<< Chapter < Page Chapter >> Page >

Students have said that they worked as a team or group and that all participated and all learned the materials. Don’t try this excuse because professors don’t buy it. Here is the problem: Part of the learning process is in you doing it yourself. Example: I ask two students to make me some pancakes for breakfast; I expect two individually prepared plates of pancakes (one from each of them) for my breakfast. The professor really does not want to eat two plates of pancakes (or 50 to 100 plates of pancakes, depending on how many students they are teaching), but part of your directed learning activity for the course is to demonstrate that you can make pancakes (not watch someone else make pancakes or participate as a group to make pancakes).

Control access to your files

Controlling the files you create (or are directed to modify) means that others will not have access to copy your work. In other words, don’t share your files.

Students have said that they shared the file so they the other student could see how the completed assignment should look. Don’t try this excuse because professors don’t buy it. Here is the problem: When you share the file you share your typing efforts (or your original work and your efforts to create that original work). Back to our pancake example: “I only gave the other student a plate of completed pancakes, so he could see what the end product should be.” All the other student does is add some blue berries and whip cream. If a student makes minor modifications to your work (changes the spots where his name is at) and turns it in as his work – you will be included in the charge of academic dishonesty. Unless specifically authorized by your professor, don’t share any files that you create or modify with another student – ever, not now and not in the future.

Here are two suggestions for controlling access to your files:

When using a course delivery software product or learning system, such as BlackBorad Vista, don’t give another person your password . With the password, they will have access to your submitted assignments including the files that you created.

Don’t leave your files on a machine where others may have access to them. If multiple students are using or have access to the same machine (often happens with students living in the same household – husband/wife, siblings or roommates) or in an on-campus course where many students will have access to the machine – store your files on a flash drive . Physically control who gets access to your flash drive.

Ask for a clarification of the collaboration

If you have any question about an activity that might be construed as unauthorized collaboration, ask your professor. They will provide clarification and direction to you about the activity.

Students have said that they did not understand or think that it was unauthorized collaboration. Don’t try this excuse because professors don’t buy it . Here is the problem: We can’t, and won’t list every minor way in which students can collude. The burden is for you to ask for any clarification for the specific course from your professor. Don’t assume that what another instructor allowed in another course will be allowed by this professor in this course.

Detecting academic dishonesty

Professors weren’t born yesterday. The faculty members of most institutions have individually years and collectively thousands of years at understanding academic dishonesty. Cheating on tests, plagiarism and collusion are not new to us. We share our expertise with each other at detecting academic dishonesty. Additionally, the years of technical computer experience of professors who teach using computers in lab settings is often astounding.

Students have said that they did not think they could be detected or that academic dishonesty could not be proved. Don’t try this approach because professors believe that they are slightly smarter. Actually, we know that we are a lot smarter. It amazes us that student don’t realize that professors are a formidable force. Don’t gamble that you can beat us at the “Academic Dishonesty Game”. Please don’t take this as a challenge and use it as an excuse to see if you can be academically dishonest and not get caught. We are warning you, not challenging you.

Serious consequences

The consequences will vary from instructor to instructor and from institution to institution. They range from a simple slap on the hand (don’t do it again) to complete explusion from the institution (expelled from all of your courses). Because the bond of trust is broken, many instructors will simply expel you from the course you are taking. As an example: Within the BCIS1405 course at Houston Community College, we expelled 8 students (along with giving them the grade of “F”) from Distance Educations sections during the Spring 2008 term for Academic Dishonesty.

Be ready for what ever the consequences your instructor will deliver if you are dishonest.

Summary

  • The ethics of academic honesty; there is a bond of trust that whatever the student does in relationship to the evaluation process are their own work and efforts.
  • Collusion is the unauthorized collaboration of students on work submitted for evaluation.
  • First directive: Type if yourself
  • Second directive: Don’t share your files
  • Seek clarification from your professor if you have any doubt that the collaborative activity might be considered collusion.
  • Professors are very capable at detecting academic dishonesty.
  • There are usually consequences to your dishonest behavior.

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Programming fundamentals - a modular structured approach using c++. OpenStax CNX. Jan 10, 2013 Download for free at http://cnx.org/content/col10621/1.22
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Programming fundamentals - a modular structured approach using c++' conversation and receive update notifications?

Ask