SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING
Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among...
Ausführliche Beschreibung
Autor*in: |
Hairulliza Mohamad Judi [verfasserIn] Syahanim Mohd Salleh [verfasserIn] Sufian Idris [verfasserIn] Norijah Hussin [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch ; Malaysisch |
Erschienen: |
2012 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Asia-Pacific Journal of Information Technology and Multimedia - UKM Press, 2021, 1(2012), (1), Seite 48-57 |
---|---|
Übergeordnetes Werk: |
volume:1 ; year:2012 ; number:(1) ; pages:48-57 |
Links: |
---|
Katalog-ID: |
DOAJ064662411 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ064662411 | ||
003 | DE-627 | ||
005 | 20230309041418.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2012 xx |||||o 00| ||eng c | ||
035 | |a (DE-627)DOAJ064662411 | ||
035 | |a (DE-599)DOAJd058381e7072474c91e4f31efa039e38 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng |a may | ||
050 | 0 | |a T58.5-58.64 | |
100 | 0 | |a Hairulliza Mohamad Judi |e verfasserin |4 aut | |
245 | 1 | 0 | |a SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
264 | 1 | |c 2012 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. | ||
650 | 4 | |a programming activity profile | |
650 | 4 | |a behavior monitoring | |
650 | 4 | |a plagiarism prevention. | |
653 | 0 | |a Information technology | |
700 | 0 | |a Syahanim Mohd Salleh |e verfasserin |4 aut | |
700 | 0 | |a Sufian Idris |e verfasserin |4 aut | |
700 | 0 | |a Norijah Hussin |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Asia-Pacific Journal of Information Technology and Multimedia |d UKM Press, 2021 |g 1(2012), (1), Seite 48-57 |w (DE-627)1692875396 |x 22892192 |7 nnns |
773 | 1 | 8 | |g volume:1 |g year:2012 |g number:(1) |g pages:48-57 |
856 | 4 | 0 | |u https://doi.org/10.17576/apjitm-2012-0101-04 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/d058381e7072474c91e4f31efa039e38 |z kostenfrei |
856 | 4 | 0 | |u https://www.ukm.my/apjitm/view.php?id=124 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2289-2192 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 1 |j 2012 |e (1) |h 48-57 |
author_variant |
h m j hmj s m s sms s i si n h nh |
---|---|
matchkey_str |
article:22892192:2012----::uvilneciiyopeetnpairs |
hierarchy_sort_str |
2012 |
callnumber-subject-code |
T |
publishDate |
2012 |
allfields |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 DE-627 ger DE-627 rakwb eng may T58.5-58.64 Hairulliza Mohamad Judi verfasserin aut SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING 2012 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. programming activity profile behavior monitoring plagiarism prevention. Information technology Syahanim Mohd Salleh verfasserin aut Sufian Idris verfasserin aut Norijah Hussin verfasserin aut In Asia-Pacific Journal of Information Technology and Multimedia UKM Press, 2021 1(2012), (1), Seite 48-57 (DE-627)1692875396 22892192 nnns volume:1 year:2012 number:(1) pages:48-57 https://doi.org/10.17576/apjitm-2012-0101-04 kostenfrei https://doaj.org/article/d058381e7072474c91e4f31efa039e38 kostenfrei https://www.ukm.my/apjitm/view.php?id=124 kostenfrei https://doaj.org/toc/2289-2192 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 1 2012 (1) 48-57 |
spelling |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 DE-627 ger DE-627 rakwb eng may T58.5-58.64 Hairulliza Mohamad Judi verfasserin aut SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING 2012 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. programming activity profile behavior monitoring plagiarism prevention. Information technology Syahanim Mohd Salleh verfasserin aut Sufian Idris verfasserin aut Norijah Hussin verfasserin aut In Asia-Pacific Journal of Information Technology and Multimedia UKM Press, 2021 1(2012), (1), Seite 48-57 (DE-627)1692875396 22892192 nnns volume:1 year:2012 number:(1) pages:48-57 https://doi.org/10.17576/apjitm-2012-0101-04 kostenfrei https://doaj.org/article/d058381e7072474c91e4f31efa039e38 kostenfrei https://www.ukm.my/apjitm/view.php?id=124 kostenfrei https://doaj.org/toc/2289-2192 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 1 2012 (1) 48-57 |
allfields_unstemmed |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 DE-627 ger DE-627 rakwb eng may T58.5-58.64 Hairulliza Mohamad Judi verfasserin aut SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING 2012 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. programming activity profile behavior monitoring plagiarism prevention. Information technology Syahanim Mohd Salleh verfasserin aut Sufian Idris verfasserin aut Norijah Hussin verfasserin aut In Asia-Pacific Journal of Information Technology and Multimedia UKM Press, 2021 1(2012), (1), Seite 48-57 (DE-627)1692875396 22892192 nnns volume:1 year:2012 number:(1) pages:48-57 https://doi.org/10.17576/apjitm-2012-0101-04 kostenfrei https://doaj.org/article/d058381e7072474c91e4f31efa039e38 kostenfrei https://www.ukm.my/apjitm/view.php?id=124 kostenfrei https://doaj.org/toc/2289-2192 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 1 2012 (1) 48-57 |
allfieldsGer |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 DE-627 ger DE-627 rakwb eng may T58.5-58.64 Hairulliza Mohamad Judi verfasserin aut SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING 2012 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. programming activity profile behavior monitoring plagiarism prevention. Information technology Syahanim Mohd Salleh verfasserin aut Sufian Idris verfasserin aut Norijah Hussin verfasserin aut In Asia-Pacific Journal of Information Technology and Multimedia UKM Press, 2021 1(2012), (1), Seite 48-57 (DE-627)1692875396 22892192 nnns volume:1 year:2012 number:(1) pages:48-57 https://doi.org/10.17576/apjitm-2012-0101-04 kostenfrei https://doaj.org/article/d058381e7072474c91e4f31efa039e38 kostenfrei https://www.ukm.my/apjitm/view.php?id=124 kostenfrei https://doaj.org/toc/2289-2192 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 1 2012 (1) 48-57 |
allfieldsSound |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 DE-627 ger DE-627 rakwb eng may T58.5-58.64 Hairulliza Mohamad Judi verfasserin aut SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING 2012 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. programming activity profile behavior monitoring plagiarism prevention. Information technology Syahanim Mohd Salleh verfasserin aut Sufian Idris verfasserin aut Norijah Hussin verfasserin aut In Asia-Pacific Journal of Information Technology and Multimedia UKM Press, 2021 1(2012), (1), Seite 48-57 (DE-627)1692875396 22892192 nnns volume:1 year:2012 number:(1) pages:48-57 https://doi.org/10.17576/apjitm-2012-0101-04 kostenfrei https://doaj.org/article/d058381e7072474c91e4f31efa039e38 kostenfrei https://www.ukm.my/apjitm/view.php?id=124 kostenfrei https://doaj.org/toc/2289-2192 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 1 2012 (1) 48-57 |
language |
English Malay |
source |
In Asia-Pacific Journal of Information Technology and Multimedia 1(2012), (1), Seite 48-57 volume:1 year:2012 number:(1) pages:48-57 |
sourceStr |
In Asia-Pacific Journal of Information Technology and Multimedia 1(2012), (1), Seite 48-57 volume:1 year:2012 number:(1) pages:48-57 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
programming activity profile behavior monitoring plagiarism prevention. Information technology |
isfreeaccess_bool |
true |
container_title |
Asia-Pacific Journal of Information Technology and Multimedia |
authorswithroles_txt_mv |
Hairulliza Mohamad Judi @@aut@@ Syahanim Mohd Salleh @@aut@@ Sufian Idris @@aut@@ Norijah Hussin @@aut@@ |
publishDateDaySort_date |
2012-01-01T00:00:00Z |
hierarchy_top_id |
1692875396 |
id |
DOAJ064662411 |
language_de |
englisch malaiisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ064662411</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309041418.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ064662411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJd058381e7072474c91e4f31efa039e38</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">may</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5-58.64</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Hairulliza Mohamad Judi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2012</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">programming activity profile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">behavior monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">plagiarism prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Syahanim Mohd Salleh</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Sufian Idris</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Norijah Hussin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Asia-Pacific Journal of Information Technology and Multimedia</subfield><subfield code="d">UKM Press, 2021</subfield><subfield code="g">1(2012), (1), Seite 48-57</subfield><subfield code="w">(DE-627)1692875396</subfield><subfield code="x">22892192</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:1</subfield><subfield code="g">year:2012</subfield><subfield code="g">number:(1)</subfield><subfield code="g">pages:48-57</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.17576/apjitm-2012-0101-04</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/d058381e7072474c91e4f31efa039e38</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.ukm.my/apjitm/view.php?id=124</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2289-2192</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">1</subfield><subfield code="j">2012</subfield><subfield code="e">(1)</subfield><subfield code="h">48-57</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Hairulliza Mohamad Judi |
spellingShingle |
Hairulliza Mohamad Judi misc T58.5-58.64 misc programming activity profile misc behavior monitoring misc plagiarism prevention. misc Information technology SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
authorStr |
Hairulliza Mohamad Judi |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)1692875396 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
T58 |
illustrated |
Not Illustrated |
issn |
22892192 |
topic_title |
T58.5-58.64 SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING programming activity profile behavior monitoring plagiarism prevention |
topic |
misc T58.5-58.64 misc programming activity profile misc behavior monitoring misc plagiarism prevention. misc Information technology |
topic_unstemmed |
misc T58.5-58.64 misc programming activity profile misc behavior monitoring misc plagiarism prevention. misc Information technology |
topic_browse |
misc T58.5-58.64 misc programming activity profile misc behavior monitoring misc plagiarism prevention. misc Information technology |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Asia-Pacific Journal of Information Technology and Multimedia |
hierarchy_parent_id |
1692875396 |
hierarchy_top_title |
Asia-Pacific Journal of Information Technology and Multimedia |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)1692875396 |
title |
SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
ctrlnum |
(DE-627)DOAJ064662411 (DE-599)DOAJd058381e7072474c91e4f31efa039e38 |
title_full |
SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
author_sort |
Hairulliza Mohamad Judi |
journal |
Asia-Pacific Journal of Information Technology and Multimedia |
journalStr |
Asia-Pacific Journal of Information Technology and Multimedia |
callnumber-first-code |
T |
lang_code |
eng may |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2012 |
contenttype_str_mv |
txt |
container_start_page |
48 |
author_browse |
Hairulliza Mohamad Judi Syahanim Mohd Salleh Sufian Idris Norijah Hussin |
container_volume |
1 |
class |
T58.5-58.64 |
format_se |
Elektronische Aufsätze |
author-letter |
Hairulliza Mohamad Judi |
author2-role |
verfasserin |
title_sort |
surveillance activity for preventing plagiarism in programming |
callnumber |
T58.5-58.64 |
title_auth |
SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
abstract |
Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. |
abstractGer |
Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. |
abstract_unstemmed |
Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
(1) |
title_short |
SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING |
url |
https://doi.org/10.17576/apjitm-2012-0101-04 https://doaj.org/article/d058381e7072474c91e4f31efa039e38 https://www.ukm.my/apjitm/view.php?id=124 https://doaj.org/toc/2289-2192 |
remote_bool |
true |
author2 |
Syahanim Mohd Salleh Sufian Idris Norijah Hussin |
author2Str |
Syahanim Mohd Salleh Sufian Idris Norijah Hussin |
ppnlink |
1692875396 |
callnumber-subject |
T - General Technology |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
callnumber-a |
T58.5-58.64 |
up_date |
2024-07-03T23:52:23.971Z |
_version_ |
1803603928913281024 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ064662411</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309041418.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ064662411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJd058381e7072474c91e4f31efa039e38</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">may</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T58.5-58.64</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Hairulliza Mohamad Judi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SURVEILLANCE ACTIVITY FOR PREVENTING PLAGIARISM IN PROGRAMMING</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2012</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Plagiarism is a convenient way for students to accomplish assignments and projects since it is easy to copy and edit computer programs. Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Prevention approach is conducted through monitoring of student programming activities. To address this problem, a surveillance system is proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach is applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e. Hawthorne effect and effect of expectation on subject behavior is exploited as prevention of plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and backup file to save the program writing record. The proposed programming activity surveillance system, DwiCoder presents a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: compilation, execution, and modification. The report is presented in a simple and meaningful way to encourage student spend their own time in programming activity. By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">programming activity profile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">behavior monitoring</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">plagiarism prevention.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Syahanim Mohd Salleh</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Sufian Idris</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Norijah Hussin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Asia-Pacific Journal of Information Technology and Multimedia</subfield><subfield code="d">UKM Press, 2021</subfield><subfield code="g">1(2012), (1), Seite 48-57</subfield><subfield code="w">(DE-627)1692875396</subfield><subfield code="x">22892192</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:1</subfield><subfield code="g">year:2012</subfield><subfield code="g">number:(1)</subfield><subfield code="g">pages:48-57</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.17576/apjitm-2012-0101-04</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/d058381e7072474c91e4f31efa039e38</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.ukm.my/apjitm/view.php?id=124</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2289-2192</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">1</subfield><subfield code="j">2012</subfield><subfield code="e">(1)</subfield><subfield code="h">48-57</subfield></datafield></record></collection>
|
score |
7.4018154 |