Abstract
Contract cheating is a major problem in Higher Education because it is very difficult to detect using traditional plagiarism detection tools. Digital forensics techniques are already used in law to determine ownership of documents, and also in criminal cases, where it is not uncommon to hide information and images within an ordinary looking document using steganography techniques. These digital forensic techniques were used to investigate a known case of contract cheating where the contract author has notified the university and the student subsequently confirmed that they had contracted the work out. Microsoft Word documents use a format known as Office Open XML Format, and as such, it is possible to review the editing process of a document. A student submission known to have been contracted out was analysed using the revision identifiers within the document, and a tool was developed to review these identifiers. Using visualisation techniques it is possible to see a pattern of editing that is inconsistent with the pattern seen in an authentic document.
Similar content being viewed by others
References
Bernstein, J. H. (2015). Transdisciplinarity: A review of its origins, development, and current issues. Journal of Research Practice, 11(1), R1.
Bretag, T., & Mahmud, S. (2009). A model for determining student plagiarism: Electronic detection and academic judgement. Journal of University Teaching and Learning Practice, 6, 49–60.
Castiglione, A., D’Alessio, B., De Santis, A., & Palmieri, F. (2011). New steganographic techniques for the OOXML file format. In A. M. Tjoa, G. Quirchmayr, I. You, & L. Xu (Eds.), Availability, reliability and security for business, enterprise and health information systems (Vol. 6908). Berlin/Heidelberg: Springer. https://doi.org/10.1007/978-3-642-23300-5_27.
Fu, Z., Sun, X., Liu, Y., & Li, B. (2011). Forensic investigation of OOXML format documents. Digital Investigation, 8(1), 44–55. https://doi.org/10.1016/j.diin.2011.04.001.
ISO. (2016). Information technology – Document description and processing languages – Office open XML file formats. ISO/IEC 29500-1, 1060-1063.
Jeong, D., & Lee, S. (2017). Study on the tracking revision history of MS word files for forensic investigation. Digital Investigation, 23, 3–10. https://doi.org/10.1016/j.diin.2017.08.003.
Rogerson, A. M. (2017). Detecting contract cheating in essay and report submissions: Process, patterns, clues and conversations. International Journal for Educational Integrity, 13, 1–17. https://doi.org/10.1007/s40979-017-0021-6.
Xiang, L., Sun, C., Liao, N., & Wang, W. (2016). A characteristic-preserving steganographic method based on revision identifiers. International Journal of Multimedia and Ubiquitous Engineering, 11(9), 29–38.
Zhangjie, F., Xingming, S., & Jie, X. (2015). Digital forensics of Microsoft Office 2007–2013. Journal of Communications and Networks, 17(5), 525–533. https://doi.org/10.1109/JCN.2015.000091.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Johnson, C., Davies, R. Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study. J Acad Ethics 18, 105–113 (2020). https://doi.org/10.1007/s10805-019-09358-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10805-019-09358-w