{"id":13,"date":"2019-06-26T12:54:19","date_gmt":"2019-06-26T12:54:19","guid":{"rendered":"http:\/\/plagiarism.localhost\/?page_id=8"},"modified":"2019-10-21T22:45:08","modified_gmt":"2019-10-21T22:45:08","slug":"a-plagiarism-crisis","status":"publish","type":"page","link":"http:\/\/deveurope.com\/share\/problematising-plagiarism\/a-plagiarism-crisis\/","title":{"rendered":"A plagiarism crisis?"},"content":{"rendered":"\n<p>Universities strive to protect and promote principles of academic integrity. Among violations requiring regular management are those whereby students falsely claim ownership of submitted work. Often, such circumstances are contested, difficult to judge, and require investigative meetings that are stressful. Many onlookers \u2013 students, staff, parents, politicians, journalists \u2013 comment on this situation with dismay. Arguably, there is a \u2018crisis\u2019 of management surrounding this form of integrity lapse. Whether crisis talk is justified by the absolute<em>&nbsp;frequency<\/em> of offences might be debatable, but justification can certainly be found in the awkward&nbsp;<em>visibility<\/em>&nbsp;of the problem and the apparent failure to address it.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/deveurope.com\/share\/wp-content\/uploads\/2019\/06\/1_0_clip_image002.jpg\" alt=\"\" class=\"wp-image-203\"\/><\/figure>\n\n\n\n<p>Accusations relating to the authorship of creative work are often aggregated with the single term, &#8220;plagiarising!&#8221;. Yet this should not imply a singular practice. Claims of ownership can be judged fragile for&nbsp;<em>various<\/em>&nbsp;reasons. So, regulation must attend to the different routes whereby the authorship of submitted work is, in some sense, unacceptably \u2018shared\u2019. However, particularly within educational contexts, the legitimacy of some routes towards this sharing might be judged quite innocent: a natural outcome of students seeking assistance through their research. A regulatory environment should acknowledge that there are totally <em>legitimate<\/em> ways in which students may find help when managing their learning &#8211; and distinguish them from ways that are illegitimate.<\/p>\n\n\n\n<p>Accordingly, \u2018help seeking\u2019 is our parent concept for the present discussion of integrity offences. In the sections below, a basic vocabulary is proposed for distinguishing the different ways in which help seeking can cross a boundary \u2013 thereby inviting the accusation &#8220;plagiarising!&#8221;. What the remainder of this website then addresses is not the first category below (\u201ctext plagiarism\u201d); instead, we consider cases where the submitted \u2018text\u2019 is not&nbsp;<em>found&nbsp;<\/em>but is&nbsp;<em>created<\/em>&nbsp;during interaction with others. So, we focus on understanding situations where help has been garnered through \u2018an exchange with some other intelligent agent\u2019. (We describe it in this ponderous fashion &#8211; rather than \u201chelp garnered&nbsp;<em>socially<\/em>\u201d &#8211; to include certain forms of help negotiated with&nbsp;<em>computational&nbsp;<\/em>agents: machines that are increasingly capable of such apparently personalised dialogue and support.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&#8220;Text plagiarism&#8221;<\/h2>\n\n\n\n<p>The term \u2018text\u2019 is used here generously. The object borrowed may correspond to the conventional understanding of \u2018writing\u2019, but its significant property in the present context is its material form \u2013 thereby rendering visible its shared nature. Rather than writing, it might be a diagram or a piece of computer code. This direct appropriation of material from someone else\u2019s work without acknowledgement seems straightforwardly to be an offence \u2013 although strategic paraphrasing and patchwriting (Howard <a href=\"https:\/\/eric.ed.gov\/?id=EJ475663\">1992<\/a>), can make judgement of some cases more challenging. Nevertheless, this family of cut-and-paste textual offences remains the most familiar and common form of plagiarism \u2013 perhaps because it is the most readily detected.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/deveurope.com\/share\/wp-content\/uploads\/2019\/06\/1_0_clip_image004-1.png\" alt=\"\" class=\"wp-image-204\"\/><\/figure>\n\n\n\n<p>Such plagiarism is easy to detect because the offending work is anchored to an independently existing source. It is potentially discoverable, should some sceptical audience choose to look for it. This possibility of exposing such plagiarising acts renders them somewhat transparent and, therefore,&nbsp;<em>public<\/em>&nbsp;in nature. Yet at the point of execution they are typically&nbsp;<em>private,<\/em>&nbsp;or autonomous. Because in such cases, there is no conspiracy, no negotiation, no contact at all between the plagiarising individual and the author whose work is plagiarised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u201c<em>Social<\/em>&nbsp;plagiarism\u201d<\/h2>\n\n\n\n<p>However, concern here is with a different form of plagiarism: one whose novelty and uncertain scale creates a more keenly felt sense of \u2018crisis\u2019. This is plagiarism that&nbsp;<em>does<\/em>&nbsp;implicate an intermediary and does, therefore, build upon exchanges with a helping agent. In these cases, the evidence of falsely claimed ownership is usually hidden from public view. For if there does exist an incriminating and unattributed source document, it is kept private by both the original author and the individual now making a false claim of ownership.<\/p>\n\n\n\n<p>The phrase \u2018social plagiarism\u2019 has&nbsp;<a href=\"https:\/\/www.urbandictionary.com\/define.php?term=social%20plagiarism\">some currency<\/a>, but is not widely adopted in the education literature. However, it is preferred here because it usefully integrates a variety of practices that seem to arouse a common concern and may require a common treatment. The practices that are integrated by this term  include the following.<\/p>\n\n\n\n<p>\u2018<strong>Contract cheating<\/strong>\u2019. This is a more familiar term: in fact, it is the one that currently dominates discussion of what we mean by the more general \u2018social plagiarism\u2019. However, its limitations are that \u201ccontract\u201d implies a commercial relationship and one with binding responsibilities for the partners. This certainly covers a serious and high profile set of offences: namely, situations whereby students <em>purchase<\/em> \u2018text\u2019 and then submit it as their own coursework. But the term excludes too many other related offences that also draw from an interpersonal exchange underpinning the claim of ownership.<\/p>\n\n\n\n<p>\u2018<strong>Collusion<\/strong>\u2019. Socially-mediated plagiarism may occur outside of&nbsp;<em>commercial<\/em>&nbsp;relationships. Formal definition proposes that the term \u2018collusion\u2019 refers to a concealed social interaction, the intended consequence of which is to mislead others (Crook and Nixon,&nbsp;<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/berj.3504\">2019<\/a>). The term therefore does identify an offence &#8211; a cheating against others. But (i) a colluding relationship would normally be more informal than implied by the term &#8216;contract&#8217;, and (ii) the claimed offence may not reside in a &#8216;product handover&#8217; so much as in the harvested fruits of an interpersonal exchange. For example, this could include cases where a text submitted in a student&#8217;s name has been produced from within a consensual coordination with peers or family. Indeed, \u2018collusion\u2019 can fit cases where another person\u2019s unattributed input to a submitted assignment text was a didactic (or simply &#8216;scaffolding&#8217;) conversation. At once, it should be apparent that academic prosecution of a collusion is often an inherently difficult process.<\/p>\n\n\n\n<p>\u2018<strong>Artificial social intelligence<\/strong>\u2019. This rather cumbersome phrase captures situations where a \u2018text\u2019 is constructed through interaction with intelligent software. Such a text may be judged a case of plagiarism because the unacknowledged input or re-drafting compromises the student\u2019s claim of authorship. Evidently, such an offending \u2018text\u2019 has not arisen within (colluding) interactions between&nbsp;<em>people<\/em>. But the dialogic and computational sophistication of some software can capture a similar sense of human agency, and it can certainly allow quite significant levels of assignment help.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why text <em>and <\/em>social plagiarism?<\/h2>\n\n\n\n<p>The underlying and common issue is how to judge an act in which  &#8216;material&#8217; has been borrowed and submitted, unattributed, as all or part of an assignment that is to be assessed. The above distinction then marks one contextual element that should be factored into any judgement of such an act: namely, the extent to which some practice under consideration involves an interpersonal relationship between material owner and material user. <\/p>\n\n\n\n<p>Text plagiarism &#8211; where the material is harvested <em>outside <\/em>of any social relationship &#8211; might be thought less troublesome to regulate.  There is a source and there is a reproduction from it: material-matching calculations can be invoked to help judge the presence of an integrity offence. Social plagiarism needs to be distinguished from this because it creates distinctive difficulties of evaluation. For these two reasons: (1) What is borrowed is ephemeral. There may simply be no source material available for that &#8216;matching&#8217;. It may exist, but not be in the public domain.  Or, more challenging, it may never have existed in a <em>physical <\/em>form that can be independently scrutinised: whatever was borrowed was something that happened in an interpersonal exchange &#8211; &#8216;material&#8217; that is usually very hard to evaluate as offending. (2) Where there <em>does <\/em>exist a physical record of the material borrowed from within social exchange; evaluation of offending may therefore need to consider the comparative responsibility of more than one actor. <\/p>\n\n\n\n<p>Consideration here of both formats for plagiarism will be bypassing a whole set of problems that apply to both. These are expressed in contemporary debates relating to the credibility of such concepts as &#8216;author&#8217;, &#8216;ownership&#8217; and &#8216;re-use&#8217;, considering how their contested status may complicate the very notion of academic offence (Howard, <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.2307\/3588141\">2000<\/a>; Pennycook, <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.2307\/3588141\">1996<\/a>).  Discussions on the pages that follow can still proceed in reviewing a status quo, without becoming entangled in such controversy &#8211; although it will be returned to in the <a href=\"http:\/\/deveurope.com\/share\/addressing-the-problem\/postscript-the-practitioners-predicament\/\">final section of this site<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How assessment practices have complicated help seeking<\/h2>\n\n\n\n<p>Recent discussion of assessment strategy has centred around a distinction between summative and formative designs. Summative assessment is diagnostic, it serves to warrant student achievement, and it therefore has a \u2018feed<em>out<\/em>\u2019 function. Whereas formative assessment is more concerned to create feed<em>back;<\/em>&nbsp;consequently it is sometimes termed \u2018assessment for learning\u2019 (Wiliam,&nbsp;<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0191491X11000149\">2011<\/a>). Traditionally, summative assessment most often took the form of examinations or closed-book tests. However, Richardson (<a href=\"https:\/\/srhe.tandfonline.com\/doi\/abs\/10.1080\/02602938.2014.919628\">2015<\/a>) has noted a gradual shift in higher education practice towards summative assessment being through open-book \u2018coursework\u2019. Such coursework is attractive for many reasons. Students generally prefer it to examinations (or prefer it mixed&nbsp;<em>with<\/em>&nbsp;examinations), grades tend to be higher (and so institutional performance tends to improve), time pressure is absent, expression of ideas need not be through writing alone, student anxiety may be reduced, variations in student health are less relevant, and the&nbsp;<em>protracted<\/em>&nbsp;nature of coursework can stimulate students towards deeper reflection and analysis.<\/p>\n\n\n\n<p>However, an assignment that is protracted in this sense can mean feed<em>out<\/em>\u00a0properties that are more troublesome to interpret. If the desired outcome of such an assignment is some measure of an author\u2019s competence within the assessed discipline, then employers and other users of this feedout may expect checks on whether students\u00a0<em>own<\/em>\u00a0the work assessed. While text matching services such as\u00a0<a href=\"https:\/\/www.turnitin.com\/\">Turnitin<\/a> can deal with some of the uncertainties (defined here as \u2018text plagiarism\u2019), detection and evaluation is far more difficult for what we term \u2018social plagiarism\u2019. Unsurprisingly, individual academics struggle with defining &#8216;plagiarism&#8217; (Maio et al <a href=\"http:\/\/www.iier.org.au\/iier29\/demaio-abs.html\">2019<\/a>) while institutions then struggle to define the boundaries of legitimate help seeking for coursework assignments (Crook and Nixon,\u00a0<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/berj.3504\">2019<\/a>).<\/p>\n\n\n\n<p>The present website explores the extent of this problem, the various forms that help seeking can take, the motives driving questionable practices, and the strategies whereby such \u2018questions\u2019 can be raised.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><a href=\"http:\/\/deveurope.com\/share\/problematising-plagiarism\/our-project-aims\/\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/deveurope.com\/share\/wp-content\/uploads\/2019\/07\/1.1.png\" alt=\"\" class=\"wp-image-742\" width=\"195\" height=\"39\" srcset=\"http:\/\/deveurope.com\/share\/wp-content\/uploads\/2019\/07\/1.1.png 455w, http:\/\/deveurope.com\/share\/wp-content\/uploads\/2019\/07\/1.1-300x60.png 300w\" sizes=\"(max-width: 195px) 85vw, 195px\" \/><\/a><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Universities strive to protect and promote principles of academic integrity. Among violations requiring regular management are those whereby students falsely claim ownership of submitted work. Often, such circumstances are contested, difficult to judge, and require investigative meetings that are stressful. Many onlookers \u2013 students, staff, parents, politicians, journalists \u2013 comment on this situation with dismay. &hellip; <a href=\"http:\/\/deveurope.com\/share\/problematising-plagiarism\/a-plagiarism-crisis\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;A plagiarism crisis?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":27,"menu_order":10,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/pages\/13"}],"collection":[{"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":44,"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":1072,"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/pages\/13\/revisions\/1072"}],"up":[{"embeddable":true,"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"http:\/\/deveurope.com\/share\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}