Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion

Abstract The use of social networking sites (SNS) such as Twitter, Facebook, and YouTube has contributed to improving teaching and learning in contemporary educational systems. Unfortunately, online social networks are among the many emerging technology artefacts that introduce new and potentially serious risks to academic environments and therefore have also been credited with the increased prevalence of academic cheating, or cyber-cheating, among students. Recent media attention has focused on how social media has added another medium that can facilitate many collective movements, such as recent uprisings in the Arab world. However, limited research focus has been afforded to the role SNS plays in the pervasiveness of cheating in non-Western cultural settings. Given the continuing growth in social media and advanced technologies, it is necessary to explore and understand academic cheating in the era of digital technology and cultural complexity. In this research, we conduct a case study of ‘Tasribat’, a Facebook page that facilitates cyber-cheating among certain social groups of students in Morocco. Using an interpretive case study approach, we explore why students collectively engage in cyber-cheating. We leverage both interviews as well digital footprints to explore this collective cheating movement on Facebook. We focus on the intertwined relationship between individual and collective cyber-cheating behaviours with an emphasis on ethical and cultural complexity. The paper's major contribution resides in its analysis and conceptualisation through our emerging model—the Collective Action Cyber-Cheating Model—that integrates collective action and social learning theories. We conclude by discussing this study's contributions to research and practice and its associated future research opportunities.

[1]  Babak Sohrabi,et al.  Effects of Personality and Information Technology on Plagiarism: An Iranian Perspective , 2011 .

[2]  Christa S. C. Asterhan,et al.  Teenage peer-to-peer knowledge sharing through social network sites in secondary schools , 2017, Comput. Educ..

[3]  Andrew T. Fiore,et al.  Serious social media: On the use of social media for improving students' adjustment to college , 2012, Internet High. Educ..

[4]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[5]  Elizabeth Cauffman,et al.  It's Wrong, But Everybody Does It: Academic Dishonesty among High School and College Students , 2002 .

[6]  A. Edmondson,et al.  METHODOLOGICAL FIT IN MANAGEMENT FIELD RESEARCH. , 2007 .

[7]  M. Lim Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in Egypt, 2004–2011 , 2012 .

[8]  M. Lynne Markus,et al.  Industry-Wide Information Systems Standardization as Collective Action: The Case of the U.S. Residential Mortgage Industry , 2006, MIS Q..

[9]  Karla R. Hamlen Academic dishonesty and video game play: Is new media use changing conceptions of cheating? , 2012, Comput. Educ..

[10]  Mark de Reuver,et al.  Collective action for mobile payment platforms: A case study on collaboration issues between banks and telecom operators , 2015, Electron. Commer. Res. Appl..

[11]  Nitin Agarwal,et al.  Raising and Rising Voices in Social Media , 2012, Bus. Inf. Syst. Eng..

[12]  Monica D. Hernandez Academic Dishonesty Using Social Media: A Comparative Study of College Students from Canada and China , 2015 .

[13]  Paul Benjamin Lowry,et al.  Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..

[14]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[15]  Glen E. Kreiner,et al.  Where is the “Me” Among the “We”? Identity Work and the Search for Optimal Balance , 2006 .

[16]  Peter Twining,et al.  Some guidance on conducting and reporting qualitative studies , 2017, Comput. Educ..

[17]  Paul Benjamin Lowry,et al.  A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .

[18]  A. Strauss,et al.  Basics of Qualitative Research , 1992 .

[19]  R. Coase The Nature of the Firm , 1937 .

[20]  J. V. Maanen,et al.  The Fact of Fiction in Organizational Ethnography. , 1979 .

[21]  M. Crotty The Foundations of Social Research: Meaning and Perspective in the Research Process , 1998 .

[22]  John Trushell,et al.  ICT facilitated access to information and undergraduates' cheating behaviours , 2013, Comput. Educ..

[23]  Michael D. Myers,et al.  A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..

[24]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[25]  E. Guba,et al.  Competing paradigms in qualitative research. , 1994 .

[26]  Paul Benjamin Lowry,et al.  Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..

[27]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[28]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[29]  Cathy Owens Swift,et al.  An Examination of the Relationship Between Academic Dishonesty and Workplace Dishonesty: A Multicampus Investigation , 2001 .

[30]  Lucas D. Introna,et al.  Cultural Values, Plagiarism, and Fairness: When Plagiarism Gets in the Way of Learning , 2005 .

[31]  Yavuz Akbulut,et al.  Exploring the types and reasons of Internet-triggered academic dishonesty among Turkish undergraduate students: Development of Internet-Triggered Academic Dishonesty Scale (ITADS) , 2008, Comput. Educ..

[32]  Bryan Lee Miller,et al.  Learning to E-Cheat: A Criminological Test of Internet Facilitated Academic Cheating , 2013 .

[33]  Michael F. Young,et al.  Digital plagiarism: An experimental study of the effect of instructional goals and copy-and-paste affordance , 2015, Comput. Educ..

[34]  Marie-Claude Boudreau,et al.  Think Individually, Act Collectively: Studying the Dynamics of a Technologically Enabled Civic Movement , 2013, ICIS.

[35]  Rubén Comas-Forgas,et al.  Academic Plagiarism: Explanatory Factors from Students’ Perspective , 2010 .

[36]  Nickolas A. Jordan,et al.  Integrating Social Media into the Classroom Curriculum , 2013 .

[37]  Xiaolan Fu,et al.  Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups , 2010, Inf. Syst. J..

[38]  Chien Chou,et al.  Why do they become potential cyber-plagiarizers? Exploring the alternative thinking of copy-and-paste youth in Taiwan , 2015, Comput. Educ..

[39]  Michael I. Barrett,et al.  Information Infrastructure Development and Governance as Collective Action , 2015, Inf. Syst. Res..

[40]  Elizabeth Armstrong,et al.  Culture, Power, and Institutions: A Multi-Institutional Politics Approach to Social Movements* , 2008 .

[41]  G. Marwell,et al.  The critical mass in collective action , 1993 .

[42]  Wanda J. Orlikowski,et al.  CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development , 1993, MIS Q..

[43]  Barry Turner,et al.  THE USE OF GROUNDED THEORY FOR THE QUALITATIVE ANALYSIS OF ORGANIZATIONAL BEHAVIOUR , 1983 .

[44]  L. Treviño,et al.  Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .