skip to main content
10.1145/3279720.3279740acmotherconferencesArticle/Chapter ViewAbstractPublication Pageskoli-callingConference Proceedingsconference-collections
short-paper

An Application to Discover Cheating in Digital Exams

Published:22 November 2018Publication History

ABSTRACT

Cheating is a common problem for both, paper-based and electronic examinations. Therefore, it is desirable to be able to detect cheating reliably. Since it is not always possible to recognize a cheating attempt in situ, other ways to detect cheating have to be found. One way is to analyze the answers that students hand in to verify that a particular student is in fact the author of those answers. This can be done based on the assumption that students develop an individual style for answering certain types of assignments, which can be extracted using techniques of artificial intelligence and then compared to reference material for which the author is verified. This paper presents FLEXauth, an application which tackles this task for electronic programming exams with Machine Learning techniques and discusses the state of the art of author verification as well as first results and open research questions that have to be addressed for the further development of FLEXauth.

References

  1. Christian Arwin and S. M. M. Tahaghoghi. 2006. Plagiarism Detection Across Programming Languages. In Proceedings of the 29th Australasian Computer Science Conference - Volume 48 (ACSC '06). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 277--286. http://dl.acm.org/citation.cfm?id=1151699.1151730 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Leo Breiman. 2001. Random Forests. Machine Learning 45 (Oct 2001), 5--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. N. Burlak, J. Hernandez, A. Ochoa, and J. Munoz. 2006. The Use of Data Mining to Determine Cheating in Online Student Assessment. In Electronics, Robotics and Automotive Mechanics Conference (CERMA'06), Vol. 1. 161--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. 2015. De-anonymizing Programmers via Code Stylometry. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 255--270. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/caliskan-islam Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Elmano Ramalho Cavalcanti, Carlos Eduardo S. Pires, Elmano Pontes Cavalcanti, and Vládia Freire Pires. 2012. Detection and Evaluation of Cheating on College Exams using Supervised Classification. Informatics in Education 11 (2012), 169--190.Google ScholarGoogle ScholarCross RefCross Ref
  6. Corinna Cortes and Vladimir Vapnik. 1995. Support-Vector Networks. Machine Learning 20, 3 (1995), 273--297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Martin Dick, Judy Sheard, Cathy Bareiss, Janet Carter, Donald Joyce, Trevor Harding, and Cary Laxer. 2003. Addressing student cheating: definitions and solutions. ACM SIGCSE Bulletin 35, 2 (June 2003), 182--196. http://www.cs.kent.ac.uk/pubs/2003/1645 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Aleksander Heintz. 2017. Cheating at Digital Exams. Master's thesis. Norwegian University of Science and Technology, Norway.Google ScholarGoogle Scholar
  9. Petrus Peltola, Vilma Kangas, Nea Pirttinen, Henrik Nygren, and Juho Leinonen. 2017. Identification Based on Typing Patterns Between Programming and Free Text. In Proceedings of the 17th Koli Calling International Conference on Computing Education Research (Koli Calling '17). ACM, New York, NY, USA, 163--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Saul Schleimer, Daniel S. Wilkerson, and Alex Aiken. 2003. Winnowing: Local Algorithms for Document Fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMOD '03). ACM, New York, NY, USA, 76--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, and Rachel Greenstadt. 2014. Breaking the Closed-World Assumption in Stylometric Authorship Attribution. In Advances in Digital Forensics X, Gilbert Peterson and Sujeet Shenoi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 185--205.Google ScholarGoogle Scholar
  12. J. Zheng, W. Yang, and X. Li. 2017. Training data reduction in deep neural networks with partial mutual information based feature selection and correlation matching based active learning. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2362--2366.Google ScholarGoogle Scholar
  13. Justin Zobel. 2004. "Uni Cheats Racket": A Case Study in Plagiarism Investigation. In Proceedings of the Sixth Australasian Conference on Computing Education - Volume 30 (ACE '04). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 357--365. http://dl.acm.org/citation.cfm?id=979968.980016 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Application to Discover Cheating in Digital Exams

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        Koli Calling '18: Proceedings of the 18th Koli Calling International Conference on Computing Education Research
        November 2018
        207 pages
        ISBN:9781450365352
        DOI:10.1145/3279720
        • Conference Chairs:
        • Mike Joy,
        • Petri Ihantola

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 November 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate80of182submissions,44%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader