<< Chapter < Page Chapter >> Page >

Students have said that they worked as a team or group and that all participated and all learned the materials. Don’t try this excuse because professors don’t buy it. Here is the problem: Part of the learning process is in you doing it yourself. Example: I ask two students to make me some pancakes for breakfast; I expect two individually prepared plates of pancakes (one from each of them) for my breakfast. The professor really does not want to eat two plates of pancakes (or 50 to 100 plates of pancakes, depending on how many students they are teaching), but part of your directed learning activity for the course is to demonstrate that you can make pancakes (not watch someone else make pancakes or participate as a group to make pancakes).

Control access to your files

Controlling the files you create (or are directed to modify) means that others will not have access to copy your work. In other words, don’t share your files.

Students have said that they shared the file so they the other student could see how the completed assignment should look. Don’t try this excuse because professors don’t buy it. Here is the problem: When you share the file you share your typing efforts (or your original work and your efforts to create that original work). Back to our pancake example: “I only gave the other student a plate of completed pancakes, so he could see what the end product should be.” All the other student does is add some blue berries and whip cream. If a student makes minor modifications to your work (changes the spots where his name is at) and turns it in as his work – you will be included in the charge of academic dishonesty. Unless specifically authorized by your professor, don’t share any files that you create or modify with another student – ever, not now and not in the future.

Here are two suggestions for controlling access to your files:

When using a course delivery software product or learning system, such as BlackBorad Vista, don’t give another person your password . With the password, they will have access to your submitted assignments including the files that you created.

Don’t leave your files on a machine where others may have access to them. If multiple students are using or have access to the same machine (often happens with students living in the same household – husband/wife, siblings or roommates) or in an on-campus course where many students will have access to the machine – store your files on a flash drive . Physically control who gets access to your flash drive.

Ask for a clarification of the collaboration

If you have any question about an activity that might be construed as unauthorized collaboration, ask your professor. They will provide clarification and direction to you about the activity.

Students have said that they did not understand or think that it was unauthorized collaboration. Don’t try this excuse because professors don’t buy it . Here is the problem: We can’t, and won’t list every minor way in which students can collude. The burden is for you to ask for any clarification for the specific course from your professor. Don’t assume that what another instructor allowed in another course will be allowed by this professor in this course.

Detecting academic dishonesty

Professors weren’t born yesterday. The faculty members of most institutions have individually years and collectively thousands of years at understanding academic dishonesty. Cheating on tests, plagiarism and collusion are not new to us. We share our expertise with each other at detecting academic dishonesty. Additionally, the years of technical computer experience of professors who teach using computers in lab settings is often astounding.

Students have said that they did not think they could be detected or that academic dishonesty could not be proved. Don’t try this approach because professors believe that they are slightly smarter. Actually, we know that we are a lot smarter. It amazes us that student don’t realize that professors are a formidable force. Don’t gamble that you can beat us at the “Academic Dishonesty Game”. Please don’t take this as a challenge and use it as an excuse to see if you can be academically dishonest and not get caught. We are warning you, not challenging you.

Serious consequences

The consequences will vary from instructor to instructor and from institution to institution. They range from a simple slap on the hand (don’t do it again) to complete explusion from the institution (expelled from all of your courses). Because the bond of trust is broken, many instructors will simply expel you from the course you are taking. As an example: Within the BCIS1405 course at Houston Community College, we expelled 8 students (along with giving them the grade of “F”) from Distance Educations sections during the Spring 2008 term for Academic Dishonesty.

Be ready for what ever the consequences your instructor will deliver if you are dishonest.

Summary

  • The ethics of academic honesty; there is a bond of trust that whatever the student does in relationship to the evaluation process are their own work and efforts.
  • Collusion is the unauthorized collaboration of students on work submitted for evaluation.
  • First directive: Type if yourself
  • Second directive: Don’t share your files
  • Seek clarification from your professor if you have any doubt that the collaborative activity might be considered collusion.
  • Professors are very capable at detecting academic dishonesty.
  • There are usually consequences to your dishonest behavior.

Questions & Answers

what is phylogeny
Odigie Reply
evolutionary history and relationship of an organism or group of organisms
AI-Robot
ok
Deng
what is biology
Hajah Reply
the study of living organisms and their interactions with one another and their environments
AI-Robot
what is biology
Victoria Reply
HOW CAN MAN ORGAN FUNCTION
Alfred Reply
the diagram of the digestive system
Assiatu Reply
allimentary cannel
Ogenrwot
How does twins formed
William Reply
They formed in two ways first when one sperm and one egg are splited by mitosis or two sperm and two eggs join together
Oluwatobi
what is genetics
Josephine Reply
Genetics is the study of heredity
Misack
how does twins formed?
Misack
What is manual
Hassan Reply
discuss biological phenomenon and provide pieces of evidence to show that it was responsible for the formation of eukaryotic organelles
Joseph Reply
what is biology
Yousuf Reply
the study of living organisms and their interactions with one another and their environment.
Wine
discuss the biological phenomenon and provide pieces of evidence to show that it was responsible for the formation of eukaryotic organelles in an essay form
Joseph Reply
what is the blood cells
Shaker Reply
list any five characteristics of the blood cells
Shaker
lack electricity and its more savely than electronic microscope because its naturally by using of light
Abdullahi Reply
advantage of electronic microscope is easily and clearly while disadvantage is dangerous because its electronic. advantage of light microscope is savely and naturally by sun while disadvantage is not easily,means its not sharp and not clear
Abdullahi
cell theory state that every organisms composed of one or more cell,cell is the basic unit of life
Abdullahi
is like gone fail us
DENG
cells is the basic structure and functions of all living things
Ramadan
What is classification
ISCONT Reply
is organisms that are similar into groups called tara
Yamosa
in what situation (s) would be the use of a scanning electron microscope be ideal and why?
Kenna Reply
A scanning electron microscope (SEM) is ideal for situations requiring high-resolution imaging of surfaces. It is commonly used in materials science, biology, and geology to examine the topography and composition of samples at a nanoscale level. SEM is particularly useful for studying fine details,
Hilary
Got questions? Join the online conversation and get instant answers!
Jobilize.com Reply

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Programming fundamentals - a modular structured approach using c++. OpenStax CNX. Jan 10, 2013 Download for free at http://cnx.org/content/col10621/1.22
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Programming fundamentals - a modular structured approach using c++' conversation and receive update notifications?

Ask