{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:51:41Z","timestamp":1754157101856,"version":"3.41.2"},"reference-count":46,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2011,11,22]],"date-time":"2011-11-22T00:00:00Z","timestamp":1321920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11,22]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to focus on plagiarism and the consequences of anti\u2010plagiarism services such as Turnitin.com, iThenticate, and PlagiarismDetect.com in detecting the most recent cheatings in academic and other writings.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The most important approach is plagiarism prevention and finding proper solutions for detecting more complex kinds of plagiarism through natural language processing and artificial intelligence self\u2010learning techniques.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The research shows that most of the anti\u2010plagiarism services can be cracked through different methods and artificial intelligence techniques can help to improve the performance of the detection procedure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>Accessing entire data and plagiarism algorithms is not possible completely, so comparing is just based on the outputs from detection services. They may produce different results on the same inputs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Academic papers and web pages are increasing over time, and it is very difficult to capture and compare documents with all available data on the network in an up to date manner.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>As many students and researchers use the plagiarism techniques (e.g. PDF locking, ghost\u2010writers, dot replacement, online translators, previous works, fake bibliography) to cheat in academic writing, this paper is intended to prevent plagiarism and find suitable solutions for detecting more complex kinds of plagiarism. This should also be of grave concern to teachers and librarians to provide up to date\/standard anti\u2010plagiarism services. The paper proposes some new solutions to overcome these problems and to create more resilient and intelligent future systems.<\/jats:p><\/jats:sec>","DOI":"10.1108\/07378831111189732","type":"journal-article","created":{"date-parts":[[2011,12,3]],"date-time":"2011-12-03T17:47:32Z","timestamp":1322934452000},"page":"623-640","source":"Crossref","is-referenced-by-count":9,"title":["Evaluation of cheating detection methods in academic writings"],"prefix":"10.1108","volume":"29","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Kaveh","family":"Bakhtiyari","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020219485484800_b1","doi-asserted-by":"crossref","unstructured":"Ahtiainen, A., Surakka, S. and Rahikainen, M. (2006), \u201cPlaggie: GNU\u2010licensed source code plagiarism detection engine for Java exercises\u201d, in Berglund, A. and Wigg\u2010berg, M. (Eds), Proceedings of the 6th Baltic Sea Conference on Computing Education ResearchProceedings of the 6th Baltic Sea Conference on Computing Education Research, Koli Calling, Uppsala University, Uppsala.","DOI":"10.1145\/1315803.1315831"},{"key":"key2022020219485484800_b2","doi-asserted-by":"crossref","unstructured":"Belkhouche, B., Nix, A. and Hassell, J. (2004), \u201cPlagiarism detection in software designs\u201d, paper presented at the ACM Southeast Regional Conference.","DOI":"10.1145\/986537.986585"},{"key":"key2022020219485484800_b3","doi-asserted-by":"crossref","unstructured":"Boneh, D. and Shaw, J. (1995), Collusion\u2010secure Fingerprinting for Digital Data, Computer Science Department, Princeton University, Princeton, NJ.","DOI":"10.1007\/3-540-44750-4_36"},{"key":"key2022020219485484800_b4","unstructured":"Burnham, R.A. (2003), \u201cMarketing yourself via ghostwriting\u201d, Certification Magazine, available at: www.certmag.com\/read.php?in=344 (accessed 20 April 2011)."},{"key":"key2022020219485484800_b5","unstructured":"Carrol, J. (2002), A Handbook for Detecting Plagiarism in Higher Education, The Oxford Centre for Staff and Learning Development, Oxford Brookes University, Oxford."},{"key":"key2022020219485484800_b6","unstructured":"CLEF (2011), PAN 2011 \u2013 Uncovering Plagiarism, Authorship, and Social Software Misuse, available at: http:\/\/pan.webis.de\/ (accessed 5 May)."},{"key":"key2022020219485484800_b7","unstructured":"Cosma, G. and Joy, M. (2006), \u201cSource\u2010code plagiarism: a UK academic perspective\u201d, paper presented at 7th Annual Conference of the HEA Network for Information and Computer Sciences, Dublin, 29\u201031 August."},{"key":"key2022020219485484800_b8","doi-asserted-by":"crossref","unstructured":"Cowie, R., Douglas\u2010Cowie, E., Tsapatsoulis, N., Votsis, G., Kollias, S., Fellenz, W. and Taylor, J.G. (2001), \u201cEmotion recognition in human\u2010computer interaction\u201d, Signal Processing Magazine, IEEE, Vol. 18 No. 1, pp. 32\u201080.","DOI":"10.1109\/79.911197"},{"key":"key2022020219485484800_b9","unstructured":"Culwin, F., MacLeod, A. and Lancaster, T. (2001), Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes and Tools, JISC, London, Commissioned by JISC."},{"key":"key2022020219485484800_b10","doi-asserted-by":"crossref","unstructured":"Farquad, M., Ravi, V. and Bapi, R.S. (2008), \u201cRule extraction using Support Vector Machine based hybrid classifier\u201d, paper presented at TENCON 2008 \u2013 2008 IEEE Region 10 Conference, Hyderabad, 19\u201021 November.","DOI":"10.1109\/TENCON.2008.4766534"},{"key":"key2022020219485484800_b11","unstructured":"Giombetti (1992), \u201cUW's friendly corporate ghostwriter\u201d, Eat the State, Vol. 6 No. 19."},{"key":"key2022020219485484800_b12","unstructured":"Google (2011), Google Translator, available at: http:\/\/translate.google.com\/ (accessed 20 April)."},{"key":"key2022020219485484800_b13","doi-asserted-by":"crossref","unstructured":"H\u00e1jek, P. (2011), \u201cDeductive systems of fuzzy logic\u201d, Proof, Computation and Agency, Vol. 352 No. 2, pp. 67\u201078.","DOI":"10.1007\/978-94-007-0080-2_5"},{"key":"key2022020219485484800_b14","doi-asserted-by":"crossref","unstructured":"Harp, J. and Taietz, P. (1966), \u201cAcademic integrity and social structure: a study of cheating among college students\u201d, Social Problems, Vol. 13 No. 4, pp. 365\u201073.","DOI":"10.1525\/sp.1966.13.4.03a00010"},{"key":"key2022020219485484800_b15","unstructured":"Harrick, C. (2011), iThenticate Introduces New Plagiarism Detection Service for Individual Authors and Researchers, prweb.com, available at: www.prweb.com\/releases\/2011\/1\/prweb8072290.htm (accessed 20 April)."},{"key":"key2022020219485484800_b16","doi-asserted-by":"crossref","unstructured":"Hawley, C.S. (1984), \u201cThe thieves of academe: plagiarism in the university system\u201d, Improving College and University Teaching, Vol. 32 No. 1, pp. 35\u20109.","DOI":"10.1080\/00193089.1984.10533838"},{"key":"key2022020219485484800_b17","doi-asserted-by":"crossref","unstructured":"Holley, R. (2009), \u201cHow good can it get? Analysing and improving OCR accuracy in large scale historic newspaper digitisation programs\u201d, D\u2010Lib Magazine, Vol. 15.","DOI":"10.1045\/march2009-holley"},{"key":"key2022020219485484800_b18","unstructured":"IEEE (2011), Cross Check User Guide, IEEE, available at: www.ieee.org\/documents\/CrossCheck_User_Guide.pdf (accessed 20 April)."},{"key":"key2022020219485484800_b19","unstructured":"iParadigms (2011), Turnitin.com, available at: www.turnitin.com\/ (accesseed 10 February)."},{"key":"key2022020219485484800_b20","unstructured":"ISO (2008), Document Management \u2013 Portable Document Format, International Organiztion for Standardization, available at: www.iso.org\/iso\/catalogue_detail.htm?csnumber=51502."},{"key":"key2022020219485484800_b21","unstructured":"iThenticate.com (2011a), CrossCheck, iParadigms.com, available at: www.crossref.org\/crosscheck\/index.html (accessed 20 April)."},{"key":"key2022020219485484800_b22","unstructured":"iThenticate.com (2011b), Plagiarism Checker \u2013 Plagiarism Detection Software, (accessed 1 April)."},{"key":"key2022020219485484800_b23","doi-asserted-by":"crossref","unstructured":"Kumar, G., Tulyakov, S. and Govindaraju, V. (2010), \u201cCombination of symmetric hash functions for secure fingerprint matching\u201d, paper presented at the Pattern Recognition (ICPR), 2010 Twentieth International Conference, 23\u201026 August.","DOI":"10.1109\/ICPR.2010.224"},{"key":"key2022020219485484800_b24","unstructured":"Lei, L., Zhi\u2010Ping, G. and Wen\u2010Yan, D. (2010), \u201cFuzzy multi\u2010class support vector machine based on binary tree in network intrusion detection\u201d, paper presented at the Electrical and Control Engineering (ICECE), 2010 International Conference, Wuhan, 25\u201027 June."},{"key":"key2022020219485484800_b25","unstructured":"Liu, Y. and Liu, Y. (2010), \u201cIncremental learning method of least squares support vector machine\u201d, paper presented at the Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference, Changsha, 11\u201012 May."},{"key":"key2022020219485484800_b27","unstructured":"McCabe, D.L. (1999), \u201cAcademic dishonesty among high school students\u201d, Adolescence, Vol. 34 No. 136."},{"key":"key2022020219485484800_b26","doi-asserted-by":"crossref","unstructured":"Marsden, H., Carroll, M. and Neill, J.T. (2005), \u201cWho cheats at university? A self\u2010report study of dishonest academic behaviours in a sample of Australian university students\u201d, Australian Journal of Psychology, Vol. 57 No. 1, pp. 1\u201010.","DOI":"10.1080\/00049530412331283426"},{"key":"key2022020219485484800_b28","doi-asserted-by":"crossref","unstructured":"Niezgoda, S. and Way, T.P. (2006), \u201cSNITCH: a software tool for detecting cut and paste plagiarism\u201d, ACM SIGCSE Bulletin, Vol. 38 No. 1, pp. 51\u20105.","DOI":"10.1145\/1124706.1121359"},{"key":"key2022020219485484800_b29","doi-asserted-by":"crossref","unstructured":"Parker, A. and Hamblen, J.O. (1989), \u201cComputer algorithms for plagiarism detection\u201d, IEEE Transactions on Education, Vol. 32 No. 2, pp. 94\u20109.","DOI":"10.1109\/13.28038"},{"key":"key2022020219485484800_b30","unstructured":"PlagiarismDetect (2011), Plagiarism Checker, (accessed 20 April)."},{"key":"key2022020219485484800_b31","unstructured":"Prechelt, L., Malpohl, G. and Philippsen, M. (2000), \u201cJPlag: finding plagiarisms among a set of programs\u201d, Journal of Universal Computer Science, Vol. 8 No. 11."},{"key":"key2022020219485484800_b32","unstructured":"RemovePlagiarism.com (2011), Detect Plagiarism|Remove Plagiarism, RemovePlagiarism.com, available at: www.removeplagiarism.com\/ (accessed 20 April)."},{"key":"key2022020219485484800_b33","doi-asserted-by":"crossref","unstructured":"Rennie, D. and Flanagin, A. (1994), \u201cAuthorship! Authorship! Guests, ghosts, grafters, and the two\u2010sided coin\u201d, JAMA, Vol. 271 6, February, pp. 469\u201071.","DOI":"10.1001\/jama.271.6.469"},{"key":"key2022020219485484800_b34","doi-asserted-by":"crossref","unstructured":"Seungjin, L., Joonsoo, K., Jinwook, O., Junyoung, P. and Hoi\u2010Jun, Y. (2010), \u201cA 92m W 76.8GOPS vector matching processor with parallel Huffman decoder and query re\u2010ordering buffer for real\u2010time object recognition\u201d, paper presented at the Solid State Circuits Conference (A\u2010SSCC), 2010 IEEE Asian, 8\u201010 November.","DOI":"10.1109\/ASSCC.2010.5716616"},{"key":"key2022020219485484800_b35","doi-asserted-by":"crossref","unstructured":"Shivakumar, N. and Garcia\u2010Molina, H. (1995), \u201cThe SCAM approach to copy detection in digital libraries\u201d, D\u2010Lib Magazine, November.","DOI":"10.1045\/november95-shivakumar"},{"key":"key2022020219485484800_b36","unstructured":"SysTranSoft.com (2011), SYSTRAN \u2013 Online Translation Software, www.systransoft.com\/ (viewed 20 April)."},{"key":"key2022020219485484800_b37","unstructured":"Tahaghoghi, C.A. and Tahaghoghi, S.M.M. (2006), \u201cPlagiarism Detection across Programming Languages\u201d, in Estivill\u2010Castro, V. and Dobbie, G. (Eds), ACS 48, Hobart."},{"key":"key2022020219485484800_b38","doi-asserted-by":"crossref","unstructured":"Tappert, C.C., Suen, C.Y. and Wakahara, T. (1990), \u201cThe state of the art in online handwriting recognition\u201d, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 12 No. 8, pp. 787\u2010808.","DOI":"10.1109\/34.57669"},{"key":"key2022020219485484800_b39","unstructured":"turnitin.com (2010a), Answers to Common Legal Questions about Turnitin, available at: http:\/\/turnitin.com\/static\/pdf\/us_Legal_Document.pdf (accessed 1 February)."},{"key":"key2022020219485484800_b40","unstructured":"turnitin.com (2010b), Student Quick Start Guide, available at: http:\/\/turnitin.com\/resources\/documentation\/turnitin\/training\/en_us\/qs_student_en_us.pdf (accessed 1 February 2011)."},{"key":"key2022020219485484800_b41","unstructured":"Vamplew, P. and Dermoudy, J. (2005), \u201cAn anti\u2010plagiarism editor for software development courses\u201d, in Young, A. and Tolhurst, D. (Eds), Proceedings of the Seventh Australasian Computing Education Conference (ACE2005), CRPIT, ACS, Newcastle."},{"key":"key2022020219485484800_b42","doi-asserted-by":"crossref","unstructured":"Verco, K.L. and Wise, M.J. (1996), \u201cSoftware for detecting suspected plagiarism: comparing structure and attribute\u2010counting systems\u201d, Proceedings of the First Australian Conference on Computer Science Education, Citeseer.","DOI":"10.1145\/369585.369598"},{"key":"key2022020219485484800_b43","unstructured":"WhiteSmoke\u2010Inc. (2011), English Grammar Software, WhiteSmoke Inc., available at: www.removeplagiarism.com\/ (accessed 20 April)."},{"key":"key2022020219485484800_b44","unstructured":"Wiedemeier, P.D. (2002), \u201cPreventing plagiarism in computer literacy courses\u201d, Journal of Computing Sciences in Colleges, Vol. 17 No. 4, pp. 154\u201063."},{"key":"key2022020219485484800_b45","doi-asserted-by":"crossref","unstructured":"Wise, M.J. (1996), \u201cYAP3: improved detection of similarities in computer program and other texts\u201d, SIGCSE \u201896 Proceedings of the Twenty\u2010seventh SIGCSE Technical Symposium on Computer Science Education, ACM, New York, NY.","DOI":"10.1145\/236452.236525"},{"key":"key2022020219485484800_b46","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A. (1965), \u201cFuzzy sets*\u201d, Information and Control, Vol. 8 No. 3, pp. 338\u201053.","DOI":"10.1016\/S0019-9958(65)90241-X"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/07378831111189732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831111189732\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/07378831111189732\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:33:58Z","timestamp":1753400038000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/29\/4\/623-640\/270915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,22]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,11,22]]}},"alternative-id":["10.1108\/07378831111189732"],"URL":"https:\/\/doi.org\/10.1108\/07378831111189732","relation":{},"ISSN":["0737-8831"],"issn-type":[{"type":"print","value":"0737-8831"}],"subject":[],"published":{"date-parts":[[2011,11,22]]}}}