, 2007, from http://conference.herdsa.org.au/2005/pdf/refereed/paper_261.pdf

Le Heron, D. (2001). Why do they do it? What can we do? The contextual realities of cheating in

information systems. New Zealand Journal of Applied Computing and Information Technology,

5(2), 28 – 34.

Mann, S., & Frew, Z. (2006). Similarity and originality in code: plagiarism and normal variation in

student assignments. In D. Tolhurst & S. Mann (Eds.), Proceedings of the Eighth Australasian

Computing Education Conference (pp. 143 – 150). Darlinghurst, Australia: Australian Computer

Society.

Marsden, M. (2003). When academic dishonesty isn’t plagiarism: An overview of the literature on

other kinds of cheating. Educational Integrity: Plagiarism and Other Perplexities Conference.

Retrieved March 21, 2007, from www.unisa.edu.au/educationalintegrity/apeic2003/

Breakout%20program.htm

Marsden, H. (2005). Reinventing ethical education in Australia : Too ocker for honour? 2nd Asia –

Pacific Educational Integrity Conference. Retrieved March 21, 2007, from www.newcastle.edu.

au/conference/apeic/papers.html

Marshall, S., & Garry, M. (2005). How well do students really understand plagiarism? ASCILITE

Conference. Retrieved March 21, 2007, from www.ascilite.org.au/conferences/brisbane05/blogs/

proceedings/52_Marshall.pdf

198 D. Joyce

Page 13: Academic Integrity and Plagiarism: Australasian perspectives

Martin, B. (2004). Plagiarism: Policy against cheating or policy for learning? Nexus, 16(2), 15 – 16.

Retrieved March 21, 2007, from www.uow.edu.au/arts/sts/bmartin/pubs/04plag.pdf

Melles, G. (2003). Challenging discourses of plagiarism and the reproductive ESL learner.

Educational Integrity: Plagiarism and Other Perplexities Conference. Retrieved March 21, 2007,

from www.unisa.edu.au/educationalintegrity/apeic2003/Breakout%20program.htm

Morrison, T. (2001). Selecting a strategy for combating plagiarism. Proceedings of the 14th Annual

Conference of the National Advisory Committee on Computing Qualifications (pp. 351 – 356). Hamilton,

New Zealand: National Advisory Committee on Computing Qualifications.

Mulcahy, S., & Goodacre, C. (2004). Opening Pandora’s box of academic integrity: Using

plagiarism detection software. ASCILITE Conference. Retrieved March 21, 2007, from

www.ascilite.org.au/conferences/perth04/procs/mulcahy.html

Muller, R. (2005). An evaluation of the perceived value of web-based academic integrity resources

for staff. 2nd Asia – Pacific Educational Integrity Conference. Retrieved March 21, 2007, from

www.newcastle.edu.au/conference/apeic/papers.html

Partridge, L., & McNamara, B. (2005). Addressing the wandering naı̈ve: The development of an

online resource to educate students about a university-wide academic integrity policy. 2nd

Asia – Pacific Educational Integrity Conference. Retrieved March 21, 2007, from www.newcastle.

edu.au/conference/apeic/papers_pdf/partridge.pdf

Paynter, J., & Mills, C. (2004). Academic plagiarism: An analysis of current technological issues.

Operational Research Society of New Zealand Conference. Retrieved March 21, 2007, from

www.orsnz.org.nz

Phillips, R. (2005). Audit of academic integrity and plagiarism issues in Australia and New Zealand.

Retrieved March 21, 2007, from www.tlc.murdoch.edu.au/project/acode‘‘\t’’new

Ryan, S. (2004). Turnitin: One lecturer’s perspective. Paper presented at Electronic Plagiarism

Software: The Good, the Bad, the Reality Workshop, University of Newcastle, November

26.

Savage, S. (2004). Staff and student responses to a trial of Turnitin plagiarism detection software.

Australian Universities Quality Forum. Retrieved March 21, 2007, from www.auqa.edu.au/auqf/

2004/program/papers/Savage.pdf

Sheard, J., Carbone, A., & Dick, M. (2002). Determination of factors which impact on IT students’

propensity to cheat. 5th Australasian Computing Education Conference. Retrieved March 21,

2007, from http://crpit.com/confpapers/CRPITV20Sheard.pdf

Sheard, J., & Dick, M. (2003). Influences on cheating practice of graduate students in IT courses:

What are the factors? ACM SIGCSE Bulletin, 35(3), 45 – 49.

Sheard, J., Dick, M., Markham, S., Macdonald, I., & Walsh, M. (2002). Cheating and plagiarism:

Perceptions and practices of first year IT students. 7th Annual Conference on Innovation and

Technology in Computer Science Education. Retrieved March 21, 2007, from http://portal.acm.

org/citation.cfm?id¼544468&dl¼acm&coll¼&CFID¼15151515&CFTOKEN¼6184618

Sheard, J., Markham, S., & Dick, M. (2003). Investigating differences in cheating behaviour of IT

undergraduate and graduate students: The maturity and motivation factors. Higher Education

Research and Development Society of Australasia, 22(1), 91 – 108.

Simon (2005). Blatant cheating detected in an online examination. 2nd Asia – Pacific Educational

Integrity Conference. Retrieved March 21, 2007, from www.newcastle.edu.au/conference/apeic/

papers.html

Stoney, S., & McMahon, M. (2004). Bulletproof assessment, war stories, and tactics: Avoiding

cybercheating. ASCILITE Conference. Retrieved March 21, 2007 from www.ascilite.org.au/

conferences/perth04/procs/stoney.html

Sutherland-Smith, W., & Carr, R. (2005). Turnitin.com: Teachers’ perspectives of anti-plagiarism

software in raising issues of educational integrity. Journal of University Teaching and Learning

Practice, 2(3). Retrieved March 21, 2007, from http://jutlp.uow.edu.au/2005_v02_i03b/

sutherland-smith006.html

Academic Integrity and Plagiarism 199

Page 14: Academic Integrity and Plagiarism: Australasian perspectives

Taylor, G. (2003). The critical role of pedagogy in plagiarism prevention: The Unley ten point

counter plagiarism strategy. Educational Integrity: Plagiarism and Other Perplexities Conference.

Retrieved March 21, 2007, from www.unisa.edu.au/educationalintegrity/apeic2003/Breakout%

20program.htm

Vamplew, P., & Dermoudy, J. (2005). An anti-plagiarism editor for software development curses.

7th Australasian Computing Education Conference. Retrieved March 21, 2007, from http://

crpit.com/confpapers/CRPITV42Vamplew.pdf

Walker Teaching Resource Center. (2006). Academic integrity conference to cover more than

plagiarism. Retrieved March 21, 2007, from http://www.utc.edu/news06/academicintegrity.

php

Whale, G. (1986). Detection of plagiarism in student programs. Proceedings of the 9th Australian

Computer Science Conference (pp. 231 – 241). Canberra, Australia: Australian Computer Society.

Whale, G. (1990). Identification of program similarity in large populations. The Computer Journal,

33(2). Retrieved March 21, 2007, from http://portal.acm.org/citation.cfm?id¼79237&dl¼acm&

coll¼&CFID¼15151515&CFTOKEN¼6184618

Zobel, J. (2004). ‘‘Uni Cheats Racket’’: A case study in plagiarism investigation. 6th Australasian

Computing Education Conference. Retrieved March 21, 2007, from http://crpit.com/confpapers/

CRPITV30Zobel.pdf

Zobel, J., & Hamilton, M. (2002). Managing student plagiarism in large academic departments.

Australian Universities Review, 45(2). Retrieved March 21, 2007, from http://goanna.cs.rmit.

edu.au/*jz/abstracts/aur02.html

Appendix: List of conferences and journals

Conferences

Annual Conference of the Higher Education Academy—Information and Computer

Sciences; Annual Conference of the National Advisory Committee on Computing

Qualifications; Annual Conference on Innovation and Technology in Computer

Science Education; Art of Excellent Teaching Conference; ASCILITE Conference;

Asia – Pacific Educational Integrity Conference; Australasian Computer Science

Conference; Australian Association for Research in Education Conference;

Australian Undergraduate Students’ Computing Conference; Australian Universities

Quality Forum; EDUCAUSE Conference; E-fest Conference; Electronic Plagiarism

Software Workshop; Higher Education Research and Development Society of

Australasia Conference; International Conference on Computers in Education;

Netsafe Conference; Operational Research Society of New Zealand Conference;

Plagiarism: Prevention, Practice and Policy Conference.

Journals

Australian Universities Review; Communications of the ACM; Higher Education Research

and Development Society of Australasia; Journal of Language, Identity and Education;

Journal of the American Society of Information Science and Technology; Journal of

University Teaching and Learning Practice; Nexus; New Zealand Journal of Applied

Computing and Information Technology; ACM SIGCSE Bulletin; The Computer Journal.

200 D. Joyce