· web viewwilmington university is very specific about the categories that violate their...

46
The Assault on Academic Integrity 1 Through the Internet and Social Media The Assault on Academic Integrity Through the Internet and Social Media Michael DiDiego Draft Personal Research Opinion Paper Wilmington University May 18, 2017

Upload: others

Post on 01-Jan-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 1 Through the Internet and Social Media

The Assault on Academic Integrity

Through the Internet and Social Media

Michael DiDiego

Draft Personal Research Opinion Paper

Wilmington University

May 18, 2017

Page 2:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 2 Through the Internet and Social Media

Table of Contents

List of Tables……………………………………………………………………………………...3

List of Figures……………………………………………………………………………………..4

Prelude…………………………………………………………………………………………….5

Integrity Perspective Basics……………………………………………………………………….6

Vision of Integrity…………………………………………………………………………………8

Academic Integrity Site……………………………………………….........................................10

Integrity Displaced……………………………………………………………………………….11

Ethical Leadership through Cybersecurity……………………………………………………….12

Engagement………………………………………………………………………………………14

Convergence and Strategic Leadership Collaboration…………………………………………...14

Objectives Displaced…………………………………………………………………………….15

Cheat Sites and Social Media……………………………………………………………………15

Student’s Testimonials – Approach on Integrity………………………………………………...18

Easy A’s for a Price……………………………………………………………………………...19

Degree Value → Diminished through Credibility Issue………………………………………...19

Ensuring Institutional Reputation………………………………………………………………..20

Know Academic Strategies………………………………………………………………………21

COBIT……………………………………………………………………………………………22

Social Dissolution………………………………………………………………………………..24

References………………………………………………………………………………………..28

Appendix A: Academic Integrity Policy………………………………………………………30

Page 3:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 3 Through the Internet and Social Media

List of Tables

Table 1: Percentage of Cheating Students………………………………………………………10

Page 4:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 4 Through the Internet and Social Media

List of Figures

Figure 1 The Dewitt-Clinton, One of the Earliest Railroad Carriages……………………………5

Figure 2: Avoid Plagiarism Pitfalls with These Quick Tips……………………………………... 9

Figure 3: Propensity to Cheat……………………………………………………………………12

Figure 4: Individual Deploring Accounting Cheats……………………………………………..17

Figure 5: Enabling A Holistic Approach ……………………………………………………….22

Figure 6 Summary of COBIT 5 Process Capability Modell……………………………………..24

Figure 7: Fixed Data Center Controls …………………………………………………………..26

Figure 8: 2017 Volt, an Access Point…………………………………………………………...27

Page 5:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 5 Through the Internet and Social Media

Prelude

The train has left the station. Do you have your ticket? Are you on board? Do you still

have to buy a ticket and wait for the next train?

Figure 1 The Dewitt-Clinton, One of the Earliest Railroad Carriages (The Dewitt Clinton, 2017)

The computer with the information age has arrived in the station. Whether we like it or

not we may be going down the tracks with it even though our destination may be still unknown.

We are all in the mist of the information age.

Data is traveling fast. Specifically, it can travel at data transfer rates of 1 to 10 gigabytes

per second (gbps). Just think how quickly we can browse the internet to find a question’s

answer. Do you know when such a search by a student is cheating?

Page 6:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 6 Through the Internet and Social Media

Accordingly, this will be a high level presentation examining the use of the Internet and

Social Media that impacts academic integrity. Using four presentation modules (Integrity

Perspective, Ethical Dilemma, The Sites, and Solutions), this discussion highlights the basics

with examples and introduces the threats to institutional integrity. Each presentation segment

contrasts shifting values between the students and academia. In conclusion, solutions will be

proposed to help ensure the institution's reputation.

This paper is a fundamental search for coming to grasps with the modern paradigm of our

connectivity through the internet. The question becomes what are our standards for the modern

connected big data internet? Consequently, this is not a mere matter of cracking down on online

cheating but rather facilitating our accepted standards for learning. Our objectives are:

A. To recognize and be aware of threats to academics from the internet and social media

(collusion),

B. To recognize and be aware of opportunities to help protect academic integrity through

countering the identified threats.

Integrity Perspective Basics

At the most fundamental level an instructor’s grading assessments consist of checking the

information (data) presented by their students. It is their data that is being evaluated. So, this

verification is dependent on the data’s veracity at a basic level.

Whether you are an educator or system professional, you both share a concern for the

integrity of data. An organization endeavoring to help answer data integrity issues is the

Information System and Control Association (ISACA). So, it may be appropriate to look at their

viewpoint regarding data integrity. Let’s consider what one of their authors has to say about the

governance of data to strength its integrity. We can share the author’s and organization’s insight.

Page 7:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 7 Through the Internet and Social Media

Gelbstein (201l) explains a security officer’s perspective in one of ISACA’s journals:

WHAT IS MEANT BY “INEGRITY”

The importance of data integrity can be illustrated simply: A person needs

hospital treatment that includes taking a daily medication dosage of 10

milligrams (mg). By accidental or deliberate intervention, the electronic

record of the treatment is changed to a dosage of 100 mg—with fatal

consequences. In another example what if, as in work of fiction that predates

the Stuxnet attack of 2010, the control system of a nuclear power station are

interfered with to show normal conditions while, in fact, a chain reaction has

been triggered? Are professionals aware of the many definitions of “data

integrity”? According to:

A security officer – “Data integrity” may mean that data cannot be modified

undetectably. From the perspective of data and network security, data

integrity is the assurance that information can be accessed or modified only

by those authorized to do so. An examination of this concept could show that

“integrity” also includes personal integrity (i.e., trust, trustworthiness,

reliability) in addition to system integrity (i.e. antivirus protection, structured

system development life cycles [SDLCs] peer review of source code, extensive

testing). (p. 1-2)

In the mist of this quote, lie the basics of integrity which includes personal integrity:

trust, trustworthiness, and reliability. Accordingly, from an academic perspective alignment is

needed by educators to recognize the trustworthiness of any student assessment. Can we rely on

such assessment that it is a product of their work especially in an online environment? It is one

Page 8:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 8 Through the Internet and Social Media

problem to have the data contaminated by a computer virus and it is another problem to have the

data contaminated by direct student’s indiscretion. However, the result of both incidences is the

same. The educator is confronted with falsely accepting a student’s work as the student’s very

own and perpetuating the incident by approving the results for the prosperity of the student’s

official academic record.

As the educators records the results of the test (assessment), metadata is being recorded.

Metadata is data about data often just providing a marker to more data. So, the grade becomes in

effect metadata. This grade should be in compliance with your expert knowledge of your subject

area. Thus, you are gauging the student’s results with your intended criteria.

Furthermore, Gelbstein uses an online dictionary to make the reader aware of the many

definitions of “data integrity.”

Data integrity is the : Quality of correctness, completeness, wholeness,

soundness and compliance with the intention of the creators of the data. It is

achieved by preventing accidental or deliberate, but unauthorized, insertion,

modification or destruction of data in a database. Data integrity is one of the

six fundamental components of information security. (p2)

If the intention of the creator, the student, is to get an A at any price, then acceptance of such

work without measures restricting cheating may constitute at least a misrepresentation.

Vision of Integrity

Wilmington University has an academic integrity policy intendent to guard against

misrepresentations. “Students of Wilmington University are expected to be honest and

forthright in their academic pursuits. When a student places his or her name on submitted work,

Page 9:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 9 Through the Internet and Social Media

the student certifies the originality of all work not otherwise identified by appropriate

acknowledgement” (Appendix A).

Wilmington University is very specific about the categories that violate their integrity

policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

Documents. The policy explains the meaning of each of these offenses. The policy specifies

violations with two tiers of actions. Ultimately, for continuous infractions of the code the

student may be suspended. (Wilmington University Academic Integrity, 2017)

Figure 2: Avoid Plagiarism Pitfalls with These Quick Tips (Wilmington University Academic Integrity, 2017):

Furthermore, Wilmington University has expressly stated its commitment to integrity in

its vision statement “We are committed to being a university where respect for each other is

paramount, integrity guides all our choices, providing educational opportunity is our primary

purpose, and responsiveness to community needs is key” (Wilmington University Mission,

Vision, & Values, 2017). The university serves the community by adopting practices to maintain

the integrity of test results. Such practices should be designed to prevent and detect actions that

are contrary to the principles of academic integrity

Page 10:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 10 Through the Internet and Social Media

Academic Integrity Site

Also, in pursuit of academic integrity is The International Center for Academic Integrity

(ICAI).

The International Center for Academic Integrity (ICAI) was founded to

combat cheating, plagiarism, and academic dishonesty in higher education.

Its mission has since expanded to include the cultivation of cultures of

integrity in academic communities throughout the world. ICAI offers

assessment services, resources, and consultations to its member institutions,

and facilitates conversations on academic integrity topics each year at its

annual conference. (ICAI, 2016a)

ICAI has conducted extensive research to help combat violations of academic

integrity.

According to research and surveys conducted by Dr. Donald McCabe and the

International Center for Academic Integrity, the number of university

students who admit to cheating in some form is truly eye-opening. The

statistics below are just a snapshot of overall trends uncovered over the past

12 years.

Table 1: Percentage of Cheating Students Graduate Students Undergraduates* Number responding: ~17,000 ~71,300 % who admit cheating on tests: 17% 39% % who admit cheating on written assignments: 40% 62%% total who admit written or test cheating: 43% 68% *Excluding first year students, code schools, and two year schools

Page 11:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 11 Through the Internet and Social Media

This basic dataset was compiled based upon surveys that were conducted

between Fall 2002 and Spring 2015, by Dr. Donald McCabe and the

International Center for Academic Integrity.

Furthermore, McCabe's surveys of over 70,000 high school students at over

24 high schools in the United States demonstrated that 64 percent of students

admitted to cheating on a test, 58 percent admitted to plagiarism and 95

percent said they participated in some form of cheating, whether it was on a

test, plagiarism or copying homework. (ICAI, 2016b)

Integrity Displaced

What rational can contribute to such a degree of cheating including the fact that

they will admit it? Today’s generation is more open as evidenced by the cultural

phenomenon of social media. The culture of such media is open to frankness. Of course,

there are other motivations to cheat as engendered by our modern society.

These other motivations which impinge on integrity include today’s social

pressure to do everything: raise a family, have a good job, obtain a college degree to get

a better job etc. This is often an overwhelming series of events that leave little time to

study. This is especially true of the adult learner who is raising a family. (I know that I

have been told by several of my students that I really don’t have time for this).

So, with time constraints aided by social pressures the tendency to cheat is there.

This includes taking shortcuts in homework assignments and outright cheating on exams.

If the test and homework assignments are online, the students can proliferate cheating by

not being monitored. Unfortunately, the student feels due to time constraints he just has

Page 12:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 12 Through the Internet and Social Media

to get his academic work done despite the consequences. Instant access with availability

is replacing integrity.

Figure 3: Propensity to Cheat

Ethical Leadership through Cybersecurity

How do we deal with the dilemma of compressed time and increasing workloads?

Well, for some students they have found the solution. They just maximize the use of their

internet (cyber) resources. They google the answer and paste the results. No need then to buy or

read the book. This is their shortcut. Not only do they save time but they can get a good grade

too.

Consequently, as educators we must recognize how our students are using their

interconnected world. How, do we know we are getting authentic results and our traditional

assessments actually measure their learning? This would require cybersecurity leadership on the

part of the institution and corresponding implementation by its educators.

Page 13:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 13 Through the Internet and Social Media

We should recognize that cybersecurity is our job as well as information technology

(Hasib, 2015). We should avoid thinking that we can avoid using technological approaches and

tools because the traditional methods are enough. We need to recognize that electronic devices

in our modern classrooms can negate the effectiveness of even traditional proctoring. A

humorous example of electronic cheating in the classroom can be seen on YouTube (Japan Exam

Cheating Technology, 2016).

Whoever said cheaters never prosper forgot to text the message to the current

generation of students. According to a 2010 study conducted by Rutgers

University, 64% of college students have cheated on tests. In 2009, global

research firm, the Benenson Strategy Group, conducted a poll which found

almost one-in-three middle school and high school students have cheated on a

test using their mobile phone; over half said they’ve used the Internet to cheat

in some capacity. What’s more, one-in-four students said they didn’t see

anything wrong with using technology to cheat. Seems times have changed.

This is new version [of] japan [Japanese] cheating technology and video on

how to cheat in 2016 in any exam without getting caught.

While cheat sheets written on sheathes of dead bark are still used to help

students get an upper hand on exams, kids are increasingly turning to more

technological means to get over on their teachers. Recently, schools have

been catching up, getting hip to the many ways students can use their gadgets

to cheat. Is cheating right? No, not really. Is it risky? Yes, very. If you get

caught cheating the consequences are now very severe. Is that going to stop

us from exploring the multitude of high and low-tech ways you can trick your

Page 14:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 14 Through the Internet and Social Media

way to an A? Nope, not in the least. (Japan Exam Cheating Technology,

2016)

Engagement

To control the student’s usage and promote the faculty development, information

technology (IT), needs to be aligned with the goals, objectives and the policy of the institution.

This was accomplished at Indiana University (IU) where a former Chief Information Officer

(CIO) was elevated to President of the University. IU serves about 100,000 students on eight

campuses. “What has followed is an example of how a president, a CIO, and others enterprise

leaders can engage their community and propel it forward through technology powered strategic

collaboration” (Hasib, 2015, p.126).

Convergence and Strategic Leadership Collaboration

Instead of trying to lead in all areas of IT, IU aligned its strategic plan with

the universities priorities and focused on a few key areas where it can excel

and achieve distinction. The strategic plan has four key elements: Faculty

and Scholarship Excellence, Student Success (which focusses on education

and student living), Effective Community (which focuses on communication

and collaboration within IU), and Engagement Beyond (which focuses on

IU’s mission in the state of Indiana and its standing and impact as an

international university). (Hasib, 2015, p.126).

Page 15:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 15 Through the Internet and Social Media

Objectives Displaced

A university’s degree confers on the graduate recognition of their achievement. The

achievement is the body of knowledge that the graduate has demonstrated. So, this degree

represents their obtained knowledge, not merely what they can copy from the internet. The

reputation of the institution is on the line if employers begin to question this “obtained

knowledge.” Unfortunately, some students will beg, steal, and borrow for this degree. Finding

the answer key on the internet is their goal to obtain the degree.

Cheat Sites and Social Media

8 Top Websites that Students Use to Cheat

What websites do students like to use when they want to cheat on writing

assignments?

In an attempt to answer that question, Turnitin, a company dedicated to

uncovering plagiarism, looked at more than 40 million student papers. The

firm concluded that the most popular website for plagiarism is the trusted

source that millions of us Americans turn to learn stuff: Wikipedia.

Interestingly enough, Turnitin said that the websites that are designed to

assist cheaters by, for instance, selling papers represent only 15% of the

potentially plagiarized content that the company detected.

In contrast, one third of the suspicious content that Turnitin uncovered was

traced to social networks such as Facebook and question-and-answer sites

where users contribute and share content.

Page 16:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 16 Through the Internet and Social Media

Do Students Know They Are Cheating?

There remains some question about whether cheaters actually know they are

being dishonest. Students, who have grown up with the Internet and social

media, are so used to sharing what they find on the Web that many won't

necessarily understand that term papers and other writing assignments are

supposed to be original work.

8 Top Sites for Plagiarism

Here are the most popular websites for would-be cheaters:

1. Wikipedia Encylopedia

2. Yahoo! Answers Social & content sharing site

3. Answers.com Social & content sharing site

4. Slideshare Social and content sharing site

5. OPPapers.com Cheat site & paper mill

6. Scribd Social & content sharing site

7. Course Hero Homework & academic site

8. MedLibrary.org Homework & academic site (O”Shaughnessy, 2011)

In addition to these sites there are many Web 2.0 forums that provide the answers. Often

these forums are in specific subject area such as accounting. For example, tutoring with the

answers provided can be found at http://www.asaptutor.com/payment.html . These online forums

and sites give the students a means to cheat.

One individual who was feed-up with such sites protested as follows:

Page 17:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 17 Through the Internet and Social Media

Figure 4: Individual deploring Accounting Cheats (Intuit Inc/Accountants Community, 2017)

Page 18:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 18 Through the Internet and Social Media

Student’s Testimonials – Approach on Integrity

Now just what do some students think of these cheat sites. According to Newton (2015);

When I was in high school, I cheated pretty regularly. And I mean all the

time. I remember writing chemistry formulas on small bits of paper that I

then sealed to the bottom of my dress shoes with transparent tape. When I

crossed my legs, the information I needed was literally in my lap.

That was before education went online. Cheating, it seems, has gone with it.

Today, entrepreneurs and freelancers openly advertise services designed to

help students cheat their online educations. These digital cheaters for hire

will even assume students’ identities and take entire online classes in their

place. (p.1)

One site, “No Need to Study,” boast that they have a pool of experienced academic tutors

to take classes and complete course work for any student. They even have handy video

references that show satisfied clients plugging the cheat sites results. These clients, students,

brag how easy it was to pay someone else to take their online classes. One student who

previously failed a course stated: but “the quizzes were just way too difficult” so he searched for

a solution. “They got it done, and they did really, really well,” he continues. “They absolutely

killed my final math and app classes with a 90 percent, and I can definitely tell you I never got a

90 percent before on anything” (Newton, 2015, p2).

Page 19:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 19 Through the Internet and Social Media

Easy A’s for a Price

As the proliferation of mobile electronic devices increase, so does the propensity to use a

cheat site. It is big business. If online degrees earn more clout, then the industry would be

poised to increase their revenue.

Online education is already poised to be a $100 billion global industry. But it

could be even bigger if online degrees earn more clout, especially with

employers. If online degrees and certifications achieve the same stature as

traditional, on-campus ones, an online education marketplace could transform

higher education and change the very meaning of going to college. (Newton,

2015, p2)

For some students who are already busy working and raising a family paying a cheat site

to save them time is a deal. The employees of the site, “No Need to Study,” offered to take an

online English Literature class at Columbia University for $1,225.15. For this price not only

could the company get a ringer to take the online class, but also they guarantee a B or better

(Newton, 2015).

Degree Value → Diminished through Credibility Issue

But what is the price to the institution for not inhibiting such identity imposters?

If a goal of online education proponents is to convince the public and

employers that an online education is as official and prestigious as a

traditional one earned in brick-and-mortar and Ivy classrooms, it’s hard to

imagine anything more damaging than identity-fraud schemes in which

students literally pay for grades but do no work whatsoever. At least with a

Page 20:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 20 Through the Internet and Social Media

traditional degree, the assumption is the recipient actually went to class

personally. (Newton, 2015, p2)

Ensuring Institutional Reputation

Just as important as the institution’s reputation is their students’ reputation. Without

measures to recognize the honest student from the dishonest student, all students’ reputations are

tarnished. Thus, the university has a burden to protect itself by protecting its students.

The university and its student body should collaborate through such means as

announcements, training, meetings and prerequisite requirements to implement the goals of the

academic integrity policy. The standards of the university should be made clear and it should be

acknowledge by the students. The university’s mechanism of enforcing this policy should be

explained and clarified through their questioning. In particular Wilmington University expects

the faculty to:

Utilized Safe Assign

Stress the importance of this policy (Academic Integrity Policy) throughout the course

Contact your Program Chair with questions or concerns

Submit any Academic Integrity Policy Violations to your Chair, who will then send it to

the Office of Academic Affairs to be properly processed.

(Wilmington University Academic Integrity, 2017)

Although there is no silver bullet, institution can take other steps to enhance their

institutional reputation for academic integrity. This can be accomplished by: (1) employing

known academic strategies, (2) utilizing the Control Objectives and Related Technologies

(COBIT) quality assurance measures, and (3) preserving institutional integrity through the

curtailment of social media dissolution. Such steps necessitate the alignment through proper

Page 21:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 21 Through the Internet and Social Media

integration of policy with technology by knowledgeable organizational personnel: IT personnel,

high level administrative officials, faculty and students.

For example, a policy can be adopted by the highest levels of the university to help

secure the online testing environment. The policy can encourage the faculty to initiate a special

online tool for summative assessments. A tool exist that can both lock-down the browser and

monitor the student through their webcam. Promoting the use of the tool through promulgated

policy would be a step that demonstrates the university’s commitment to academic integrity.

Know Academic Strategies

Institutions have to be on the guard to what other are saying over social media. A

disgruntled student could initiate a smear campaign to tarnish the institution reputation. Also,

social media could help proliferate academic cheating by providing cheat sites and exploiting

known weakly controlled courses. A risk assessment and a project plan should be developed to

address such issues.

Since enterprise use of social media tools usually requires no additional

technology to implement, an enterprise social media presence does not

always begin with a project plan and risk assessment. To effectively control

social media usage by both the enterprise and employees, a documented

strategy (and associated policies and procedures) should be developed with

the involvement of all relevant stake holders, including business leadership,

risk management professionals , and human resource and legal

representation. This holistic approach to integrating emerging technologies

into the enterprise helps to ensure that risks are being considered in the

context of broader business goals and objectives. (ISACA, 2010)

Page 22:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 22 Through the Internet and Social Media

COBIT

Adopting policy and employing the strategies to control the online activities including the

use of social media, requires a holistic approach. COBIT employs a holistic approach. It is

generic and useful not-for-profit institutions such as a university. It provides a comprehensive

framework and set of enablers that guide organizations in reaching their goals. The guidance

presents activities in a manageable and logical structure (IT Governance Institute, 2012).

Figure 5: Enabling a Holistic Approach, Slide 24 (IT Governance Institute, 2012)

For a multi-cultural institution the ethics and behavior of diverse culture are considered.

These considerations are important for testing purposes and the usage of social media. The goals

for the culture ethics and behavior enabler relate to:

Organizational ethics, determined by the values by which the enterprise

wants to live

Page 23:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 23 Through the Internet and Social Media

Individual ethics, determined by the personal values of each individual in

the enterprise and depending to an important extent on external factors

such as religion, ethnicity, socioeconomic background, geography and

personal experiences

Individual behaviors, which collectively determine the culture of an

enterprise. Many factors, such as the external mentioned above, but also

interpersonal relationships in enterprises, personal objectives and

ambitions, drive behaviors. Some types of behaviors that can be relevant

in this context include:

Behavior towards taking risk – How much risk does the enterprise feel it

can absorb and which risk is it willing to take?

Behavior towards following policy – To what extent will people embrace

and/or comply with policy?

Behavior towards negative outcomes – How does the enterprise deal with

negative outcomes, i.e. loss events or missed opportunities? Will it learn

from them and try to adjust, or will blame be assigned without treating

the root cause? (IT Governance Institute, 2012, p. 79)

How do know if the steps for building and employing strategies to protect integrity in the

interconnected world are effective? The COBIT can also guide you through the measurement

process. In particular, the Capability Maturity Model provides the template for self-grading. “A

maturity model component is used to evaluate an organization’s relative level of achievement of

IT governance” (Bondar & Hopwood, 2013, p. 498). A process model is illustrated as follows:

Page 24:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 24 Through the Internet and Social Media

Figure 6 Summary of COBIT 5 Process Capability Model (IT Governance Institute, 2012 , p.42)

This is an involved process to achieve measurement which requires much iteration, steps, to

reach an optimized solution.

Social Dissolution

In my opinion, the sledge hammers and the crowbars of technical innovations are ripping

us apart. We are all connected but often at the exclusion of traditionally connected values. Our

integrity has gone into the cyberspace- both figuratively and literally. Once we had brick and

mortar to protect our data integrity. That has changed with mobile devices and cloud computing.

Page 25:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 25 Through the Internet and Social Media

The old days gave us a fixed data center with concentric circles of security. This brick

and mortar data center is coming down. We are moving into the outer circles of cloud

computing with their platforms consisting of complete infrastructures. There is more capacity

than ever to support Web apps for any purpose.

Even to Martin (1973) over 4 decades ago, the legal and societal environment is the most

problematic. Accordingly, he wrote and illustrated (see next page):

Page 26:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 26 Through the Internet and Social Media

Figure 7: Fixed Data Center Controls (Martin, 1973, p. 7))

Page 27:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 27 Through the Internet and Social Media

Your new data center can look like this:

Figure 8: 2017 Volt, an Access Point (Chevrolet, 2017)

”Stay seamlessly connected with available built-in 4G LTE Wi-Fi.®† Connect up to seven devices

to easily access apps, stream music or work on the go, on a signal that’s more powerful than your

smartphone” (Chevrolet, 2017). If you choose to connect to a cloud infrastructure platform, you

can have a data center more powerful than what existed in 1973. We are on the move and in

effect our data centers can now move with us. Can you imagine this data center moving next to

your institution receiving information from a pen scanner and then completing the internet search

and sending the answer back to the test taker?

Again, in my opinion we need to restore our foundation with a solid builder. Time is

needed for a new advocate to protect our integrity: The Dean of the Internet and Social Media.

Page 28:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 28 Through the Internet and Social Media

References

Bondar, G. H., & Hopwood, W.S.(2013). Accounting Information Systems. Upper Saddle River,

NJ: Pearson Education.

Chevrolet 2017 Volt: Hybrid Electric Car (2017). Retrieved May 13, 2017 from

http://www.chevrolet.com/volt-electric-car#

Gelbstein, E. (2011, Volume 6). Data Integrity—Information Security’s Poor relation.

Information Systems Control Journal: 1-6.

Hasib, M. (2015). Cybersecurity Leadership. Middletown, DE: Tommorow’s Staegry Today,

LLC.

Information System Audit and Control Association (2011). Social Media: Business Benefits and

Security, Governance and Assurance Perspectives. Rolling Meadows, IL: Author.

International Center for Academic Integrity (2012a). Mission Statement. Clemson, SC: Author.

Retrieved May 7, 2017 from http://www.academicintegrity.org/icai/about-1.php

International Center for Academic Integrity (2012b). Statistics. Clemson, SC: Author.

Retrieved May 7, 2017 from http://www.academicintegrity.org/icai/integrity-3.php

International Center for Academic Integrity (2016). Clemson partners to take actions against

essay-writing services [Press Release]. Retrieved March 1, 2007 from

http://newsstand.clemson.edu/mediarelations/clemson-partners-to-take-action-against-

essay-writing-services/

IT Governance Institute (2012). Control Objectives for Information and related Technology

(COBIT) 5.0. A Business Framework for the Governance and Management of IT Rolling

Meadows, IL: Author.

Page 29:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 29 Through the Internet and Social Media

Intuit Inc./ Accountants Community, To Cheating Accounting Students Everywhere. Retrieved

March 2, 2017 from https://accountants-community.intuit.com/questions/313324-to-

cheating-accounting-students-everywhere

Japan Exam Cheating Technology (2016, May). Retrieved April 30, 2017 from

https://www.youtube.com/watch?v=B6wKKSbgSi8

Martin, M. (1973). Security, Accuracy, and Privacy in Computer Systems. Englewood Cliffs,

NJ. Prentice Hall, Inc.

Newton, D. (2015, November). Cheating in Online Classes Is Now Big Business. The Atlantic

Monthly Group. Retrieved March 2, 2017 from

https://www.theatlantic.com/education/archive/2015/11/cheating-through-online-

courses/413770/

O’Shaughnessy, L. (2011, May). 8 Top Websites that Students Use to Cheat. Moneywatch.

Retrived March 2, 2017 from http://www.cbsnews.com/news/8-top-websites-that-

students-use-to-cheat/

The Dewitt Clinton, one of the Earliest Railroad Carriages [Online Image]. Retrieved May 8,

2017 from http://pchs-fsm.org/westpointfoundry/galleryartifacts/the_dewitt_clinton.html

Wilmington University Academic Integrity [Online Image]. Retrieved May 9, 2017 from

http://www.wilmu.edu/academics/acadintegrity.aspx

Wilmington University Mission, Vision, & Values. Retrieved May 9, 2017 from

http://www.wilmu.edu/about/mission.aspx

Page 30:  · Web viewWilmington University is very specific about the categories that violate their integrity policy: Plagiarism, Fabrication, Cheating, Grade and Test Tampering, and Falsifying

The Assault on Academic Integrity 30 Through the Internet and Social Media

Appendix A