The Assault on Academic Integrity Through the Internet and Social Media Michael DiDiego Draft Personal Research Opinion Paper Wilmington University May 18, 2017 Figure 1 The Dewitt-Clinton, One of the Earliest Railroad Carriages (The Dewitt Clinton, 2017) Prelude • The computer with the information age has arrived in the station. Whether we like it or not we may be going down the tracks with it even though our destination may be still unknown. We are all in the mist of the information age. THE ASSAULT ON ACADEMIC INTEGRITY Do You Know? • Data is traveling fast. Specifically, it can travel at data transfer rates of 1 to 10 gigabytes per second (gbps). Just think how quickly we can browse the internet to find a question’s answer. Do you know when such a search by a student is cheating? THE INTERNET AND SOCIAL MEDIA PRESENTATION MODULES INTEGRITY PERSPECTIVE (paper pages 6 – 12) ETHICAL DILEMMA (12-15) THE SITES (15-21) SOLUTIONS (21-27) INTEGRITY PERSPECTIVE BASICS VISION OF INTEGRITY ACADEMIC INTEGRITY SITE INTEGRITY DISPLACED EDUCATOR • Grading Assessment EDUCATOR & SYSTEM PROFESSIONAL • Common Concern Integrity of Data • Checking information (data) • Information System & Control Association • Evaluating Data for Results • (ISACA) • Verifying Data’s Veracity • Share Insight for Solutions Next ---Vision of Integrity “We are committed to being a university where respect for each other is paramount, integrity guides all our choices, providing educational opportunity is our primary purpose, and responsiveness to community needs is key” (Wilmington University Mission, Vision, & Values, 2017). The International Center for Academic Integrity (ICAI) was founded to combat cheating, plagiarism, and academic dishonesty in higher education. Its mission has since expanded to include the cultivation of cultures of integrity in academic communities throughout the world. ICAI offers assessment services, resources, and consultations to its member institutions, and facilitates conversations on academic integrity topics each year at its annual conference. (ICAI, 2016a) (ICAI, 2016b) How do we deal with the dilemma of compressed time and increasing workloads? Well, for some students they have found the solution. They just maximize the use of their internet (cyber) resources. They google the answer and paste the results. No need then to buy or read the book. This is their shortcut. Not only do they save time but they can get a good grade too. We should recognize that cybersecurity is our job as well as information technology (Hasib, 2015). We should avoid thinking that we can avoid using technological approaches and tools because the traditional methods are enough. We need to recognize that electronic devices in our modern classrooms can negate the effectiveness of even traditional proctoring. A humorous example of electronic cheating in the classroom can be seen on YouTube (Japan Exam Cheating Technology, 2016). Degree is Recognition of Student Achievement Not Enough to cut, paste & copy To demonstrate ACQUIRED KNOWLEDGE SOLUTION ALIGNMENT OF GOALS, OBJECTIVES AND POLICY OF THE INSTITUTION By Engagement, Convergence & Strategic Leadership Collaboration CHEAT SITES & SOCIAL MEDIA TOP 8 Here are the most popular websites for would-be cheaters: 1. Wikipedia Encylopedia 2. Yahoo! Answers Social & content sharing site 3. Answers.com Social & content sharing site 4. Slideshare Social and content sharing site 5. OPPapers.com Cheat site & paper mill 6. Scribd Social & content sharing site 7. Course Hero Homework & academic site 8. MedLibrary.org Homework & academic site (O”Shaughnessy, 2011) Student’s Testimonials – Approach on Integrity One site, “No Need to Study,” boast that they have a pool of experienced academic tutors to take classes and complete course work for any student. They even have handy video references that show satisfied clients plugging the cheat sites results. These clients, students, brag how easy it was to pay someone else to take their online classes. One student who previously failed a course stated: but “the quizzes were just way too difficult” so he searched for a solution. “They got it done, and they did really, really well,” he continues. “They absolutely killed my final math and app classes with a 90 percent, and I can definitely tell you I never got a 90 percent before on anything” (Newton, 2015, p2). Site’s Price & Social Cost • • • • • • • Easy A’s for a Price Big Business Poised to be $100 billion industry “No Need to Study” cite offers: Online English Literature Class at Columbia University for $1225.15 RINGER GUARNTEES B OR BETTER (Newton, 2015) DEGREE VALUE DIMINISHED THROUGH CREDIBILITY ISSUE – Identity-fraud schemes – Pay for grade – Do not work – At least with traditional degree – Assumption you personally went to class (Newton, 2015) Ensuring Institutional Reputation Just as important as the institution’s reputation is their students’ reputation. Without measures to recognize the honest student from the dishonest student, all students’ reputations are tarnished. Thus, the university has a burden to protect itself by protecting its students. The university and its student body should collaborate through such means as announcements, training, meetings and prerequisite requirements to implement the goals of the academic integrity policy. The standards of the university should be made clear and it should be acknowledge by the students. The university’s mechanism of enforcing this policy should be explained and clarified through their questioning. In particular Wilmington University expects the faculty to: Utilized Safe Assign Stress the importance of this policy (Academic Integrity Policy) throughout the course Contact your Program Chair with questions or concerns Submit any Academic Integrity Policy Violations to your Chair, who will then send it to the Office of Academic Affairs to be properly processed. (Wilmington University Academic Integrity, 2017) Known Academic Strategies • Develop risk assessment and a project plan to address issues such as: • Smear Campaign • Assault on Institution Reputation • Social Media proliferating academic cheating Documente d Strategy with associated policies and procedures Use a holistic approach to integrate emerging (ISACA, 2010) Control Objectives for Information and related Technology (COBIT) Enabling a Holistic Approach, Slide 24 (IT Governance Institute, 2012) Considers Goals for Culture Ethics & Behavior • Organizational ethics, determined by the values by which the enterprise wants to live • Individual ethics, determined by the personal values of each individual in the enterprise and depending to an important extent on external factors such as religion, ethnicity, socioeconomic background, geography and personal experiences SOCIAL MEDIA AN OLD PROBLEM Even to Martin (1973) over 4 decades ago, the legal and societal environment is the most problematic. Accordingly, he wrote and illustrated (when discussing the control environment): “The outermost layer (in concentric circles of IT security) is by far the most problematical. When the computer and telecommunications revolution has run its full course (and today it is only just beginning), society will be very different. Many contorls will no doubt have evolved, seeking to maximize the benefits and minimize the dangers of a technology of which George Orwell never dreamed.” (Martin, 1973, p. 7)) ”Stay seamlessly connected with available built-in 4G LTE Wi-Fi.®† Connect up to seven devices to easily access apps, stream music or work on the go, on a signal that’s more powerful than your smartphone” (Chevrolet, 2017). If you choose to connect to a cloud infrastructure platform, you can have a data center more powerful than what existed in 1973. CONCLUSION Again, in my opinion we need to restore our foundation with a solid builder. Time is needed for a new advocate to protect our integrity: The Dean of the Internet and Social Media. References Bondar, G. H., & Hopwood, W.S.(2013). Accounting Information Systems. Upper Saddle River, NJ: Pearson Education. Chevrolet 2017 Volt: Hybrid Electric Car (2017). Retrieved May 13, 2017 from http://www.chevrolet.com/volt-electric-car# Gelbstein, E. (2011, Volume 6). Data Integrity—Information Security’s Poor relation. Information Systems Control Journal: 1-6. Hasib, M. (2015). Cybersecurity Leadership. Middletown, DE: Tommorow’s Staegry Today, LLC. Information System Audit and Control Association (2011). Social Media: Business Benefits and Security, Governance and Assurance Perspectives. Rolling Meadows, IL: Author. International Center for Academic Integrity (2012a). Mission Statement. Clemson, SC: Author. Retrieved May 7, 2017 from http://www.academicintegrity.org/icai/about-1.php International Center for Academic Integrity (2012b). Statistics. Clemson, SC: Author. Retrieved May 7, 2017 from http://www.academicintegrity.org/icai/integrity-3.php International Center for Academic Integrity (2016). Clemson partners to take actions against essay-writing services [Press Release]. Retrieved March 1, 2007 from http://newsstand.clemson.edu/mediarelations/clemson-partners-to-take-action-againstessay-writing-services/ IT Governance Institute (2012). Control Objectives for Information and related Technology (COBIT) 5.0. A Business Framework for the Governance and Management of IT Rolling Meadows, IL: Author. Intuit Inc./ Accountants Community, To Cheating Accounting Students Everywhere. Retrieved March 2, 2017 from https://accountants-community.intuit.com/questions/313324-tocheating-accounting-students-everywhere Japan Exam Cheating Technology (2016, May). Retrieved April 30, 2017 from https://www.youtube.com/watch?v=B6wKKSbgSi8 Martin, M. (1973). Security, Accuracy, and Privacy in Computer Systems. Englewood Cliffs, NJ. Prentice Hall, Inc. Newton, D. (2015, November). Cheating in Online Classes Is Now Big Business. The Atlantic Monthly Group. Retrieved March 2, 2017 from https://www.theatlantic.com/education/archive/2015/11/cheating-through-onlinecourses/413770/ O’Shaughnessy, L. (2011, May). 8 Top Websites that Students Use to Cheat. Moneywatch. Retrived March 2, 2017 from http://www.cbsnews.com/news/8-top-websites-thatstudents-use-to-cheat/ The Dewitt Clinton, one of the Earliest Railroad Carriages [Online Image]. Retrieved May 8, 2017 from http://pchs-fsm.org/westpointfoundry/galleryartifacts/the_dewitt_clinton.html Wilmington University Academic Integrity [Online Image]. Retrieved May 9, 2017 from http://www.wilmu.edu/academics/acadintegrity.aspx Wilmington University Mission, Vision, & Values. Retrieved May 9, 2017 from http://www.wilmu.edu/about/mission.aspx
© Copyright 2026 Paperzz