CFP last date
22 April 2024
Reseach Article

Plagiarism Detection in Web based Learning Management Systems and Intellectual Property Rights in the Academic Environment

by Dinesh Kumar Saini, Lakshmi Sunil Prakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 14
Year of Publication: 2012
Authors: Dinesh Kumar Saini, Lakshmi Sunil Prakash
10.5120/9180-3598

Dinesh Kumar Saini, Lakshmi Sunil Prakash . Plagiarism Detection in Web based Learning Management Systems and Intellectual Property Rights in the Academic Environment. International Journal of Computer Applications. 57, 14 ( November 2012), 6-11. DOI=10.5120/9180-3598

@article{ 10.5120/9180-3598,
author = { Dinesh Kumar Saini, Lakshmi Sunil Prakash },
title = { Plagiarism Detection in Web based Learning Management Systems and Intellectual Property Rights in the Academic Environment },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 14 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number14/9180-3598/ },
doi = { 10.5120/9180-3598 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:24.664073+05:30
%A Dinesh Kumar Saini
%A Lakshmi Sunil Prakash
%T Plagiarism Detection in Web based Learning Management Systems and Intellectual Property Rights in the Academic Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 14
%P 6-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a background of a project undertaken at Sohar University to implement a web based plagiarism detection system for academic activities. Digital content in academic environments are created by academics and students. This Digital content is research publications and assessment submissions – assignments. Academic Digital content once created needs to be verified for non-violation of IPR issues and compliance to academic plagiarism policies followed by the institution.

References
  1. C. H. Huang, Chu, S. S. , and Guan, C. T, " Implementation and performance evaluation of parameter improvement mechanisms for intelligent e-learning systems," Computers & Education, vol. 49, pp. 597 - 614, 2007.
  2. A. U. Szabo, J, "Cybercheats: Is Information and Communication Technology Fuelling Academic Dishonesty?," Active Learning in Higher EducationEducation þ Training, vol. 5, pp. 80-99, 2004.
  3. M. Hart, & Friesner, T, "Plagiarism and poor academic practice - A threat to the extension of e-learning in higher education?," Electronic Journal of e-Learning, vol. 2, 2004.
  4. J. Kraus, "Rethinking plagiarism: What our students are telling us when they cheat. ," Issues in Writing, vol. 13, pp. 80-95, 2002.
  5. J. A. Liles, & Rozalski, M. E. , "It's a Matter of Style: A Style Manual Workshop for Preventing Plagiarism," College & Undergraduate Libraries, vol. 11, pp. 91-101, 2004.
  6. C. Barnbaum, "Plagiarism: A Student's Guide to Recognizing It and Avoiding It," 2002.
  7. J. M. C. Hughes, & McCabe, D. L. , "Understanding academic misconduct. ," Canadian Journal of Higher Education, vol. 36, pp. 49-63, 2006.
  8. M. Devlin, "Policy, preparation, and prevention: Proactive minimization of studentplagiarism. ," Journal of Higher Education Policy & Management,, vol. 28, pp. 45-58, 2006.
  9. T. B. Gallant, & Drinan, P "Organizational theory and student cheating:Explanation, responses, and strategies. ," Journal of Higher Education,, vol. 77, p. 839, 2006.
  10. P. Clough. (June2000, Plagiarism in natural and programming languages: an overview of current tools and technologies,.
  11. B. -R. A. Z. Su, K. -Y. Eom, M. -K. Kang, J. -P. Kim,and M. -K. Kim,, "Plagiarism detection using the levenshtein distance and smith-waterman algorithm," in ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control. , Washington, DC, USA, 2008, p. 569.
  12. V. L. S. Engels, and M. Craig. , "Plagiarism detection using feature-based neural networks. ," in Proceedings of the Thirty-Eighth SIGCSE Technical Symposium on Computer Science Education, Covington, Kentucky, March 2007, pp. 34-38.
  13. R. M. Federica Mandreoli, Paolo Tiberio, "A document comparison scheme for secure duplicate detection," Int J Digit Libr vol. Springer-Verlag 2004, 2004.
  14. M. M. Edda Leopold, and Gerhard Paa, "DATA MINING AND TEXT MINING FOR SCIENCE & TECHNOLOGY RESEARCH " in Handbook of Quantitative Science and Technology Research, H. F. Moed et al. (eds. ), Ed. , ed Printed in the Netherlands: © Kluwer Academic Publishers. , 2004, pp. 187-213. Barnbaum, C. (2002). "Plagiarism: A Student's Guide to Recognizing It and Avoiding It. "
  15. Devlin, M. (2006). "Policy, preparation, and prevention: Proactive minimization of studentplagiarism. " Journal of Higher Education Policy & Management, 28(1): 45-58.
  16. Dinesh Kumar Saini, L. S. P. a. W. M. O. (2010). Review of Technological Challenges in Web - Based Learning Content Management Systems (LCMS) with special emphasis on extraction of Learning Contents. International Symposium, College of Applied Science, Ministry of Higher Education. Oman: 43-49.
  17. Gallant, T. B. , & Drinan, P (2006). "Organizational theory and student cheating:Explanation, responses, and strategies. " Journal of Higher Education, 77(5): 839.
  18. Hart, M. , & Friesner, T (2004). "Plagiarism and poor academic practice - A threat to the extension of e-learning in higher education?" Electronic Journal of e-Learning 2(1).
  19. Hughes, J. M. C. , & McCabe, D. L. (2006). "Understanding academic misconduct. " Canadian Journal of Higher Education 36(1): 49-63.
  20. Kraus, J. (2002). "Rethinking plagiarism: What our students are telling us when they cheat. " Issues in Writing 13(1): 80-95.
  21. Lakshmi Sunil Prakash, Dinesh Kumar Saini, N. S. Kutti (2009). " Integrating EduLearn learning content management system (LCMS) with cooperating learning object repositories (LORs) in a peer to peer (P2P) architectural framework. " ACM SIGSOFT Software Engineering Notes 34(3): 1-7.
  22. Liles, J. A. , & Rozalski, M. E. (2004). "It's a Matter of Style: A Style Manual Workshop for Preventing Plagiarism. " College & Undergraduate Libraries 11(2): 91-101.
  23. Lukashenko, R. , Graudina, V. , Grundspenkis, J. : (2007). Computer Based Plagiarism Detection Methods and Tools: an Overview. CompSysTech '07:Proceedings of the 2007 International Conference on Computer Systems and Technologies,, New York, ACM Press.
  24. Mark Pedersen, D. E. , Samir K. Amin and Lakshmi Prakash (2004). Parsing Arabic relative clauses: a Paninian dependency grammar approach. Multitopic Conference, 2004. Proceedings of INMIC 2004. 8th International Proceedings of the 8th IEEE International Multi-topic conference
  25. Mark Pedersen, D. E. , Samir K. Amin and Lakshmi Prakash (2004). Relative Clauses in Hindi and Arabic: a Paninian Dependency Grammar Analysis. Proceedings of the Workshop on Recent Developments in Dependency Grammar -COLING2004 – The 20th International Conference on Computational Linguistics, Geneva,Switzerland.
  26. N. S Kutti, K. , Z,Sunil. L (2007). EduLearn:An e-Learning Architecture for Prototyping Web-Based Learning Systems. EISWT, Florida,USA.
  27. Saini, D. K. , Sunil Prakash, Lakshmi ,Omar M Wail (2010). Review of Technological Challenges in Web - Based Learning Content Management Systems (LCMS) with special emphasis on extraction of Learning Contents. Proceedings of First Joint scientific SYMPOSIUM of the Colleges of APPLIED SCIENCES
  28. Szabo, A. U. , J (2004). "Cybercheats: Is Information and Communication Technology Fuelling Academic Dishonesty?" Active Learning in Higher Education Education þ Training 5(2): 80-99.
  29. V. Scherbinin and S. Butakov, "Using Microsoft SQL server platform for plagiarism detection," in Proc. SEPLN, Donostia, Spain, pp. 36–37.
  30. Z. Su, B. R. Ahn, K. Y. Eom, M. K. Kang, J. P. Kim, andM. K. Kim, "Plagiarism detection using the Levenshtein distance and Smith-Waterman algorithm," in Proc. 3rd Int. Conf. Innov. Comput. Inf. Control, Dalian, Liaoning, China, Jun. 2008, p. 569.
  31. M. Elhadi and A. Al-Tobi, "Duplicate detection in documents and webpages using improved longest common subsequence and documents syntactical structures," in Proc. 4th Int. Conf. Comput. Sci. Converg. Inf. Technol. , Seoul, Korea, Nov. 2009, pp. 679–684.
  32. R. A. Wagner and M. J. Fischer , The string to string corection problem,J. Assoc. Comput. Mach. 21,No. 1 (1974),168-183.
Index Terms

Computer Science
Information Sciences

Keywords

Plagiarism Detection IPR Web Based Learning Management Systems Learning Digital Content Authentication Digital Content