Writing from Sources and Academic Honesty
ةيملعلارداصملا نم قيثوتلاو سابتقلاا
Presented by Abeer F. Alkhouli
Sep-12-2013
Outline
• What is Academic dishonesty? Plagiarism?
• Why should we care?
• What is fair use? What is considered plagiarism?
• How to avoid plagiarism?
• Top 10 plagiarism detection tools.
• What is ithenticate? How it works?
Research Conduct
• All academic research requires you to search and use other sources. You need to integrate materials from published sources into your own work.
• رداصملا نم سابتقلاا للاتسا ربتعي امإو ديجلا قيثوتلا امإ :
ةيملع ةقرس وأ Plagiarism
The question is
What is plagiarism and how to avoid it?
Do you know these people?
2013, Annette Schavan.
Germany's education minister plagiarized parts of her PhD thesis in 1980
2013, Revoke Hassan Rouhani's PhD degree due to plagiarism in his doctoral thesis.
Usnews.com Blog.nature.com Pal Schmitt : Hungary's
President (2010 resigned in 2012 after being stripped of his doctorate over plagiarism
former German defense minister, resigned in 2011
What is plagiarism?
(Amer. Dictionary heritage)
• To try to use or pass off idea or words of another as yours
• “word borrowing”
Merriam-Webster online Dictionary,
• To steal and pass off (the ideas or words of another) as one’s own.
• To use (another’s production) without crediting the source.
• To commit literary theft
(The Oxford English Dictionary (2011)• To present as new and original an idea or product
derived for an existing source
So what?
• A fraud, an act of stealing and lying
Plagiarism is an academic misconduct, dishonesty and a misdemeanor, felony (crime) and there are consequences and penalties for plagiarism
• Academic , legal and institutional consequences
– Academic integrity statement , Scholarly dishonesty code, Code of honor
– Academic misconduct policy & procedures
• Zero- tolerance policy
• If degree, promotion, money, prize or job is awarded, it
could be revoked and punishable in court.
Why some do it?
1. Ignorance
2. Language barrier
3. Pressure to publish or get the degree
Intention doesn’t matter
Writing from sources & fair use
Sources:
• Books, journals, websites, reports, conference proceedings, articles, unpublished work, art, video, audio.
– Paper or electronic, – Spoken or written
Fair use: The guidelines to decide the use of a source is permissible or not.
• Copyright use, Intellectual property.
• Public domain,
• Common facts & shared language
How to avoid plagiarism
You must document & give credit Whenever you use other’s
– Words, ideas, facts, theory, concepts, opinions – Graphs, drawings, figures and pictures
– Computer programs, statistics
– Any pieces of information—that are not common knowledge or shared language
• quotations of another person’s actual spoken or written words
• paraphrase of another person’s spoken or written Words
• Document even your own work: Self Plagiarism!
http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml
• Paraphrase or quote?
• How to quote a source?
• How to paraphrase a source?
Quotation & Paraphrasing
• Quotation : place the passage you are using in quotation marks, and document the source
according to a standard documentation style.
• Paraphrasing: rewrite some one’s ideas and
words in your own words and structure. You
must still acknowledge/cite the source
Good and bad paraphrase
• Passage as is
• Word-for-word
• Patch work
• Legitimate paraphrasing
Critical care nurses function in a hierarchy of roles. In this open heart surgery unit, the nurse manager hires and fires the nursing personnel. The nurse manager does not directly care for patients but follows the progress of unusual or long-term patients. On each shift a nurse assumes the role of resource nurse. This person oversees the hour-by-hour functioning of the unit as a whole, such as considering expected admissions and discharges of patients, ascertaining that beds are
available for patients in the operating room, and covering sick calls. Resource nurses also take a patient assignment. They are the most experienced of all the staff nurses. The nurse clinician has a separate job description and provides for quality of care by orienting new staff, developing unit policies, and providing direct support where needed, such as assisting in emergency situations. The clinical nurse specialist in this unit is mostly involved with formal teaching in orienting new staff. The nurse manager, nurse clinician, and clinical nurse
specialist are the designated experts. They do not take patient assignments. The resource nurse is seen as both a caregiver and a resource to other caregivers. . . . Staff nurses have a hierarchy of seniority. . . . Staff nurses are assigned to patients to provide all their nursing care. (Chase, 1995, p. 156)
The Original Passage
http://writing.wisc.edu/Handbook/QPA_paraphrase.html
http://writing.wisc.edu/Handbook/QPA_paraphrase.html
Critical care nurses have a hierarchy of roles. The nurse manager hires and fires nurses. S/he does not directly care for patients but does follow unusual or long-term cases. On each shift a resource nurse attends to the functioning of the unit as a whole, such as making sure beds are available in the
operating room, and also has a patient assignment. The nurse clinician
orients new staff, develops policies, and provides support where needed. The clinical nurse specialist also orients new staff, mostly by formal teaching. The nurse manager, nurse clinician, and clinical nurse specialist, as the designated experts, do not take patient assignments. The resource nurse is not only a caregiver but a resource to the other caregivers. Within the staff nurses there is also a hierarchy of seniority. Their job is to give assigned patients all their nursing care.
Word-for-Word Plagiarism
http://writing.wisc.edu/Handbook/QPA_paraphrase.html Chase (1995) describes how nurses in a critical care unit function in a
hierarchy that places designated experts at the top and the least senior staff nurses at the bottom. The experts — the nurse manager, nurse clinician, and clinical nurse specialist — are not involved directly in patient care. The staff nurses, in contrast, are assigned to patients and provide all their nursing care.
Within the staff nurses is a hierarchy of seniority in which the most senior can become resource nurses: they are assigned a patient but also serve as a
resource to other caregivers. The experts have administrative and teaching tasks such as selecting and orienting new staff, developing unit policies, and giving hands-on support where needed.
Patch Work Plagiarism
http://writing.wisc.edu/Handbook/QPA_paraphrase.html
In her study of the roles of nurses in a critical care unit, Chase (1995) also found a hierarchy that distinguished the roles of experts and others. Just as the educational experts described above do not directly teach students, the experts in this unit do not directly attend to patients. That is the role of the staff nurses, who, like teachers, have their own “hierarchy of seniority” (p.
156). The roles of the experts include employing unit nurses and overseeing the care of special patients (nurse manager), teaching and otherwise
integrating new personnel into the unit (clinical nurse specialist and nurse clinician), and policy-making (nurse clinician). In an intermediate position in the hierarchy is the resource nurse, a staff nurse with more experience than the others, who assumes direct care of patients as the other staff nurses do, but also takes on tasks to ensure the smooth operation of the entire facility.
A Legitimate Paraphrase
Idea, words, structure and content
• Keeping idea, words, structure? Without crediting the source?
• Keeping idea, words, structure? With crediting the source?
• Changing words? Keeping structure?
• Changing words and structure?
• Sourced? Wrong info about source?
All this is considered plagiarism
• Turning in someone else’s work as your own,
• Copying words or ideas without credit,
• Failing to put quotes in “ ” ,
• Giving incorrect/incomplete info about a source,
• Changing words but copy sentence structure without giving credit,
• Copying so much, even with credit.
KAU document!Self plagiarism
“self-plagiarism refers to the practice of presenting one’s own previously published work as though it were new”
(APA, 2010, pg. 170).
Roig (2006) suggests
• Republishing the same paper that is published
elsewhere without notifying the reader nor publisher of the journal,
• Reusing portions of a previously written (published or unpublished text) without letting the reader know that this material has appeared elsewhere,
• Publishing a significant study as smaller studies to
increase the number of publications rather than
publishing one large study
Style of documentation and proper citation
Most plagiarism can be avoided by proper citation
• What? Citation is the way you tell reader sources you used, and enough/correct information to retrieve
them.
author name, title, year or date, publisher, volume, pages,….etc• When? whenever you quote, paraphrase, use
someone’s idea previously expressed, reference work of others, other’s work that’s critical in developing
your idea .
• How? According to a specific writing style. Inside text
and at bibliography section.
Strategies for Avoiding Plagiarism
• Put in quotations everything that comes directly from the text—especially when taking notes.
• Paraphrase, but be sure you are not just rearranging or
replacing a few words. Instead, read over what you want to paraphrase carefully; cover up the text
• with your hand, or close the text so you can't see any of it (and so aren’t tempted to use the text as a “guide”). Write out the idea in your own words without peeking.
• Check your paraphrase against the original text to be sure
you have not accidentally used the same phrases or words,
and that the information is accurate.
Top 10 sites
1. Turnitin.com , writecheck.com 2. Ithenticate.com
3. Viper (www.scanmyessay.com) 4. Plagiarismchecker.com
5. Plagiarism-detect.com 6. Dustball.com
7. Plagiarisma.net
8. Plagiarismsoftware.net
9. Checkforplagiarism.net
10. Eve2 (canexus.com)
ITHENTICATE- SOFTWARE
A TOOL TO
VERIFY ORIGINALITY
DETECT & PREVENT PLAGIARISM
3-Steps
• Upload
• Compare
• Results
1-Upload
File Types and Size
• Microsoft Word® (DOC and DOCX)
• Word XML
• Plain Text (TXT)
• Adobe PostScript®
• Portable Document Format (PDF)
• HTML
• Corel WordPerfect® (WPD)
• Rich Text Format (RTF)
• 20MB or 200MB zipped
• You can covert to acceptable formats
2-Compare
Sources to compare against
The currently available search indexes are:
• Research articles, books, and conference proceedings provided by the worlds scientific, technical and medical publishers
• Internet: a database of archived and live publicly
available internet pages containing billions of pages of existing content and tens of thousands of new pages added daily
• Publications: third party periodical, journal, and
publication content including many major professional
journals, periodicals, and business publications
Sources to compare against
• Publishers, partners, internet, custom database
• 37+ billion current and archived web pages
• 92+ million published works from journals,
periodicals, magazines, encyclopedias, abstracts
• 37+ million scholarly articles, books and
conference proceedings from nearly 80,000 scientific, technical and medical journals
• Custom databases of content based on
organizations' comparison needs
RESULTS
Four modes to view reports:
1. similarity report, 2. content tracking, 3. largest match, 4. summary reports
You can exclude or include quotes and bibliography, or exclude small matches.
http://www.ithenticate.com/plagiarism-detection-text-only-reports/
How to use IThenticate reports
Warning
• Similarity Index: Necessary but not sufficient condition
• The similarity indices do not reflect iThenticate’s
assessment of whether a paper has or has not been plagiarized.
• Similarity Reports are simply a tool to help our clients find sources that contain text similar to the submitted documents.
• The decision to deem any work plagiarized must be made
carefully, and only after an in depth examination of both
the submitted paper and suspect sources.
Examples of similarity index
How high is too high?
1. High percentage problems action?
2. False alarm (false positive) action?
3. Hidden problems action?
4. Low level or no issues(possible
unauthentication) action?
QUESTIONS?