Вы находитесь на странице: 1из 2

ICT News!

For staff and pupils of DBIS


Students turn to web plagiarism
Nov 7th 2008
Vol. 04 No. 01

By Dickon Hooper, BBC News

Plagiarism by university students across Bristol


ICT Top
Tip
and Bath is on the increase, according to figures
obtained by the BBC.
The highest figures come from the
University of the West of England (UWE), which
identified more than 300 cases in the last
academic year, up from 245 in 2005/06.
This represents about 1% of its students, and
could be a result of its solid detection procedures,
according to the University.
At Bristol University, more than 70
cases were reported last year (from 12,000
undergraduates), against 46 at Bath University
(13,000 undergraduates). Bath’s figures more
than doubled from 2005/2006.
Plagiarism can be hard to track, with the
internet offering a proliferation of sources. But
universities employ a variety of means. Keith Hicks, from UWE, said: “Plagiarism software is no real substitute
for staff being in touch with their students and their material.” And he added: “The internet can actually make it
easier for us to find the plagiarised material if it is not referenced.”
The real problem is contract cheating. One growing source for students is essay-generating websites.
A quick search throws up a plethora of alternatives for the cash-rich, time-poor student, ranging from the
customised essay to the generic.
Fast Formatting
One of our favorite hidden gems is
“Essay mills recycle essays and our detection service picks them up,” said Richard Edwards, assistant t h e Fo r m at Pa i n t e r. T h i s Pa i n t b r u s h
registrar in the University of Bristol’s Education Support Unit. icon should appear by default on
“The real problem is contract cheating where students put their work out to tender. The chief weapon t h e s t a n d a r d t o o l b a r. To a d d i t t o
against this is the academics doing the marking.” t h e t o o l b a r, g o t o To o l s | C o m m a n d s ,
Essay-generating websites tend to go out of their way to shun any suggestion that their work should be navigate to Format, and drag the
used verbatim, claiming it is for research purposes only. Pa i n t b r u s h i c o n t o a t o o l b a r.
But not everyone is convinced, and as one Bristol undergraduate discovered, quality is far from guaranteed.

Online Action could mean


When you click on this icon, Format
Painter copies the text formatting
of the area where the cursor is
located. If you select an entire

trouble in the real world!


paragraph or cell and then click
on the icon, Format Painter will
also copy the paragraph or cell
fo r m at t i n g. Yo u c a n t h e n “p a i n t ”
the copied formatting into other
The Associated Press because she suddenly found herself parts of the document by simply
reported that a Japanese woman divorced without any reasons highlighting text.
hacked into her online “husband’s” given, without any prior warning.
account and killed the avatar. While The woman originally obtained
By double- clicking on the Format
the report said that she had no the 33-year-old office worker’s Painter icon, you can apply the
intent to cause the other player login information while the virtual copied formatting repeatedly until
physical harm in the real world, couple was still happily married. you press Esc.
she now faces a prison term up to Thus, out of anger, she took her
5 years or a fine up to $5,000 for revenge. The man called the police
“illegally accessing a computer and once he logged in and discovered
manipulating electronic data,” or in that his Maple Story alter ego was Miyazaki and taken 620 miles across
other words, hacking. murdered. Although the woman has Japan to Sapporo, the city where
Apparently, her reasoning not been formally charged, she was the male player resides. Ongoing
for killing off the virtual husband was arrested at her home in southern
Staff
KEEP UP THE GOOD WORK Development
Thanks to all those who came Factors which teachers need to Try to remember that D o n’t fo rg e t t h at yo u c a n
to the ICT PD session on be taken into acount ICT should : adress your IC T training
Wednesday 5th November. • clear identification of how • Ensure that the learning
ICT will be used to meet outcomes can be achieved; needs by dropping in to
The topic discussed was ICT specific subject objectives • Enable the learner;
and Pedagogy, and participants to improve pupils’ • Ease and supports the task; the Primar y IC T suite on
were encouraged to talk about attainment; • Enhance the task’s quality M o n d a y ’s f r o m 3 . 1 5 - 5 p m ,
the use of ICT in their lessons to • ensuring that pupils have and value.
support, enahnce and extend adequate ICT skills to Barker and Franklin (1998) or the Kindi Suite from
children’s learning. achieve those objectives; 2 . 3 0 o n T h u r s d a y.
• planned match of pedagogy
with the identified purpose
of ICT activities and
learning outcomes.
Singapore MOE Launches Third Masterplan for ICT in Education
The Ministry of Education has give feedback on each others’ work
developed the third Masterplan and collaborate with peers within
for ICT in Education (2009-2014). and outside school.
The third masterplan represents Differentiated Professional
a continuum of the vision of the Development
first and second Masterplans i.e. to School leaders can create the
enrich and transform the learning environment for teachers to
environments of our students reflect and learn from each other
and equip them with the critical about effective teaching practices
competencies and dispositions to that incorporate ICT use in the
succeed in a knowledge economy. classrooms to achieve desired
The broad strategies of the third learning outcomes for their
Masterplan for ICT in Education are: students.
• To strengthen integration of In addition, MOE will train a pool of
ICT into curriculum, pedagogy and “ICT specialist teachers” with strong
assessment to enhance learning pedagogical groundings to model
and develop competencies for the and lead professional development
21st century; efforts within and across schools.
• To provide differentiated A learning roadmap will also be
professional development that is developed to help pace teachers in
more practice-based and models learning how to effectively use ICT piloting 1-notebook-to-1-pupil ratio strengthening the integration of ICT
how ICT can be effectively used to in their classes. in more schools, and higher data into the curriculum, establishing
help students learn better; bandwidth to the Internet. baseline ICT standards for students,
Improve the sharing of best practices and seeding innovative use of ICT
• To improve the sharing and successful innovations Background
The Masterplans for ICT in Education among schools.
of best practices and successful To improve the sharing of best
innovations; and drive the use of ICT in education. For more information on the
practices, MOE will support the Masterplans for ICT in Education,
• To enhance ICT provisions establishment of a network of The underlying philosophy of the
Masterplans is that education follow the links from the following
in schools to support the educational labs where innovations website:
implementation of mp3. can be prototyped and tested. should continually anticipate the
These labs will provide the latest needs of the future and prepare
Strengthening Integration of ICT pupils to meet those needs.
into Curriculum, Assessment & technologies to promote exploration
Pedagogy of learning possibilities. They can The first Masterplan for ICT in
also serve as training ground for Education (1997 — 2002) laid a http://wiki.nus.edu.sg/
ICT will be more extensively strong foundation for schools to
integrated into the planning, design pre- and in-service teachers. pages/viewrecentblogposts.
MOE will continue to support harness ICT, particularly in the action?key=ICTSGedu
and implementation stages of provision of basic ICT infrastructure
the curriculum, assessment and schools to innovate in the use of
ICT and to facilitate sharing of and in equipping teachers with
pedagogy. There will be greater a basic level of ICT integration
alignment of students’ learning good practices among schools
through programmes like the competency, which achieved a
outcomes in the syllabi, national widespread acceptance for its use
examinations, and classroom FutureSchools@Singapore and
LEAD ICT@Schools. in education.
experience to 21st century skills
such as IT skills, and the ability to Enhanced ICT Provisions The second Masterplan for ICT
communicate persuasively and in Education (2003 — 2008) built
Accessibility of ICT to students will on this foundation to strive for
collaborate effectively. Students be increased through more flexible
will be required to use ICT to look an effective and pervasive use of
and mobile infrastructure provisions ICT in education by, for example,
for information, synthesise reports, such as wireless internet access,

Alarm raised on teenage hackers


Increasing numbers of teenagers are
http://news.bbc.co.uk/2/hi/technology/7690126.stm
was arrested as a teenager and then
starting to dabble in hi-tech crime, say acquitted for his online exploits, said it
experts. was no surprise that young people were
Computer security professionals say indulging in online crime.
many net forums are populated by “It’s about the thrill and power to prove
teenagers swapping credit card numbers, they are somebody,” he said. That also
phishing kits and hacking tips. explains why they stuck with an alias
The poor technical skills of many young or online identity even though it was
hackers means they are very likely to get compromised, he added.
caught and arrested, they say. “The aim of what they are doing is to
Youth workers added that any teenager get the fame within their peer group,”
getting a criminal record would be he said. “They spend months or years
putting their future at risk. developing who they are and their status.
“I see kids of 11 and 12 sharing credit They do not want to give that up freely.”
he said, many progress to outright Chris Boyd from FaceTime said many Graham Robb, a board member of the
card details and asking for hacks,” said criminal practices such as using phishing of the young criminal hackers were
Chris Boyd, director of malware research Youth Justice Board, said teenagers
kits to create and run their own scams. undermined by their desire to win needed to appreciate the risks they took
at FaceTime Security. recognition for their exploits.
“Some are quite crude, some are clever by falling into hi-tech crime.
Many teenagers got into low level crime and some are stupid,” he said. Many teenage hackers publicise their
by looking for exploits and cracks for their “If they get a criminal record it stays
The teenagers’ attempts to make money exploits on YouTube with them,” he said. “A Criminal Record
favourite computer games.
from their life of cyber crime usually “They are obsessed with making videos Bureau check will throw that up and it
Communities and forums spring up came unstuck because of their poor of what they are doing,” he said.
where people start to swap malicious could prevent access to jobs.”
technical skills. Many post videos of what they have done Anyone arrested and charged for the
programs, knowledge and sometimes
stolen data. “They do not even know enough to get a to sites such as YouTube and sign on with most serious crimes would carry their
simple phishing or attack tool right,” said the same alias used to hack a site, run a criminal record with them throughout
Some also look for exploits and virus Kevin Hogan, a senior manager Symantec phishing attack or write a web exploit.
code that can be run against the social their life.
Security Response. Many share photos or other details of Also, he added, young people needed to
networking sites popular with many
young people. Some then try to peddle “We have seen phishing sites that have their life on other sites making it easy for appreciate the impact of actions carried
or use the details or accounts they net in broken images because the link, rather computer security experts to track them out via the net and a computer.
this way. than reference the original webpage, is down and get them shut down. “Are they going to be able to live with
referencing a file on the C: drive that is Mr Boyd’s action to shut down one the fact that they caused harm to other
Mr Boyd said he spent a lot of time not there,” he said.
tracking down the creators of many of wannabe hacker, using the name people?” he said. “They do not think
the nuisance programs written to exploit Symantec researchers have collected YoGangsta50, was so comprehensive there is someone losing their money or
users of social networking sites and the many examples of teenagers who have that it wrung a pledge from the teenager their savings from what they are doing.
culprit was often a teenager. managed to cripple their own PCs by in question to never to get involved in “For a kid, getting a criminal record is
infecting them with viruses they have petty hi-tech crime again. the worst possible move.”
From such virus and nuisance programs, written. Mathew Bevan, a reformed hacker who

Вам также может понравиться