Results 131 to 140 of about 4,282,796 (347)

Weapons of mouse destruction: a 3D strategy for combating cut-and-paste plagiarism using the JISC Plagiarism Advisory Service [PDF]

open access: yes, 2006
This article describes an action research project undertaken in the Business Information Technology (BIT) subject group of a post-1992 University Business School to combat the growing menace of cut-and-paste plagiarism.
Martin, Ian, Stubbs, Mark, Troop, Hannah
core  

Beyond evidence hierarchies: Leveraging randomized controlled trials and real‐world data to advance the value of maternity care

open access: yesActa Obstetricia et Gynecologica Scandinavica, EarlyView.
Value‐based maternity care decisions should draw on cost‐effectiveness evidence from both randomized controlled trials and real‐world data, integrating them systematically rather than ranking them hierarchically. Abstract While existing literature has compared the methodological strengths and limitations of randomized controlled trials (RCTs) and real ...
Yanan Hu   +3 more
wiley   +1 more source

CASE STUDY: POLICIES, STRATEGIES AND RESPONSES TO PLAGIARISM IN SLOVAKIA

open access: yesJournal on Efficiency and Responsibility in Education and Science, 2014
The European project “Impact of Policies for Plagiarism in Higher Education Across Europe“ has identified best practices and gaps related to plagiarism in different European countries.
FOLTYNEK, Tomas   +2 more
doaj   +1 more source

Supporting learner agency in collaborative writing with generative AI

open access: yesBritish Journal of Educational Technology, EarlyView.
Abstract To support learner agency in LLM‐powered writing environments, this research introduces a new interface that integrates two key features: an Argument Outline and a Similarity Viewer. These features were designed to enhance intentionality in writing and self‐monitoring of reliance on AI‐generated suggestions.
Sujin Kim, Hyo‐Jeong So, Kyudong Park
wiley   +1 more source

Source code plagiarism detection for PHP language

open access: yesEuropean Journal of Business Science and Technology, 2017
This paper introduces a system for detection of plagiarism in source codes written in the PHP computer language, part of the plagiarism detection tool Anton. We used the greedy string tiling algorithm together with tokenization and hash calculation.
Richard Všianský   +2 more
doaj   +1 more source

Generative artificial intelligence in higher education: Emotional tensions and ethical declaration

open access: yesBritish Journal of Educational Technology, EarlyView.
Abstract The increasing use of Generative Artificial Intelligence (GenAI) tools such as ChatGPT in higher education has raised questions about authorship, ethical responsibility, and academic transparency. While institutional guidelines exist, many remain vague and ineffective, leaving students to interpret disclosure obligations on their own.
Yao Qu, Hui En Loo, Jue Wang
wiley   +1 more source

Syntax tree fingerprinting: a foundation for source code similarity detection [PDF]

open access: yes, 2009
Plagiarism detection and clone refactoring in software depend on one common concern: nding similar source chunks across large repositories. However, since code duplication in software is often the result of copy-paste behaviors, only minor modi cations ...
Chilowicz, Michel   +2 more
core   +2 more sources

The government–robber comparison: A long‐standing tradition beyond avowed libertarianism

open access: yesEconomic Affairs, EarlyView.
Abstract A government differs from a robber, but they share the common feature of initiating coercion. This similarity has been noticed by libertarians as well as within a distinct scholarly tradition and as a recurring theme throughout Western philosophy.
Brian Mandeville
wiley   +1 more source

Home - About - Disclaimer - Privacy