Whether a school puts forth a code of conduct in its student handbook or uses an honor code signed by all students in freshman orientation, official regulations are commonly employed (Olsen, 2008). Many of these policies are stated in broad terms. The University of Phoenix: Student Code of Academic Integrity (2008) is typical with its regulations. The policy begins with a mission statement and relates the importance of honesty to the statements realization (University of Phoenix, 2008). Some schools do specifically mention the misuse of technology in their code of induct, but in similarly general verbiage.
For example, the Syracuse University Code of Conduct (2008) prohibits “misuse of computer software, data, equipment, or networks”. The Code of Conduct (2008) also mentions the one use of technology that is specifically prohibited in many codes: using the Internet to purchase or copy prepared papers for submission. As stated in the university Of Florida Honor Code (2008), the source Of these documents “includes … A commercial vendor of research papers, [or] a file of research papers or tests maintained by a student organization or other body or person”.
The University of Phoenix Code of Conduct (2008) states: The student must rely upon their own abilities and refrain from obtaining assistance in any manner the faculty does not explicitly allow. This includes, but is not limited to, providing or receiving answers to an exam, use of faculty materials or answer keys, or a student having someone take his or her exam. (p. L) These codes of conduct and policies are in place in many schools. From high schools to universities, the aspects of cheating have been adequately addressed. With technology readily available, academic dishonesty is much easier to achieve than in the past.
The Texas Technical University, in their Codes of Conduct (2008), describes Dishonesty as anything that gives a student an unfair advantage. Prevention To find examples of methods used to prevent particular acts of cheating, one must turn to available sources of information intended to assist individual professors. The recommendations of the District Academic Senate Academic Integrity Task Force range from disallowing cell phones to requiring “any students who may depend on the use of hearing aids or other devices to submit documentation from a physician to confirm this need” (2007, AS).
The Provost’s Task Force at SUNY Albany warns of “an array of fairly exotic electronic devices that the student determined to cheat on an exam might find available” (2006). They go on to recommend that faculty change the way in which exams are administered to better facilitate close monitoring of students and that they provide a clear and pronounced statement of expected ethical standards in the classroom (SUNY Task Force, 2006). Further examples of prevention techniques are more likely to be found in anecdotal statements regarding the individual methods of college and university faculty.
To prevent cheating when students’ computers are used to cake tests, the UCLA School of Law requires that students run software that restricts the user from accessing anything but the test (Gloater, 2006). Gloater also reports that one professor rearranged the classroom to allow himself a clear view of student’s screens (2006). Professors at US Davis are advised to direct that all electronic gadgets be powered off and stowed away during exams (US Davis, 2006). The effectiveness of prevention techniques will depend upon the vigilance of the professor employing them.
Once item that is noted to have a positive outcome is the development of honor codes (Cole, & McCabe, 1996). The SUNY Task Force also notes the importance of both faculty and students taking an active role in enforcing a code as well as his or her involvement in promoting understanding of its provisions (2006). It was also noted that faculty must be willing to report and discipline students who violate the Honor Code. Research presented by the SUNY Task Force indicates “44% of those who were aware Of student cheating in their course n the last three years, have never reported a student cheating to the appropriate campus authority’ (2006).
This data is also confirmed by a US News & World report indicating that “113 of faculty from 21 different campuses” (Unknown, 2007) also did nothing when they encountered cheating. Reasons to Cheat What would make a good and honest student cheat? One major contributor is the stress one feels while furthering his or her education. Academic performance can create these pressures because high scores are difficult to achieve. University and college students are placed under an enormous demand to execute by parents, professors, and themselves.
The peer pressure experienced when a student may be competing with another student over grades or academic status is another source of stress. Another contributing factor is lack of preparation and ineffective time management. Times are changing in the academic world and typical students are no longer “just students”. One often finds students who work full or part- time, or who are parents and attend classes in the evenings. This means they have less time to dedicate to their studies.
Without a proper schedule, including time set aside specifically for school, even good students may find themselves falling behind. As a result, they may well turn to cheating to help them regain lost time. Regardless of the reason, these individuals are not abiding by the rules put n to place by the colleges and universities they are attending. It may be possible that some cheat only because they think they can get away with it, but the fact of the matter is: people cheat on a daily basis. The availability of technology has only worsened the epidemic of cheating.
In the past students had to be much more resourceful because electronic devices were not conducive to academic cheating. Now documents can be purchased online or copied from the Internet, answers for an exam can be acquired via text messaging, or one can easily print voluminous crib notes using tiny fonts. Newer, more innovative ways of cheating include some of today’s common devices in unusual ways. Creativity of students has made the classroom an unwelcoming environment for most handheld electronics. Devices “Cheating is not a new phenomenon” (Ma, Lu, Turner, & Wan, 2007, p. 9). It has occurred as long as there have been students. The high tech world of today lends itself well to change as smaller and more advanced gadgets are developed and introduced. Students can use many devices to cheat in a classroom environment, from digital media players, such as pods, to cell phones and Pad’s- In an online environment, where direct instructor prevision is not possible, the methods of cheating available to the student grow exponentially. Individuals can purchase work, such as term papers and program code, online.
Furthermore, with the Internet, plagiarism has become a bigger problem than before. Many educators have recognized the risk posed by high tech gadgets and the proclivity of some students to use them dishonestly. At the same time “educators agree that, used properly, these devices can be valuable study aids” (Ongoing, 2007). In fact, the author further states that “an audio player can be helpful in learning, say, a foreign language, and tutoring centers like Kaplan and the Princeton Review now offer SAT-prep tools for pods” (Ongoing, 2007).
Educators must judge the value of these devices considering both their ever-increasing use by dishonest students and the benefits they provide. Many school districts are now employing policies that forbid the use of pods after “school official[s] realized some students were downloading formulas and other materials on to the players” (Kinsman, 2007). Kinsman, a former teacher and current school administrator, goes on to say that pods and similar media devices can still be used if cheating is redefined and the est. are modified to an “open book” format to accommodate the use of these devices (2007).
If the tests were “focused more on process over product, and on thinking over simple product” (Kinsman, 2007) the students will learn more and be better prepared for the world that awaits them. Media devices such as pods are not the only things being used to cheat. Students are using cell phones, Pad’s, pagers, and even calculators in the same manner. Richardson explores several of these methods and states that each of these devices can be used to store complex formulas and files, and to end and receive email and instant messages with test answers (2007).
The devices can also connect to the Internet during tests to obtain information regarding answers. Through the use of cell phones and some Pad’s, audio and video clips can be stored for viewing or listening to during tests. The use of calculators in school has been debated for decades. In today’s schools, the use of calculators is generally accepted, especially in higher learning institutions where mathematical computations can be lengthy and time consuming if done without a calculator. However, calculators have come extremely sophisticated and are used more frequently for cheating since having one does not constitute cheating.
In 1995, Marilyn Tip, a mother from Nebraska, found a magazine that her son had which contained an ad regarding the Sage IR 7000. This ad stated the calculator is capable of “organizing schedules, converting currency, and translating languages, among other things” (One Pareses Message, 1995). This was 13 years ago. The capabilities of calculators have far surpassed the Sage IR 7000 and now include the ability to store text and numerical formulas for recall during a test. Conclusion Cheating has not gone away over the years. It has indeed grown to be a bigger problem than it was in the past.
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…
Lesson 1: Thesis Lesson 2: Introduction Lesson 3: Topic Sentences Lesson 4: Close Readings Lesson 5: Integrating Sources Lesson 6:…