Oscar Karnalim

Oscar Karnalim
Universitas Kristen Maranatha | Maranatha · Faculty of Information Technology

Doctor of Philosophy

About

100
Publications
42,989
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
530
Citations
Citations since 2016
92 Research Items
528 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Introduction
Oscar Karnalim is a Ph.D. candidate in Information Technology at University of Newcastle, Australia. He is also an assistant professor at Maranatha Christian University, Indonesia. His interests are source code plagiarism and collusion in academia, computing education, information retrieval, and software artifacts.
Additional affiliations
August 2016 - December 2016
Telkom University
Position
  • Lecturer
August 2016 - December 2016
Telkom University
Position
  • Lecturer
June 2011 - December 2018
Universitas Kristen Maranatha
Position
  • Lecturer
Education
August 2012 - April 2014
Bandung Institute of Technology
Field of study
  • Informatics
August 2007 - January 2011
Universitas Katolik Parahyangan
Field of study
  • Computer Science

Publications

Publications (100)
Conference Paper
Full-text available
Conventional practices for recording student attendance in a classroom, such as roll-call and sign-in-sheet, are proven to be inefficient in terms of time and staff-workload. In addition, they are also prone to human error and bogus attendance, which introduce inaccuracy in the recorded data. A number of studies have been conducted to improve the w...
Article
Full-text available
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these technique...
Article
Full-text available
When using code similarity detection to uncover code plagiarism and collusion, the marker needs to determine whether any detected similarities might be the result of coincidence. But understanding the similarities can be difficult and might be prone to human error, because few tools facilitate the investigation process, and if they do, the similari...
Article
To help address programming plagiarism and collusion, students should be informed about acceptable practices and about program similarity, both coincidental and non-coincidental. However, current approaches are usually manual, brief, and delivered well before students are in a situation where they might commit academic misconduct. This paper presen...
Article
When weekly programming assessments are used, it is often the case that some of them are either trivial or strongly directed. Common code similarity detectors are not particularly helpful with such assessments: some potential instances of misconduct are not selected for manual investigation as all submissions are expected to be similar and it is no...
Chapter
Full-text available
COVID-19 has disrupted all aspects of human life. To mitigate the impact of Cthe pandemic, several efforts have been taken, including by Indonesian scholars abroad. This book entitled Indonesia Post-Pandemic Recovery Outlook: Social Perspectives explores social issues and topics related to the COVID-19 pandemic and discusses post-pandemic recovery...
Article
Full-text available
Guna menjaga kearifan lokal, masyarakat Indonesia perlu diedukasi terkait hal tersebut sejak dini melalui jalur pendidikan formal yang interaktif. Namun, pandemi Covid-19 mengubah cara pengajaran guru secara substansial dan membuat sebagian dari mereka tidak dapat mengajar dengan interaktif. Materi yang disampaikan bisa jadi tidak terserap dengan b...
Article
Full-text available
The COVID-19 pandemic has pushed early childhood teachers in Indonesia to switch to online learning. This is a challenge to be able to package online learning to keep it interesting, interactive, and fun. This community service activity aims to help early childhood teachers apply Kahoot! and Quizizz in making online-based interactive quiz questions...
Conference Paper
Full-text available
Many strategies have been proposed to mitigate programming plagiarism and collusion. However, the effectiveness can vary across learning environments due to different cultural and/or geographical backgrounds. A few specific studies have been conducted to provide a better picture about the matter in particular countries, but none of them focus on a...
Conference Paper
Full-text available
Due to the pandemic, schools and universities are forced to do teaching activities online. Many studies analyze the impact of such sudden transition and argue that online teaching during the pandemic has some inevitable drawbacks like higher stress level for students. Although the success of teaching activities is often portrayed by student academi...
Conference Paper
Full-text available
Dalam kurikulum pendidikan K-12 Indonesia terbaru (2013), mata pelajaran Informatika tidak lagi menjadi mata pelajaran wajib, melainkan menjadi mata pelajaran pilihan pada peminatan akademik. Padahal di era digital ini, pemahaman dan implementasi praktis dari berpikir komputasi sangat diperlukan. Fakultas Teknologi Informasi Universitas Kristen Mar...
Article
Full-text available
Systematic thinking is a process of thinking that should be introduced from early age. While developing such thinking, students will learn how to solve a task by breaking it down to smaller tasks and complete them one by one. There are many activities that can support such thinking. One of them is to program visually. Visual programming is usually...
Conference Paper
Full-text available
This research-to-practice work-in-progress paper presents an automated feedback tool that can be used in many teaching environments by integrating it with a web-based assessment submission system. Each time a student submits their work, they will automatically get feedback about aspects of the code quality. Automated feedback tools have been develo...
Conference Paper
Full-text available
Covid-19 changes the way of learning in schools. Students study in a virtual meeting instead of a physical classroom. Given that the transition is suddenly applied, students experience some challenges. A few surveys have been performed to highlight this but, none of them are focused on high school students in a country that is severely hit by the p...
Article
Low-level approach is a recent way for source code plagiarism detection. Instead of relying on source code tokens, it relies on low-level structural representation resulted from compiling given source codes. However, to date, existing low-level approaches are unsuitable for handling large-sized source codes; their comparison takes either quadratic...
Conference Paper
Full-text available
Some code similarity detectors are designed to address academic integrity in early programming courses by recognising subtle variations, in the assumption that the code similarity in these courses is typically higher than that in later courses. Although the assumption is often used, it has no empirical evidence, and might be misleading. This study...
Article
Full-text available
A number of studies regarding the correlation between student seating position and their academic performance have been conducted. However, only a few of them focusing on computer science major, which is argued to be unique in terms of teaching style and classroom layout; as the discipline puts more emphasise on hands on activity like programming,...
Article
Full-text available
In engineering education, some assessments require the students to submit program code, and since that code might be a result of plagiarism or collusion, a similarity detection tool is often used to filter excessively similar programs. To improve the scalability of such a tool, it is suggested to initially suspect some programs and only compare tho...
Conference Paper
Full-text available
Covid-19 pandemic greatly affects student daily life. Instead of physically attend classes, they need to meet the lecturer and learn the course material via online meeting platform. The transition somehow introduces some issues like the difficulty of maintaining their focus. This becomes worse for computing students given that the assessments are n...
Conference Paper
Full-text available
When checking student programs for plagiarism and collusion, many similarity detectors aim to capture semantic similarity. However, they are not particularly effective for strongly directed assessments, in which the student programs are expected to be semantically similar. A detector focusing on syntactic similarity might be useful, and this paper...
Conference Paper
Full-text available
When dealing with academic integrity in programming , code similarity detectors are often used to raise suspicion of student programs with undue similarity. However, it appears that only detectors designed for that purpose are discussed in computing education publications, although similarity detectors for other purposes might also be beneficial, b...
Conference Paper
When comparing student programs to check for evidence of plagiarism or collusion, the goal is to identify code segments that are common to two or more programs. Yet some code segments are common for reasons other than plagiarism or collusion, and so should not be considered. A few code similarity detection tools automatically remove very common seg...
Article
Full-text available
A study shows that pair programming can help slow-paced students in completing Introductory Programming assessment. This paper replicates the study on Data Structure course, in which the completion of the assessments does not only rely on logic but also theoretical knowledge. The aim is to check whether pair programming is still helpful on such new...
Conference Paper
Full-text available
To act with academic integrity in programming, students need to understand the concept of code similarity and the aspects that contribute to it, because undue similarity is often used as a first step in detecting plagiarism or collusion. However, if students are told at all about code similarity, it is typically in very general terms, which might n...
Conference Paper
Full-text available
It is well documented that some students either work together on programming assessments when required to work individually (col-lusion) or make unauthorised use of existing code from external sources (plagiarism). One approach used in the detection of these violations of academic integrity is source code similarity detection, the automatic checkin...
Article
Full-text available
Background: In higher education in Indonesia, students are often required to complete a thesis under the supervision of one or more lecturers. Allocating a supervisor is not an easy task as the thesis topic should match a prospective supervisor's field of expertise. Objective: This study aims to develop a thesis supervisor recommender system with r...
Article
Full-text available
Many code similarity detection techniques have been developed to maintain academic integrity in programming. However, most of them assume that the student programs are locally available, and the computation can be run on any computer specification. Further, their comparison in raising suspicion is time-consuming as the student programs are pairwise...
Article
Full-text available
In engineering education, educational technologies and teaching interventions are often used to maintain the student retention high. Most of them are strongly related to either in-class or take-home assessment. This paper compares the impact of both assessments on student performance for one academic semester. The findings are expected to realign t...
Chapter
Teknologi di Indonesia sudah berkembang cukup pesat. Namun, beberapa aspek dapat lebih dipersiapkan dalam menyongsong Industri 4.0 seperti pemerataan akses komputer, peningkatan kualitas sumber daya manusia, interoperabilitas data, kolaborasi multi-disiplin, dan transformasi pandangan pembuat kebijakan negara terhadap penerapannya.
Conference Paper
Full-text available
Most modern browsers record all previously visited web pages for future revisitation. However, not all users utilise such feature. One of the reasons is that the records are displayed at once as a single list, which may overwhelm the users. This paper proposes a predictive model to decide whether a web page will be revisited in the future based on...
Article
Full-text available
Waste management issue is a relevant topic that had been focused on many persuasive technologies. This issue is not only related to getting disposed of waste in proper places but also reducing waste disposal volume. This paper proposes a persuasive system that aims both goals by providing a smart trash bin and waste disposal tracker. The smart tras...
Article
Full-text available
Many automated attendance systems have been proposed in academia. However, all of them require the attendees to consciously record their attendance. This is prone to human error as some attendees may forget to do that. It is also distractive as the recording process should be remembered by the attendees, in addition to focusing on their main respon...
Article
Full-text available
This paper utilises programming style on a source code plagiarism and collusion detection to both capture obvious attempts of such academic dishonesty (which characteristics are ignored on most detection techniques) and prioritise non-coincidental similarity to the coincidental one (as only the former can raise suspicion). The technique relies on p...
Conference Paper
Full-text available
In dealing with source code plagiarism and collusion, automated code similarity detection can be used to filter student submissions and draw attention to pairs of programs that appear unduly similar. The effectiveness of the detection process can be improved by considering more structural information about each program, but the ensuing computation...
Article
Full-text available
Several computing courses allow students to choose which programming language they want to use for completing a programming task. This can lead to cross-language code plagiarism and collusion, in which the copied code file is rewritten in another programming language. In response to that, this paper proposes a detection technique which is able to a...
Conference Paper
Full-text available
Source code plagiarism and collusion are continuing problems in academia. To deal with these issues, lecturers are often aided by automated code similarity detection techniques or tools. Students' programs are filtered by these, and suspicious groups of programs are displayed to the markers for further investigation. As the detection techniques are...
Article
Full-text available
Algorithm Visualisation (AV) tool is commonly used to learn data structures. However, since that tool does not address technical details, some students may not know how to implement the data structures. This paper integrates the AV tool with Program Visualisation (PV) tool to help the students understanding the data structures’ implementation. The...
Article
Full-text available
Background: Most source code plagiarism detection tools are not modifiable. Consequently, when a modification is required to be applied, a new detection tool should be created along with it. This could be a problem as creating the tool from scratch is time-inefficient while most of the features are similar across source code plagiarism detection to...
Article
Full-text available
Writing style plays a role in publication venue recommendation. However, such finding should be observed further; it is concluded from an arbitrary dataset which contains various topics and writing quality. This paper aims to observe that style's impact in a more controlled environment. A dataset with the same specific topic and writing quality was...
Conference Paper
Full-text available
International Bebras Community is an organization which its purpose is educating informatics and computational thinking for students. Since 2016, Komunitas Bebras Indonesia consistently once a year hold Bebras Challenge. Faculty of Information Technology Maranatha Christian University has participated as a Bebras partner since 2016. As a Bebras Bur...
Article
Full-text available
According to several works, Program Visualization (PV) enhances student understanding further about how a particular program works. However, to our knowledge, no PVs utilize color gradation as a part of their features, even though color plays an important role in visualization. Therefore, two uses of color gradation on PV are proposed on this paper...
Article
Full-text available
According to several works, low-level approach is an effective and efficient solution for detecting source code plagiarism. Instead of relying on source code tokens, it compares the executable form of given code; that form only contains semantic-preserving tokens and is resistant to various plagiarism attacks. However, to our knowledge, an issue ab...
Article
Full-text available
Due to its high failure rate, Introductory Programming has become a main concern. One of the main issues is the incapability of slow-paced students to cope up with given programming materials. This paper proposes a learning technique which utilises pair programming to help slow-paced students on Introductory Programming; each slow-paced student is...
Article
Full-text available
Easy information access supports students to find resources in learning. However, excess information caused students to face difficulty processing information well. Infographics becomes a solution to presenting the information in visual format. Infographics is expected to help students to process the information, especially for academic purposes. I...
Article
Full-text available
Most source code plagiarism detection tools only rely on source code similarity to indicate plagiarism. This can be an issue since not all source code pairs with high similarity are plagiarism. Moreover, the culprits (i.e., the ones who plagiarise) cannot be differentiated from the victims even though they need to be educated further on different w...
Article
Source code plagiarism detection using Running‐Karp‐Rabin Greedy‐String‐Tiling (RKRGST) is a common practice in academic environment. However, such approach is time‐inefficient (due to RKRGST's cubic time complexity) and insensitive (toward token subsequence rearrangement). This paper proposes ES‐Plag, a plagiarism detection tool featured with cosi...
Article
Full-text available
Digital competence is a promising skill to be learned in this ICT era. However, teaching such skill is not a trivial task, especially when the students are not ICT-aware. In this article, the authors consider the ICT awareness of high school students in Indonesia. According to this study that involved 113 respondents at the beginning of August 2018...
Article
Full-text available
In most organizations, candid moments on held events should be captured as images for administrative purposes. For instance, if an event is sponsored by third parties, it is necessary to send some images capturing moments on that event to them. However, human resources are required to capture such images, resulting additional operational cost. This...
Conference Paper
Full-text available
The rapid development in face detection study has been greatly supported by the availability of large image datasets, which provide detailed annotations of faces on images. However, among a number of publicly accessible datasets, to our best knowledge, none of them are specifically created for academic applications. In this paper, we propose a syst...
Preprint
Full-text available
To solve time inefficiency issue, only potential pairs are compared in string-matching-based source code plagiarism detection; wherein potentiality is defined through a fast-yet-order-insensitive similarity measurement (adapted from Information Retrieval) and only pairs which similarity degrees are higher or equal to a particular threshold is selec...
Conference Paper
Full-text available
To solve time inefficiency issue, only potential pairs are compared in string-matching-based source code plagiarism detection; wherein potentiality is defined through a fast-yet-order-insensitive similarity measurement (adapted from Information Retrieval) and only pairs which similarity degrees are higher or equal to a particular threshold is selec...
Preprint
This paper contributes in developing source code plagiarism detection that is more aligned with human perspective. Three evaluation mechanisms that directly relate human perspective with evaluated approaches are proposed: think-aloud, aspect-oriented, and empirical mechanism. Using those mechanisms, a comparative study toward attribute-and structur...
Conference Paper
Full-text available
This paper contributes in developing source code plagiarism detection that is more aligned with human perspective. Three evaluation mechanisms that directly relate human perspective with evaluated approaches are proposed: think-aloud, aspect-oriented, and empirical mechanism. Using those mechanisms, a comparative study toward attribute-and structur...
Article
Full-text available
Numerous Program Visualization tools (PVs) have been developed for assisting novice students to understand their source code further. However, none of them are practical to be used in the context of completing programming laboratory task; students are required to keep switching between PV and programming workspace when they need to know how their c...
Article
Full-text available
Most scientific publishers encourage authors to provide keyphrases on their published article. Hence, the need to automatize keyphrase extraction is increased. However, it is not a trivial task considering keyphrase characteristics may overlap with the non-keyphrase's. To date, the accuracy of automatic keyphrase extraction approaches is still cons...
Article
Full-text available
Algorithm time complexity is an important topic to be learned for programmer; it could define whether an algorithm is practical to be used on real environment or not. However, learning such material is not a trivial task. Based on our informal observation regarding students’ test, most of them could not correlate Big-Oh equation to real program exe...