Detection
While some free online tools exist to
support the detection of plagiarism, most institutions purchase programs such
as Turnitin, Grammerly, and SafeAssign, to check not only Internet
resource plagiarism, but to host a database of previously submitted student
work for the institution. This practice
can greatly enhance an institution’s ability to hold students accountable for
academic integrity, even if a student copies his or her own work from a
previous course. Although these programs
promote the ethical use of information, they create a false sense of security
in that the work a student submits is their own. In my district’s virtual school, there were
some cases in which a student account was submitting work of sufficient
academic integrity, however, the student’s parent was doing all the work. This prompted the virtual school to implement a
policy in which content in an online course is split into modules and each
student must schedule a “call-in” with the teacher of record to talk about what
they have learned in the module. This
process has greatly helped in ensuring that the student of record is the one
completing the work. The virtual school final
course exams are proctored and students must come to a testing site and provide
photo identification to be given the online exam. In this manner, the virtual school has been
able to prove that the student of record is the individual completing and
submitting the work.
The punitive nature of copyright infringement,
whether intentional or unintentional can hinder the body of academic work and
creativity (Jocoy, & DiBiase, 2006).
Last year during the training for building blended courses in
Blackboard©, teachers were cautioned and trained on the proper use of citation
and copyrighted materials. The fear of
retribution convinced some teachers to limit their use of the learning
management system and caused a backlash from others concerned about their own
intellectual property rights.
Inspiration
More important than the detection of
plagiarism is the development of student’s sense of ethics and integrity. Challenging students and building a culture
of respect for individual contributions will have a greater and more positive
impact than whether a program caught a “copy/paste” infraction. The lesson is not, in the not getting caught,
but in the not wanting to steal in the first place.
Just as the Internet has provided
almost unlimited access to information in the virtual classroom, teachers in the
physical classroom have had to deal with these issues as well. In a great post entitled, “Google-Proof
Questioning: A New Use For Bloom’s Taxonomy”, blogger and educator John
Sowash shares how teachers can challenge students in meaningful and creative
ways. Similarly, online courses can be
designed with the intention of getting beyond the copy/paste option and into
the creation of more personalized content that cannot be stolen but must be
created to meet a specific goal.
References:
Jocoy,
C., & DiBiase, D. (2006). Plagiarism by adult learners online: A case study
in detection and remediation. International Review of Research in Open &
Distance Learning, 7(1), 1-15. Retrieved from the Walden Library using the
Education Research Complete database.
Tisch,
ReplyDeleteThanks for you’re your post. The title of your post says it all. The use of plagiarism detection software should be one of the many strategies of encouraging students to act responsibly whilst they are developing their scholarly writing skills. As I pointed out in my post, some faculty have reported using Turnitn as a teaching and learning tool (Brown, Jordan, Rubin & Arome, 2010).
I like your article entitled “Google-Proof Questioning”. The article supports the concept that assessment design can be used to discourage dishonesty at the same time assisting students’ to develop their critical thinking skills.
References
Brown, V., Jordan, R., Rubin, N., & Arome, G. (2010). Strengths and weaknesses of plagiarism detection software. Journal of Literacy and Technology, 11(1/2), 110-131. Retrieved from Education Research Complete database.
Hilary,
DeleteThank you for your comment, and in pointing out the similarities to your post. As I read through several of our class blogs, I noticed a common thread that most felt there was a need to develop real-world assessments to build work related skills.
This comment has been removed by the author.
ReplyDeleteTish,
ReplyDeleteI think this is my first time visiting your blog for this class it is great. I like the use of graphics and videos. I like the idea of split school and the requirement for students to call in. I have heard from friends and colleges that others cheat in this way to have others do their work for them. I may be just a bit naive or just never thought someone could stoop so low.
Hi Tisch,
ReplyDeleteYou mentioned that institutions purchase programs to check plagiarism. “Most institutions purchase programs such as Turnitin, Grammerly, and SafeAssign, to check not only Internet resource plagiarism, but to host a database of previously submitted student work for the institution.” My question for the institutions/companies out there is if institutions are all using different programs; are they allowing their data bases to talk to each other. It kind of defeats the purpose of having one central repository of information to cross check data if the repositories are all private and separate.
For example, if I was to copy 79% of a paper that’s not in the data base that the institution uses how would the instructor ever know that’s not my work? What are your thoughts?
I think that these databases should not be privatized and if they are, their data bases should be linked or “talk” to each other, but that would defeat the purpose of selecting one company to provide your plagiarism services. Sorry for my rant and rave but that’s my thought on plagiarism software. :)
Other than turnitin.com have you ever used any other plagiarism detection software? In undergrad we did not have to submit anything to a software platform like EVE or Turnitin.