Using Learning Analytics for Preserving Academic Integrity
ARTICLE
Alexander Amigud, Joan Arnedo-Moreno, Department of Computer Science, Multimedia and Telecommunications Universitat Oberta de Catalunya (UOC), Rambla del Poblenou, 156, 08018 Barcelona, Spain ; Thanasis Daradoumis, Greece ; Ana-Elena Guerrero-Roldan, Department of Computer Science, Multimedia and Telecommunications Universitat Oberta de Catalunya (UOC), Rambla del Poblenou, 156, 08018 Barcelona, Spain
IRRODL Volume 18, Number 5, ISSN 1492-3831 Publisher: Athabasca University Press
Abstract
This paper presents the results of integrating learning analytics into the assessment process to enhance academic integrity in the e-learning environment. The goal of this research is to evaluate the computational-based approach to academic integrity. The machine-learning based framework learns students\u2019 patterns of language use from data, providing an accessible and non-invasive validation of student identities and student-produced content. To assess the performance of the proposed approach, we conducted a series of experiments using written assignments of graduate students. The proposed method yielded a mean accuracy of 93%, exceeding the baseline of human performance that yielded a mean accuracy rate of 12%. The results suggest a promising potential for developing automated tools that promote accountability and simplify the provision of academic integrity in the e-learning environment.
Citation
Amigud, A., Arnedo-Moreno, J., Daradoumis, T. & Guerrero-Roldan, A.E. (2017). Using Learning Analytics for Preserving Academic Integrity. The International Review of Research in Open and Distributed Learning, 18(5),. Athabasca University Press. Retrieved March 28, 2024 from https://www.learntechlib.org/p/180432/.
Keywords
References
View References & Citations Map- Ali, N., Hindi, M., & Yampolskiy, R.V. (2011). Evaluation of authorship attribution software on a Chatbot
- Amigud, A., Arnedo-Moreno, J., Daradoumis, T., & Guerrero-Roldan, A.E. (2016). A behavioral
- Bailie, J.L., & Jortberg, M.A. (2009). Online learner authentication verifying the identity of online users. MERLOT Journal of Online Learning and Teaching, 5, 197– 207. Retrieved from http://jolt.merlot.org/vol5no2/bailie_0609.pdf
- Barnes, C., & Paris, L. (2013). An analysis of academic integrity techniques used in online courses at a
- Brennan, M., Afroz, S., & Greenstadt, R. (2012). Adversarial stylometry. ACM Transactions on Information and System Security, 15(3), 1–22.
- Brocardo, M.L., Traore, I., Saad, S., & Woungang, I. (2013). Authorship verification for short messages
- Brocardo, M.L., Traore, I., & Woungang, I. (2015). Authorship verification of e-mail and tweet messages applied for continuous authentication. Journal of Computer and System Sciences, 81(8), 1429– 1440.
- Buzdar, M.A., Ali, A., & Tariq, R.U.H. (2016). Emotional intelligence as a determinant of readiness for online learning. International Review of Research in Open and Distributed Learning, 17(1). Doi:10.19173/irrodl.v17i1.2149
- Crawford, G., & Rudy, J.A. (2003). Fourth annual EDUCAUSE survey identifies current IT issues. Educause Quarterly, 26(2), 12–27.Retrieved from http://net.educause.edu/ir/library/pdf/eqm0322.pdf
- Domingos, P. (2012). A few useful things to know about machine learning. Communications of the ACM, 55(10), 78.
- Feng, G., Wang, H., Sun, T., & Zhang, L. (2016). A term frequency based weighting scheme using naïve Bayes for text classification. Journal of Computation and Theoretical Nanoscience, 13(1), 319– 326.
- Fiedler, R., & Kaner, C. (2010). Plagiarism-detection services: How well do they actually perform? IEEE Technology and Society Magazine, 29(4), 37– 43.
- Gao, Q. (2012). Using IP addresses as assisting tools to identify collusions. International Journal of Business, Humanities and Technology, 2(1), 70– 75. Retrieved from http://www.ijbhtnet.com/journals/Vol_2_No_1_January_2012/8.pdf
- Grajek, S. (2016). Top 10 IT issues, 2016: Divest, reinvest, and differentiate. EDUCAUSE Review, 51(1). Retrieved from http://er.educause.edu/articles/2016/1/top-10-it-issues-2016
- Iqbal, F., Binsalleeh, H., Fung, B.C.M., & Debbabi, M. (2013). A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences, 231, 98–112.
- Levy, Y., Ramim, M., Furnell, S., & Clarke, N. (2011). Comparing intentions to use university-provided vs
- McLoughlin, C., & Luca, J. (2002). A learner-centred approach to developing team skills through webbased learning and assessment. British Journal of Educational Technology, 33(5), 571–582.
- O'Reilly, G., & Creagh, J. (2015). Does the shift to cloud delivery of courses compromise quality control. Higher Education in Transformation Conference (HEIT) , Dublin, Ireland, 417-424. Retrived from http://arrow.dit.ie/cgi/viewcontent.cgi?article=1001&context=st5
- Schmid, M.R., Iqbal, F., & Fung, B.C.M. (2015). E-mail authorship attribution using customized
- Siemens, G., & Baker, R.S. (2012). Learning analytics and educational data mining: towards communication and collaboration. In Proceedings of the 2nd international conference on learning analytics and knowledge (pp. 252-254). New York: ACM.
- Stamatatos, E. (2009). A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology, 60(3), 538–556.
- Stamatatos, E., Potthast, M., Rangel, F., Rosso, P., & Stein, B. (2015). Overview of the PAN/CLEF 2015 evaluation lab. In J. Mothe, J. Savoy , J. Kamps , K. Pinel-Sauvagnat , G. Jones, E. San Juan , …
These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.
Suggest Corrections to References