TY - GEN
T1 - Software reuse and plagiarism
T2 - 2009 ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE-2009
AU - Gibson, J. Paul
PY - 2009/12/1
Y1 - 2009/12/1
N2 - In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a significant impact on a student's degree result, particularly in courses were there is a significant emphasis on large-scale projects. We argue that a policy for software reuse is the most explicit, and fair, way of overcoming this problem. In our policy, we specify the notion of software to cover all the documents that are generally built during the engineering of a software system - analysis, requirements, validation, design, verification, implementation and tests. Examples are used to show acceptable and unacceptable forms of reuse, mostly at the design, testing and implementation stages. These examples are represented in Java, although they should be easily understood by anyone with software engineering experience. We conclude with a simple code of practice for reuse of software based on a file-level policy, combined with emphasis on re-using only what is rigorously verified.
AB - In general, university guidelines or policies on plagiarism are not sufficiently detailed to cope with the technical complexity of software. Software plagiarism can have a significant impact on a student's degree result, particularly in courses were there is a significant emphasis on large-scale projects. We argue that a policy for software reuse is the most explicit, and fair, way of overcoming this problem. In our policy, we specify the notion of software to cover all the documents that are generally built during the engineering of a software system - analysis, requirements, validation, design, verification, implementation and tests. Examples are used to show acceptable and unacceptable forms of reuse, mostly at the design, testing and implementation stages. These examples are represented in Java, although they should be easily understood by anyone with software engineering experience. We conclude with a simple code of practice for reuse of software based on a file-level policy, combined with emphasis on re-using only what is rigorously verified.
KW - Ethics
KW - Plagiarism
KW - Software re-use
KW - Student projects
KW - Testing
UR - https://www.scopus.com/pages/publications/77049117747
U2 - 10.1145/1562877.1562900
DO - 10.1145/1562877.1562900
M3 - Conference contribution
AN - SCOPUS:77049117747
SN - 9781605583815
T3 - Proceedings of the Conference on Integrating Technology into Computer Science Education, ITiCSE
SP - 55
EP - 59
BT - ITiCSE-2009 - Proceedings of the 2009 ACM SIGCSE Annual Conference on Innovation and Technology in Computer Science Education
Y2 - 6 July 2009 through 8 July 2009
ER -