DOI: 10.11118/978-80-7509-772-9-0078
PLAGIARISM FROM A DIGITAL FORENSICS PERSPECTIVE
- Clare S. Johnson, Ross Davies
- University of South Wales, Cardiff, United Kingdom
Plagiarism and contract cheating are serious academic issues that ‘undermine the integrity of education’ (Bretag, 2013). There are a number of tools that can help assessors detect plagiarism – particularly where text has been copied and pasted: Turnitin (https://www. turnitin.com), PlagScan (https://www.plagscan.com) and Urkund (https://www.urkund.com) are examples of such tools. The providers of these tools are also developing authorship tools that use stylometrics and linguistics to determine matches between authors (whether the submitting author, or a third party). It is also possible for an assessor to copy passages of text and paste them into a Google search (or similar) with quotes surrounding the passage to see if there are any immediate online matches. In a previous paper Using digital forensic techniques to identify contract cheating: A case study (Johnson & Davies, 2020), the authors began using digital forensic techniques to see if it was possible to detect contract cheating. In that paper, consideration was given to how forensic techniques allow review of document edits through examining the Open Office extensible markup language (OOXML) format of the document. This paper seeks to extend that research by further exploration of the OOXML format to establish whether forensic artefacts can be found to indicate that work has been copied and pasted from online sources. A number of sample documents were created by the authors and the xml analysed. Whilst there were some indicators to suggest work had been copied and pasted, more analysis is required to develop the techniques into a more reliable tool.
Keywords: Cheating, Copying, Detection, Forensics, OOXML, Plagiarism
pages: 78-89
References
- BOWERS, W. J. (1964). Student dishonesty and its control in college. New York: Bureau of Applied Social Research, Columbia University.
- BRETAG, T. ET AL. (2014) Teach us how to do it properly! An Australian academic integrity student survey, Studies in Higher Education, 39(7), pp. 1150-1169. doi: 10.1080/03075079.2013.777406.
Go to original source...
- FOLTYNEK, T., MEUSCHKE, N., & GIPP, B. (2019). Academic Plagiarism Detection: A Systematic Literature Review, ACM Computer Surveys, 12 doi: 10.1145/3345317, accessed 23/03/20
Go to original source...
- FU, Z., SUN, X., LIU, Y., & LI, B. (2011). Forensic investigation of OOXML format documents. Digital Investigation, 8(1), 44-55. doi:10.1016/j.diin.2011.04.001
Go to original source...
- JEONG, D., & LEE, S. (2017). Study on the tracking revision history of MS Word files for forensic investigation. Digital Investigation, 23, 3-10. doi:10.1016/j.diin.2017.08.003
Go to original source...
- JOHNSON, C., DAVIES, R. (2020). Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study. Journal of Academic Ethics. https://doi.org/10.1007/s10805-019-09358-w
Go to original source...
- MCCABE, D., TREVINO, L., & BUTTERFIELD, K., (1996). The Influence of Collegiate and Corporat Codes of Conduct on Ethics-Related Behavior in the Workplace. Business Ethics Quarterly, 6(4), pp. 461-476. https://doi.org/10.2307/3857499
Go to original source...
- MCCABE, D., TREVINO, L., & BUTTERFIELD, K., (2001). Cheating in academic institutions: A decade of research. Ethics & Behavior, 11(3), pp. 219-232.
Go to original source...
- MICROSOFT. (2019). Open XML Formats and file name extension. Retrieved from: https://support.office.com/en-gb/article/open-xml-formats-and-file-name-extensions-5200d93c-3449-4380-8e11-31ef14555b18, accessed 30/11/19
- MOSTROUS, A., & KENBER, B. (2016). Universities face student cheating crisis. The Times, available at: https://www.thetimes.co.uk/article/universities-face-student-cheating-crisis-9jt6ncd9vz7
- PLAGIARISM.ORG (2017). What is Plagiarism. Available at: https://www.plagiarism.org/article/what-is-plagiarism, accessed 28/02/20
- XIANG, L., SUN, C., LIAO, N., & WANG, W. (2016). A Characteristic-Preserving Steganographic Method based on Revision Identifiers. International Journal of Multimedia and Ubiquitous Engineering, 11(9), 29-38.
Go to original source...
- WIKIPEDIA (2020). Plagiarism, Available at: https://en.wikipedia.org/wiki/Plagiarism, accessed 20/02/20
- STACK OVERFLOW (2020). Creating a traffic light using Python, Available at: https://stackoverflow.com/questions/24588406/creating-a-traffic-light-using-python, accessed 20/02/20
- GITHUB (2020). Pi-hole / setup.py, Available at: https://github.com/pi-hole/pi-hole/blob/master/setup.py, accessed 20/02/20
- Y. MA, Z. MAO, W. JIA, C. LI, J. YANG AND M. SUN (2011). Magnetic Hand Tracking for Human-Computer Interface. In IEEE Transactions on Magnetics, vol. 47, no. 5, pp. 970-973
Go to original source...
- BARSZAP, A. G., SKAVHAUG, I., JOSHI, S. S., (2016). Effects of muscle fatigue on the usability of a myoelectric human-computer interface, Human Movement Science, vol. 49, pp. 225-238, available at: https://10.1016/j.humov.2016.06.009, accessed 20/02/20.
Go to original source...
- IEEE (2018). Internet of Things Security: Is Anything New? In IEEE Security & Privacy, vol. 16, no. 5, pp. 3-5, September/October 2018, available at: https://doi.org/10.1109/MSP.2018.3761715, accessed 19/02/2020.
Go to original source...
- INTELLECTSOFT (2019). Top 10 Biggest IoT Security Issues, available at https://www.intellectsoft.net/blog/biggest-iot-security-issues/, accessed 19/02/2020
- WIKIPEDIA (2020). Red Team, Available at: https://en.wikipedia.org/wiki/Red_team, accessed 28/02/20).
- SECURITYTRAILS (2018). Cybersecurity Red Team Versus Blue Team - Main Differences Explained, available at: https://securitytrails.com/blog/cybersecurity-red-blue-team, accessed 28/02/20
- EC COUNCIL (n.d.). Red Team vs Blue Team, available at: https://blog.eccouncil.org/red-team-vs-blue-team/, accessed 28/02/20.
- NORTON (2020). What is social engineering? Tips to help avoid becoming a victim. Available at: https://us.norton.com/internetsecurity-emerging-threats-what-is-social-engineering.html, accessed 19/02/20.
- KASPERSKY (n.d.). Social engineering - Definition. Available at: https://www.kaspersky.co.uk/resource-center/definitions/what-is-social-engineering, accessed 19/02/20.
- THE INTERNET SOCIETY WWW.INTERNETSOCIETY.ORG. (n.d.). Blockchain, available at: https://www.internetsociety.org/issues/blockchain, accessed 23/03/20.
- COINTELEGRAPH.COM (n.d.). How Blockchain Technology Worlks. Guide for Beginners. Available at: https://cointelegraph.com/bitcoin-for-beginners/how-blockchain-technology-works-guide-for-beginners, accessed 23/03/20.
- JOHNSON, C. S. (2017). Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners. Research in Learning Technology. 25. Available at: https://doi.org/10.25304/rlt.v25.1981, accessed 20/03/20.
Go to original source...
- SALMON, G. (n.d.). E-tivities - Introduction. Gilly Salmon. Available at: https://www.gillysalmon.com/e-tivities.html, accessed 20/03/20.