229
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Identifying plagiarised programming assignments based on source code similarity scores

ORCID Icon &
Pages 621-645 | Received 25 Oct 2020, Accepted 29 Mar 2022, Published online: 19 Apr 2022

References

  • Ahtiainen, A., Surakka, S., & Rahikainen, M. (2006). Plaggie: GNU-licensed source code plagiarism detection engine for Java exercises, in: Proceedings of the 6th Baltic Sea Conference on Computing Education Research: Koli Calling 2006, Uppsala, Sweden, Association for Computing Machinery, Baltic Sea ‘06, 141–142. https://doi.org/10.1145/1315803.1315831
  • Allyson, F. B., Danilo, M. L., José, S. M., & Giovanni, B. C. (2019). Sherlock N-overlap: Invasive normalization and overlap coefficient for the similarity analysis between source code. IEEE Transactions on Computers, 68(5), 740–751. https://doi.org/10.1109/TC.2018.2881449
  • Bufferfield, F., 1991. Scandal over cheating at MIT stirs debate on limits of teamwork. The New York Times. https://www.nytimes.com/1991/05/22/technology/scandal-over-cheating-at-mit-stirs-debate-on-limits-of-teamwork.html
  • Burrows, S., Tahaghoghi, S. M., & Zobel, J. (2007). Efficient plagiarism detection for large code repositories. Software: Practice and Experience, 37(2), 151–175. https://doi.org/10.1002/spe.750
  • Cheers, H., Lin, & Y. Smith, S. P. (2020). Detecting pervasive source code plagiarism through dynamic program behaviours. Proceedings of the Twenty-Second Australasian Computing Education Conference, Association for Computing Machinery, Melbourne, VIC, Australia, 21–30. https://doi.org/10.1145/3373165.3373168
  • Cosma, G., & Joy, M. (2008). Towards a definition of source-code plagiarism. IEEE Transactions on Education, 51(2), 195–200. https://doi.org/10.1109/TE.2007.906776
  • Cosma, G., & Joy, M. An approach to source-code plagiarism detection and investigation using Latent Semantic Analysis. (2012). IEEE Transactions on Computers, 61(3), 379–394. https://doi.org/10.1109/TC.2011.223
  • Curtis, G. J., & Popal, R. (2011). An examination of factors related to plagiarism and a five-year follow-up of plagiarism at an Australian university. IJEI, 7(1). https://doi.org/10.21913/IJEI.v7i1.742
  • Daly, C., & Horgan, J. Patterns of plagiarism. (2005). SIGCSE Bull, 37(1), 383–387. https://doi.org/10.1145/1047124.1047473
  • Duric, Z., & Gasevic, D. (2013). A source code similarity system for plagiarism detection. The Computer Journal, 56(1), 70–86. https://doi.org/10.1093/comjnl/bxs018
  • Ester, M., Kriegel, H. P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. AAAI Press.
  • Evans, J., (2020). This university couldn’t work out which students cheated, so it punished them all Australian Broadcasting Corporation. accessed: 2021-05-1https://www.abc.net.au/news/2020-12-22/anu-computer-science-students-penalised-over-alleged-plagiarism/13004718
  • Faidhi, J., & Robinson, S. (1987). An empirical approach for detecting program similarity and plagiarism within a university programming environment. Computers & Eduation, 11(1), 11–19. https://doi.org/10.1016/0360-1315(87)90042-X
  • Grune, D., & Huntjens, M. (1989). Het detecteren van kopieën bij informatica-practica. Informatie (in Dutch), 31(11), 864–867. https://dickgrune.com/Books/Publications/Het_detecteren_van_kopieen_bij_informatica-practica.pdf
  • Joy, M., & Luck, M. (1999). Plagiarism in programming assignments. IEEE Transactions on Education, 42(2), 129–133. https://doi.org/10.1109/13.762946
  • Karp, R. M., & Rabin, M. O. (1987). Efficient randomized pattern-matching algorithms. IBM Journal of Research and Development, 31(2), 249–260. https://doi.org/10.1147/rd.312.0249
  • Lancaster, T., & Codrin, C. (2021). Contract cheating by STEM students through a file sharing website: A Covid-19 pandemic perspective. International Journal for Educational Integrity, 17(1), 1833–2595. https://doi.org/10.1007/s40979-021-00070-0
  • Martins, V. T., Fonte, D., Henriques, P. R., & da Cruz, D. (2014). Plagiarism Detection: A Tool Survey and Comparison M. J. V. Pereira, J. P. Leal, & A. Simões (Eds.), 3rd Symposium on Languages, Applications and Technologies (Vol. 38, pp. 143–158). OpenAccess Series in Informatics (O ASIcs). Dagstuhl, Germany: Schloss Dagstuhl– Leibniz. Dagstuhl, Germany: Schloss Dagstuhl Leibniz. Dagstuhl, Germany: Schloss Dagstuhl LeibnizZentrum fuer Informatik.
  • Mozgovoy, M. (2006). Desktop tools for offline plagiarism detection in computer programs. Informatics in Education, 5(1), 97–112. https://doi.org/10.5555/1149707.1149716
  • Novak, M., Joy, M., & Kermek, D. (2019). Source-code similarity detection and detection tools used in academia: A systematic review, ACM Ttransactions on Computing Education, 19(3), 3. https://doi.org/10.1145/3313290
  • Parker A & Hamblen J. (1989). Computer algorithms for plagiarism detection. IEEE Trans. Educ., 32(2), 94–99. https://doi.org/10.1109/13.28038
  • Pierce, J., & Zilles, ca. 2017. Investigating student plagiarism patterns and correlations to grades, in: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science. Education (Vol. 17 471–476). Association for Computing Machinery, SIGCSE. https://doi.org/10.1145/3017680.3017797
  • Pike, R., n.d. Sherlock plagiarism detector. The University of Sydney. https://web.archive.org/web/20150323030146/http://rp-www.cs.usyd.edu.au/~scilect/sherlock/, accessed: 2021-05-01
  • Prechelt, L., & Malpohl, G. (2003). Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science 8 (11). https://www.jucs.org/jucs_8_11/finding_plagiarisms_among_a/Prechelt_L.pdf
  • Ragkhitwetsagul, C., Krinke, J., & Clark, D. (2016). Similarity of source code in the presence of pervasive modifications, in: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), Raleigh, NC, USA (IEEE), 117–126. https://doi.org/10.1109/SCAM.2016.13
  • Ragkhitwetsagul, C., Krinke, J., & Clark, D. (2018). A comparison of code similarity analysers. Empirical Software Engineering, 23(4), 2464–2519. https://doi.org/10.1007/s10664-017-9564-7
  • Ramírez-de-la Cruz, A., Ramírez-de-la Rosa, G., Sánchez-Sánchez, C., & Jiménez-Salazar, H. (2014). On the Importance of Lexicon, Structure and Style for Identifying Source Code Plagiarism. In: Proceedings of the 2014 Forum for Information Retrieval Evaluation Bangalore, India. (pp. 31–38). .Association for Computing Machinery. https://doi.org/10.1145/2824864.2824879
  • Roberts, E., 2002. Strategies for promoting academic integrity in CS courses, in: 32nd Annual Frontiers in Education Boston, MA, USA, vol. 2 (IEEE), F3G–F3G. https://doi.org/10.1109/FIE.2002.1158209
  • Roy, C. K., Cordy, J. R., & Koschke, R. (2009). Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7), 470–495. https://doi.org/10.1016/j.scico.2009.02.007
  • Schleimer, S., Wilkerson, D. S., & Aiken, A. (2003). Winnowing: Local Algorithms for Document Fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, California ACM, 76–85. https://doi.org/10.1145/872757.872770
  • Sraka, D., & Kaucic, B. (2009). Source code plagiarism ITI 2009 31st International Conference on Information Technology Interfaces Cavtat, Croatia (IEEE), 461–466. https://doi.org/10.1109/ITI.2009.5196127
  • Wagner, N. R. (2000). Plagiarism by student programmers. The University of Texas at San Antonio, http://www.cs.utsa.edu/wagner/pubs/plagiarism0.html, accessed: 2021-05-01
  • Yeo, S. (2007). First-year university science and engineering students’ understanding of plagiarism. Higher Education Research & Development, 26(2), 199–216. https://doi.org/10.1080/07294360701310813
  • Zheng, M., Pan, X., & Lillis, D. (2018). CodEX: Source code plagiarism detection based on abstract syntax trees, in: Proceedings of the 29th Irish Conference on Artificial Intelligence and Cognitive Science (AICS 2018), Dublin, Ireland: CEUR-WS.org. http://ceur-ws.org/Vol-2259/aics_33.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.