期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Cheating or Coincidence? Statistical Method Employing the Principle of Maximum Entropy for Judging Whether a Student Has Committed Plagiarism 被引量:1
1
作者 M. P. Silverman 《Open Journal of Statistics》 2015年第2期143-157,共15页
Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work f... Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes. 展开更多
关键词 PLAGIARISM cheating COINCIDENCE Information Entropy
下载PDF
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
2
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM cheating
下载PDF
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
3
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games CONFIDENTIALITY Virtual World Cheat Code Bots PROGRAMMING
下载PDF
Further Results of Cheating Immune Secret Sharing 被引量:3
4
作者 ZHANGJie CHANGZu-ling WENQiao-yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期26-28,共3页
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater tha... Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?). 展开更多
关键词 propagation characteristics correlation immunity cheating immune secret sharing
原文传递
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
5
作者 Xin WANG Bo YANG +1 位作者 Zhe XIA Hong-xia HOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第6期787-800,共14页
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ... With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud. 展开更多
关键词 Data SHARING Chaum- Pedersen PROOF cheating det ection CLOUD storage
原文传递
Do Pay-for-Grades Programs Encourage Student Academic Cheating?Evidence from a Randomized Experiment
6
作者 Tao LI Yisu ZHOU 《Frontiers of Education in China》 2019年第1期117-137,共21页
Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could ... Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications. 展开更多
关键词 pay-for-grades cheating randomized control trial China primary school
原文传递
A theoretical analysis of how user fee on healthcare can waste economic resources
7
作者 Eugenia Amporfu 《Health》 2014年第1期128-136,共9页
The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but... The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but not on how it can lead to the waste of resources. The current study is theoretical and it examines the efficiency of regulated user fee and the factors affecting the efficiency. Efficiency focused mainly on the extent to which resources are wasted as a result of regulated user fee. The results show that the asymmetric information between the provider of healthcare and the patient combined with the costliness of investigation by the government as well as the costliness of revenue collection caused three sources of waste: excessive treatment of the rich or the non-poor, investigation and revenue collection. Comparative statics were done to examine the effect of various factors on the level of waste. The study then examined the conditions under with regulated user fee is more efficient than direct financing of healthcare by the government. Some recommendations were made to reduce wastes. 展开更多
关键词 Regulated USER FEE WASTE ASYMMETRIC Information cheating Investigation
下载PDF
Reducing Test Anxiety while Increasing Learning Efficiency:by Using Cheat Sheet in the College English Exam
8
作者 夏英姿 项敏 《海外英语》 2011年第5X期61-62,共2页
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a... Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency. 展开更多
关键词 assessment CHEAT SHEET student ANXIETY college EXAM
下载PDF
Students' Unethical Academic Behaviors: A Self-Determination Theory Approach
9
作者 Jung-in (Stephanie) Bae Jun Mo Kwon Shane C. Blum 《Journal of Tourism and Hospitality Management》 2015年第2期60-72,共13页
Building on the Self-Determination Theory (SDT), the study examines the influence of intrinsic motivation, extrinsic motivation, and in-class deterrents on prior cheating, neutralization, and likelihood of cheating ... Building on the Self-Determination Theory (SDT), the study examines the influence of intrinsic motivation, extrinsic motivation, and in-class deterrents on prior cheating, neutralization, and likelihood of cheating in the future. In addition, the model has been tested based on gender differences. To test the hypotheses, the data were collected from 324 undergraduate hospitality and tourism students. The proposed model was tested using structural equation modeling. Results of hypotheses testing showed that both extrinsic motivation and intrinsic motivation had negative relationships with prior cheating, which is consistent with previous research. In addition, neutralization showed a positive relationship with likelihood of cheating and prior cheating was positively related to likelihood of cheating. These findings can help hospitality and tourism instructors and administrators develop various strategies to prevent students' unethical behaviors. A discussion of implications is included along with limitations and recommendations for future research. 展开更多
关键词 cheating unethical behaviors MOTIVATION hospitality and tourism Self-Determination Theory (SDT)
下载PDF
"Winning Is Everything" as the Basis of Academic Misconduct Among Indonesian Students
10
作者 Yeremias Jena Kasdin Sihotang 《Sociology Study》 2015年第2期157-162,共6页
Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internal... Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internalizing values and norms that lead to the formation of students' moral principles and moral behaviour. Educators have played the role of ensuring the students to internalize and realized moral values and norms. A study of 360 students of the second semester who enrolled at the course of "ethical and personal development" at Atma Jaya Catholic University in Indonesia showed that unethical behavior such as cheating and plagiarism were rarely done. However, a deep look at the reason the students did academic dishonesty has prompted the permissiveness of student's moral life. This study proves that academic integrity among university students is worrisome, and it is worsened by the fact that they were enrolled in the course of "ethical and personal development". Seriously taking into consideration the strong desire of students to change the culture of academic misconduct, the authors argue that an educational model which is not oriented excessively to cognitive performance is needed. The authors argue that this position has to be practiced in line with the involvement of "clean" students who are involved as role models in influencing the formation of student awareness and ethical behavior. 展开更多
关键词 cheating plagiarizing performance-oriented goal-oriented academic misconduct
下载PDF
Research on the trust evaluation model of the P2P system based on the probability statistics method
11
《International English Education Research》 2013年第12期66-68,共3页
The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accur... The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system. 展开更多
关键词 Peer to peer network RECOMMENDATION malicious act cooperative cheat
下载PDF
An Advanced Threshold Secret Sharing Scheme for Identifying Cheaters 被引量:1
12
作者 XIEShu-cui ZHANGJian-zhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期17-21,共5页
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha... In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others. 展开更多
关键词 secret sharing authentication codes threshold scheme cheating
原文传递
Fewer Cambodia Pupils Cheat on Final Exams
13
作者 夏露涟 《当代外语研究》 2001年第9期18-19,共2页
我曾经在柬埔寨大使馆工作过,深知该国“高考”作弊现象之猖獗。政府终于下了决心,下了猛药:动用警察和宪兵,使用监视器!也许是神经过敏了,一场骚乱差点发生。因为,在一家书店发现了今年高考试题的答案!】
关键词 柬埔寨 监视器 Fewer Cambodia Pupils Cheat on Final Exams
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部