• Title/Summary/Keyword: Plagiarism

Search Result 171, Processing Time 0.031 seconds

Development of a Teaching-Learning Model for Science Ethics Education with History of Science (과학사 활용 과학 윤리 수업 모형 개발)

  • Shin, Dong-Hee;Shin, Ha-Yoon
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.2
    • /
    • pp.346-371
    • /
    • 2012
  • The purpose of this study is to investigate the possibilities of science ethics education with history of science (HOS) and to develop its teaching and learning model for secondary school students. A total of 72 cases about science ethics were extracted from 20 or more HOS books, journal articles, and newspaper articles. These cases were categorized into 8 areas, such as forgery, fabrication, violation of bioethics in testing, plagiarism and stealth, unfair allocation of credit, over slander, conjunction with ideologies, and social responsibility problems. The results of this study are as follows. First, research forgery, occurring in the process of the research, was the most frequent in HOS. Second, we developed eight teaching lesson plans for each area. Third, we proposed a teaching and learning model based on the developed lesson plans as well as related teaching and learning models in the fields of science ethics education, ethics education, and history education. Our model has five steps, 'investigating-suggesting casesclarifying problems-finding alternatives-summarizing'.

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

Design and Implementation of an Automatic Grading System for Programming Assignments (자동화된 프로그래밍 과제 평가 시스템의 설계 및 구현)

  • Kim, Mi-Hye
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.75-85
    • /
    • 2007
  • One of important factors for improving the learning achievement of students in computer programming education is to provide plenty of opportunities of problem-solving experiences through variety forms of assignments, However, for the most cases, evaluation of programming assignments is performed manually by instructors and automated tools for the accurate evaluation are not equipped at the present time. Under this restricted environment instructors need much work and time to grade assignments so that instructors could not deliver sufficient programming assignments to students, In order to overcome this problem. au automated programming assignment evaluation system is needed that would enable instructors to evaluate assignments easily in an effective and consistent way and also to detect any plagiarism activities among students in program source codes readily, Accordingly, in this paper we design and implement a Web-based programming assignment grading system that allows instructors to evaluate program performance automatically as well as to evaluate program styles and piagiarism easily with appropriate feedback.

  • PDF

A study of Copyright Infringement Countermeasures for designers (디자이너를 위한 저작권 침해 대응 방안 연구)

  • Lee, Je;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.447-452
    • /
    • 2016
  • Designers need to manage their copyrights. Designers be placed in both situations. The two situations is sometimes the case that infringes their copyrights and infringes the copyrights of others. But most designers do not know what to do to deal with this situation. Designers have to judge a lot of things for themselves. Designers should inform the user that you have infringed my copyright. And they will have to think about the legal proceedings. This paper was written based on the legal process, conducted from 2012 to 2014. Copyright infringement countermeasures for designers through this case were investigated. And to organize a correspondence course was organized personal correspondence, legal action, ruling process. The study of the processes for copyright holders themselves to respond to the piracy situation is needed.

Educational Needs Assessment on Research Ethics among Nursing Researchers (간호연구자의 연구윤리 교육요구도 조사)

  • Jeong, Ihn-Sook;Gu, Mee-Ock;Kim, Keum-Soon;Lee, Kwang-Ja;Yang, Soo
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.4
    • /
    • pp.515-523
    • /
    • 2010
  • Purpose: This study aimed to investigate the educational needs of research ethics among nursing researchers. Methods: Convenience sample of 161 nursing professors and 262 master or doctoral nursing students participated in the study. Data was collected with self-reported questionnaire from June to August 2009, and analyzed with descriptive statistics using SPSS WIN (version 14.0). Results: Among 161 nursing professors, about 31.7% has educated nursing ethics in the postgraduate course. The most common course was nursing research or methodology (62.7%), and median education time was 2 hr. Areas that showed difficulty in understanding was the conflict of interest and plagiarism for professors and falsification and fabrication for graduate students. Average knowledge on the research ethics was 75.4 points for professors and 61.6 points for students based on the 100 points. Conclusion: Educational needs of research ethics among nursing professors and students in the postgraduate course was high. We recommend both basic and advanced research ethics educational programs for the nursing researchers. The basic course should be at least 6 hr and include various cases and something to discuss.

A study on academic integrity in dental education (치의학 교육의 학습윤리에 관한 연구)

  • Kim, Hee-Kyung;Lee, Ji-Hyun;Kim, Sung-Hun;Baek, Jeong-Hwa;Han, Jung-Suk;Rhyu, In-Chul
    • The Journal of the Korean dental association
    • /
    • v.55 no.3
    • /
    • pp.215-228
    • /
    • 2017
  • The topic of academic integrity is an important public concern that has emerged in higher education. Recent surveys at U.S. and Canadian dental schools revealed that cheating and plagiarism were significant problems in dental schools. In addition, some schools stated that cheating had increased compared to a decade ago. Various institutional rituals have been implemented to enhance the academic integrity environment of U. S. and Canadian dental schools. Furthermore, the application of honor code which is dealing with ethical issues has been reported to improve the attitudes and behaviors of students. Since there have been no reported studies regarding ethics curricula in Korean dental schools, further studies should be needed to assess academic integrity policies, violations, and the results of the measures in Korean dental schools. Additionally, the challenge to provide professional ethics curricula for dental students must be conducted with respect and humanity for our students and thus, students will be more likely to respond positively to expectations in terms of ethical behaviors. Therefore, the outcome is clearly and undoubtedly link to better care for patients.

  • PDF

Design and Implementation of a Web-based Programming Class Support System (웹기반 프로그래밍 언어 강의 지원 시스템의 설계 및 구현)

  • Park, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2775-2782
    • /
    • 2010
  • In this paper, we propose a web-based programming class support system to help a lecturer to teach a programming language to students effectively. The proposed system is composed of a error analysis step and a verification step. The error analysis step checks whether there are compile time errors or run time errors in each student's submitted program. Given some errors, the system provides helpful feedback for the student to fix the errors. On the contrary, the system provides quick feedback after checking the source code style, comments, and plagiarism in the submitted program. As soon as the student submits the program, the student can see the check results. According to the result of utilizing the proposed system in a C programming language class, students tend to submit program assignments actively.

Souce Code Identification Using Deep Neural Network (심층신경망을 이용한 소스 코드 원작자 식별)

  • Rhim, Jisu;Abuhmed, Tamer
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.373-378
    • /
    • 2019
  • Since many programming sources are open online, problems with reckless plagiarism and copyrights are occurring. Among them, source codes produced by repeated authors may have unique fingerprints due to their programming characteristics. This paper identifies each author by learning from a Google Code Jam program source using deep neural network. In this case, the original creator's source is to be vectored using a pre-processing instrument such as predictive-based vector or frequency-based approach, TF-IDF, etc. and to identify the original program source by learning by using a deep neural network. In addition a language-independent learning system was constructed using a pre-processing machine and compared with other existing learning methods. Among them, models using TF-IDF and in-depth neural networks were found to perform better than those using other pre-processing or other learning methods.

A Study on Myth Storytelling (신화 스토리텔링에 관한 연구)

  • Park, Chan-Ik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.439-444
    • /
    • 2021
  • There are many reasons why myths are used in the cultural context. However, the primary reason is that myths tend to be a safe choice as they are guaranteed to be entertaining and connect people over the past thousands of years, and are also free from issues related to plagiarism. In particular, myths from Northern Europe are used in many parts of modern cultural content as they have a clear conflict between good and evil and present a universe with various tribes and worlds. This study analyzed the movie series of Thor and the game Ragnarok to investigate how myths are used in the modern cultural context. In the movie series of Thor and the game Ragnarok, it is possible to identify how myths are modified while keeping their basic storyline. The findings from the analysis can be summarized as follows.

Learning Source Code Context with Feature-Wise Linear Modulation to Support Online Judge System (온라인 저지 시스템 지원을 위한 Feature-Wise Linear Modulation 기반 소스코드 문맥 학습 모델 설계)

  • Hyun, Kyeong-Seok;Choi, Woosung;Chung, Jaehwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.11
    • /
    • pp.473-478
    • /
    • 2022
  • Evaluation learning based on code testing is becoming a popular solution in programming education via Online judge(OJ). In the recent past, many papers have been published on how to detect plagiarism through source code similarity analysis to support OJ. However, deep learning-based research to support automated tutoring is insufficient. In this paper, we propose Input & Output side FiLM models to predict whether the input code will pass or fail. By applying Feature-wise Linear Modulation(FiLM) technique to GRU, our model can learn combined information of Java byte codes and problem information that it tries to solve. On experimental design, a balanced sampling technique was applied to evenly distribute the data due to the occurrence of asymmetry in data collected by OJ. Among the proposed models, the Input Side FiLM model showed the highest performance of 73.63%. Based on result, it has been shown that students can check whether their codes will pass or fail before receiving the OJ evaluation which could provide basic feedback for improvements.