Tips for detecting and beating plagiarism

Appears to be disappointingly common in HE: Detecting ghost-written essays is a tricky task for academics. Written by other academics or postgraduates to student specifications, these scripts are not the easly identifiable copy-and-paste efforts that anti-plagiarism software is so adept at catching. But they often still leave behind clues to their illicit origin, according to Ann Rogerson, lecturer in organisational behaviour at the University of Wollongong, in Australia. Ms Rogerson – who spoke at the…

Plagiarism Software

My colleague, Nicole McNab, has looked at plagiarism quite extensively over the past couple of years, so this has gained my interest ... especially as Nicole tends towards the idea that TurnItIn, etc. should not be used for detection, but for training students to understand! Students who are aware that their work will be checked by plagiarism-detection software are just as likely to cheat as those who are not, a study suggests. Turnitin software, which…

"Our job is to judge" (@timeshighered)

Academics without the freedom to exercise judgement are not true academics. Frank Furedi explains why scholars must resist the rise of proceduralism A couple of years ago, I was listening to a presentation about a new and apparently sophisticated anti-plagiarism tool. Throughout the talk, the speaker boasted of her software's potential for detecting copied work and preserving "academic integrity". I was a little despondent about the notion that, henceforth, the value of academic integrity would…

Plagiarism software can be beaten by simple tech tricks

IT scholar says PDF tweaks allow students' copied work to evade detection. Hannah Fearn reports Technological loopholes allow savvy students to beat academic plagiarism software, an IT expert has warned. James Heather, senior lecturer in computing at the University of Surrey, has revealed that plagiarism detection systems such as Turnitin that are routinely used by universities are open to simple cheats allowing students to evade detection when submitting copied material. The software works by extracting…