27.06.2013 Views

Volume Two - Academic Conferences

Volume Two - Academic Conferences

Volume Two - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Abel Nyamapfene<br />

Office hours were also set up to allow students to visit the lecturer to discuss difficult concepts they<br />

came across during their research. Students could also get in touch with the lecturer through email<br />

contact. In addition, students could also get in contact with security experts in industry as well as with<br />

security researchers in other academic institutions. Collaborative working between the students was<br />

also encouraged to enable them to learn from each other as well as to support each other during the<br />

assignment. However, each student had to submit an independent individual piece of work, and this<br />

was checked for plagiarism using Turnitin (iParadigms), an academic plagiarism detection software.<br />

Turnitin compares each submission with other pieces of work already stored in its database. This<br />

stored work includes assignments submitted by students at other institutions worldwide, as well as<br />

with content that is already on the Internet. Prior to submission, students experimented with Turnitin<br />

so that they could get a feel of its capabilities. As a consequence of Turnitin, students were forced to<br />

produce original pieces of work, thereby contributing to the wider understanding of computer network<br />

security.<br />

4. Results and discussion<br />

Students generally submitted high quality work for both TMA1 and the project. Of the 21 students<br />

registered on the course, 12 students in TMA1 and 8 students in the project achieved a mark greater<br />

or equal to 70%. An academic colleague who reviewed the marked work was also impressed with the<br />

quality, even going to the extent of suggesting that at least four of the TMA1 assignments were of<br />

journal quality. This is a remarkable achievement, given that none of the students had formal<br />

experience of computer and networking security prior to the course.<br />

4.1 Analysis of plagiarism<br />

With regard to originality, for TMA1 only one student had a similarity index in the red category, with a<br />

value of 81%. The class comprised 5 international students, with the rest being European Union or<br />

home students. In contrast, the highest similarity index for a home or European student was 26%,<br />

which was less than the lowest similarity index for an international student (28%). This assignment<br />

therefore highlighted the problems of plagiarism amongst international students as highlighted by<br />

Bamford and Sergiou (2005). However, similarity indices improved in the project coursework, with the<br />

highest similarity index falling to 52%. In addition, international students no longer had outlier<br />

similarity indices out of proportion with those achieved by home and European Union students. This<br />

therefore suggests that like any assessment tasks, issues to do with plagiarism can be resolved with<br />

sufficient feedback and tuition.<br />

4.2 Analysis of student anonymous course evaluation<br />

Students perception of the coursework were also analysed through the University of Exeter module<br />

and coursework evaluation (MACE) online feedback forms that students fill in anonymously at the end<br />

of each course. The MACE feedback form comprises 12 five-point Likert questionnaire items with a<br />

scale ranging from 1 for the “Strongly disagree” category through to 5 for the “Strongly Agree”<br />

category. In addition there are also separate spaces for students to write positive, negative and any<br />

other comments they may wish to make about the course content, method of delivery and<br />

assessment. Of the 21 students on the course, 8 students completed the MACE feedback form. Such<br />

a low response rate is typical across the university.<br />

The list of Likert questionnaire items used on the MACE evaluation form is as follows:<br />

1. The module was interesting and intellectually stimulating<br />

2. The amount of material was suitable<br />

3. The material was at the right level of difficulty<br />

4. The module was well structured and had clear objectives<br />

5. The staff teaching the module were enthusiastic about the subject<br />

6. The staff teaching the module explained things clearly<br />

7. Good use was made of appropriate media (e.g., boards, handouts, visual aids).<br />

589

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!