نتایج جستجو برای: cheating
تعداد نتایج: 2423 فیلتر نتایج به سال:
Extensive research indicates that cheating among undergraduate students is a serious problem. A recent study by McCabe reported that as many as nine in ten engineering undergraduates admit to one or more incidents of cheating in college and up to 23% admit to repetitive examination cheating. Several consequences of cheating, including personal shame, embarrassment, and institutional sanctions, ...
Based on a simplified evolutionary game model, this article analyzes the internal mechanism of credit cheating behaviors in E-Commerce business. With regard to potentially technological or rule defaults in credit system as well as traders’ selfish rationality, presence of credit cheating is to some extent unavoidable. We then suggest a new kind of credit system, which is independently coexisten...
Visual cryptography (VC), first proposed by Naor and Shamir, is a variant of secret sharing with many applications, such as providing secure services in communications. In 2006, Horng et al. showed that VC is vulnerable to cheating attacks. They also presented two approaches to prevent cheating, namely share authentication and blind authentication. In this paper, we review some share authentica...
BACKGROUND Honesty and integrity are key attributes of an ethically competent physician. However, academic misconduct, which includes but is not limited to plagiarism, cheating, and falsifying documentation, is common in medical colleges across the world. The purpose of this study is to describe differences in the self-reported attitudes and behaviours of medical students regarding academic mis...
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of cheating. These systems are often evaluated by measuring their performance against simple agents that cheat randomly. Unfortunately, these systems are not often evaluated from the perspective of security—can a motivat...
Although reports of academic cheating are abundant, there are relatively few papers in the literature that focus on cheating in the context of science courses and even fewer that address dishonest practices, such as "cooking" or fudging data, within the classroom laboratory. This paper briefly reviews the existing literature on academic dishonesty and explores two theories that can be used to e...
Visual Cryptographic technique has become an important field of study in modern cryptography. Visual cryptography (VC) has quite a few applications and some of them are authentication and identification, steganography, and image encryption. As the era demands the need of security and Visual Secret Sharing to resist cheating scenario is a Visual Cryptographic technique. VSS is simple as it is ea...
This work addresses the problem of cheating prevention in secret sharing. The scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. In this paper we study the constraints of cheating immune secret sharing schemes. We give a necessary and sufficient condition for SSSs to be cheating immune. Then, we improve the upper bound of D’Arco et. al o...
Malfeasant behaviors on tests may takeone of two forms—cheating or response distortion. Cheating is associated with ability and knowledge tests, and response distortion is associated with noncognitive/personality measures. Pursuant to the cheating and response distortion-related questions posed by Tippins (2009), the objective of the present article is to present a summary of the pertinent resu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید