The Contemporary Plagiarist: The Roles of Technology and Moral Development

This research examines a chronic problem in academic settings – inappropriate copying or misuse of source materials–i.e., plagiarism. We conduct a computer-based writing experiment to examine the effects of psychological and situational characteristics on subjects’ propensity to misappropriate text. Specifically, we examine to what extent such misappropriations may be explained by available technological support and an individual’s level of cognitive moral development (CMD). We hypothesize that more technological support will be positively associated with misuse while advanced CMD will be negatively associated with misuse. Lastly, we explore the interaction of technology and CMD on our measure of misuse. We find that both CMD and technology play a significant role in explaining such misappropriations. Subjects in the high technological support condition demonstrate a level of misuse that is significantly higher than those in the control condition. While higher levels of CMD are associated with a significant decrease in misuse.

[1]  James R. Rest Development in Judging Moral Issues , 1979 .

[2]  M. F. Luce,et al.  Constructive Consumer Choice Processes , 1998 .

[3]  J. Lefkowitz,et al.  Individual and Organizational Antecedents of Misconduct in Organizations , 2009 .

[4]  Chris J. Park,et al.  In Other (People's) Words: Plagiarism by university students--literature and lessons , 2003 .

[5]  P. Spicker,et al.  Type A Behavior, Competitive Achievement-Striving, and Cheating among College Students , 1990, Psychological reports.

[6]  Huseyin Cavusoglu,et al.  Economics of IT Security Management , 2004, Economics of Information Security.

[7]  David Miles Huber Multimedia and the Web , 2007 .

[8]  D. Fosbinder,et al.  Cheating and plagiarism. , 1991, Nurse educator.

[9]  I. Ajzen,et al.  Predicting dishonest actions using the theory of planned behavior , 1991 .

[10]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[11]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[12]  Abbas Tashakkori,et al.  Mixed Methodology: Combining Qualitative and Quantitative Approaches , 1998 .

[13]  Rubén Comas-Forgas,et al.  Academic Plagiarism: Explanatory Factors from Students’ Perspective , 2010 .

[14]  Rafik Z. Elias The Impact of Anti-Intellectualism Attitudes and Academic Self-Efficacy on Business Students’ Perceptions of Cheating , 2009 .

[15]  Randi L. Sims,et al.  The severity of academic dishonesty: A comparison of faculty and student views , 1995 .

[16]  William H. Yates Academic integrity in the Internet age , 2007 .

[17]  Iwan G. J. H. Wopereis,et al.  Differences between novice and experienced users in searching information on the World Wide Web , 2000, J. Am. Soc. Inf. Sci..

[18]  Richard Rubin Moral distancing and the use of information technologies: the seven temptations , 1994, ECA '94.

[19]  L. Kohlberg,et al.  The Philosophy Of Moral Development , 1982 .

[20]  Bart Victor,et al.  The Organizational Bases of Ethical Work Climates , 1988 .

[21]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[22]  G. Glass,et al.  Statistical methods in education and psychology, 3rd ed. , 1996 .

[23]  Dan Ariely,et al.  Dishonesty in Everyday Life and Its Policy Implications , 2006 .

[24]  Kenneth D. Butterfield,et al.  Honor Codes and Other Contextual Influences on Academic Integrity: A Replication and Extension to Modified Honor Code Settings , 2002 .

[25]  B. Whitley,et al.  Academic Dishonesty: An Educator's Guide , 2001 .

[26]  M. Hardy Regression with dummy variables , 1993 .

[27]  R. Sunley Linda K. Trevino and Katherine A. Nelson: Managing business ethics: Straight talk about how to do it right. New Jersey: John Wiley & Sons , 2011 .

[28]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[29]  James R. Rest,et al.  A Neo-Kohlbergian Approach: The DIT and Schema Theory , 1999 .

[30]  J. Shepard,et al.  Toward an understanding of ethical climate: Its relationship to ethical behavior and supervisory influence , 1994 .

[31]  T. K. Srull,et al.  Effects of personality and situational variation in locus of control on cheating: determinants of the "congruence effect". , 1978, Journal of personality.

[32]  L. Kohlberg Essays On Moral Development , 1981 .

[33]  S. Thoma Trends and Issues in Moral Judgment Research Using the Defining Issues Test. , 1994 .

[34]  Dusten R. Hollist,et al.  Causes of Delinquency , 1950, Juvenile Justice.

[35]  R. Friedrich In Defense of Multiplicative Terms In Multiple Regression Equations , 1982 .

[36]  L. Kohlberg,et al.  1. Stages of moral development as a basis for moral education , 1971 .

[37]  J. Ryan,et al.  Moral Reasoning as a Determinant of Organizational Citizenship Behaviors: A Study in the Public Accounting Profession , 2001 .

[38]  I. M. Jawahar,et al.  Predicting Academic Misconduct Intentions and Behavior Using the Theory of Planned Behavior and Personality , 2010 .

[39]  Jennifer L. Kisamore,et al.  Academic Integrity: The Relationship between Individual and Situational Factors on Misconduct Contemplations , 2007 .

[40]  George E. Stevens,et al.  Ethical Inclinations of Tomorrow's Managers Revisited: How and Why Students Cheat. , 1987 .

[41]  Seth Finn,et al.  Origins of Academic Dishonesty , 2006 .

[42]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[43]  Nancy M. Levenburg,et al.  Cheating During the College Years: How do Business School Students Compare? , 2007 .

[44]  Harm J. A. Biemans,et al.  Differences between novice and experienced users in searching information on the World Wide Web , 2000 .

[45]  Lisa Renard,et al.  Cut and Paste 101: Plagiarism and the Net , 2000 .

[46]  James Weber,et al.  Influences upon Managerial Moral Decision Making: Nature of the Harm and Magnitude of Consequences , 1996 .

[47]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[48]  G. Glass,et al.  Statistical methods in education and psychology , 1970 .

[49]  Matthew S. Eastin,et al.  Psychology of Communication Technology Use in the Workplace , 2007, Cyberpsychology Behav. Soc. Netw..

[50]  James R. Davis,et al.  Perceptions of Dishonesty among Two-year College Students: Academic versus Business Situations , 2004 .

[51]  I. Ajzen,et al.  The Prediction of Behavioral Intentions in a Choice Situation. , 1969 .

[52]  Sally Cole,et al.  Issues in Academic Integrity. , 1996 .

[53]  Samuel Mann,et al.  Similarity and originality in code: plagiarism and normal variation in student assignments , 2006 .

[54]  James R. Rest Moral Development: Advances in Research and Theory , 1986 .

[55]  N. Garg,et al.  Information Ethics: Privacy and Intellectual Property , 2006, IEEE Transactions on Professional Communication.

[56]  David A Harrison,et al.  Bad apples, bad cases, and bad barrels: meta-analytic evidence about sources of unethical decisions at work. , 2010, The Journal of applied psychology.

[57]  Tay Vaughan,et al.  Multimedia: Making It Work , 1993 .

[58]  Tony R. Smith Low Self-Control, Staged Opportunity, and Subsequent Fraudulent Behavior , 2004 .

[59]  Ulla K. Bunz,et al.  The Computer-Email-Web (CEW) Fluency Scale--Development and Validation , 2001 .

[60]  Linda Klebe Trevino,et al.  Cheating in Academic Institutions: A Decade of Research , 2001 .

[61]  Lynne M. Funtik Plagiarism: Detection and Prevention , 2002 .

[62]  N. Willard Moral Development in the Information Age. , 1998 .

[63]  Nathan W. Pino,et al.  College Students and Academic Dishonesty , 2003 .

[64]  Neil F. Doherty,et al.  Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis , 2005, Inf. Resour. Manag. J..

[65]  Aileen B. Sedman,et al.  A longitudinal study , 1987 .

[66]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[67]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[68]  Marvin Karlins,et al.  An empirical investigation of actual cheating in a large sample of undergraduates , 1988 .

[69]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[70]  James Weber Managers' Moral Reasoning: Assessing Their Responses to Three Moral Dilemmas , 1990 .

[71]  Aaron U. Bolin Self-Control, Perceived Opportunity, and Attitudes as Predictors of Academic Dishonesty , 2004, The Journal of psychology.

[72]  A. Lathrop,et al.  Student Cheating and Plagiarism in the Internet Era: A Wake-Up Call , 2000 .

[73]  L. Treviño Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .

[74]  P. Primeaux,et al.  Managing Business Ethics and Opportunity Costs , 1997 .

[75]  Charles B. Shrader,et al.  Cheating and Moral Judgment in the College Classroom: A Natural Experiment , 2004 .

[76]  David R. Firth,et al.  Communications of the Association for Information Systems , 2011 .

[77]  Richard A. Bernardi,et al.  Examining the Decision Process of Students' Cheating Behavior: An Empirical Study , 2004 .

[78]  Vilmos F. Misangyi,et al.  Ending Corruption: The Interplay Among Institutional Logics, Resources, and Institutional Entrepreneurs , 2008 .

[79]  Sandra Turner,et al.  An Empirical Investigation of Digital Cheating and Plagiarism Among Middle School Students , 2007 .

[80]  R. L. Dawkins Attributes and Statuses of College Students Associated with Classroom Cheating on a Small-Sized Campus. , 2004 .

[81]  Randi L. Sims,et al.  The Relationship Between Academic Dishonesty and Unethical Business Practices , 1993 .

[82]  D. Crown,et al.  Learning from the Literature on Collegiate Cheating: A Review of Empirical Research , 1998 .

[83]  J. Houston Learning and Cheating as a Function of Study Phase Distraction. , 1976 .

[84]  Ellen Krupar,et al.  Mouse Click Plagiarism: The Role of Technology in Plagiarism and the Librarian's Role in Combating It , 2001, Libr. Trends.

[85]  L. Kohlberg,et al.  Theoretical foundations and research validation , 1987 .

[86]  G. Diekhoff,et al.  College cheating: Ten years later , 1996 .

[87]  B. Whitley,et al.  FACTORS ASSOCIATED WITH CHEATING AMONG COLLEGE STUDENTS: A Review , 1998 .

[88]  W. Steve Albrecht,et al.  Fraud: Bringing Light to the Dark Side of Business , 1994 .

[89]  Sutirtha Chatterjee Unethical behavior using information technology , 2008 .

[90]  Rasil Warnakulasooriya,et al.  Patterns, correlates, and reduction of homework copying , 2010 .

[91]  Huseyin Cavusoglu,et al.  Economics of ITSecurity Management: Four Improvements to Current Security Practices , 2004, Commun. Assoc. Inf. Syst..

[92]  Julie M. Hupp,et al.  Honesty and Heroes: A Positive Psychology View of Heroism and Academic Honesty , 2008, The Journal of psychology.

[93]  Richard H. Franke,et al.  Fraud: Bringing Light to the Dark Side of Business , 1995 .

[94]  Batya Friedman,et al.  Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .

[95]  Cathy Owens Swift,et al.  An Examination of the Relationship Between Academic Dishonesty and Workplace Dishonesty: A Multicampus Investigation , 2001 .

[96]  David W. Pentico,et al.  Why do Employees Steal? , 2003 .

[97]  Anne Colby,et al.  The measurement of moral judgment, Vol. 1: Theoretical foundations and research validation; Vol. 2: Standard issue scoring manual. , 1987 .

[98]  Antonis C. Stylianou,et al.  Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology , 2004 .

[99]  Zoltán Ádám Mann,et al.  Three public enemies: cut, copy, and paste , 2006, Computer.

[100]  I. Ajzen The theory of planned behavior , 1991 .

[101]  Harsh K. Luthar,et al.  Exposure to Ethics Education and the Perception of Linkage between Organizational Ethical Behavior and Business Outcomes , 2005 .

[102]  Renate R. Mai-Dalton The experiences of one faculty member in a business ethics seminar: What can we take back to the classroom? , 1987 .

[103]  M. Williams,et al.  STRATEGIES FOR REDUCING ACADEMIC DISHONESTY , 2003 .

[104]  William O. Bearden,et al.  Ethical Values and Long-term Orientation , 2007 .

[105]  Charles A. Drake Why Students Cheat , 1941 .

[106]  Kenneth J. Chapman,et al.  Academic dishonesty in a global educational market: a comparison of Hong Kong and American university business students , 2004 .

[107]  Maren Wöltje,et al.  Cut, Copy and Paste. , 2001 .

[108]  R. Iyer,et al.  Academic Dishonesty: Are Business Students Different From Other College Students? , 2006 .

[109]  Murugan Anandarajan INTERNET ABUSE IN THE WORKPLACE , 2002 .

[110]  Ranald Macdonald,et al.  Plagiarism—a complex issue requiring a holistic institutional approach , 2006 .