Topics Map > Hybrid Instruction > Deliver

Academic integrity methods

Guidance on fostering academic integrity in your course

The following paper was written by Thomas Tobin  (Center for Teaching, Learning, and Mentoring) and identifies three paths toward ensuring academic integrity in your courses: trustverification, and observation. During instruction, consider these options as you weigh your student exam solutions.


The least intrusive method of ensuring academic integrity is trust. The professor trusts that the student will act honestly in creating content or taking assessments. There are three levels of trust on a continuum from least to most interactive:

Honor codes are statements of expected behavior typically housed in a non-course-specific location, such as the institution’s general website (cf. Georgia Tech University, 2016). Honor codes, by themselves, are passive:  learners need only read them, and professors do not have a way to tell who has and has not read (or, more importantly, agreed to) the honor code.

More interactive are sanction statements (cf. DeVry University, 2009), which outline not only the behaviors expected of learners but also the penalties for transgression. Sanction statements are often placed at the point of need, such as in the directions for a test, where learners are most likely to be tempted toward dishonesty.

A signed honor code is the most interactive trust method (cf. Meyer, 2010). Whether the learner signs the code on paper or e-signs, the act of signing one’s name to agree to the tenets of the honor code provides psychological weight to the honor code’s provisions, and having a signature helps faculty members hold to a stricter zero-tolerance stance when dishonesty is detected. The best practices for trust-based methods include:

  • placing the honor/sanction statement in both a generally accessible location and at the “point of temptation” within the learning environment;
  • crafting honor/sanction statements that are clear, easy to understand, and brief; and
  • matching the level of trust to the relative importance of the assignment (e.g., asking for signatures only for mid-term and final exams).

To best implement trust methods, publicize them to learners early and often (cf. Sutherland-Smith, 2010). Remind learners that they are held to the standards outlined in the honor/sanction statements, and provide the statements to learners via multiple channels, such as in-course announcements, e-mail messages, and directions for assignments and assessments. 


More intrusive than trust is verification. Verification methods actively check learners’ work against measurable criteria, such as a collection of existing work, an identity database, or time spent on a given task. The professor uses verification tools to understand which learners are statistical outliers and then uses the tools' outputs to decide how to respond to those learners. Verification methods are among the most common ways to ensure academic integrity today. Here are five, in descending order from most to least commonly used.

The extensive subscription databases, such as TurnItIn and SafeAssign (cf TurnItIn, 2016 and SafeAssign, 2016), compare learner submissions against large databases of previously submitted content, Internet sources, and library database sources. These tools produce “originality” reports, whose score indicates the amount of content in the submission that matches or is similar to existing content. Professors use the reports to verify the degree to which learners create original content (which is problematic outside of the humanities, as discussed above).

Often called the “poor man’s TurnItIn” is the practice of “Google fishing,” in which a professor copies a suspect passage from a learner’s work and pastes it into a search engine to check for an exact match. This method relies on the professor’s ability to detect shifts in tone or linguistic ability to spot material copied from sources dissimilar to the writing style and complexity of the learner.

The most intrusive verification method, restriction, prevents learners from using outside resources when taking an assessment. In face-to-face classes, the restriction is accomplished by asking learners to remove potential aids from the assessment area. For online assessments, tools like the LockDown browser from Respondus (cf. Respondus, 2016) prevent learners from opening other programs, creating new Internet windows, or copying text from the screen. Professors also restrict online assessments by setting date/time parameters, passwords, and IP address restrictions.

Less common verification methods are statistical verification (measuring time on task or activity duration) and identity validation (granting access via fingerprint scanner [cf. Digital Persona, 2012] or only after answering identify-confirmation challenge questions).

For all verification methods, the best practice is to tell learners ahead of time that the methods will be employed. This is a must for some methods, such as fingerprint scanning, but for others, such as extensive database services, it is possible to use verification methods surreptitiously. Doing so undermines learner confidence and trust. Many of the most common verification methods allow learners to take part in the verification. For example, students can submit their work to TurnItIn and see their originality reports ahead of the professor, allowing them to review and revise.

To implement verification methods, follow the setup process outlined by the tool vendor; in the case of search-engine verification and statistical verification, include a statement in the syllabus or another frequently visited document about how and when the professor will use the verification method. Also, consistently use the verification method; avoid being a “hammer” early and do not check learner submissions afterward. 


The most intrusive academic integrity method is observation. Seeing the learner as he or she completes the assignment or assessment is the best guarantee of academic integrity, going back to the days of proctored face-to-face tests. If the professor can see the learners, this minimizes the chance of academic dishonesty. In this category fall such things as face-to-face assessments, proctored tests (both in one place and “distributed proctoring” at libraries and cooperating educational institutions), and online monitoring. Online monitoring is an emerging observation area; companies now offer video-camera monitoring services for online assessments and keystroke recording (Kryterion Online Services, 2016). Because of the synchronous nature of observation, long-term assignments are not typically suited to this method.

The best practices for observation are to be the least intrusive and the most flexible, especially for assessments where the learner is not in the same place as the observer. The scheduling flexibility allows learners to set up observations where and when they can best take assessments under the specified conditions; many schools, public libraries, and universities will proctor individual assessments as a courtesy. Observation methods often cause anxiety among assessment-takers, so methods that are the least intrusive are deemed the most effective. For example, video-camera observations work best when the learner does not know when the camera is on or off and when no indicator or video link shows the observer during the assessment.

To implement observation methods, prior notification is critical, and depending on stage guidelines, permission to observe learners remotely may be required. The range of implementation possibilities includes requiring learners to come to one location, obtain trustworthy proctoring services, or use e-monitoring tools. 

View Document

Keywordsguidances, academic, integrityDoc ID121197
OwnerTimmo D.GroupInstructional Resources
Created2022-09-09 09:08:03Updated2024-04-17 13:56:37
SitesCenter for Teaching, Learning & Mentoring
Feedback  0   0