One of the priorities identified this year by WCET’s Steering Committee was to shed light on the unscrupulous practice of third party sites that entice students to cheat. WCET learned that many of our member institutions regularly issue “cease and desist” notices to organizations that violate intellectual property by copying faculty content, assessments, etc. and then charge students to access these materials. WCET’s Steering Committee organized a working group to raise awareness about this problem. Throughout this three-part blog series, authors are united in the need for more awareness-building for faculty, students, and student services personnel. All agree we need to uphold the integrity of our degrees.

Today, to open the series, WCET welcomes Jen Simonds and Dan Gallagher, from University of Maryland Global Campus, to share about UMGC’s culture of academic integrity and how they respond when issues do occur.

In addition, this month, WCET will join with the International Center for Academic Integrity (ICAI) to participate in the 5th Annual International Day of Action Against Contract Cheating on Oct. 21. We encourage other organizations, college’s and universities to sign up and participate in ICAI’s website.

A big thank you to everyone who wrote, advised, brainstormed, and reviewed the articles included in our series. We’ll be back next week with the next installment. Thank you,

Mollie McGill, Deputy Director, WCET


The rise of the new cheating economy in higher education has been driven by commercialized websites that have monetized academic misconduct and repackaged it as so-called educational services and products. The practices of the new cheating economy are not new, but the internet vastly expands their prevalence and scale, and so intensifies potential threats to academic integrity. In response, the University of Maryland Global Campus has changed not only how we sustain a culture of academic integrity, but also how we define it in practice and respond to academic misconduct. The Academic Integrity Threat Spectrum is one tool we use in our approach to deterrence.

Academic Threat Spectrum – UMGC

The Academic Integrity Threat Spectrum

The Threat Spectrum arrays threat types by the severity of the risk, with the highest on the left and the lowest levels on the right.

Fraud – Degree for Hire

The most severe threat involves students engaging in academic fraud by hiring a paid contractor to complete an entire degree, from application through graduation, using original work throughout. Because the electronic footprint created by the contractor is consistent throughout the degree process and original work is not identifiable by similarity detection software, this is nearly impossible to prevent.

Fraud (degree for hire): full degree, account created by hired agent, fulldegree, account created by student, full course, partial course

At the same time, this form of fraud is rare because of the high cost of paying a contractor across the lifecycle of a degree. Moreover, this level of fraud requires students to surrender highly sensitive pieces of personal information (including SSN, if federal financial aid is involved) that even someone unscrupulous enough to buy a college degree may be reluctant to surrender. No reliable data is available on this type of cheating, but full end-to-end degree-for-hire services are not easily secured online.

More commonly, and next in order of comparative severity, is a paid contractor who will complete coursework within the student’s learning management system. This red-zone threat involves students providing a contractor with login and password credentials to the university’s learning management system. This poses risks to the student’s own identity and data, and to the institution’s cybersecurity: once in the classroom, the contractor can access other students’ educational data and records.

How Do They Target Students?

Students may seek out contractors, but it is also common for contractors to seek out students. Students honestly searching for assignment help online may find one of the many commercial websites that advertise their “excellent writers” who will complete assignments for a fee. Or students may be solicited by contractors who gain access to student email information once they have been hired by another student to complete work in that online classroom. More commonly, contractors push spam and phishing emails to students using language that presents the contractor as a “tutor.” When sent or received through a college/university system, or when implying that the contractor has “previously worked with other students in this course,” these emails may appear college/university-sanctioned to students who are not educated in the deceptive tactics of contract cheaters.

Academic Misconduct

More familiar or common forms of academic misconduct are shaded in teal. Beyond the most familiar forms of copy-paste plagiarism and faulty citation practices, this category encompasses more pernicious forms of internet-based transactional cheating that take multiple forms. These can include straightforward monetary transactions as well as online bartering in the form of assignment exchanges and assessment uploads hosted on commercial websites that position themselves as “study help” services.

These websites might provide some valid forms of academic assistance, but their primary business model involves the facilitation of plagiarism through the peer-to-peer sharing of completed assignment files. Students might not realize the pitfalls here: websites often misleadingly frame this type of peer-to-peer cheating as the sharing of “study materials” with other students in educational need in ways that present academic misconduct as an educationally beneficial act of generosity.

Copyright Violations

There are two related threats in the area shaded in gray that address unauthorized distribution of institutions’ proprietary teaching, learning, and assessment materials. First, students’ unauthorized distribution of an institution’s proprietary materials is a violation of institutional copyright. At UMGC, the university’s academic integrity policy defines such behavior as academic misconduct. Second, the violation of institutional copyright constitutes a threat to the integrity and quality of the teaching and learning enterprise, and so to institutional reputation and brand.

A Strategic and Tactical Response

Disaggregating academic conduct and threats from the new cheating economy along a threat spectrum in this way allows for a more strategic and tactically precise response to different types of academic misconduct and risks. Distinguishing threat types from one another facilitates the identification of unique root causes and ensures appropriately calibrated responses that foregrounds restorative justice practices and educational remediation alongside more traditional accountability measures. This measure of recontextualization improves the situational response to specific incidences of academic misconduct and bolsters a culture of academic integrity across the institution.

Jen Simonds

Asst. Vice President for Academic Integrity & Accountability, University of Maryland Global Campus

Dan Gallagher

Director Effective Writing Center, University of Maryland Global Campus

3 replies on “Spectrum of Threats to Academic Integrity”

Comments are closed.

Subscribe

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,538 other subscribers

Archive By Month

Blog Tags

Distance Education (337)Student Success (311)Online Learning (241)Managing Digital Learning (239)State Authorization (227)WCET (221)U.S. Department of Education (213)Regulation (210)Technology (169)Digital Learning (163)Innovation (125)Teaching (121)Collaboration/Community (114)WCET Annual Meeting (105)Course Design (103)Professional Development (101)Access (99)SAN (98)Faculty (90)Cost of Instruction (89)Financial Aid (84)Legislation (83)Completion (74)Assessment (69)Instructional Design (68)Open Educational Resources (68)Accessibility (67)Accreditation (65)Professional Licensure (65)COVID-19 (64)SARA (64)Credentials (62)Competency-based Education (61)Quality (61)Data and Analytics (60)Diversity/Equity/Inclusion (59)Research (58)Reciprocity (57)WOW Award (54)Outcomes (47)Workforce/Employment (46)Negotiated Rulemaking (44)Regular and Substantive Interaction (43)Policy (42)Higher Education Act (41)Virtual/Augmented Reality (37)Title IV (36)Artificial Intelligence (35)Practice (35)Academic Integrity (34)Disaster Planning/Recovery (34)Leadership (34)State Authorization Network (31)Every Learner Everywhere (30)WCET Awards (30)IPEDS (28)Adaptive/Personalized Learning (28)Reauthorization (28)Military and Veterans (27)Survey (27)Credits (26)Disabilities (25)MOOC (23)WCET Summit (23)Evaluation (22)Complaint Process (21)Retention (21)Enrollment (21)Correspondence Course (18)Physical Presence (17)WICHE (17)System/Consortia (16)Cybersecurity (16)Products and Services (16)Blended/Hybrid Learning (15)Forprofit Universities (15)Member-Only (15)WCET Webcast (15)Digital Divide (14)NCOER (14)Textbooks (14)Mobile Learning (13)Consortia (13)Personalized Learning (12)Futures (11)Marketing (11)Privacy (11)STEM (11)Prior Learning Assessment (10)Courseware (10)Teacher Prep (10)Social Media (9)LMS (9)Rankings (9)Standards (8)Student Authentication (8)Partnership (8)Tuition and Fees (7)Readiness and Developmental Courses (7)What's Next (7)International Students (6)K-12 (6)Lab Courses (6)Nursing (6)Remote Learning (6)Testing (6)Graduation (6)Proctoring (5)Closer Conversation (5)ROI (5)DETA (5)Game-based/Gamification (5)Dual Enrollment (4)Outsourcing (4)Coding (4)Security (4)Higher Education Trends (4)Mental Health (4)Fall and Beyond Series (3)In a Time of Crisis (3)Net Neutrality (3)Universal Design for Learning (3)Cheating Syndicates Series (3)ChatGPT (3)Enrollment Shift (3)Minority Serving Institution (3)Nontraditional Learners (2)Student Identity Verification (2)Cross Skilling/Reskilling (2)Virtual Summit (2)Department of Education (2)Higher Education (2)Title IX (1)Business of Higher Education (1)OPMs (1)Third-Party Servicers (1)microcredentials (1)equity (1)Community College (1)Formerly Incarcerated Students (1)Global (1)