Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work f...Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes.展开更多
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho...The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment.展开更多
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam...Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest.展开更多
Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater tha...Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?).展开更多
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity ...With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud.展开更多
Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could ...Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications.展开更多
The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but...The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but not on how it can lead to the waste of resources. The current study is theoretical and it examines the efficiency of regulated user fee and the factors affecting the efficiency. Efficiency focused mainly on the extent to which resources are wasted as a result of regulated user fee. The results show that the asymmetric information between the provider of healthcare and the patient combined with the costliness of investigation by the government as well as the costliness of revenue collection caused three sources of waste: excessive treatment of the rich or the non-poor, investigation and revenue collection. Comparative statics were done to examine the effect of various factors on the level of waste. The study then examined the conditions under with regulated user fee is more efficient than direct financing of healthcare by the government. Some recommendations were made to reduce wastes.展开更多
Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a...Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency.展开更多
Building on the Self-Determination Theory (SDT), the study examines the influence of intrinsic motivation, extrinsic motivation, and in-class deterrents on prior cheating, neutralization, and likelihood of cheating ...Building on the Self-Determination Theory (SDT), the study examines the influence of intrinsic motivation, extrinsic motivation, and in-class deterrents on prior cheating, neutralization, and likelihood of cheating in the future. In addition, the model has been tested based on gender differences. To test the hypotheses, the data were collected from 324 undergraduate hospitality and tourism students. The proposed model was tested using structural equation modeling. Results of hypotheses testing showed that both extrinsic motivation and intrinsic motivation had negative relationships with prior cheating, which is consistent with previous research. In addition, neutralization showed a positive relationship with likelihood of cheating and prior cheating was positively related to likelihood of cheating. These findings can help hospitality and tourism instructors and administrators develop various strategies to prevent students' unethical behaviors. A discussion of implications is included along with limitations and recommendations for future research.展开更多
Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internal...Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internalizing values and norms that lead to the formation of students' moral principles and moral behaviour. Educators have played the role of ensuring the students to internalize and realized moral values and norms. A study of 360 students of the second semester who enrolled at the course of "ethical and personal development" at Atma Jaya Catholic University in Indonesia showed that unethical behavior such as cheating and plagiarism were rarely done. However, a deep look at the reason the students did academic dishonesty has prompted the permissiveness of student's moral life. This study proves that academic integrity among university students is worrisome, and it is worsened by the fact that they were enrolled in the course of "ethical and personal development". Seriously taking into consideration the strong desire of students to change the culture of academic misconduct, the authors argue that an educational model which is not oriented excessively to cognitive performance is needed. The authors argue that this position has to be practiced in line with the involvement of "clean" students who are involved as role models in influencing the formation of student awareness and ethical behavior.展开更多
The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accur...The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system.展开更多
In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid sha...In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others.展开更多
文摘Elements of correspondence (“coincidences”) between a student’s solutions to an assigned set of quantitative problems and the solutions manual for the course textbook may suggest that the stu-dent copied the work from an illicit source. Plagiarism of this kind, which occurs primarily in fields such as the natural sciences, engineering, and mathematics, is often difficult to establish. This paper derives an expression for the probability that alleged coincidences in a student’s paper could be attributable to pure chance. The analysis employs the Principle of Maximum Entropy (PME), which, mathematically, is a variational procedure requiring maximization of the Shannon-Jaynes entropy function augmented by the completeness relation for probabilities and known information in the form of expectation values. The virtue of the PME as a general method of inferential reasoning is that it generates the most objective (i.e. least biased) probability distribution consistent with the given information. Numerical examination of test cases for a range of plausible conditions can yield outcomes that tend to exonerate a student who otherwise might be wrongfully judged guilty of cheating by adjudicators unfamiliar with the surprising properties of random processes.
文摘The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment.
文摘Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest.
文摘Cheating immune secret sharing in the unconditionally secure case are investigated in this paper.Constructionsof defining functions of cheating immune secret sharing on V_n are given,where n is any integer greater than 5.Further-more,the obtained defining functions have good cryptographic properties.The nonlinearity of them is 2^(n-1)-2^(n/2+1) whenn≡0(mod 4)and 2^(n-1)-2^((?)n/2」+2) otherwise.And thedegree is「n/4(?).
基金the National Key R&D Program of China (No. 2017YFB0802000)the National Natural Science Foundation of China (Nos. 61772326 and 61572303)+4 种基金the Research Fund for International Young Scientists, China (No. 61750110528)National Cryptography Development FYind for the 13th Five- Year Plan, China (No. MMJJ20170216), the Foundation of State Key Laboratory of Information Security, China (No. 2017-MS- 03)the Fundamental Research Funds for the Central Universities, China (No. GK201702004)the Scientific Research Program Funded by Shaanxi Provincial Education Department, China (No. 16JK1109), the Provincial Natural Science Foundation Research Project of Shaanxi, China (No. 2017JQ6029)the Doctoral Scientific Fund Project of Shaanxi University of Science & Technology, China (No. BJ11-12).
文摘With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the ChaumPedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users’ decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users’ medical insurance data over the cloud.
文摘Pay-for-grades programs aim to incentivize families and students to engage in specified behaviors given financial remittance.In addition to doubts over its effectiveness,educators worry that monetary incentives could skew student learning motivation and lead to academic cheating.Using a randomized control trial in 11 Chinese primary schools,we studied the effects of pay-for-grades programs on academic cheating.We randomly assigned 82 classrooms into treatment or control conditions,and used a statistical algorithm to determine the occurrence of cheating.While our data indicates a concerning level of cheating overall,our experiment did not find any relationship between academic cheating and the pay-for-grades program.Finally,we discuss the feasibility of such policies in improving learning outcomes and its policy implications.
文摘The difficulty of assessing funds to directly fund healthcare for the poor makes governments adopt user fee in the health system. Many studies have shown how user fee can cause the poor to under utilize healthcare but not on how it can lead to the waste of resources. The current study is theoretical and it examines the efficiency of regulated user fee and the factors affecting the efficiency. Efficiency focused mainly on the extent to which resources are wasted as a result of regulated user fee. The results show that the asymmetric information between the provider of healthcare and the patient combined with the costliness of investigation by the government as well as the costliness of revenue collection caused three sources of waste: excessive treatment of the rich or the non-poor, investigation and revenue collection. Comparative statics were done to examine the effect of various factors on the level of waste. The study then examined the conditions under with regulated user fee is more efficient than direct financing of healthcare by the government. Some recommendations were made to reduce wastes.
文摘Cheat sheets are so named because they may be used by students without the instructor's knowledge to cheat on a test.Student learning is greatly enhanced by studying prior to an exam.Allowing students to prepare a cheat sheet for the exam helps structure this study time and deepens learning.The crib sheet is well defined:one double-sided page of A4.An award for the best and most creative cheat sheet allows the instructor to appreciate the students' efforts.Using the cheat sheet can not only reduces student anxiety during testing but also incease student learning efficiency.
文摘Building on the Self-Determination Theory (SDT), the study examines the influence of intrinsic motivation, extrinsic motivation, and in-class deterrents on prior cheating, neutralization, and likelihood of cheating in the future. In addition, the model has been tested based on gender differences. To test the hypotheses, the data were collected from 324 undergraduate hospitality and tourism students. The proposed model was tested using structural equation modeling. Results of hypotheses testing showed that both extrinsic motivation and intrinsic motivation had negative relationships with prior cheating, which is consistent with previous research. In addition, neutralization showed a positive relationship with likelihood of cheating and prior cheating was positively related to likelihood of cheating. These findings can help hospitality and tourism instructors and administrators develop various strategies to prevent students' unethical behaviors. A discussion of implications is included along with limitations and recommendations for future research.
文摘Unethical behavior among university students such as cheating and plagiarism has weakened the character of honesty in education. This fact has challenged those who perceived education as a holistic process of internalizing values and norms that lead to the formation of students' moral principles and moral behaviour. Educators have played the role of ensuring the students to internalize and realized moral values and norms. A study of 360 students of the second semester who enrolled at the course of "ethical and personal development" at Atma Jaya Catholic University in Indonesia showed that unethical behavior such as cheating and plagiarism were rarely done. However, a deep look at the reason the students did academic dishonesty has prompted the permissiveness of student's moral life. This study proves that academic integrity among university students is worrisome, and it is worsened by the fact that they were enrolled in the course of "ethical and personal development". Seriously taking into consideration the strong desire of students to change the culture of academic misconduct, the authors argue that an educational model which is not oriented excessively to cognitive performance is needed. The authors argue that this position has to be practiced in line with the involvement of "clean" students who are involved as role models in influencing the formation of student awareness and ethical behavior.
文摘The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system.
文摘In this paper an advanced threshold secret sharing scheme for identifyingcheaters is proposed by using authentication codes. The performance of the scheme is discussed. Theresults show that in the scheme the valid shareholders can not only identify the impersonation of anadversary, but also detect cheating of some valid shareholders . In particular one honestshareholder is able to detect cheating of other participants forming a collection, and theinformation rate of the scheme is higher than that of others.