Skip to main content
Log in

Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study

  • Published:
Journal of Academic Ethics Aims and scope Submit manuscript

Abstract

Contract cheating is a major problem in Higher Education because it is very difficult to detect using traditional plagiarism detection tools. Digital forensics techniques are already used in law to determine ownership of documents, and also in criminal cases, where it is not uncommon to hide information and images within an ordinary looking document using steganography techniques. These digital forensic techniques were used to investigate a known case of contract cheating where the contract author has notified the university and the student subsequently confirmed that they had contracted the work out. Microsoft Word documents use a format known as Office Open XML Format, and as such, it is possible to review the editing process of a document. A student submission known to have been contracted out was analysed using the revision identifiers within the document, and a tool was developed to review these identifiers. Using visualisation techniques it is possible to see a pattern of editing that is inconsistent with the pattern seen in an authentic document.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Bernstein, J. H. (2015). Transdisciplinarity: A review of its origins, development, and current issues. Journal of Research Practice, 11(1), R1.

    Google Scholar 

  • Bretag, T., & Mahmud, S. (2009). A model for determining student plagiarism: Electronic detection and academic judgement. Journal of University Teaching and Learning Practice, 6, 49–60.

    Google Scholar 

  • Castiglione, A., D’Alessio, B., De Santis, A., & Palmieri, F. (2011). New steganographic techniques for the OOXML file format. In A. M. Tjoa, G. Quirchmayr, I. You, & L. Xu (Eds.), Availability, reliability and security for business, enterprise and health information systems (Vol. 6908). Berlin/Heidelberg: Springer. https://doi.org/10.1007/978-3-642-23300-5_27.

    Chapter  Google Scholar 

  • Fu, Z., Sun, X., Liu, Y., & Li, B. (2011). Forensic investigation of OOXML format documents. Digital Investigation, 8(1), 44–55. https://doi.org/10.1016/j.diin.2011.04.001.

    Article  Google Scholar 

  • ISO. (2016). Information technology – Document description and processing languages – Office open XML file formats. ISO/IEC 29500-1, 1060-1063.

  • Jeong, D., & Lee, S. (2017). Study on the tracking revision history of MS word files for forensic investigation. Digital Investigation, 23, 3–10. https://doi.org/10.1016/j.diin.2017.08.003.

    Article  Google Scholar 

  • Rogerson, A. M. (2017). Detecting contract cheating in essay and report submissions: Process, patterns, clues and conversations. International Journal for Educational Integrity, 13, 1–17. https://doi.org/10.1007/s40979-017-0021-6.

    Article  Google Scholar 

  • Xiang, L., Sun, C., Liao, N., & Wang, W. (2016). A characteristic-preserving steganographic method based on revision identifiers. International Journal of Multimedia and Ubiquitous Engineering, 11(9), 29–38.

    Article  Google Scholar 

  • Zhangjie, F., Xingming, S., & Jie, X. (2015). Digital forensics of Microsoft Office 2007–2013. Journal of Communications and Networks, 17(5), 525–533. https://doi.org/10.1109/JCN.2015.000091.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Clare Johnson.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Johnson, C., Davies, R. Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study. J Acad Ethics 18, 105–113 (2020). https://doi.org/10.1007/s10805-019-09358-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10805-019-09358-w

Keywords

Navigation