Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Boneh, James Shaw (1998)
Collusion-Secure Fingerprinting for Digital DataIEEE Trans. Inf. Theory, 44
M. Wise (1996)
YAP3: improved detection of similarities in computer program and other texts
Giombetti
UW's friendly corporate ghostwriter
iParadigms
Turnitin.com
George, Burdell, George Burdell (1989)
Computer Algorithms for Plagiarism Detection
(2011)
Mona Taghavi Journal of Library Hi Tech
C. Tappert, C. Suen, T. Wakahara (1990)
The State of the Art in Online Handwriting RecognitionIEEE Trans. Pattern Anal. Mach. Intell., 12
C. Harrick
iThenticate Introduces New Plagiarism Detection Service for Individual Authors and Researchers
D. McCabe (1999)
Academic dishonesty among high school students.Adolescence, 34 136
P. Hájek (2011)
Deductive Systems of Fuzzy Logic
Kristina Verco, M. Wise (1996)
Software for detecting suspected plagiarism: comparing structure and attribute-counting systems
L. Zadeh (1996)
Fuzzy sets
(2011)
iThenticate Introduces New Plagiarism Detection Service for Individual Authors and Researchers, prweb.com, viewed 20
Manish Kumar, S. Tulyakov, V. Govindaraju (2010)
Combination of Symmetric Hash Functions for Secure Fingerprint Matching2010 20th International Conference on Pattern Recognition
(2011)
Marketing Yourself via Ghostwriting, Certification Magazine
(1992)
UW's Friendly Corporate Ghostwriter', Eat the State
Student Quick Start Guide, viewed 01 February 2011
R. Holley (2009)
How Good Can It Get? Analysing and Improving OCR Accuracy in Large Scale Historic Newspaper Digitisation ProgramsD Lib Mag., 15
L. Prechelt, G. Malpohl, M. Philippsen (2002)
Finding Plagiarisms among a Set of Programs with JPlagJ. Univers. Comput. Sci., 8
WhiteSmoke‐Inc.
English Grammar Software
RemovePlagiarism.com
Detect Plagiarism|Remove Plagiarism
(2011)
Detect Plagiarism | Remove Plagiarism, RemovePlagiarism.com, viewed 20
PlagiarismDetect
Plagiarism Checker
Sebastian Niezgoda, T. Way (2006)
SNITCH: a software tool for detecting cut and paste plagiarism
(2011)
SYSTRAN -Online Translation Software
A handbook for detecting plagiarism in higher education, Oxford: The Oxford Centre for Staff and Learning Development
R.A. Burnham
Marketing yourself via ghostwriting
(2011)
Plagiarism Checker -Plagiarism Detection Software
M. Farquad, V. Ravi, R. Bapi (2008)
Rule extraction using Support Vector Machine based hybrid classifierTENCON 2008 - 2008 IEEE Region 10 Conference
CLEF 2011, PAN 2011 -Uncovering Plagiarism, Authorship, and Social Software Misuse, viewed 05 May 2011
turnitin.com
Answers to Common Legal Questions about Turnitin
F. Culwin, A. MacLeod, T. Lancaster
Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes and Tools
turnitin.com
Student Quick Start Guide
ISO
Document Management – Portable Document Format, International Organiztion for Standardization
B. Belkhouche, A. Nix, J. Hassell (2004)
Plagiarism detection in software designs
Seungjin Lee, Joonsoo Kwon, Jinwook Oh, Junyoung Park, H. Yoo (2010)
A 92m W 76.8GOPS vector matching processor with parallel Huffman decoder and query re-ordering buffer for real-time object recognition2010 IEEE Asian Solid-State Circuits Conference
D. Rennie, A. Flanagin (1994)
Authorship! Authorship! Guests, ghosts, grafters, and the two-sided coin.JAMA, 271 6
G. Cosma, M. Joy (2006)
Source-code Plagiarism: a UK Academic Perspective
Liu Yucheng, Liu Yubin (2010)
Incremental Learning Method of Least Squares Support Vector Machine2010 International Conference on Intelligent Computation Technology and Automation, 2
CLEF
PAN 2011 – Uncovering Plagiarism, Authorship, and Social Software Misuse
P. Vamplew, Julian Dermoudy (2005)
An Anti-Plagiarism Editor for Software Development Courses
(2011)
English Grammar Software, WhiteSmoke Inc
P. Wiedemeier (2002)
Preventing plagiarism in computer literacy coursesJournal of Computing Sciences in Colleges, 17
L. Prechelt, Michael Phlippsen (2000)
JPlag: Finding plagiarisms among a set of programs
J. Harp, P. Taietz (1966)
Academic Integrity and Social Structure: A Study of Cheating Among College StudentsSocial Problems, 13
IEEE
Cross Check User Guide
Christopher Hawley (1984)
The Thieves of Academe: Plagiarism in the University SystemImproving College and University Teaching, 32
R. Cowie, E. Douglas-Cowie, Nicolas Tsapatsoulis, G. Votsis, S. Kollias, W. Fellenz, John Taylor (2001)
Emotion recognition in human-computer interactionIEEE Signal Process. Mag., 18
Dejan Sraka, B. Kaucic (2009)
Source code plagiarismProceedings of the ITI 2009 31st International Conference on Information Technology Interfaces
Lei Li, Zhi Gao, Wen-Yan Ding (2010)
Fuzzy Multi-class Support Vector Machine Based on Binary Tree in Network Intrusion Detection2010 International Conference on Electrical and Control Engineering
Christian Arwin, S. Tahaghoghi (2006)
Plagiarism detection across programming languages
J. Carrol
A Handbook for Detecting Plagiarism in Higher Education
Aleksi Ahtiainen, Sami Surakka, Mikko Rahikainen (2006)
Plaggie: GNU-licensed source code plagiarism detection engine for Java exercises
Helen Marsden, M. Carroll, J. Neill (2005)
Who cheats at university? A self-report study of dishonest academic behaviours in a sample of Australian university studentsAustralian Journal of Psychology, 57
N. Shivakumar, H. Garcia-Molina (1995)
The SCAM Approach to Copy Detection in Digital LibrariesD Lib Mag., 1
N. Fragopanagos, John Taylor (2005)
Emotion recognition in human-computer interactionNeural networks : the official journal of the International Neural Network Society, 18 4
iThenticate.com
CrossCheck
Purpose – This paper aims to focus on plagiarism and the consequences of anti‐plagiarism services such as Turnitin.com, iThenticate, and PlagiarismDetect.com in detecting the most recent cheatings in academic and other writings. Design/methodology/approach – The most important approach is plagiarism prevention and finding proper solutions for detecting more complex kinds of plagiarism through natural language processing and artificial intelligence self‐learning techniques. Findings – The research shows that most of the anti‐plagiarism services can be cracked through different methods and artificial intelligence techniques can help to improve the performance of the detection procedure. Research limitations/implications – Accessing entire data and plagiarism algorithms is not possible completely, so comparing is just based on the outputs from detection services. They may produce different results on the same inputs. Practical implications – Academic papers and web pages are increasing over time, and it is very difficult to capture and compare documents with all available data on the network in an up to date manner. Originality/value – As many students and researchers use the plagiarism techniques (e.g. PDF locking, ghost‐writers, dot replacement, online translators, previous works, fake bibliography) to cheat in academic writing, this paper is intended to prevent plagiarism and find suitable solutions for detecting more complex kinds of plagiarism. This should also be of grave concern to teachers and librarians to provide up to date/standard anti‐plagiarism services. The paper proposes some new solutions to overcome these problems and to create more resilient and intelligent future systems.
Library Hi Tech – Emerald Publishing
Published: Nov 22, 2011
Keywords: Anti‐plagiarism; Cheating; Plagiarism detection; Plagiarism prevention; Ghostwriting; Source code plagiarism; Computer crime; Research work
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.