ArticlePDF Available

Cheaters on Twitter: an analysis of engagement approaches of contract cheating services

Taylor & Francis on behalf of the Society for Research into Higher Education
Studies In Higher Education
Authors:
  • International Business University (IBU)

Abstract and Figures

This paper presents the results of an exploratory study that examined engagement approaches of contract cheating services on the Twitter platform. The literature portrays the grey academic market as an invisible hand that magically delivers academic content at the click of a button, which leaves a wide gap in our understanding of their outreach efforts. To this end, data from 71 contractors and 12,701 users were analysed to describe what academics and administrators are up against. The results suggest that contractors employ automation tools to generate leads, specific to their subject area, which denotes market segmentation and competition. This study is part of a larger project aimed at minimizing academic misconduct; it discusses implications for educational practice and offers recommendations for prevention of contract cheating. Keywords: social media, academic dishonesty, social media cheating, academic integrity.
Content may be subject to copyright.
Cheaters on Twitter: an analysis of engagement approaches of
contract cheating services
Alexander Amigud
Center for the Study of Social Processes, Toronto, Canada
ABSTRACT
This paper presents the results of an exploratory study that examined
engagement approaches of contract cheating services on the Twitter
platform. The literature portrays the grey academic market as an
invisible hand that magically delivers academic content at the click of a
button, which leaves a wide gap in our understanding of their outreach
eorts. To this end, data from 71 contractors and 12,701 users were
analysed to describe what academics and administrators are up against.
The results suggest that contractors employ automation tools to
generate leads, specic to their subject area, which denotes market
segmentation and competition. This study is part of a larger project
aimed at minimizing academic misconduct; it discusses implications for
educational practice and oers recommendations for prevention of
contract cheating.
KEYWORDS
Higher education; academic
integrity; contract cheating;
plagiarism; collusion
Introduction
The ubiquity of social media has been extensively discussed in the literature. Its interactive features
simplify dissemination of information and collection of corresponding feedback. It has been inte-
grated into academic services to provide student support, facilitate collaborative learning, and
promote engagement (Grosseck and Holotescu 2008; Junco, Heiberger, and Loken 2011; Gülbahar
et al. 2017). Social media is also being used as a marketing platform to promote contract cheating
services to students (Rowland et al. 2018). Contract cheating is arguably the most challenging
issue faced by academic practitioners. It is dened by Clarke and Lancaster (2006)asthe submission
of work by students for academic credit which the students have paid contractors to write for them.
Academic integrity approaches and technologies that address the issue of authorship by mapping
learner identities to their academic work are selectively employed by institutions (Amigud et al.
2018). Due to their resource intensiveness, they are generally reserved for high stakes assessments.
This leaves a wide gap in the detection of academic misconduct and contract cheating in particular.
This gap, coupled with pressure to succeed, fuels the demand for original content, which translates
into business opportunities to satisfy the demand. Social media became a double-edge sword the
very interactive functionality of the social media that helps facilitate communication and collabor-
ation is turned to identify and provide immediate response to students seeking to outsource aca-
demic work.
Much of the literature discusses the problem of contract cheating in terms of ethical conduct and
student and instructor perceptions (Walker and Townley 2012; Sivasubramaniam, Kostelidou, and
Ramachandran 2016; Draper and Newton 2017; Tauginienėand Jurkevičius 2017; Harper et al.
2018). From a handful of empirical studies, we know that there is an abundance of contract cheating
© 2019 Society for Research into Higher Education
CONTACT Alexander Amigud aamigud@uoc.edu
STUDIES IN HIGHER EDUCATION
https://doi.org/10.1080/03075079.2018.1564258
services, that they are business ventures with an online presence, and that they employ a range of
persuasive features such as refunds and 24/7 support to make their services appeal to customers
(Rowland et al. 2018; Ellis, Zucker, and Randall 2018). What we do not know is how contractors go
about engaging with students. Essays, research papers and math homework assignments are not
going to sell themselves and there is more than one player oering the service, which entails com-
petition and therefore variance in engagement techniques. The current gap in the literature is a lack
of information on contract cheating services social media engagement and the means to counter
their pervasive inuence.
This research is important and timely because rst, contract cheating poses a threat to the credi-
bility of the academic enterprise, and, second, it increases our understanding of operating structures
of service providers leveraging social media to maintain customer engagement.
Research questions
This study explores three research questions:
(1) What are the characteristics of Twitter accounts that oer contract cheating services?
(2) How do contract cheating services identify potential customers?
(3) How do the engagement approaches vary across contract cheating service providers?
To this end, this study employed a mixed-methods approach to identify contractor characteristics,
explore customer selection criteria, and analyse their engagement approaches using data from 71
contractors and 12,701 users on the Twitter platform.
The next sections provide an overview of the literature on academic integrity, explore the issue of
contract cheating, and discuss Twitter engagement.
Background
This section is organized into two parts. First, it provides an overview of the notions of academic
integrity and contract cheating. Second, it explicates the process of engagement using the Twitter
platform.
Academic integrity
Learning requires a signicant investment of eort, time, and often nancial resources which, due to
the competitive nature of the academic environment and substantial work load, come with the
inherent risk of failure and inability to recoup the investment. The pressure to succeed, heavy work-
load, and personal factors limiting the studentsability to complete the work may inuence students
decision to cut corners (McCabe and Trevino 1996; Malgwi and Rakovski 2009; Lewellyn and Rodri-
guez 2015). Therefore, cheating is a path of least resistance and a means of self-preservation. A
study by McCabe, Trevino, and Buttereld (2001) suggests that self-reports of unpermitted collabor-
ation go as high as 49%.
Institutions are well aware of the risks to assessment integrity and employ a variety of strategies to
counterbalance student creative eorts to undermine assessment protocols (Amigud et al. 2018).
However, academic integrity strategies vary in their level of assurance and logistical requirements,
are therefore applied selectively, thus leaving plenty of room for misconduct opportunities that stu-
dents and contract cheating services can exploit. Academic integrity requires a process that maps
student identity to the student-produced content, where only those students who successfully com-
plete the assessment task receive a credit. This two-tiered process, often conducted though invigila-
tion, is a logistically challenging task and therefore applied selectively. The rest of the assessments is
generally conducted in a less secure manner, where either identity or authorship is veried. Unless
2A. AMIGUD
instructors employ stringent checks and balances to validate authorship of the submitted work, any
activity bears a risk of being produced by anyone other than the student claiming credit for it. Auth-
entic assessments, such as programming projects and critical essays often undergo plagiarism
screening that deems work originally as long as it is signicantly dierent from the content in its data-
base. Bespoke essays and assignments are original works whose authors agreed to forfeit authorship
claims in exchange for a fee. They will not be in the plagiarism database; therefore, these plagiarism
detection softwares are not eective in detecting misconduct (Walker and Townley 2012; Sivasubra-
maniam, Kostelidou, and Ramachandran 2016). Contract cheating is dierent from other threats to
academic integrity in that it is both convenient and presently has a low risk of detection. The contract
cheating market is eager to capitalize on these opportunities. The next section describes the notion of
contract cheating in greater detail.
Contract cheating
The notion of contracting out academic assignments was examined by Clarke and Lancaster (2006)in
their seminal paper that coined the phrase contract cheating, which was dened as the submission
of work by students for academic credit which the students have paid contractors to write for them.
This is the denition that will guide this study. Walker and Townley (2012) argued that contract cheat-
ing is a more fraudulent form of misconduct than other forms of plagiarism and oered an alternative
denition. They asserted that contract cheating is a form of cyber-pseudepigraphy the act of claim-
ing authorship of someone elses work obtained through the Internet. They also stress that content
may not necessarily be custom-written but also produced and submitted as part of another project.
Some of the common services of the contract cheating enterprise are bespoke essays, research
assignments, and computer programming code, among others (Clarke and Lancaster 2006; Clare,
Walker, and Hobson 2017). The extent of the contract cheating market is subject to ongoing
debate. Considering the sensitive nature of transactions, there is not enough public information avail-
able to make an accurate estimate of the transaction volume and subsequently market size. The
attempts to quantify the extent of the problem are generally limited to publicly available data,
such as the volume of oers and price structure, which is very dierent from the volume and
price of completed transactions. For example, a study by Clarke and Lancaster (2013) estimated
the average cost of student assignment at £138.39 GBP. A study by Owings and Nelson (2014) esti-
mated the size of the bespoke essay industry at over $50 million USD per year, assuming that 2.3% of
students outsourced only one paper. The results of a survey conducted by Bretag et al. (2018) suggest
that 2.2% (N= 13,462) of students had obtained and submitted someone elses work as their own. A
literature review by Curtis and Clare (2017) on the prevalence of contract cheating for the period from
2006 to 2016, suggests that misconduct rates range from 0.3 to 3.1% (N= 116413). Foltynek and Kra-
likova (2018) examined the prevalence of contract cheating behaviour in Czechia by conducting a
survey of N= 1016 students. The results suggest that 7.6% (N= 77) submitted assignments com-
pleted by someone else. A survey of teaching staconducted by Harper et al. 2018 at eight Australian
universities examined faculty experiences with contract cheating. The results revealed a set of out-
sourcing behaviours, some more common than others. For example, 67.6% (N= 619) of faculty sus-
pected students submitting assignments and claiming credit for work they did not complete,
whereas proxy test taking was less common, with only 5.0% (N= 43) of faculty reporting experiencing
this behaviour.
Some of the proposed solutions to the problem of contract cheating include education as a means
to foster integrity culture (Walker and Townley 2012; Rogerson 2017), assessment design (Lancaster
and Clarke 2014; Sivasubramaniam, Kostelidou, and Ramachandran 2016), legislation (Draper and
Newton 2017), and continuous validation of student work (Amigud et al. 2018; Harper et al. 2018).
One may argue that the ecacy of an educational approach to deter academic misconduct is
limited and that automated methods of detection are necessary (Clarke and Lancaster 2006;
Amigud et al. 2017). Some scholars have proposed shortening turnaround time as a means to
STUDIES IN HIGHER EDUCATION 3
address contract cheating (OMalley and Roberts 2012). This notion was examined by Wallace and
Newton (2014) who argued that imposing time constraint may not yield the desired results
because of the market saturation and short turnaround times already oered by contract cheating
services.
Furthermore, the use of social media marketing by contract cheating services has been noted by
Sivasubramaniam, Kostelidou, and Ramachandran (2016). Social media is playing an important role in
sales prospecting and customer engagement. One reason for favouring social media marketing over
search engine marketing is that the latter are known to block contract cheating ads. Their study
results suggest that contractors are targeting Twitter and Facebook users, oering help with assign-
ments, coursework, and dissertations. Contractors provide assurance of plagiarism-free work that is
undetectable by the plagiarism screening software, which denotes their understanding of academic
integrity practices. The study also highlighted the pervasiveness of social media, allowing contractors
to post service oers right on a social media page of an academic institution.
Bespoke essays, theses, and programming assignments do not spontaneously emerge on students
desks; they need to be rst procured, then produced. Establishing and maintaining a contractual relation-
ship is a complex and fragile process. As with any other business enterprise, contract cheating services
require a medium to engage with customers, communicate requirements, and negotiate the terms.
Social media provides just that. The next section provides an overview of social media engagement.
Twitter engagement
Customer-facing organizations recognized the power of social media technology as a multifaceted
communication tool that combines features of the traditional media pushing content to customers
and also interactive media establishing a two way communication with customers, which Felix,
Rauschnabel, and Hinsch (2017) described as an explorer approach. The collection and analysis of
user-generated content have many applications from customer insights (Ahuja and Shakeel 2017)
to engagement (Venkatesan 2017), from collaboration (Junco, Heiberger, and Loken 2011)toinuen-
cing of purchase decisions (Barcelos, Dantas, and Sénécal 2018). As social media users go about
experiencing the world, sharing their observations, concerns, and wants on social media, their mess-
ages are available to be mined and responded to with oers to satisfy their wants, with solutions to
satisfy the concerns, and with opinions about their observations.
Twitter, a key player in the social media arena, has 330 million users worldwide (Fiegerman 2017).
The company oers free and paid services to reach specic audiences, increase brand awareness, and
analyse engagement. One explanation of its wide adoption is that the communication platform facili-
tates the intrinsic need to form relationships with other people by sending tweets and direct
messages, retweeting, following people, and gaining followers(Chen 2011).
Considering that contract cheating services are for-prot ventures, Twitter engagement serves as a
means to generate customer leads. The process of engagement can be organized into six categories
as follows: (a) users can post messages on their prole pages; (b) users may reply to messages of other
users; (c) users may send private messages to other users, and messages, both public and private,
may include URLs and audiovisual content; (d) users may mark messages as favourites, or give
them likes; (e) users may subscribe to or followother users; and (f) users may run search queries
that return messages with search terms.
Unlike other social media platforms, Twitter delineates users by interests therefore, engagement
requires understanding how to derive behaviours from textual and visual data. Considering a large
volume of content continuously generated by millions of users, automation is often necessary to
make the engagement process eective. Twitter provides an Application Programming Interface
(API) to integrate with its system and automate many of the management tasks such as searching
and posting messages. For example, a reply bot may be deployed to identify keywords in a
stream and automatically send a message to that user.
The next section outlines the methodology used in this study.
4A. AMIGUD
Methodology
This study is predicated on the assumption that contract cheating is a business venture with the aim
to monetize studentsinability or unwillingness to satisfy academic requirements on their own. There-
fore, their engagement approaches aim to maximize the prot gain. Although contractors have
access to the same interactive features on the Twitter platform, their leads generation patterns
may vary. Using a mixed-methods approach, this study analysed the engagement approaches of con-
tract cheating services in two phases. First, public prole data were analysed to summarize contractor
characteristics and identify criteria used in customer selection. Second, data from Twitter messages
that attracted oers from contractors was analysed to take a closer look at their engagement
approaches.
The data were collected from February to March of 2018. Analysis was performed using the Python
language. The snowball sampling technique was employed as follows. Data collection commenced
with a search query for essay, which returned an array of messages. These messages were examined
to identify contract cheating services which replied to or marked these messages as favourite. Results
of the Twitters recommender algorithm who to followwas also used to draw additional data. Figure
1depicts the sampling process, which yielded a list of N= 71 contractors. For each contractor, Twitter
prole information was collected to compare their usage (number of messages, followers, accounts
being followed, likes), alternative contact details (website, email, phone), cost of service, location, and
maturity of accounts. Contract cheating services vary in size and maturity of business. Their usage
volume (i.e. likes, follows, and tweets) was normalized and expressed as the number of daily trans-
actions for each type of activity. Location, part of the public prole, is an optional eld. It may be
left blank or include an arbitrary string, for example Why do you want to know?Entries that did
not include location names were discarded; the remainder was organized by the country.
With millions of users continually posting messages, the process of identication of prospective
customers becomes a challenging task. In order to reach customers eectively, contract cheating ser-
vices need to derive a technique to eciently delineate related content from noise. A set of 12,701
messages from unique users was analysed to identify the most frequent keywords that contract
cheating services consider as indicators or markers of the prospective customer. For each contractor
in the list, messages marked as favourite were downloaded. The inclusion criteria were: an account
active within a month and had at least 500 likes, which yielded a subset of 45 contractors. Due to the
Figure 1. Sampling method.
STUDIES IN HIGHER EDUCATION 5
competitive nature of the contract cheating business, there is an overlap in message selection criteria,
and several contractors engaged with the same user. Bigrams were computed using the NLTK library
(Bird 2006) as follows: stop words removed, word length 3 characters, collocation window size = 2,
frequency lter value that limits the output to 10 items, and likelihood ratio scoring (Manning and
Schütze 1999).
In the second part of phase two, the top keywords were used as an input to elicit oers from con-
tractors and examine their engagement approaches. The keywords were used in a sentence and the
message read: I have 2 page essay paper due & I havent started it. I will pay someone $50 to write
research paper & do my stats homework math homework hate statistics hate calculus. Assignments
due tomorrow. The message was posted for 24 h and interactions logged.
To increase the accuracy of data capture a new account was created. Any new contractors ident-
ied in this phase were not added to the initial list. The sample size, type, time of data collection, and
data format are the limitations of the study.
Results
The presentation of ndings is divided into three parts: (a) contractor characteristics; (b) relevance
markers; and (c) the engagement approaches, each part answering its own research question.
Contractor characteristics
The rst research question involved exploring characteristics of Twitter accounts that oer contract
cheating services. The oldest contractors account in the sample (N= 71) is 8.5 years old, and the
newest account is 5 days old. The mean maturity of contractorsaccounts is 22.25 months (SD =
21.94). Account maturity is depicted in Figure 2. The majority of proles indicated they are located
in the United States. The second largest market is the United Kingdom, followed by the Republic of
Mauritius and Kenya. Contractor-specied location is depicted in Figure 3. Contractors generate on
average 28.98 (SD = 89.83) tweets/day, issue 22.86 likes per day (SD = 55.18), and follow other users
at a rate of 5.52 (SD = 10.13) users/day. The highest level of daily engagement was as follows: 743 mess-
ages, 375 likes, and 73 users being followed. Engagement trends are depicted in Figure 4.
The service cost was made explicit in 4% (N= 3) of the proles and ranged from $5 to $10 per
page. Twitter was used as a storefront by 44% (N= 31) of the contractors, who did not provide
any alternative contact information such as phone, email, or website link. The remainder posted a
combination of website addresses 56% (N= 40), email addresses 35% (N= 25) and/or phone
numbers 7% (N= 5). All phone numbers had US area codes. None of the contractors in the sample
had all three contact particulars posted. Two accounts provided a link to a mobile academic help
app. The contractorswebsites can be divided into three categories: those that oer services directly,
those that provide a freelance marketplace, and those that review quality or make recommendations
of contract cheating services. The last type, which is 4% (N= 3), post messages warning students
about unscrupulous contractors which serves as a strategy to deter competition, while promoting
aliated service providers.
The prole data highlights general trends; for instance, we know that contractors automate
response to messages and use some criteria to lter out the prospects from the rest. The next sections
take a closer look at how they are doing it.
Relevance markers
The second research question analysed how contract cheating services go about identifying potential
customers. Considering a vast volume of user-generated data, contract cheating services face the
challenge of being able to accurately identify students seeking to outsource their academic work
while ltering the noise. This entails having a clear idea of the terms students seeking assistance
6A. AMIGUD
would include in their messages. The balance is key, as a single keyword can cast too wide of a net,
while irrelevant terms limit the search leading to loss of valuable computational resources and time.
The more time spent engaging with unrelated content, the less are the chances of generating leads
and making a prot. This means that contractors review and optimize their engagement strategies,
and the observed variance in the use of keywords highlights just that. Tables 1 and 2depict the most
frequent terms in two categories: unigrams and bigrams; the latter were computed to narrow down
potential customers. Two contractors use two dierent approaches to engage with dierent groups
of customers, one is targeting essays, research papers, and assignments, and the other math, stat-
istics, and calculus. The term hateis related to math homework but is not present in writing
Figure 2. Account maturity.
Table 1. Top 10 unigrams.
Contractor A Contractor B Entire set
Due Hate Essay
Essay Math Pay
Paper Homework Write
Write Starts Someone
Tomorrow Odio Paper
Assignment Pay Due
Started Someone Homework
Assignments Statistics Tomorrow
Page Much Page
Someone Matematica Research
STUDIES IN HIGHER EDUCATION 7
assignments. Furthermore, as shown in Table 1, the presence of Spanish terms suggests that some
contractors are targeting non-native English-speaking students.
These terms will serve as input for the next phase that is concerned with analysing the engage-
ment approaches.
Engagement approaches
The nal research question assessed how the engagement approaches vary across contract cheating
service providers. To examine contractorsengagement approaches, a message composed of
Figure 3. Contractor-specied location.
Table 2. Top 10 bigrams.
Contractor A Contractor B Entire set
Due tomorrow Hate math Pay someone
Paper due Pay someone Write essay
Assignment due Stats homework Someone write
Research paper Hate calculus Essay due
Havent started Fucking hate Research paper
Write essay Statistics homework Due tomorrow
Assignments due Hate stats Write paper
Essay due Hate statistics Paper due
Page paper Math hate Essay pay
Write paper Math homework Page essay
8A. AMIGUD
keywords identied in the previous section was posted for 24 h. Within the rst 5 min of being
posted, the message received 9 replies, 7 likes, and 5 follows. After 3 h, the engagement rate rose
to 19 likes, 26 replies, and 11 follows. In 12 h, the engagement rate was at 25 likes, 37 replies, 17
follows, and 1 retweet. After 24 h of being posted, 36 unique contractors engaged with the
message through 44 replies, 27 likes, 16 follows and 1 retweet. Figure 5 depicts the engagement
activity.
The data denotes the use of automation tools that not only continuously monitor the stream and
engage with messages immediately after they are posted but query historical data either on-demand
or at certain time intervals. This variance suggests the existence of three dierent approaches to
engagement: (a) some contractors monitor the stream continuously, (b) others query historical
data periodically, and also (c) on-demand. These require dierent resources and levels of human
involvement. Human responses, characterized by the personalization of messages, low volume of
Twitter activity, and breadth of responses, were observed in ve cases. There was one new Twitter
account opened for the purposes of responding to the oer. This account contained a single reply
message and was not part of the initial sample. This depicts the ease with which one can start a con-
tract cheating business, using social media as a virtual storefront. There is no oce, website, or phone
number required. By the same token, this suggests the potential risks to students as social media
accounts can be closed with equal ease. During the 3-week period of data collection, four accounts
were removed, one account was suspended, and one account was renamed. This denotes volatility of
the contract cheating landscape, which can be used as an advantage in the design of prevention
strategies. This will be touched on in the discussion section.
Replies were the preferred approach in this sample, followed by likes, follows, and retweets.
However, this ranking may vary with changes in sample composition. The majority of the contractors
used a plain-text message, asking to contact them privately (i.e. DM). A website link was included in
Figure 4. Engagement trends.
STUDIES IN HIGHER EDUCATION 9
the reply of 1, and 2 contractors attached images promoting their services as a form of visual adver-
tising. Replies with images are more visible than their plain-text counterparts. A phone number was
included by 1, and 3 contractors provided email addresses in the replies. Quality and originality were
stressed by 4 contractors (e.g. high quality paper in good time with no plagiarism). Furthermore, the
results suggest specialization among contractors; some oer calculus, math, and stats help, while
others oer assistance with written assignments, such as essays. This means that when bots are
used, they are congured to respond to dierent keywords with dierent messages, a nding that
is consistent with the analysis of the relevance markers.
Issuing likesis another popular approach. These are often used in conjunction with replies. Fol-
lowing users and reposting (retweeting) their messages are far less common engagement
approaches. Neither approach is explicitly oering a service but trigger account notication, thus
appealing to studentscuriosity to explore who engaged with their message. Following a user and
reciprocal following, although not readily apparent, is a strategy that enables the exchange of
private messages.
These ndings denote dierences in engagement approaches. The following section discusses
their implications for the educational practice and oers recommendations.
Discussion
This section integrates the ndings and presents an overview of what institutions are up against in
terms of potential risks to academic integrity. It discusses implications for the educational practice
and oers recommendations for addressing the issue of contract cheating.
Within minutes of posting a message requesting assistance with completion of an academic
assignment, contract cheating services embarked on a competitive quest to win the contract.
Figure 5. Engagement activity.
10 A. AMIGUD
There are two key trends that emerged in this research the use of bots and competition. Bots make
engagement more ecient, and we see a large dierence in the volume of daily transactions
between contractors who employ bots and those who do not. The use of bots denotes that contrac-
tors are tech-savvy and can make use of programming resources. This is an important characteristic
because of their potential to automate the production of academic artefacts at scale. Once they
perfect the methods for computer-assisted plagiarism and thus increase eciency, the ability to
compete on costs and full orders within tight deadlines a weak point in their current operating
model academia will have a much more grave concern about integrity than it does now.
Furthermore, the logistical complexity of automation suggests that contractors not only need to
be merchants but also creative problem solvers. In order to utilize the power of targeted outreach,
contractors have to go through a research process that yields a list of markers that separate leads
from noise. The process is likely to commence with an intuition as to what language a student
might use to signal demand for academic help and later undergo renement to increase ecacy.
This takes time and resources. Considering the presence of duplicate messages in the original
dataset, the markers were not rened far enough, which resulted in an overlap and competition
where contractors engage with each other. This is a weakness in their strategy.
Heightened competition, coupled with an overlap in markers, renders the use of bots counter-pro-
ductive. Although it is important to reach a prospective customer as soon as possible, and bots
provide just that, the messages are displayed in chronological order, and excessive engagement
makes it dicult to see the earlier messages positioned at the bottom. To address this issue, contrac-
tors replied more than once, which increased their visibility and at the same time created a spam
problem.
Because students do not receive just one oer but are ooded with multiple oers and engage-
ment notications for hours that claim to provide legitand plagiarism-freeservices, what was sup-
posed to be a targeted campaign ended up being a nuisance. Contract cheating services are running
a continuous risk of being reported for spam, which will result in account suspension. During the
short period of this study, several accounts were closed or suspended, and new accounts were
created. This denotes market volatility, which works against contractors. There is no assurance that
any work will be done after students remitted the payment, let alone that the contractor will
remain in business to provide assistance for the rest of the semester. Therefore, contractor screening
and procurement are continuous processes.
Contract cheating is a process constrained by the environment in which it operates. This is the
point that should be stressed most often. Competition and service volatility are two limiting
factors that place constraints on contractorsabilities to conduct business. Bespoke papers are not
one click away, because there is a need to evaluate the available options. Assignments have require-
ments, and students need assurance that the work will be done right and delivered on time. The
student is facing a decision about whom to hire, which involves establishing trust, negotiating the
terms, making a payment, then following up on the delivery. It is counter-productive to spend pre-
cious time sifting through spam when the deadline is looming. Wallace and Newtons(2014) argu-
ment that shortening turnaround time will not aect contract cheating behaviour needs to be
further examined. Much of the work is already being requested with a very small window (i.e. due
at midnight,due tomorrow), rendering order fullment rather dicult. On the one hand, time
restrictions are expected to create a barrier to nding a suitable contractor, in spite of the market sat-
uration. However, students with a tendency to procrastinate will likely remain true to their habits,
holding up until the last minute to outsource the work. On the other hand, reduced turnaround
time puts all students under greater pressure to succeed, which, in turn may trigger cheating behav-
iour in students who otherwise would have done the work themselves.
Furthermore, the legal frameworks targeting contract cheating services (Draper and Newton 2017;
Tauginienėand Jurkevičius 2017) will not be eective, as contractors could move jurisdictions or
reframe their services as tutoring at short notice. Because ads can be disguised as news or personal
STUDIES IN HIGHER EDUCATION 11
messages, the use of social media for customer prospecting and engagement will become more
prevalent.
Implications for the educational practice
Whilst contract cheating is a serious problem that erodes institutional credibility, to date, its true
extent has not been gauged due to the lack of replicable data. The sheer volume of advertising
creates a temptation to conate sales eorts with academic misconduct, and both the academic lit-
erature and media seem to make this logical fallacy. It is important for academic practitioners to
remain critical about the issue. Intentions to outsource academic work, as a means to succeed or mini-
mize cognitive eort, may not extend beyond curiosity, as the procurement process has inherent
limitations and risks. Assuming that cheating is a path of least resistance, plagiarizing someones
work or colluding with friends and family members are more accessible and therefore more prefer-
able than hiring a contract cheating service. This argument is supported by recent survey results that
suggest that students are more likely to collude with friends, family, or classmates (Bretag et al. 2018).
Some scholars even placed family and friends as a subtype of contract cheating, along with le-
sharing and proxy test taking (Ellis, Zucker, and Randall 2018). What follows is an argument that
future research should examine: contract cheating is not a more egregious form of academic miscon-
duct that evolved from plagiarism but merely another tool that is available to some students to
get the job done. The commercial nature of the contract cheating enterprise aects accessibility. The
price is a discriminating factor, which means that not everyone is able to aord it, particularly when
the complexity of academic work is proportional to the contract price. By the same token, specializ-
ation is a discriminating factor, because not every subject matter expert is equally accessible.
Past research suggested that prevention should focus on raising awareness; however, this study
denotes a gap in academic integrity communication strategies. Academic integrity is treated as an
issue that only exists on campus; the onus is on students to remain virtuous outside the teaching
hours. There is no evidence of any eorts to counterbalance the engagement of the contract cheating
services on social media. Out of 44 replies and 27 likes that the contract oer received, none were
from academic sources that warned students about the potential risks or repercussions of cheating.
Perhaps practitioners may learn engagement techniques from contract cheating services, in an
attempt to counter their persuasive power and extend academic integrity awareness to social media.
The crux of the matter is that academic institutions do not appear to be proactive about academic
integrity strategies, which gives cheaters an upper hand. In spite of the availability of open technol-
ogies that validate authorship and can address the issue of contract cheating, very few pilots have
been conducted, while plagiarism detection tools remain the go-to solution for the bulk of the
written assessments. Contract cheating will prevail for as long as this gap remains open. The next
section discusses opportunities for future research.
Conclusion
This study examined the engagement approaches of contract cheating services that target students
on Twitter, discussed implications for the educational practice, and oered recommendations to miti-
gate the risks of contract cheating. This study demonstrated that within minutes of being posted, a
social media message oering payment for completing academic work prompted contractors to
engage and compete with each other. Although these gures are concerning, they should not be
taken as a direct measurement of the problem. To better understand the issue of contract cheating,
future research should focus on personal and environmental factors that facilitate and limit the use of
contract cheating services. First, it should identify the reasons why students nd themselves in a pos-
ition to outsource the work. Second, the research should compare the quality of work across a sample
of contractors and analyse textual data for computer-based plagiarism. For many students the choice
of a trusted partner in crime will not go outside of their circle of friends and family members, thus
12 A. AMIGUD
minimizing risks of exposure and costs. The future research should examine the role of the family in
academic cheating. Hiring a contractor suggests that students, or their families, can aord the service,
which, in turn, suggests that cheating methods are tied to economic status.
Furthermore, future research should bring academic integrity awareness outside of the classroom
and examine the eects of these eorts. It would be interesting to examine the use of ethical bots
that employ the same techniques that contract cheaters do, in order to raise awareness among stu-
dents about the potential risks and long-term eects of cheating. Lastly, the future research may
examine the impact of the legal frameworks aimed at curbing contract cheating services. These
laws will be dicult to enforce, considering that many contractors use social media as virtual store-
fronts and may change jurisdictions within hours of being shut down or reframe their business
models to imply academic support and tutoring services. Legal pressure, if applied, will force contrac-
tors to evolve and adapt. This, in turn, might give rise to a new business model and never-before-seen
permutation of the academic grey market. This study argues that many contractors are not just mer-
chants, but are innovators and disruptors who appear to be one step ahead. If academia holds any
hope of solving the problem of contract cheating, it should start examining the operational processes
of contract cheating and get involved in the development of technologies that validate authorship.
Disclosure statement
No potential conict of interest was reported by the author.
ORCID
Alexander Amigud http://orcid.org/0000-0002-2347-3172
References
Ahuja, V., and M. Shakeel. 2017.Twitter Presence of Jet Airways-deriving Customer Insights Using Netnography and
Wordclouds.Procedia Computer Science 122: 1724.
Amigud, A., J. Arnedo-Moreno, T. Daradoumis, and A. E. Guerrero-Roldan. 2017.Using Learning Analytics for Preserving
Academic Integrity.The International Review of Research in Open and Distributed Learning 18 (5): 192210.
Amigud, A., J. Arnedo-Moreno, T. Daradoumis, and A.-E. Guerrero-Roldan. 2018.An Integrative Review of Security and
Integrity Strategies in an Academic Environment: Current Understanding and Emerging Perspectives.Computers &
Security 76: 5070. doi:10.1016/j.cose.2018.02.021.
Barcelos, R. H., D. C. Dantas, and S. Sénécal. 2018.Watch Your Tone: How a Brands Tone of Voice on Social Media
Inuences Consumer Responses.Journal of Interactive Marketing 41: 6080.
Bird, S. 2006.NLTK: The Natural Language Toolkit.Presented at the Proceedings of the COLING/ACL on Interactive pres-
entation sessions, Association for Computational Linguistics, 6972.
Bretag, Tracey, Rowena Harper, Michael Burton, Cath Ellis, Philip Newton, Pearl Rozenberg, Sonia Saddiqui, and Karen van
Haeringen. 2018.Contract Cheating: A Survey of Australian University Students.Studies in Higher Education.doi:10.
1080/03075079.2018.1462788.
Chen, G. M. 2011.Tweet This: A Uses and Gratications Perspective on how Active Twitter Use Graties a Need to
Connect with Others.Computers in Human Behavior 27 (2): 75562.
Clare, J., S. Walker, and J. Hobson. 2017.Can we Detect Contract Cheating Using Existing Assessment Data? Applying
Crime Prevention Theory to an Academic Integrity Issue.International Journal for Educational Integrity 13 (1).
doi:10.1007/s40979-017-0015-4.
Clarke, R., and T. Lancaster. 2006.Eliminating the Successor to Plagiarism? Identifying the Usage of Contract Cheating
Sites.Presented at the Proceedings of 2nd International Plagiarism Conference.
Clarke, R., and T. Lancaster. 2013.Commercial Aspects of Contract Cheating.Proceedings of the 18th ACM Conference
on Innovation and Technology in Computer Science Education - ITiCSE 13, 219224 doi:10.1145/2462476.2462497.
Curtis, G. J., and J. Clare. 2017.How Prevalent is Contract Cheating and to What Extent are Students Repeat Oenders?
Journal of Academic Ethics 15 (2): 11524.
Draper, M. J., and P. M. Newton. 2017.A Legal Approach to Tackling Contract Cheating?International Journal for
Educational Integrity 13 (1). doi:10.1007/s40979-017-0022-5.
STUDIES IN HIGHER EDUCATION 13
Ellis, C., I. M. Zucker, and D. Randall. 2018.The Infernal Business of Contract Cheating: Understanding the Business
Processes and Models of Academic Custom Writing Sites.International Journal for Educational Integrity 14 (1).
doi:10.1007/s40979-017-0024-3.
Felix, R., P. A. Rauschnabel, and C. Hinsch. 2017.Elements of Strategic Social Media Marketing: A Holistic Framework.
Journal of Business Research 70: 11826.
Fiegerman, S. 2017, October 26.Twitter Admits Overstating User Numbers for Years.Cable News Network (CNN).http://
money.cnn.com/2017/10/26/technology/business/Twitter-earnings/index.html.
Foltynek, T., and V. Kralikova. 2018.Analysis of the Contract Cheating Market in Czechia.International Journal for
Educational Integrity 14 (1): 115.
Grosseck, G., and C. Holotescu. 2008.Can We Use Twitter for Educational Activities.Presented at the 4th International
Scientic Conference, eLearning and Software for Education, Bucharest, Romania.
Gülbahar, Y., C. Rapp, S. Kilis, and A. Sitnikova. 2017.Enriching Higher Education with Social Media: Development and
Evaluation of a Social Media Toolkit.The International Review of Research in Open and Distributed Learning 18 (1):
2339.
Harper, R., Bretag, T., Ellis, C., Newton, P., Rozenberg, P., Saddiqui, S., & van Haeringen, K. (2018). Contract Cheating: a
Survey of Australian University Sta.Studies in Higher Education.doi:10.1080/03075079.2018.1462789.
Junco, R., G. Heiberger, and E. Loken. 2011.The Eect of Twitter on College Student Engagement and Grades.Journal of
Computer Assisted Learning 27 (2): 11932.
Lancaster, T., and R. Clarke. 2014.An Observational Analysis of the Range and Extent of Contract Cheating from Online
Courses Found on Agency Websites.In Complex, Intelligent and Software Intensive Systems (CISIS), 2014 Eighth
International Conference on,5663. IEEE.
Lewellyn, P. G., and L. C. Rodriguez. 2015.Does Academic Dishonesty Relate to Fraud Theory? A Comparative Analysis.
American International Journal of Contemporary Research 5 (3): 16.
Malgwi, C. A., and C. C. Rakovski. 2009.Combating Academic Fraud: Are Students Reticent About Uncovering the
Covert?Journal of Academic Ethics 7 (3): 207.
Manning, C. D., and H. Schütze. 1999.Foundations of Statistical Natural Language Processing. Cambridge, MA: MIT Press.
McCabe, D. L., and L. K. Trevino. 1996.What we Know About Cheating in College Longitudinal Trends and Recent
Developments.Change: The Magazine of Higher Learning 28 (1): 2833.
McCabe, D. L., L. K. Trevino, and K. D. Buttereld. 2001.Cheating in Academic Institutions: A Decade of Research.Ethics &
Behavior 11 (3): 21932.
OMalley, M., and T. S. Roberts. 2012.Plagiarism on the Rise? Combating Contract Cheating in Science Courses.
International Journal of Innovation in Science and Mathematics Education 20 (4): 1624.
Owings, S., and J. Nelson. 2014.The Essay Industry.Mountain Plains Journal of Business and Economics, General Research
15: 121.
Rogerson, A. M. 2017.Detecting Contract Cheating in Essay and Report Submissions: Process, Patterns, Clues and
Conversations.International Journal for Educational Integrity 13 (1): 10.
Rowland, S., C. Slade, K.-S. Wong, and B. Whiting. 2018.“‘Just Turn to us: the Persuasive Features of Contract Cheating
Websites.Assessment & Evaluation in Higher Education 43 (4): 652665.
Sivasubramaniam, S., K. Kostelidou, and S. Ramachandran. 2016.A Close Encounter with Ghost-writers: an Initial
Exploration Study on Background, Strategies and Attitudes of Independent Essay Providers.International Journal
for Educational Integrity 12 (1): 1.
Tauginienė, L., and V. Jurkevičius. 2017.Ethical and Legal Observations on Contract Cheating Services as an Agreement.
International Journal for Educational Integrity 13 (1): 9.
Venkatesan, R. 2017.Executing on a Customer Engagement Strategy.Journal of the Academy of Marketing Science 45 (3):
28993.
Walker, M., and C. Townley. 2012.Contract Cheating: a new Challenge for Academic Honesty?Journal of Academic Ethics
10 (1): 2744.
Wallace, M. J., and P. M. Newton. 2014.Turnaround Time and Market Capacity in Contract Cheating.Educational Studies
40 (2): 2336.
14 A. AMIGUD
... Search engines have been known to restrict SEA for CCWs in some countries (Amigud 2020). Currently, no such restrictions exist when it comes to appearing organically. ...
... Second, by explicitly profiling the search terms and common phrases targeted within these strategies, this research provides a straightforward road map for actively combatting these strategies. Like the Twitter accounts profiled by Amigud (2020), these sites are well ahead of universities and other educational institutions in terms of marketing sophistication. Researching the knowledge and attitudes of university administrators regarding search engine optimization would help identify the expertise gaps that are impediments to progress. ...
Article
Full-text available
This paper presents the first systematic investigation into the search engine optimization practices of major contract cheating websites in the United States. From a business perspective, visibility in organic search engine results is considered one of the top client recruitment tools. The current understanding of student recruitment strategies by these companies remains largely unexplored in both academic literature and popular press. Replicating the business research practices used in the search engine optimization industry, comprehensive search engine ranking and traffic data was obtained for the 38 largest contract cheating websites in the US. The overall objective was to illuminate the strategies that these companies take to get their services at the top of the search results of as many students as possible – not just the relatively small proportion of students actively cheating. The results show that these companies dominate the search results for not just students searching to cheat, but also for naïve search efforts, when students are simply doing genuine research or classwork. These nefarious companies use highly sophisticated search engine manipulation strategies to bait naïve student searchers onto their sites, thus enabling the potential to switch them to cheaters. Higher education institutions, armed with the specific details provided in this study, can use the strategies outlined in the discussion to directly and negatively impact on the success of these contract cheating services.
... In the pre-internet age, academic ghostwriting involved a range of fraudulent practices, from individuals asking someone to write their assignment as a favor to more elaborate contract-cheating businesses (Lines, 2016;Medway et al., 2018;Rowland et al., 2018). This form of academic dishonesty involves paying someone else to complete assignments and submitting them as one's original work (Amigud, 2020;Clarke & Lancaster, 2006). In recent years, the prevalence of technology, such as crowdsourcing platforms or AI, has given rise to many new forms of ghostwriting, enabling researchers to explore further the interaction between this industry and the education system (Baird & Clare, 2017;Bretag et al., 2019;Campbell et al., 2000). ...
... Lastly, prior research has explored how students from various cultural and social backgrounds opt to utilize ghostwriting services Rigby et al., 2015;Shafaei et al., 2016). These studies have offered many insights by exploring the forms of commercialization (Amigud, 2020;Amigud & Lancaster, 2020;Ellis et al., 2020;Rowland et al., 2018;Wallace & Newton, 2014) and examining the quality of the product (Lines, 2016;Wallace & Newton, 2014). Despite extensive research on the demand side of academic ghostwriting seekers, limited attention has been devoted to understanding the supply end. ...
Article
Full-text available
The challenge posed by academic ghostwriting extends beyond education, affecting moral and meritocratic expectations of learners. Through a sociological lens of the “accounts theory,” we analyzed the marketing language of 102 academic ghostwriting websites in English and Chinese to explore their legitimization of services in diverse cultures and contexts. Our research focused on how ghostwriting sites legitimize their services across diverse cultures and linguistic contexts while navigating the stigma associated with academic ghostwriting. We identified five neutralization techniques used by ghostwriting sites, including “Denial of responsibility,” “Denial of injury,” “Denial of the victim,” “Condemnation of the condemners,” and “Appeal to higher loyalties.” Our findings suggest that the marketing of academic ghostwriting is customized to appeal to potential clients’ cultural backgrounds, with Chinese ghostwriting sites emphasizing the authority of ghostwriters and English sites prioritizing empathy with users. The ghostwriting industry has diversified to meet the needs of diverse consumers and online environments. Our research provides insights into how ghostwriting sites devise market strategies based on cultural predispositions, shedding light on the complexities of the ghostwriting industry and its impact on the moral and educational landscape. It sheds light on how the dynamics of this market evolve, adapt, and ultimately influence the educational landscape, emphasizing the need for a holistic perspective on the forces at play in higher education.
... Interestingly, over 65% of papers discussed the impact of family and friends of students-whether they collude or act as a source of assignment services (Amigud & Lancaster, 2019, 2020) -on students' decisions to engage in contract cheating, portraying them as both an influence and a source of pressure . For instance, many students rely on their circle of friends and family as a choice of a trusted partner for outsourcing to minimise the risk of exposure and cost (Amigud, 2020). This highlights that family and friends have a significant role to play in the contract cheating process. ...
Article
Full-text available
Contract cheating remains an academic integrity concern in higher education institutions, and scholarly studies in this area have continued to increase. While highly informative systematic literature reviews on contract cheating exist, they have mainly focused on the concept of contract cheating, causal factors, and prevention strategies through detection and punitive measures. To broaden the understanding and study of contract cheating, exploring the research philosophy and theoretical approach underpinning the methodological aspects is essential. This paper aims to identify, synthesize, and critically evaluate methodologies used in the study of contract cheating and provide methodological developments for future research avenues. The findings identify a lack of theoretical foundation, methodological rigour, limited research approaches, data sources, sample diversity, and ethical considerations. Accordingly, the review brings out several methodological implications for data sources, research approaches, type of analysis, and the nature of sample diversity, with special emphasis on the ethical considerations to be aware of when conducting research with sensitive participant groups related to a sensitive research area.
... A Russian social network similar to Facebook is said to be heavily used by contract cheating providers advertising their services, including advertising by companies and by individual writers. Amigud (2019) recognised the use of bots on social media to identify students who may wish to commit contract cheating and to generate leads. The same tactics used by legitimate businesses are being used by the contract cheating industry. ...
Article
The contract cheating industry, those services and individuals who are supplying students with original work for assessment, is evolving. Contract cheating companies are using enhanced marketing techniques, including social media marketing, to encourage potential customers to avail themselves of services that breach academic integrity. Social media is proving to be integral to the success of the contract cheating industry as a whole. It allows contract cheating companies to recruit academic ghost writers and other staff. In addition, social media is fuelling a black market trade in contract cheating service accounts. Potential ghost writers who would not otherwise qualify are using this hidden market to get accounts to work for contract cheating services.This paper examines the state of the contract cheating industry, paying particular attention to the role that social media has played in the industry’s development and apparent growth. The discussion of the industry is supported by example and case studies. These cover the end-to-end contract cheating process from when an essay mill is first set up, through to supplying services to students and to engaging contract cheating service workers. Examples of contract cheating and social media use of specific interest to Canadian academics and scholars are included. The paper concludes with a discussion of future challenges as well as the opportunities for academic integrity discussions. These are intended to enable academics to work with students as academic integrity partners and to enable discussions that make use of what is known about the operation of the contract cheating industry.
... Given the scale and worth of the contract cheating industry, it is hardly surprising that operators use varied and sophisticated techniques to attract custom. In addition to more traditional methods such as flyers, business cards, advertising hoardings, posters on public transport (Quality Assurance Agency 2020), assignment providers have kept up with developments in online marketing, from posting notices in online forums (Clarke and Lancaster 2013, 221) to purchasing advertising space on search engines (Lancaster 2020), use of YouTube influencers (BBC 2018), and direct marketing on social media, assisted by tools such as reply bots (Amigud 2020). They even threaten cybersecurity: in 2021, the Australian government discovered that essay mills were placing malicious code on HEI websites, directing students from the institution's webpages to their own services (Quality Assurance Agency 2021). ...
Article
Full-text available
Contract cheating is a challenging problem facing higher and further education providers (HE and FE) worldwide. In the UK, contract cheating has been identified as a growing problem by the HEA and, more recently, the Quality Assurance Agency for Higher Education and the Department for Education. The high rate of contact cheating among students suggests that 8–9% of degrees awarded in the UK are unsafe. To address this issue, the current study with a new approach seeks to investigate student’s motivations, experiences, and rationale for using contract cheating from their point of view. Collected data has been subjected to content analysis and the findings show different phases and drivers in this process. This study will help increase awareness among UK academics and education providers about the processes involved in contract cheating and propose a set of recommendations for the future.
... We define academic integrity as participants' dedication to norms and values, including honesty, fairness, trust, respect, and responsibility (Lynch et al., 2021), while we classify academic dishonesty as intentional actions which seek to violate the code of academic integrity. Clarity is required, as multiple factors can lead to unintentional violations of academic integrity (Amigud, 2020), and there are differences between institutions' and individuals' definitions of academic dishonesty (Parkinson et al., 2022). ...
Article
Full-text available
In this article we report on a study of higher education students’ (N = 256) perceptions on the willingness, pressure, and frequency of their peers to cheat in online assessments at an Australian university in Singapore during the COVID-19 induced Online Teaching and Assessment period (COTA). MANOVA was used to identify the differences in perception between COTA and In- Person Teaching and Assessment (IPTA), as well as differences between academic disciplines and stages of study. The findings demonstrate that students perceived an increase across all areas of online cheating during COTA, and that these perceptions varied significantly by discipline but not by stage of study. Inductive qualitative thematic analysis was then used to explore the reasons behind the perceived increases, identifying themes related to anonymity, material access, pressure to achieve, lack of consequences, and peer group access. The implications of this research offer deeper insight into assessment security, design, and student concerns during emergency online teaching periods which can inform institutional policies in the future.
Article
Full-text available
Contract cheating is currently one of the most serious academic integrity issues around the globe. Numerous studies have been conducted, mostly in English speaking countries. So far, no such research has been conducted in Czechia, and consequently there have been no specific data available on Czech students’ fraudulent behaviour. For this study, we created a questionnaire to obtain primary data on student usage of essay mills and their self-reported exposure to contract cheating. The questionnaire focused on students and graduates of Czech universities and collected a total of 1016. Of that number, 8% of respondents admit having engaged in contract cheating. The questionnaire responses yielded useful information and insight into students’ attitudes regarding contract cheating and the extent of this phenomenon in Czechia. We now know more about their reasons for contract cheating and have insight into their thoughts regarding possible discovery.
Article
Full-text available
While there is growing awareness of the existence and activities of Academic Custom Writing websites, which form a small part of the contract cheating industry, how they work remains poorly understood. Very little research has been done on these sites, probably because it has been assumed that it is impossible to see behind their firewalls and password protection. We have found that, with some close scrutiny, it is indeed possible to find some ‘cracks’ in these sites through which we can look to gain insights into the business processes that operate within them. We have reverse engineered the business processes that operate within some of these sites. From this we have also been able to identify three different business models that are supported by these sites. Our analysis supports important findings about how these sites operate that can be used to inform future strategies to detect and deter contract cheating.
Article
Full-text available
The phenomenon of contract cheating presents, potentially, a serious threat to the quality and standards of Higher Education around the world. There have been suggestions, cited below, to tackle the problem using legal means, but we find that current laws are not fit for this purpose. In this article we present a proposal for a specific new law to target contract cheating, which could be enacted in most jurisdictions. We test our proposed new law against a number of issues that would need to be considered before any legal approach could be successful; would changing the legal status of contract cheating make it less likely to happen? Could this be achieved in a specific way? If so, who should actually be prosecuted and what offence are they committing? Would it actually address the causes of contract cheating? We suggest some answers to these questions, but then also identify a number of unintended potential consequences. We therefore additionally consider whether a legal approach is possible or even desirable. We conclude that a legal approach to contract cheating is possible, and, on balance, appropriate. Using UK law as an example, we offer a specific suggestion to lawmakers, around the world, for how this might be achieved, and conclude that the most successful approach would be to focus largely on a law targeting the providers of contract cheating, in particular commercial services.
Article
Full-text available
In this paper we cast light on one form of dishonest behaviour in academia – contract cheating services. We examine how an agreement between a student and a contract cheating services provider is viewed from ethical and legal perspectives. For this purpose we carried out an analysis of contract cheating services as an agreement which, in Lithuania, is currently facing the challenge of implementing laws regarding contract cheating services as a violation of academic ethics. Taking into consideration recent jurisprudence, together with social media articles, we conclude that while any agreement for contract cheating services is severely criticized in terms of ethics, the courts either do not regard this type of agreement as a violation of legal norms, or they inadequately apply legal remedies when such an agreement is deemed to be void.
Article
Full-text available
Detecting contract cheating in written submissions can be difficult beyond direct plagiarism detectable via technology. Successfully identifying potential cases of contract cheating in written work such as essays and reports is largely dependent on the experience of assessors and knowledge of student. It is further dependent on their familiarity with the patterns and clues evident in sections of body text and reference materials to identify irregularities. Consequently, some knowledge of what the patterns and clues look like is required. This paper documents how to identify some of the patterns and clues observed in essay and report submissions. Effective assessment design with specific contextual requirements make irregularities easier to detect and interpret. The irregularities identified were confirmed as instances of contract cheating through conversations held with postgraduate students. An essential element of the conversations was the evidence presented for discussion. Irregularities were noted on a pro-forma specifically developed for this purpose. Patterns identified include misrepresented bibliographic data, inappropriate references, irrelevant material and generalised text that did not address the assessment question or grading criteria. The validated patterns formed the basis of identifying potential instances of contract cheating in later submissions. Timely conversations with students before the end of semester are essential to determining whether the patterns and clues link to poor knowledge of academic writing conventions or classified as contract cheating necessitating the application of appropriate penalties under institutional policies and procedures.
Article
Recent Australian media scandals suggest that university students are increasingly outsourcing their assessments to third parties – a behaviour known as ‘contract cheating’. This paper reports on findings from a large survey of students from eight Australian universities (n = 14,086) which sought to explore students’ experiences with and attitudes towards contract cheating, and the contextual factors that may influence this behaviour. A spectrum of seven outsourcing behaviours were investigated, and three significant variables were found to be associated with contract cheating: dissatisfaction with the teaching and learning environment, a perception that there are ‘lots of opportunities to cheat’, and speaking a Language Other than English (LOTE) at home. To minimise contract cheating, our evidence suggests that universities need to support the development of teaching and learning environments which nurture strong student–teacher relationships, reduce opportunities to cheat through curriculum and assessment design, and address the well-recognised language and learning needs of LOTE students.
Article
If media reports are to be believed, Australian universities are facing a significant and growing problem of students outsourcing their assessment to third parties, a behaviour commonly known as ‘contract cheating’. Teaching staff are integral to preventing and managing this emerging form of cheating, yet there has been little evidence-based research to inform changes to their practice. This paper reports on the findings of a large-scale survey of teaching staff in Australian universities on the topic of contract cheating. It investigated staff experiences with and attitudes towards student cheating, and their views on the individual, contextual and organisational factors that inhibit or support efforts to minimise it. Findings indicate that contract cheating could be addressed by improving key aspects of the teaching and learning environment, including the relationships between students and staff. Such improvements are likely to minimise cheating, and also improve detection when cheating occurs.
Article
The growing scope and changing nature of academic programs provide a challenge to the integrity of testing and examination protocols, prompting academic administrators to reevaluate the design of learner performance assessment. This article reviews the research on a number of identity and authorship assurance approaches employed to the bolster security of assessment activities. A total of 54 articles, published between 2000 and 2016, were reviewed. Research in the area of learner identity and authorship assurance is important because the award of course credits to unverified entities raises questions over institutional credibility.We argue that learner identity is composed of two distinct layers: physical and behavioral, where identity and authorship are criteria that both need to be confirmed to maintain a reasonable level of academic integrity.
Article
Social media platforms enable firms to communicate directly and often publicly with individual consumers. In this research, comprising four online studies, the authors investigate how the tone of voice used by firms (human vs. corporate) influences purchase intentions on social media. Findings suggest that a human tone of voice is not always the firm's best option. Study 1a (N = 174) shows that using a human voice, instead of the more traditional corporate voice, can increase a consumer's hedonic value on social media and also purchase intentions. However, that influence of a human voice on purchase intentions is stronger when the consumer is looking at a brand page with a hedonic goal in mind (versus a utilitarian one). Study 1b (N = 342) shows that the presence of several negative comments about a brand on social media acts as a boundary condition, nullifying the influence of a human voice on purchase intentions. Studies 2a (N = 154) and 2b (N = 202) show in different settings that using a human voice can even reduce purchase intentions in contexts of high situational involvement, due to perceptions of risk associated with humanness. The results contribute to the literature surrounding the effects of conversational human voice, while also providing managers with a set of guidelines to help inform and identify which tone of voice is best adapted to each communications scenario.