Plagiarism Detection Tool Based on Programming Activity Logs

被引:0
作者
Meier, Heidi [1 ]
Lepp, Marina [1 ]
Kutt, Rene [1 ]
机构
[1] Univ Tartu, Inst Comp Sci, Tartu, Estonia
来源
2024 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE, EDUCON 2024 | 2024年
关键词
programming education; plagiarism detection; similarity analysis; history-based analysis; programming process; log file; SIMILARITY;
D O I
10.1109/EDUCON60312.2024.10578885
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In academia, plagiarism is a critical concern, and educators require effective tools to identify and prevent it. Presently, many plagiarism detection tools rely on source code comparison, which may not effectively counter the obfuscation techniques employed by students. This article presents an innovative solution to identifying potential plagiarism in programming assignments through the analysis of logs containing information on user actions during the programming process. The created tool adopts a history-based approach to plagiarism detection, which helps to counteract certain forms of obfuscation students use to conceal their plagiarism. The plagiarism detection tool analyses logs based on user-specific criteria such as run count, total time spent working, log file size, and pasted text ratio. The tool also compares log files for detection of duplicate files, identical texts pasted in different log files, source code pasted in different log files, and source code similarity. The solution also allows the user to specify the values for each analyzed metric for plagiarism detection. The effectiveness of the tool is demonstrated through experimental evaluations, enabling to identify cases of plagiarism that could not be detected with other available tools. The findings suggest that the tool can be an efficient and effective means for educators to identify plagiarism in programming assignments.
引用
收藏
页数:7
相关论文
共 19 条
  • [1] Thonny, a Python']Python IDE for Learning Programming
    Annamaaa, Aivar
    [J]. ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 343 - 343
  • [2] Blanchard Jeremiah, 2022, ITiCSE-WGR '22: Proceedings of the 2022 Working Group Reports on Innovation and Technology in Computer Science Education, P261, DOI 10.1145/3571785.3574129
  • [3] Detecting Pervasive Source Code Plagiarism through Dynamic Program Behaviours
    Cheers, Hayden
    Lin, Yuqing
    Smith, Shamus P.
    [J]. PROCEEDINGS OF THE TWENTY-SECOND AUSTRALASIAN COMPUTING EDUCATION CONFERENCE, ACE'20, 2020, : 21 - 30
  • [4] A Source Code Similarity System for Plagiarism Detection
    Duric, Zoran
    Gasevic, Dragan
    [J]. COMPUTER JOURNAL, 2013, 56 (01) : 70 - 86
  • [5] Gitchell D., 1999, SIGCSE Bulletin, V31, P266, DOI 10.1145/384266.299783
  • [6] Plagiarism Deterrence in CS1 Through Keystroke Data
    Hart, Kaden
    Mano, Chad
    Edwards, John
    [J]. PROCEEDINGS OF THE 54TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, VOL 1, SIGCSE 2023, 2023, : 493 - 499
  • [7] Hrkut Patrik, 2023, 2023 33rd Conference of Open Innovations Association (FRUCT), P77, DOI 10.23919/FRUCT58615.2023.10143064
  • [8] Plagiarism in programming assignments
    Joy, M
    Luck, M
    [J]. IEEE TRANSACTIONS ON EDUCATION, 1999, 42 (02) : 129 - 133
  • [9] Authorship Is Continuous: Managing Code Plagiarism
    Koss, Ian
    Ford, Richard
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (02) : 72 - 74
  • [10] Liu T., 2023, 2023 4 INT SEM ART I, P188, DOI [10.1109/AINIT59027.2023.10212887, DOI 10.1109/AINIT59027.2023.10212887]