Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student

Sergey Butakov, Craig Barber, Vadim Diagilev, Alexey Mikhailov

Abstract

Plagiarism detection services (PDS) have become a vital part of Learning Management Systems (LMS). Commercial or non-commercial PDS can be easily attached to the most popular LMS these days. In most such systems, to compare a submitted work with all possible sources on the Internet a university has to transfer the student submission to the third party. Such an approach is often criticized by students who may see a violation of copyright law in this process. This paper outlines an improved approach for PDS development that should allow universities to avoid such criticism. The major proposed alteration of the mainstream architecture of the improved PDS is a move of document preprocessing and search result clarification from the server side to the client side. Such a split allows users to submit only limited information to the third party, and to do so in a way that will not make it possible to fully recover the submitted work but will allow the PDS to maintain the same search quality.

References

  1. A. V. ex rel. Vanderhye v. iParadigms, LLC, 562 F.3d 630, 2009 Copr.L.Dec. P 29,743, 90 U. S. P.Q.2d 1513 (4th Cir. 2009).
  2. A. V. v. iParadigms, LLC, 544 F.Supp.2d 473, 232 Ed. Law Rep. 176 (4th Cir. 2008)
  3. Abbasi A. & Chen H. (2008). Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26, 2, Article 7 (April 2008), 29 pages. DOI=10.1145/1344411.1344413
  4. Bennett M. G.. (2009) A Nexus of Law & Technology: Analysis and Postsecondary Implications of A.V. et al. v. iParadigms, LLC Journal of Student Conduct Administration, 2009, Vol. 2, no.1. p. 40-45
  5. Burrows S., Uitdenbogerd A.L., and Turpin A. (2009). Application of Information Retrieval Techniques for Source Code Authorship Attribution. In Proceedings of the 14th International Conference on Database Systems for Advanced Applications (DASFAA 7809), Xiaofang Zhou, Haruo Yokota, Ke Deng, and Qing Liu (Eds.). Springer-Verlag, Berlin, Heidelberg, 699-713. DOI=10.1007/978-3-642-00887-0_61
  6. Butakov, S. and Shcherbinin, V. (2009) On the Number of Search Queries Required for Internet Plagiarism Detection. In Proceedings of the 2009 Ninth IEEE international Conference on Advanced Learning Technologies - Volume 00 (July 15 - 17, 2009). ICALT. IEEE Computer Society, Washington, DC, 482-483
  7. Carter M. (2008). How to Use Google Alerts to Detect Plagiarism. Retrieved on December 15, 2010 from http://www.suite101.com/content/how-to-use-google-alerts-for-web-writersa86525
  8. Chowdhury A., Frieder O., Grossman D., and McCabe M. C.. (2002). Collection statistics for fast duplicate document detection. ACM Trans. Inf. Syst. 20, 2 (April 2002), 171-191. DOI=10.1145/506309.506311
  9. Christen v. Iparadigms, LLC, August 4, 2010, 2010 WL 3063137, Copr.L.Dec. P 29,960, (E. D. Va. 2010).
  10. Culwin F., & Child M. (2010) Optimizing and Automating the Choice of Search Strings when Investigating Possible Plagiarism. In Proceedings of 4th International Plagiarism Conference, Newcastle, June 2010. Retrieved on November 20, 2010 from http://www.plagiarismadvice.org/
  11. Horovitz, S. (2008). Two wrongs don't negate a copyright. Florida Law Review, 60, 229.
  12. Jensen, L.A., Arnett, J.J., Feldman, S.S. & Cauffman, E. (2002), It's wrong, but everybody does it: academic dishonesty among high school students, Contemporary Educational Psychology, 27(2), 209-228
  13. Kompas (2010) Saving Indonesia from Traps of Plagiarism. Retrieved on November 5, 2010 from http://english.kompas.com/read/2010/04/28/02563687/ Saving.Indonesia.from.Traps.of.Plagiarism
  14. Manku G. S., Jain A., and Sarma A. D.. (2007). Detecting near-duplicates for web crawling. In Proceedings of the 16th international conference on World Wide Web (WWW 7807). ACM, New York, NY, USA, 141-150. DOI=10.1145/1242572.1242592
  15. Mawle v. Texas A & M University Kingsville, 2010 WL 1782214 (S.D.Tex. 2010).
  16. Scanlon P. M. and Neumann D. R. (2002), Internet Plagiarism Among College Students, 43 J. C. STUDENT DEV. 374, 379 (May-June 2002).
  17. Schleimer S., Wilkerson D., and Aiken A. (2003). Winnowing: Local Algorithms for Document Fingerprinting. Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 76-85, June 2003.
  18. Sharon, S. (2009) Do Students Turn Over Their Rights When They Turn in Their Papers? A Case Study of Turnitin.com (June 1, 2009). Available at SSRN: http://ssrn.com/abstract=1396725
  19. The Copyright Act § 107, 17 USC § 107 (1976)
Download


Paper Citation


in Harvard Style

Butakov S., Barber C., Diagilev V. and Mikhailov A. (2011). Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student . In Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011) ISBN 978-989-8425-61-4, pages 123-131. DOI: 10.5220/0003568701230131


in Bibtex Style

@conference{wosis11,
author={Sergey Butakov and Craig Barber and Vadim Diagilev and Alexey Mikhailov},
title={Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student },
booktitle={Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011)},
year={2011},
pages={123-131},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003568701230131},
isbn={978-989-8425-61-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011)
TI - Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student
SN - 978-989-8425-61-4
AU - Butakov S.
AU - Barber C.
AU - Diagilev V.
AU - Mikhailov A.
PY - 2011
SP - 123
EP - 131
DO - 10.5220/0003568701230131