A Cautionary Note on Checking Software Engineering Papers for Plagiarism

Several tools are marketed to the educational community for plagiarism detection and prevention. This article briefly contrasts the performance of two leading tools, TurnItIn and MyDropBox, in detecting submissions that were obviously plagiarized from articles published in IEEE journals. Both tools performed poorly because they do not compare submitted writings to publications in the IEEE database. Moreover, these tools do not cover the Association for Computing Machinery (ACM) database or several others important for scholarly work in software engineering. Reports from these tools suggesting that a submission has ldquopassedrdquo can encourage false confidence in the integrity of a submitted writing. Additionally, students can submit drafts to determine the extent to which these tools detect plagiarism in their work. Because the tool samples the engineering professional literature narrowly, the student who chooses to plagiarize can use this tool to determine what plagiarism will be invisible to the faculty member. An appearance of successful plagiarism prevention may in fact reflect better training of students to avoid plagiarism detection.

[1]  Ramiro Montealegre,et al.  Reporting bad news about software projects: impact of organizational climate and information asymmetry in an individualistic and a collectivistic culture , 2003, IEEE Trans. Engineering Management.

[2]  Jeffrey V. Nickerson,et al.  Teaching the integration of information systems technologies , 2006, IEEE Transactions on Education.

[3]  F. Jansen,et al.  A note on the evaluation of footnotes and other devices for background information in popular scientific texts , 2001 .

[4]  Sorel Reisman Plagiarism or Ignorance? You Decide , 2005, IT Prof..

[5]  Maria Grigoriadou,et al.  A web-based educational environment for teaching the computer cache memory , 2006, IEEE Transactions on Education.

[6]  Charles W. Adams Legal requirements for the use of keystroke loggers , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[7]  D. Gotterbarn,et al.  Plagiarism and Scholarly Publications: An Ethical Analysis , 2006, Proceedings. Frontiers in Education. 36th Annual Conference.

[8]  Mary Jane Irwin,et al.  Plagiarism on the rise , 2006, CACM.

[9]  P. D. Park Whistleblowing: an employer's view how vulnerable is your company , 1996 .

[10]  James D. Foley,et al.  Evaluating a Web Lecture Intervention in a Human–Computer Interaction Course , 2006, IEEE Transactions on Education.

[11]  N. Ree-Lindstad,et al.  Experience with a plagiarism control module , 2006, 2006 7th International Conference on Information Technology Based Higher Education and Training.

[12]  Matthew Allen Dematerialised data and human desire: the Internet and copy culture , 2003, Proceedings. 2003 International Conference on Cyberworlds.

[13]  Venkataraman Ramesh,et al.  Design, development, and assessment of mobile applications: the case for problem-based learning , 2006, IEEE Transactions on Education.

[14]  R. House,et al.  Teaching Enron: the rhetoric and ethics of whistle-blowing , 2004, IEEE Transactions on Professional Communication.

[15]  J. Kumagai The whistle-blower's dilemma , 2004, IEEE Spectrum.

[16]  Justin Zobel Uni Cheats Racket: A Case Study in Plagiarism Investigation , 2004, ACE.

[17]  F. Mintzer Join the fight against plagiarism [President's Message] , 2005 .