نتایج جستجو برای: cheating
تعداد نتایج: 2423 فیلتر نتایج به سال:
One of the major problems facing Thai education at the university level is that of academic dishonesty. While newspapers often report upon individual and group cases of university-level cheating, there has been little research done to determine the reasons behind the dishonesty of Thai students as well as the extent and implications. In addition, surveys have shown that a majority of both stude...
Cheaters-genotypes that gain a selective advantage by taking the benefits of the social contributions of others while avoiding the costs of cooperating-are thought to pose a major threat to the evolutionary stability of cooperative societies. In order for cheaters to undermine cooperation, cheating must be an adaptive strategy: cheaters must have higher fitness than cooperators, and their behav...
It seems so obvious that cheating is wrong that providing a justification is not a main concern: most of the research is empirical and focuses on quantification and correlations. I look at a number of reasons why cheating may be wrong: it provides an unfair advantage over other students, it hinders learning, and it is dishonest. They are unexpectedly weak (often not proving that cheating is wro...
Randomized response is a misclassification design to estimate the prevalence of sensitive behaviour. Respondents who do not follow the instructions of the design are considered to be cheating. A mixture model is proposed to estimate the prevalence of sensitive behaviour and cheating in the case of a dual sampling scheme with direct questioning and randomized response. The mixing weight is the p...
In this paper, we attempt to construct practical secret sharing schemes, which scheme has smaller share size and can detect cheating with high probability. We de ne two secure ramp schemes, secure ramp scheme and strongly secure ramp scheme. Then, we propose two constructions of secure ramp scheme. These schemes both have small share size and the cheating can be detected with high probability. ...
We present two new algorithms for making secret sharing cheating immune. The first algorithm modifies Shamir’s scheme to make it k−2 cheating immune and requires no additional storage. The second proposed algorithm provides k−1 cheating immunity under computational assumptions and requires a small constant size additional storage. Here k is the minimum number of players that have to pool their ...
In this paper, a user-based CPU verification scheme is proposed for the cloud cheating detection problem, where the cloud service provider offers insufficient CPU resources that are bought by the user. In this scheme, a predefined computational task is constructed for the cloud to execute. Then, we compare the difference of the actual execution time (recorded by the user) and the theoretical ex...
In this research we claim that teachers' enthusiasm matters regarding student engagement in terms of academic cheating. Previous studies found that perceived enthusiasm of teachers is positively related to the intrinsic motivation of the students. However, it was less investigated how perceived enthusiasm is related to cheating. In the first exploratory questionnaire study (N = 244) we found th...
PURPOSE The purpose of this study was to assess physician assistant (PA) students' attitudes and experiences toward academic dishonesty during training and to determine whether PA students self-report cheating during PA school. METHODS An anonymous, quantitative, exploratory, descriptive survey was sent to clinical-year PA students enrolled in PA programs accredited by the Accreditation Revie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید