DOI - Vydavatelství Mendelovy univerzity v Brně

Identifikátory DOI

DOI: 10.11118/978-80-7509-772-9-0078

PLAGIARISM FROM A DIGITAL FORENSICS PERSPECTIVE

Clare S. Johnson, Ross Davies
University of South Wales, Cardiff, United Kingdom

Plagiarism and contract cheating are serious academic issues that ‘undermine the integrity of education’ (Bretag, 2013). There are a number of tools that can help assessors detect plagiarism – particularly where text has been copied and pasted: Turnitin (https://www. turnitin.com), PlagScan (https://www.plagscan.com) and Urkund (https://www.urkund.com) are examples of such tools. The providers of these tools are also developing authorship tools that use stylometrics and linguistics to determine matches between authors (whether the submitting author, or a third party). It is also possible for an assessor to copy passages of text and paste them into a Google search (or similar) with quotes surrounding the passage to see if there are any immediate online matches. In a previous paper Using digital forensic techniques to identify contract cheating: A case study (Johnson & Davies, 2020), the authors began using digital forensic techniques to see if it was possible to detect contract cheating. In that paper, consideration was given to how forensic techniques allow review of document edits through examining the Open Office extensible markup language (OOXML) format of the document. This paper seeks to extend that research by further exploration of the OOXML format to establish whether forensic artefacts can be found to indicate that work has been copied and pasted from online sources. A number of sample documents were created by the authors and the xml analysed. Whilst there were some indicators to suggest work had been copied and pasted, more analysis is required to develop the techniques into a more reliable tool.

Klíčová slova: Cheating, Copying, Detection, Forensics, OOXML, Plagiarism

stránky: 78-89



Reference

  1. BOWERS, W. J. (1964). Student dishonesty and its control in college. New York: Bureau of Applied Social Research, Columbia University.
  2. BRETAG, T. ET AL. (2014) Teach us how to do it properly! An Australian academic integrity student survey, Studies in Higher Education, 39(7), pp. 1150-1169. doi: 10.1080/03075079.2013.777406. Přejít k původnímu zdroji...
  3. FOLTYNEK, T., MEUSCHKE, N., & GIPP, B. (2019). Academic Plagiarism Detection: A Systematic Literature Review, ACM Computer Surveys, 12 doi: 10.1145/3345317, accessed 23/03/20 Přejít k původnímu zdroji...
  4. FU, Z., SUN, X., LIU, Y., & LI, B. (2011). Forensic investigation of OOXML format documents. Digital Investigation, 8(1), 44-55. doi:10.1016/j.diin.2011.04.001 Přejít k původnímu zdroji...
  5. JEONG, D., & LEE, S. (2017). Study on the tracking revision history of MS Word files for forensic investigation. Digital Investigation, 23, 3-10. doi:10.1016/j.diin.2017.08.003 Přejít k původnímu zdroji...
  6. JOHNSON, C., DAVIES, R. (2020). Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study. Journal of Academic Ethics. https://doi.org/10.1007/s10805-019-09358-w Přejít k původnímu zdroji...
  7. MCCABE, D., TREVINO, L., & BUTTERFIELD, K., (1996). The Influence of Collegiate and Corporat Codes of Conduct on Ethics-Related Behavior in the Workplace. Business Ethics Quarterly, 6(4), pp. 461-476. https://doi.org/10.2307/3857499 Přejít k původnímu zdroji...
  8. MCCABE, D., TREVINO, L., & BUTTERFIELD, K., (2001). Cheating in academic institutions: A decade of research. Ethics & Behavior, 11(3), pp. 219-232. Přejít k původnímu zdroji...
  9. MICROSOFT. (2019). Open XML Formats and file name extension. Retrieved from: https://support.office.com/en-gb/article/open-xml-formats-and-file-name-extensions-5200d93c-3449-4380-8e11-31ef14555b18, accessed 30/11/19
  10. MOSTROUS, A., & KENBER, B. (2016). Universities face student cheating crisis. The Times, available at: https://www.thetimes.co.uk/article/universities-face-student-cheating-crisis-9jt6ncd9vz7
  11. PLAGIARISM.ORG (2017). What is Plagiarism. Available at: https://www.plagiarism.org/article/what-is-plagiarism, accessed 28/02/20
  12. XIANG, L., SUN, C., LIAO, N., & WANG, W. (2016). A Characteristic-Preserving Steganographic Method based on Revision Identifiers. International Journal of Multimedia and Ubiquitous Engineering, 11(9), 29-38. Přejít k původnímu zdroji...
  13. WIKIPEDIA (2020). Plagiarism, Available at: https://en.wikipedia.org/wiki/Plagiarism, accessed 20/02/20
  14. STACK OVERFLOW (2020). Creating a traffic light using Python, Available at: https://stackoverflow.com/questions/24588406/creating-a-traffic-light-using-python, accessed 20/02/20
  15. GITHUB (2020). Pi-hole / setup.py, Available at: https://github.com/pi-hole/pi-hole/blob/master/setup.py, accessed 20/02/20
  16. Y. MA, Z. MAO, W. JIA, C. LI, J. YANG AND M. SUN (2011). Magnetic Hand Tracking for Human-Computer Interface. In IEEE Transactions on Magnetics, vol. 47, no. 5, pp. 970-973 Přejít k původnímu zdroji...
  17. BARSZAP, A. G., SKAVHAUG, I., JOSHI, S. S., (2016). Effects of muscle fatigue on the usability of a myoelectric human-computer interface, Human Movement Science, vol. 49, pp. 225-238, available at: https://10.1016/j.humov.2016.06.009, accessed 20/02/20. Přejít k původnímu zdroji...
  18. IEEE (2018). Internet of Things Security: Is Anything New? In IEEE Security & Privacy, vol. 16, no. 5, pp. 3-5, September/October 2018, available at: https://doi.org/10.1109/MSP.2018.3761715, accessed 19/02/2020. Přejít k původnímu zdroji...
  19. INTELLECTSOFT (2019). Top 10 Biggest IoT Security Issues, available at https://www.intellectsoft.net/blog/biggest-iot-security-issues/, accessed 19/02/2020
  20. WIKIPEDIA (2020). Red Team, Available at: https://en.wikipedia.org/wiki/Red_team, accessed 28/02/20).
  21. SECURITYTRAILS (2018). Cybersecurity Red Team Versus Blue Team - Main Differences Explained, available at: https://securitytrails.com/blog/cybersecurity-red-blue-team, accessed 28/02/20
  22. EC COUNCIL (n.d.). Red Team vs Blue Team, available at: https://blog.eccouncil.org/red-team-vs-blue-team/, accessed 28/02/20.
  23. NORTON (2020). What is social engineering? Tips to help avoid becoming a victim. Available at: https://us.norton.com/internetsecurity-emerging-threats-what-is-social-engineering.html, accessed 19/02/20.
  24. KASPERSKY (n.d.). Social engineering - Definition. Available at: https://www.kaspersky.co.uk/resource-center/definitions/what-is-social-engineering, accessed 19/02/20.
  25. THE INTERNET SOCIETY WWW.INTERNETSOCIETY.ORG. (n.d.). Blockchain, available at: https://www.internetsociety.org/issues/blockchain, accessed 23/03/20.
  26. COINTELEGRAPH.COM (n.d.). How Blockchain Technology Worlks. Guide for Beginners. Available at: https://cointelegraph.com/bitcoin-for-beginners/how-blockchain-technology-works-guide-for-beginners, accessed 23/03/20.
  27. JOHNSON, C. S. (2017). Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners. Research in Learning Technology. 25. Available at: https://doi.org/10.25304/rlt.v25.1981, accessed 20/03/20. Přejít k původnímu zdroji...
  28. SALMON, G. (n.d.). E-tivities - Introduction. Gilly Salmon. Available at: https://www.gillysalmon.com/e-tivities.html, accessed 20/03/20.