WorldWideScience

Sample records for source code plagiarism

  1. Plagiarism Detection Algorithm for Source Code in Computer Science Education

    Science.gov (United States)

    Liu, Xin; Xu, Chan; Ouyang, Boyu

    2015-01-01

    Nowadays, computer programming is getting more necessary in the course of program design in college education. However, the trick of plagiarizing plus a little modification exists among some students' home works. It's not easy for teachers to judge if there's plagiarizing in source code or not. Traditional detection algorithms cannot fit this…

  2. Detecting Source Code Plagiarism on .NET Programming Languages using Low-level Representation and Adaptive Local Alignment

    Directory of Open Access Journals (Sweden)

    Oscar Karnalim

    2017-01-01

    Full Text Available Even though there are various source code plagiarism detection approaches, only a few works which are focused on low-level representation for deducting similarity. Most of them are only focused on lexical token sequence extracted from source code. In our point of view, low-level representation is more beneficial than lexical token since its form is more compact than the source code itself. It only considers semantic-preserving instructions and ignores many source code delimiter tokens. This paper proposes a source code plagiarism detection which rely on low-level representation. For a case study, we focus our work on .NET programming languages with Common Intermediate Language as its low-level representation. In addition, we also incorporate Adaptive Local Alignment for detecting similarity. According to Lim et al, this algorithm outperforms code similarity state-of-the-art algorithm (i.e. Greedy String Tiling in term of effectiveness. According to our evaluation which involves various plagiarism attacks, our approach is more effective and efficient when compared with standard lexical-token approach.

  3. Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

    Science.gov (United States)

    Kermek, Dragutin; Novak, Matija

    2016-01-01

    In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…

  4. WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection

    Directory of Open Access Journals (Sweden)

    Deqiang Fu

    2017-01-01

    Full Text Available In this paper, we introduce a source code plagiarism detection method, named WASTK (Weighted Abstract Syntax Tree Kernel, for computer science education. Different from other plagiarism detection methods, WASTK takes some aspects other than the similarity between programs into account. WASTK firstly transfers the source code of a program to an abstract syntax tree and then gets the similarity by calculating the tree kernel of two abstract syntax trees. To avoid misjudgment caused by trivial code snippets or frameworks given by instructors, an idea similar to TF-IDF (Term Frequency-Inverse Document Frequency in the field of information retrieval is applied. Each node in an abstract syntax tree is assigned a weight by TF-IDF. WASTK is evaluated on different datasets and, as a result, performs much better than other popular methods like Sim and JPlag.

  5. A Comparison of Source Code Plagiarism Detection Engines

    Science.gov (United States)

    Lancaster, Thomas; Culwin, Fintan

    2004-06-01

    Automated techniques for finding plagiarism in student source code submissions have been in use for over 20 years and there are many available engines and services. This paper reviews the literature on the major modern detection engines, providing a comparison of them based upon the metrics and techniques they deploy. Generally the most common and effective techniques are seen to involve tokenising student submissions then searching pairs of submissions for long common substrings, an example of what is defined to be a paired structural metric. Computing academics are recommended to use one of the two Web-based detection engines, MOSS and JPlag. It is shown that whilst detection is well established there are still places where further research would be useful, particularly where visual support of the investigation process is possible.

  6. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  7. Plagiarism and Source Deception Detection Based on Syntax Analysis

    Directory of Open Access Journals (Sweden)

    Eman Salih Al-Shamery

    2017-02-01

    Full Text Available In this research, the shingle algorithm with Jaccard method are employed as a new approach to detect deception in sources in addition to detect plagiarism . Source deception occurs as a result of taking a particular text from a source and relative it to another source, while plagiarism occurs in the documents as a result of taking part or all of the text belong to another research, this approach is based on Shingle algorithm with Jaccard coefficient , Shingling is an efficient way to compare the set of shingle in the files that contain text which are used as a feature to measure the syntactic similarity of the documents and it will work with Jaccard coefficient that measures similarity between sample sets . In this proposed system, text will be checked whether it contains syntax plagiarism or not and gives a percentage of similarity with other documents , As well as research sources will be checked to detect deception in source , by matching it with available sources from Turnitin report of the same research by using shingle algorithm with Jaccard coefficient. The motivations of this work is to discovery of literary thefts that occur on the researches , especially what students are doing in their researches , also discover the deception that occurs in the sources.

  8. Students versus Plagiarism: How is Online Plagiarism Detection Service Perceived?

    Directory of Open Access Journals (Sweden)

    Muhammad Affan Ramadhana

    2016-08-01

    Full Text Available The development of information and communication technology plays a considerable role for students in writing their theses. The positive side, it will help the students to find countless number of academic sources ranging from journal articles to complete theses written by other scholars. On the other hand, it will also create a chance for the students to commit plagiarism easier. Unoriginal writing and plagiarism in this digital era can be detected in the digital way by using plagiarism detection software. This paper elaborates how students understand the concept of plagiarism, how they avoid plagiarism, and how they perceive online plagiarism detection service. The data was taken from interviews to MA students during their period of thesis writing. This paper concludes several important outlines to be learning guidelines for the students in improving their academic writing.

  9. Prevalence of plagiarism among medical students.

    Science.gov (United States)

    Bilić-Zulle, Lidija; Frković, Vedran; Turk, Tamara; Azman, Josip; Petrovecki, Mladen

    2005-02-01

    To determine the prevalence of plagiarism among medical students in writing essays. During two academic years, 198 second year medical students attending Medical Informatics course wrote an essay on one of four offered articles. Two of the source articles were available in an electronic form and two in printed form. Two (one electronic and one paper article) were considered less complex and the other two more complex. The essays were examined using plagiarism detection software "WCopyfind," which counted the number of matching phrases with six or more words. Plagiarism rate, expressed as the percentage of the plagiarized text, was calculated as a ratio of the absolute number of matching words and the total number of words in the essay. Only 17 (9%) of students did not plagiarize at all and 68 (34%) plagiarized less than 10% of the text. The average plagiarism rate (% of plagiarized text) was 19% (5-95% percentile=0-88). Students who were strictly warned not to plagiarize had a higher total word count in their essays than students who were not warned (P=0.002) but there was no difference between them in the rate of plagiarism. Students with higher grades in Medical Informatics exam plagiarized less than those with lower grades (P=0.015). Gender, subject source, and complexity had no influence on the plagiarism rate. Plagiarism in writing essays is common among medical students. An explicit warning is not enough to deter students from plagiarism. Detection software can be used to trace and evaluate the rate of plagiarism in written student assays.

  10. The problem of plagiarism.

    Science.gov (United States)

    Anderson, Melissa S; Steneck, Nicholas H

    2011-01-01

    Plagiarism is a form of research misconduct and a serious violation of the norms of science. It is the misrepresentation of another's ideas or words as one's own, without proper acknowledgement of the original source. Certain aspects of plagiarism make it less straightforward than this definition suggests. Over the past 30 years, the U.S. Federal Government has developed and refined its policies on misconduct, and Federal agencies, as well as research institutions, have established approaches to responding to allegations and instances of plagiarism. At present, efforts to avert plagiarism focus on plagiarism-detection software and instructional strategies. Copyright © 2011 Elsevier Inc. All rights reserved.

  11. Plagiarism and Self-plagiarism

    OpenAIRE

    2013-01-01

    Plagiarism is unauthorized appropriation of other people’s ideas, processes or text without giving correct credit and with intention to present it as own property. Appropriation of own published ideas or text and passing it as original is denominated self-plagiarism and considered as bad as plagiarism. The frequency of plagiarism is increasing and development of information and communication technologies facilitates it, but simultaneously, thanks to the same technology, plagiarism detection s...

  12. Knowing and avoiding plagiarism during scientific writing.

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, Svvs; Nagasree, M

    2014-09-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing.

  13. Knowing and Avoiding Plagiarism During Scientific Writing

    Science.gov (United States)

    Kumar, P Mohan; Priya, N Swapna; Musalaiah, SVVS; Nagasree, M

    2014-01-01

    Plagiarism has become more common in both dental and medical communities. Most of the writers do not know that plagiarism is a serious problem. Plagiarism can range from simple dishonesty (minor copy paste/any discrepancy) to a more serious problem (major discrepancy/duplication of manuscript) when the authors do cut-copy-paste from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism. However, it is still a current topic of interest to all the researchers to know how to avoid plagiarism. It's time to every young researcher to know ethical guidelines while writing any scientific publications. By using one's own ideas, we can write the paper completely without looking at the original source. Specific words from the source can be added by using quotations and citing them which can help in not only supporting your work and amplifying ideas but also avoids plagiarism. It is compulsory to all the authors, reviewers and editors of all the scientific journals to know about the plagiarism and how to avoid it by following ethical guidelines and use of plagiarism detection software while scientific writing. PMID:25364588

  14. Plagiarism – A Noble Misconduct

    Directory of Open Access Journals (Sweden)

    Md. Rezwanur Rahman

    2015-07-01

    eloquence of the text.8 But, there is a dilemma in scientific writing where the essence of the work is the originality of the scientific content no matter how it is presented.9 Unlike any other author, the author of a scientific paper are ought to follow certain well-established scientific methodology and always be careful not to be affected by his or her intuition or biases that might jeopardize the judgment of a researcher.9,10 For a scientific paper, the author has to take sufficient time to read and understand thoroughly the main source of the article, and then he can organize into his own ideas or thoughts. Before submitting their ideas or manuscript to the journal office, the author should rewrite the article in his own words without seeing from the original source and if in any doubt, should take help of the guide/instructor.4,11,12 Researchers and authors of scholarly papers have to follow ethical codes of Good Scientific Practice (GSP,13 primarily based of the principles of honesty and integrity.11 In the modern-day collaborative and multidisciplinary research, honesty of each and every author is becoming a pillar of trustworthy science.14 Scientists absorb new information, design new studies and publish their experimental results in various related biomedical journals. Because of the ease of using various search engines for researching resources on the internet, large numbers of published papers that contain an enormous amount of study materials can be quickly obtained. As such, plagiarism or duplicate publication may occur either consciously or unconsciously when the authors are preparing their manuscript.15 In fact availability of internet facilities and free online journals are the main sources of today's plagiarism among the students, faculty and researchers of any profession.6,16-19 Unfortunately, digitalization made copy-paste plagiarism and inappropriate re-use of sources from the websites, online journals, and other electronic media widespread.14 According

  15. Source credibility and idea improvement have independent effects on unconscious plagiarism errors in recall and generate-new tasks.

    Science.gov (United States)

    Perfect, Timothy J; Field, Ian; Jones, Robert

    2009-01-01

    Unconscious plagiarism occurs when people try to generate new ideas or when they try to recall their own ideas from among a set generated by a group. In this study, the factors that independently influence these two forms of plagiarism error were examined. Participants initially generated solutions to real-world problems in 2 domains of knowledge in collaboration with a confederate presented as an expert in 1 domain. Subsequently, the participant generated improvements to half of the ideas from each person. Participants returned 1 day later to recall either their own ideas or their partner's ideas and to complete a generate-new task. A double dissociation was observed. Generate-new plagiarism was driven by partner expertise but not by idea improvement, whereas recall plagiarism was driven by improvement but not expertise. This improvement effect on recall plagiarism was seen for the recall-own but not the recall-partner task, suggesting that the increase in recall-own plagiarism is due to mistaken idea ownership, not source confusion.

  16. A Real-Time Plagiarism Detection Tool for Computer-Based Assessments

    Science.gov (United States)

    Jeske, Heimo J.; Lall, Manoj; Kogeda, Okuthe P.

    2018-01-01

    Aim/Purpose: The aim of this article is to develop a tool to detect plagiarism in real time amongst students being evaluated for learning in a computer-based assessment setting. Background: Cheating or copying all or part of source code of a program is a serious concern to academic institutions. Many academic institutions apply a combination of…

  17. Plagiarism and Self-plagiarism

    Directory of Open Access Journals (Sweden)

    Bakir Mehić

    2013-08-01

    Full Text Available Plagiarism is unauthorized appropriation of other people’s ideas, processes or text without giving correct credit and with intention to present it as own property. Appropriation of own published ideas or text and passing it as original is denominated self-plagiarism and considered as bad as plagiarism. The frequency of plagiarism is increasing and development of information and communication technologies facilitates it, but simultaneously, thanks to the same technology, plagiarism detection software is developing[1].Within academia, plagiarism by students, professors, or researchers is considered academic dishonesty or academic fraud, and offenders are punished by sanctions ranging from suspension to termination, along with the loss of credibility and perceived integrity[2].When we talking about self-plagiarism avid B. Resnik clarifies, “Self-plagiarism involves dishonesty but not intellectual theft[3].” Roig (2002[4] offers a useful classification system including four types of self-plagiarism: - duplicate publication of an article in more than one journal;- partitioning of one study into multiple publications, often called salami-slicing;- text recycling; and- copyright infringement. In cases of proven plagiarism and academic self-plagiarism consequences may include[5]: - The author is obliged to withdraw the disputable manuscript which is already published or in different pre-publication stages.- In the event of co-authorship, the co-author must approve of publication withdrawal, even if the misconduct is not related to them.- Publications proved to be false by the Commission are erased from author’s bibliography or marked appropriately.- The procedure for detraction from academic degrees (MSc or PhD at the University is initiated if obtained based on false thesis or dissertation.- The procedure for detraction from scientific and educational titles is initiated by a relevant body if based on false publications or other

  18. Personalized Assessment as a Means to Mitigate Plagiarism

    Science.gov (United States)

    Manoharan, Sathiamoorthy

    2017-01-01

    Although every educational institution has a code of academic honesty, they still encounter incidents of plagiarism. These are difficult and time-consuming to detect and deal with. This paper explores the use of personalized assessments with the goal of reducing incidents of plagiarism, proposing a personalized assessment software framework…

  19. Knowing and avoiding plagiarism during scientific writing | Mohan ...

    African Journals Online (AJOL)

    Knowing and avoiding plagiarism during scientific writing. ... from the original source without giving adequate credit to the main source. When we search databases like PubMed/MedLine there is a lot of information regarding plagiarism.

  20. Research into Plagiarism Cases and Plagiarism Detection Methods

    OpenAIRE

    Kashkur, M; Paršutins, S; Borisovs, A

    2010-01-01

    In the age of information technology intellectual property becomes especially valuable. This is one of the causes why the cases of the plagiarism appear more frequently in all vital sectors. Due to that, there is a growing need for different instruments for the protection and verification of copyright for finding plagiarism. Before checking the document for plagiarism, reviewing algorithms and approaches for searching plagiarism, you must know and understand what constitutes the plagiarism. T...

  1. Source-Code Plagiarism in Universities: A Comparative Study of Student Perspectives in China and the UK

    Science.gov (United States)

    Zhang, Dongyang; Joy, Mike; Cosma, Georgina; Boyatt, Russell; Sinclair, Jane; Yau, Jane

    2014-01-01

    There has been much research and discussion relating to variations in plagiaristic activity observed in students from different demographic backgrounds. Differences in behaviour have been noted in many studies, although the underlying reasons are still a matter of debate. Existing work focuses mainly on textual plagiarism, and most often derives…

  2. Plagiarism: Why is it such a big issue for medical writers?

    OpenAIRE

    Natasha Das; Monica Panjabi

    2011-01-01

    Plagiarism is the wrongful presentation of somebody else‘s work or idea as one’s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-p...

  3. None-Native University Students’ Perception of Plagiarism

    Directory of Open Access Journals (Sweden)

    Ummul Khair Ahmad

    2012-01-01

    Full Text Available Plagiarism is a complex issue especially among non-native students and it has received a lot of attention from researchers and scholars of academic writing. Some scholars attribute this problem to cultural perceptions and different attitudes toward texts. This study evaluates student perception of different aspects of plagiarism. A small group of postgraduate students in a Malaysian university were asked to categorize ten cases of plagiarism instances. They were also asked to identify plagiarized paraphrased versions of five excerpts of different source texts provided. The findings showed that students had misconceptions about different aspect of plagiarism including citation conventions, collusion, using another writer’s idea, and style of writing. Further analysis has shown that students were aware that plagiarism is wrong but they could not correctly identify the multiple forms in which plagiarism could happen. These findings indicate that students need to be taught and exposed to various forms and layers of plagiarism so that they would know how best to avoid it in their own writing.

  4. Foreign-Educated Graduate Nursing Students and Plagiarism.

    Science.gov (United States)

    Knowlton, Mary; Collins, Shawn Bryant

    2017-04-01

    Plagiarism is a concern related to students educated in countries other than the United States, where English is not the first language spoken. The authors' experience with plagiarism by a foreign-educated nursing student prompted an investigation into this topic. This article focuses on the occurrence of unintentional plagiarism, a common focus with foreign-educated students, addressing linguistic, as well as cultural, viewpoints. The findings from the literature on plagiarism among foreign-educated students are elicited and the article discusses strategies to help foreign-educated students learn about plagiarism and how to properly cite and reference sources. A variety of proactive strategies exist that can be used by both faculty and students to mitigate the occurrence of plagiarism by foreign-educated nursing students in higher education, starting with a clearer understanding of some of the antecedents to the problem of plagiarism. [J Nurs Educ. 2017;56(4):211-214.]. Copyright 2017, SLACK Incorporated.

  5. Social influences on unconscious plagiarism and anti-plagiarism.

    Science.gov (United States)

    Hollins, Timothy J; Lange, Nicholas; Dennis, Ian; Longmore, Christopher A

    2016-08-01

    People are more likely to unconsciously plagiarise ideas from a same-sex partner than a different-sex partner, and more likely to unconsciously plagiarise if recalling alone rather than in the presence of their partner [Macrae, C. N., Bodenhausen, G. V., & Calvini, G. (1999). Contexts of cryptomnesia: May the source be with you. Social Cognition, 17, 273-297. doi: 10.1521/soco.1999.17.3.273 ]. Two sets of experiments explore these phenomena, using extensions of the standard unconscious plagiarism paradigm. In Experiment 1A participants worked together in same- or different-sex dyads before trying to recall their own ideas or their partner's ideas. More source errors were evident for same-sex dyads (Experiment 1A), but this effect was absent when participants recalled from both sources simultaneously (Experiment 1B). In Experiment 2A, participants recalled ideas from a single source either alone or in the presence of the partner, using an extended-recall task. Partner presence did not affect the availability of ideas, but did reduce the propensity to report them as task compliant, relative to a partner-present condition. Simultaneous recall from both sources removed this social effect (Experiment 2B). Thus social influences on unconscious plagiarism are apparent, but are influenced by the salience of the alternate source at retrieval.

  6. Plagiarism Curricula May Reduce Need for Punitive Plagiarism Education

    Directory of Open Access Journals (Sweden)

    Robin E. Miller

    2014-03-01

    Full Text Available Objective – To describe the development and implementation of two courses designed to help university students avoid plagiarism. Design – Quantitative and qualitative analysis. Setting – A university in the United Kingdom. Subjects – An unknown number of university students who took a Plagiarism Awareness Program (PAP course between 2008 and 2011, and approximately 3,000 university students enrolled in a Plagiarism Avoidance for New Students (PANS course delivered via a virtual learning environment (VLE between October and December 2012. The authors attempted to collect rates of continued plagiarism among students who had taken plagiarism education courses. The authors also surveyed 702 university students about plagiarism in 2011. Methods – Data collected from PAP participants informed revision of the authors’ approach to plagiarism education and led to development of the second course, PANS. At the end of the course, students completed a test of their knowledge about plagiarism. Authors compared scores from students who took a course supervised by a librarian to the scores from students who took the course independently. Main Results – Students reported that many aspects of citation and attribution are challenging (p. 149. The authors discovered that 93% of students who completed the PANS course facilitated by a librarian in-person passed the final exam with a grade of 70% or higher, while 85% of students who took the same course independently, without a librarian instructor, in an online VLE scored 70% or higher (p. 155. The authors report that referrals of students who plagiarized declined significantly (p-value < 0.001 since the implementation of a plagiarism avoidance curriculum. Conclusion – As reported by the authors, first-year university students require more extensive education about plagiarism avoidance. A university plagiarism avoidance program instructed by librarians reduces the total number of students caught

  7. Single Sourcing, Boilerplates, and Re-Purposing: Plagiarism and Technical Writing

    Science.gov (United States)

    Louch, Michelle O'Brien

    2016-01-01

    In academia, plagiarism adheres to the traditional definition: utilizing another person's words or ideas without proper credit. Students are taught to cite everything, while instructors are given tools to detect plagiarism. This ultimately creates an atmosphere of paranoia, where students fear accusation and teachers are convinced that plagiarism…

  8. Plagiarism in research.

    Science.gov (United States)

    Helgesson, Gert; Eriksson, Stefan

    2015-02-01

    Plagiarism is a major problem for research. There are, however, divergent views on how to define plagiarism and on what makes plagiarism reprehensible. In this paper we explicate the concept of "plagiarism" and discuss plagiarism normatively in relation to research. We suggest that plagiarism should be understood as "someone using someone else's intellectual product (such as texts, ideas, or results), thereby implying that it is their own" and argue that this is an adequate and fruitful definition. We discuss a number of circumstances that make plagiarism more or less grave and the plagiariser more or less blameworthy. As a result of our normative analysis, we suggest that what makes plagiarism reprehensible as such is that it distorts scientific credit. In addition, intentional plagiarism involves dishonesty. There are, furthermore, a number of potentially negative consequences of plagiarism.

  9. Rethinking Plagiarism

    Science.gov (United States)

    Nealy, Chynette

    2011-01-01

    Plagiarism, presenting someone's words or other creative products as one's own, is a mandatory discussion and writing assignment in many undergraduate business communication courses. Class discussions about this topic tend to be lively, ranging from questions about simply omitting identified sources to different standards of ethical behaviors…

  10. Plagiarism in residency application essays.

    Science.gov (United States)

    Segal, Scott; Gelfand, Brian J; Hurwitz, Shelley; Berkowitz, Lori; Ashley, Stanley W; Nadel, Eric S; Katz, Joel T

    2010-07-20

    Anecdotal reports suggest that some residency application essays contain plagiarized content. To determine the prevalence of plagiarism in a large cohort of residency application essays. Retrospective cohort study. 4975 application essays submitted to residency programs at a single large academic medical center between 1 September 2005 and 22 March 2007. Specialized software was used to compare residency application essays with a database of Internet pages, published works, and previously submitted essays and the percentage of the submission matching another source was calculated. A match of more than 10% to an existing work was defined as evidence of plagiarism. Evidence of plagiarism was found in 5.2% (95% CI, 4.6% to 5.9%) of essays. The essays of non-U.S. citizens were more likely to demonstrate evidence of plagiarism. Other characteristics associated with the prevalence of plagiarism included medical school location outside the United States and Canada; previous residency or fellowship; lack of research experience, volunteer experience, or publications; a low United States Medical Licensing Examination Step 1 score; and non-membership in the Alpha Omega Alpha Honor Medical Society. The software database is probably incomplete, the 10%-match threshold for defining plagiarism has not been statistically validated, and the study was confined to applicants to 1 institution. Evidence of matching content in an essay cannot be used to infer the applicant's intent and is not sensitive to variations in the cultural context of copying in some societies. Evidence of plagiarism in residency application essays is more common in international applicants but was found in those by applicants to all specialty programs, from all medical school types, and even among applicants with significant academic honors. No external funding.

  11. How to Verify and Manage the Translational Plagiarism?

    Science.gov (United States)

    Wiwanitkit, Viroj

    2016-01-01

    The use of Google translator as a tool for determining translational plagiarism is a big challenge. As noted, plagiarism of the original papers written in Macedonian and translated into other languages can be verified after computerised translation in other languages. Attempts to screen the translational plagiarism should be supported. The use of Google Translate tool might be helpful. Special focus should be on any non-English reference that might be the source of plagiarised material and non-English article that might translate from an original English article, which cannot be detected by simple plagiarism screening tool. It is a hard job for any journal to detect the complex translational plagiarism but the harder job might be how to effectively manage the case. PMID:27703588

  12. Stealing or Sharing? Cross-Cultural Issues of Plagiarism in an Open-Source Era

    Science.gov (United States)

    Haitch, Russell

    2016-01-01

    More professors and institutions want to move from a detect-and-punish to an educate-and-prevent model for dealing with plagiarism. Understanding the causes of plagiarism, especially among international students, can aid in efforts to educate students and prevent plagiarism. Research points to a confluence of causal factors, such as time pressure,…

  13. Plagiarism: Why is it such a big issue for medical writers?

    Science.gov (United States)

    Das, Natasha; Panjabi, Monica

    2011-01-01

    Plagiarism is the wrongful presentation of somebody else‘s work or idea as one’s own without adequately attributing it to the source. Most authors know that plagiarism is an unethical publication practice. Yet, it is a serious problem in the medical writing arena. Plagiarism is perhaps the commonest ethical issue plaguing medical writing. In this article, we highlight the different types of plagiarism and address the issues of plagiarism of text, plagiarism of ideas, mosaic plagiarism, self-plagiarism, and duplicate publication. An act of plagiarism can have several repercussions for the author, the journal in question and the publication house as a whole. Sometimes, strict disciplinary action is also taken against the plagiarist. The article cites examples of retraction of articles, suspension of authors, apology letters from journal editors, and other such actions against plagiarism. PMID:21731858

  14. PLAGIARISM IN DISSERTATIONS

    Directory of Open Access Journals (Sweden)

    M. S. Gelfand

    2018-01-01

    Full Text Available Introduction. Originality and independence is the first, absolute and general requirement to the content of dissertations, regardless of an academic degree and research direction. At the same time, recently a considerable fraction of different types of plagiarism have been found out in the Russian dissertation works. The aim is an analysis of the most frequent plagiarism in candidate and doctoral dissertations. Results. We consider the established practices in the evaluation of independence in academic works. Unethical use of someone else’s work and materials by the authors of dissertations include, in particular, copying from official documents and abstracts without acknowledgement the source and with no citation; replication of existing reviews and chapters from already defended dissertations; falsification by refreshing of outdated data with substituted dates, and or wordfor-word copy-pasting with substitution of the research object. The latter type of the plagiarism involving fraud in experimental and statistical data constitutes a special peril for the science and for the society in general. The primary principle for assessment of independence in dissertations has to be proper citing and referencing that should allow a reader to distinguish the author’s contribution from someone else’s text. Undocumented verbatim quotations in dissertations are inadmissible, whether the author claims scientific novelty or not. At that, it does not matter whether well-known or unique data are provided, and whether the source is protected by a copyright. Practical significance. The qualitative analysis of the factual material, based on the author’s observations, can serve as a starting point for the subsequent quantitative analysis of plagiarism in scientific texts. 

  15. Surveillance in Programming Plagiarism beyond Techniques: An Incentive-Based Fishbone Model

    Science.gov (United States)

    Wang, Yanqing; Chen, Min; Liang, Yaowen; Jiang, Yu

    2013-01-01

    Lots of researches have showed that plagiarism becomes a severe problem in higher education around the world, especially in programming learning for its essence. Therefore, an effective strategy for plagiarism surveillance in program learning is much essential. Some literature focus on code similarity algorithm and the related tools can help to…

  16. Plagiarism: Librarians Help Provide New Solutions to an Old Problem.

    Science.gov (United States)

    Hamilton, Denise

    2003-01-01

    While technology has made plagiarism easier, it has also made it easier to detect. This article explains how librarians are getting involved in this battle, what can tip off a plagiarized hand, and the software that can turn suspicion into confirmation. A list of online sources of plagiarism guidelines is provided. (AEF)

  17. Avoiding plagiarism: guidance for nursing students.

    Science.gov (United States)

    Price, Bob

    The pressures of study, diversity of source materials, past assumptions relating to good writing practice, ambiguous writing guidance on best practice and students' insecurity about their reasoning ability, can lead to plagiarism. With the use of source checking software, there is an increased chance that plagiarised work will be identified and investigated, and penalties given. In extreme cases, plagiarised work may be reported to the Nursing and Midwifery Council and professional as well as academic penalties may apply. This article provides information on how students can avoid plagiarism when preparing their coursework for submission.

  18. EDITORIAL: On plagiarism

    Science.gov (United States)

    Harris, Simon; Webb, Steve; Hendee, William R.

    2008-03-01

    Plagiarism Plagiarism is, we are pleased to observe, not a common occurrence in Physics in Medicine & Biology (PMB); however, like those responsible for all scientific journals, we are concerned about plagiarism, and very keen to prevent it. The Publications Committee of the International Organization of Medical Physics (IOMP) has prepared a generic editorial on plagiarism. The editorial is reproduced here (with permission of the IOMP), with slight modifications to enhance its relevance to the audience of PMB, along with our procedures for dealing with any cases of plagiarism should they ever arise. Plagiarism (from the Latin 'plagiare', 'to kidnap') is defined as 'the appropriation or imitation of the language, ideas, and thoughts of another author, and representation of them as one's original work' (the Random House Dictionary of the English Language—unabridged). Plagiarism is a serious breach of research ethics that, if committed intentionally, is considered research misconduct. Plagiarism in its most serious form is the passing off of all, or large sections, of another author's published paper as one's original work. If, following appropriate confidential investigation (see below), such a plagiarism is established, this will result in heavy sanctions including retraction of the article, up to a 5 year publication ban from PMB, and informing of employers and/or professional bodies (even after one offence). This may result in loss of research funding, loss of professional stature, and even termination of employment of the plagiarizing author(s). Plagiarism undermines the authenticity of research manuscripts and the journals in which they are published, and compromises the integrity of the scientific process and the public regard for science. Plagiarism violates the literary rights of the individuals who are plagiarized, and the property rights of copyright holders. Violation of these rights may result in legal action against the individual(s) committing

  19. Plagiarism in nursing education: an integrative review.

    Science.gov (United States)

    Lynch, Joan; Everett, Bronwyn; Ramjan, Lucie M; Callins, Renee; Glew, Paul; Salamonson, Yenna

    2017-10-01

    To identify the prevalence and antecedents of plagiarism within nursing education and approaches to prevention and management. There has been growing media attention highlighting the prevalence of plagiarism in universities, including the academic integrity of undergraduate nursing students. A breach of academic integrity among nursing students also raises further concern with the potential transfer of this dishonest behaviour to the clinical setting. Integrative review. A systematic search of five electronic databases including CINAHL, MEDLINE, SCOPUS, ProQuest Nursing & Allied Health Source, and ERIC was undertaken. Only primary studies related to plagiarism and nursing students (undergraduate or postgraduate) studying at a tertiary education institution or nursing faculty were included. Both qualitative and quantitative study designs were included. Twenty studies were included in this review with six key themes identified: (1) prevalence; (2) knowledge, understanding and attitudes; (3) types of plagiarism; (4) antecedents to plagiarism; (5) interventions to reduce or prevent plagiarism; and (6) the relationship between academic honesty and professional integrity. Plagiarism is common among university nursing students, with a difference in perception of this behaviour between students and academics. The review also highlighted the importance of distinguishing between inadvertent and deliberate plagiarism, with differing strategies suggested to address this behaviour. Nevertheless, interventions to reduce plagiarism have not been shown to be effective. The current punitive approach to plagiarism within nursing faculties has not reduced its occurrence. There is a need to promote awareness, knowledge and provide students with the appropriate referencing skills, to reduce the significant amount of inadvertent plagiarism. The importance of promoting honesty and academic integrity in nursing education is highlighted. Cheating within the academic setting has been

  20. Local Plagiarisms

    Science.gov (United States)

    Borg, Erik

    2009-01-01

    Plagiarism and collusion are significant issues for most lecturers whatever their discipline, and to universities and the higher education sector. Universities respond to these issues by developing institutional definitions of plagiarism, which are intended to apply to all instances of plagiarism and collusion. This article first suggests that…

  1. The Use of Technology to Combat Plagiarism in Business Communication Classes

    Science.gov (United States)

    Stowers, Robert H.; Hummel, Julie Y.

    2011-01-01

    Some have called plagiarism literary theft. Plagiarizing is akin to stealing the intellect of another person. At times, plagiarism occurs because of ignorance, sloppy authorship, or lack of knowledge about proper sourcing. Sometimes, it is done purposefully. Experts have suggested that the concept of intellectual ownership is limited to Western…

  2. University Student Online Plagiarism

    Science.gov (United States)

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  3. Citation-based plagiarism detection detecting disguised and cross-language plagiarism using citation pattern analysis

    CERN Document Server

    Gipp, Bela

    2014-01-01

    Plagiarism is a problem with far-reaching consequences for the sciences. However, even today's best software-based systems can only reliably identify copy & paste plagiarism. Disguised plagiarism forms, including paraphrased text, cross-language plagiarism, as well as structural and idea plagiarism often remain undetected. This weakness of current systems results in a large percentage of scientific plagiarism going undetected. Bela Gipp provides an overview of the state-of-the art in plagiarism detection and an analysis of why these approaches fail to detect disguised plagiarism forms. The aut

  4. Helping International Students Succeed Academically through Research Process and Plagiarism Workshops

    Science.gov (United States)

    Chen, Yu-Hui; Van Ullen, Mary K.

    2011-01-01

    Workshops on the research process and plagiarism were designed to meet the needs of international students at the University at Albany. The research process workshop covered formulating research questions, as well as locating and evaluating sources. The plagiarism workshop focused on acknowledging sources, quoting, paraphrasing, and summarizing…

  5. Plagiarism in scientific publishing.

    Science.gov (United States)

    Masic, Izet

    2012-12-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader's own scientific contribution. There is no general regulation of control of

  6. Student's Plagiarisms in Higher Learning Institutions in the Era of Improved Internet Access: Case Study of Developing Countries

    Science.gov (United States)

    Anney, Vicent Naano; Mosha, Mary Atanas

    2015-01-01

    This study investigated students' plagiarism practices in Tanzania higher learning institutions by involving two universities-one public and one private university as a case study. The universities involved have honour code and policies for plagiarism detection however they do not employ software for checking students' plagiarism. The study…

  7. Authorship attribution of source code by using back propagation neural network based on particle swarm optimization.

    Science.gov (United States)

    Yang, Xinyu; Xu, Guoai; Li, Qi; Guo, Yanhui; Zhang, Miao

    2017-01-01

    Authorship attribution is to identify the most likely author of a given sample among a set of candidate known authors. It can be not only applied to discover the original author of plain text, such as novels, blogs, emails, posts etc., but also used to identify source code programmers. Authorship attribution of source code is required in diverse applications, ranging from malicious code tracking to solving authorship dispute or software plagiarism detection. This paper aims to propose a new method to identify the programmer of Java source code samples with a higher accuracy. To this end, it first introduces back propagation (BP) neural network based on particle swarm optimization (PSO) into authorship attribution of source code. It begins by computing a set of defined feature metrics, including lexical and layout metrics, structure and syntax metrics, totally 19 dimensions. Then these metrics are input to neural network for supervised learning, the weights of which are output by PSO and BP hybrid algorithm. The effectiveness of the proposed method is evaluated on a collected dataset with 3,022 Java files belong to 40 authors. Experiment results show that the proposed method achieves 91.060% accuracy. And a comparison with previous work on authorship attribution of source code for Java language illustrates that this proposed method outperforms others overall, also with an acceptable overhead.

  8. Investigating Plagiarism: The Form and The Motivation in Performing Plagiarism in High Education

    Directory of Open Access Journals (Sweden)

    S Sariffuddin

    2017-05-01

    Full Text Available The rapid development of information technology, especially the Internet is pointed out to be factor driving the student to practice plagiarism. Prevention efforts continue to be made both from government policies and stakeholder by creating software anti-plagiarism. However, in the reality the practice of plagiarism re-mains common and relatively more widespread. This practice continues to be varied, so that we need to up-date the information and findings through investigations plagiarism practices in student assign-ments. The method used was a mixed-method approach or mix of quantitative and quali-tative approaches. A quantitative approach was done by using software turnitin.com to scan for plagiarism indication of the level of student assignment in common. To study the behavior of plagiarism, the interview process was also done informally to students who commit high plagiarism. The results showed that the pattern of students’ plagiarism consists of five forms: sham paraphrasing, illicit paraphrasing, other plagiarism, copying verbatim and purloining. Illicit paraphrasing practices are a form of copy-paste literature review and did not pay attention to the bibliography. Besides, the practice of plagiarism is closely associated with low academic writing knowledge. Therefore, the practice of plagiarism should not only be viewed from the perspective of the academic violations, but also from the other perspectives.

  9. The plagiarism project.

    Science.gov (United States)

    Glassman, Nancy R; Sorensen, Karen; Habousha, Racheline G; Minuti, Aurelia; Schwartz, Rachel

    2011-01-01

    Plagiarism has been a problem plaguing academia for centuries. The Internet has made it easier than ever to copy material from one electronic document and paste it into another. Many cases are unintentional, as writers are unaware of the rules regarding plagiarism. This paper provides an overview of plagiarism and describes a project in which librarians partnered with the assistant dean of a graduate science program to educate students about the perils of plagiarism and encourage ethical writing practices.

  10. Plagiarism in computer science courses

    Energy Technology Data Exchange (ETDEWEB)

    Harris, J.K. [Francis Marion Univ., Florence, SC (United States)

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  11. Beyond Culture: Helping International Students Avoid Plagiarism

    OpenAIRE

    Soni Adhikari

    2017-01-01

    With the rapid increase in the number of international students from different academic backgrounds around the world, college and university teachers in the West find it harder to understand the many and complex reasons when these students plagiarize or use sources ineffectively. Reviewing relevant literature, I first make a pedagogical analysis of student plagiarism then show why teachers should shift focus from traditional views about cultural difference toward a multidimensional understand...

  12. Prevalence of plagiarism in recent submissions to the Croatian Medical Journal.

    Science.gov (United States)

    Baždarić, Ksenija; Bilić-Zulle, Lidija; Brumini, Gordana; Petrovečki, Mladen

    2012-06-01

    To assess the prevalence of plagiarism in manuscripts submitted for publication in the Croatian Medical Journal (CMJ). All manuscripts submitted in 2009-2010 were analyzed using plagiarism detection software: eTBLAST, CrossCheck, and WCopyfind. Plagiarism was suspected in manuscripts with more than 10% of the text derived from other sources. These manuscripts were checked against the Déjà vu database and manually verified by investigators. Of 754 submitted manuscripts, 105 (14%) were identified by the software as suspicious of plagiarism. Manual verification confirmed that 85 (11%) manuscripts were plagiarized: 63 (8%) were true plagiarism and 22 (3%) were self-plagiarism. Plagiarized manuscripts were mostly submitted from China (21%), Croatia (14%), and Turkey (19%). There was no significant difference in the text similarity rate between plagiarized and self-plagiarized manuscripts (25% [95% CI 22-27%] vs. 28% [95% CI 20-33%]; U = 645.50; P = 0.634). Differences in text similarity rate were found between various sections of self-plagiarized manuscripts (H = 12.65, P = 0.013). The plagiarism rate in the Materials and Methods (61% (95% CI 41-68%) was higher than in the Results (23% [95% CI 17-36%], U = 33.50; P = 0.009) or Discussion (25.5 [95% CI 15-35%]; U = 57.50; P Plagiarism detection software combined with manual verification may be used to detect plagiarized manuscripts and prevent their publication. The prevalence of plagiarized manuscripts submitted to the CMJ, a journal dedicated to promoting research integrity, was 11% in the 2-year period 2009-2010.

  13. Defining Plagiarism: A Literature Review

    Directory of Open Access Journals (Sweden)

    Akbar Akbar

    2018-02-01

    Full Text Available Plagiarism has repeatedly occurred in Indonesia, resulting in focusing on such academic misbehavior as a “central issue” in Indonesian higher education. One of the issues of addressing plagiarism in higher education is that there is a confusion of defining plagiarism. It seems that Indonesian academics had different perception when defining plagiarism. This article aims at exploring the issue of plagiarism by helping define plagiarism to address confusion among Indonesian academics. This article applies literature review by firs finding relevant articles after identifying databases for literature searching. After the collection of required articles for review, the articles were synthesized before presenting the findings. This study has explored the definition of plagiarism in the context of higher education. This research found that plagiarism is defined in the relation of criminal acts. The huge numbers of discursive features used position plagiaristic acts as an illegal deed. This study also found that cultural backgrounds and exposure to plagiarism were influential in defining plagiarism.

  14. Plagiarism in Student Research: Responsibility of the Supervisors and Suggestions to Ensure Plagiarism Free Research.

    Science.gov (United States)

    Krishan, Kewal; Kanchan, Tanuj; Baryah, Neha; Mukhra, Richa

    2017-08-01

    Plagiarism is a serious threat plaguing the research in publication of science globally. There is an increasing need to address the issue of plagiarism especially among young researchers in the developing part of the world. Plagiarism needs to be earnestly discouraged to ensure a plagiarism free research environment. We provide further suggestions to combat student plagiarism at Master's level and the regulations/guidelines regarding plagiarism in India.

  15. PLAGIARISM IN SCIENTIFIC PUBLISHING

    Science.gov (United States)

    Masic, Izet

    2012-01-01

    Scientific publishing is the ultimate product of scientist work. Number of publications and their quoting are measures of scientist success while unpublished researches are invisible to the scientific community, and as such nonexistent. Researchers in their work rely on their predecessors, while the extent of use of one scientist work, as a source for the work of other authors is the verification of its contributions to the growth of human knowledge. If the author has published an article in a scientific journal it cannot publish the article in any other journal h with a few minor adjustments or without quoting parts of the first article, which are used in another article. Copyright infringement occurs when the author of a new article with or without the mentioning the author used substantial portions of previously published articles, including tables and figures. Scientific institutions and universities should,in accordance with the principles of Good Scientific Practice (GSP) and Good Laboratory Practices (GLP) have a center for monitoring,security, promotion and development of quality research. Establish rules and compliance to rules of good scientific practice are the obligations of each research institutions,universities and every individual-researchers,regardless of which area of science is investigated. In this way, internal quality control ensures that a research institution such as a university, assume responsibility for creating an environment that promotes standards of excellence, intellectual honesty and legality. Although the truth should be the aim of scientific research, it is not guiding fact for all scientists. The best way to reach the truth in its study and to avoid the methodological and ethical mistakes is to consistently apply scientific methods and ethical standards in research. Although variously defined plagiarism is basically intended to deceive the reader’s own scientific contribution. There is no general regulation of control of

  16. Plagiarism in Academia

    Science.gov (United States)

    Shahabuddin, Syed

    2009-01-01

    Plagiarism sometimes creates legal and ethical problems for students and faculty. It can have serious consequences. Fortunately, there are ways to stop plagiarism. There are many tools available to detect plagiarism, e.g. using software for detecting submitted articles. Also, there are many ways to punish a plagiarist, e.g. banning plagiarists…

  17. Penguins and Plagiarism: Stemming the Tide of Plagiarism in Elementary School

    Science.gov (United States)

    Mitchell, Sara

    2007-01-01

    Plagiarism is on the rise on high school and college campuses. There are many reasons why students tend to plagiarize. One of these is that many students are interested in the shortest possible route through a course. Some students also fear that their writing ability is inadequate. If student plagiarism and lack of academic integrity are…

  18. Undergraduates’ Misconceptions Concerning Plagiarism

    Directory of Open Access Journals (Sweden)

    Nermin Çakmak

    2015-06-01

    Full Text Available In their education lives undergraduate students’ one of the most encountered difficulty is to provide citations for their research projects and term papers. This difficulty drives students to two kinds of plagiarism: intentional or unintentional plagiarism. In this context, plagiarism is a no ethical  scientific behaviour we encounter most frequently among undergraduate students. When plagiarism is investigated in national and international literature, which is considered as an important problem regarding scientific communication and ethics principles, it is seen that research focused on intentional plagiarism. In this context the present study aimed to focus on university students’ unintentional plagiarism, a nonethical academic behaviour, based on their misconceptions. Adding it is aimed to attract the attention of the researchers in librarianship and information sciences to the problem, increase their awareness and to encourage them to make in-depth research. Thus the present study includes issues of conceptions; learning concepts; misconceptions; plagiarism; misconceptions of university students regarding plagiarism and the reasoning; defining and preventing misconceptions; the roles of librarianships and teachers in correcting the misconceptions regarding plagiarism. Present study followed a comprehensive review utilizing descriptive approaches to reveal the situation. At the end of the study a short summary evaluating the situation depending on the literature analysed is also added. Adding ideas and suggestions in how to reveal probable misconceptions and how to prevent or decrease their formation are also presented.

  19. Detection of bilingual plagiarism

    Directory of Open Access Journals (Sweden)

    Frank Zamora R.

    2016-06-01

    Full Text Available In this paper a computational algorithm for text alignment in the task of automatically detecting bilingual plagiarism is proposed. The method of detecting bilingual plagiarism uses machine translation services, in order to have the documents in question a base language, and apply techniques of monolingual plagiarism. The algorithm was tested with The corpus belonging to the International Competition Plagiarism 2013, with the objective of evaluating the step of detecting monolingual plagiarism. Besides it’s experimented with the collection of texts EUROPARL, a collection of documents pertaining to the meeting the European Parliament, specifically it´s to English and Spanish documents.

  20. Attitudes towards students who plagiarize: a dental hygiene faculty perspective.

    Science.gov (United States)

    Patel-Bhakta, Hemali G; Muzzin, Kathleen B; Dewald, Janice P; Campbell, Patricia R; Buschang, Peter H

    2014-01-01

    The purpose of this study was to examine baccalaureate dental hygiene faculty members' attitudes and practices regarding student plagiarism. An email containing a link to a thirty-two-item survey was sent to fifty-two baccalaureate dental hygiene program directors in the United States; thirty of those agreed for their faculty members to participate. Of the 257 faculty members who received the survey link, 106 completed the survey, for a response rate of 41.2 percent. The responding faculty members reported thinking plagiarism is a rising concern in their dental hygiene programs (54.5 percent, 54/99). The majority said they check for plagiarism on student class assignment/projects (67.1 percent, 53/79). For those who did not check for plagiarism, 45.8 percent (11/24) stated it took "too much time to check" or it was "too hard to prove" (16.6 percent, 4/24). The most frequent form of student plagiarism observed by the respondents was "copying directly from a source electronically" (78.0 percent, 39/50). Most respondents reported checking for plagiarism through visual inspection (without technological assistance) (73.0 percent, 38/52). Of those who said they use plagiarism detection software/services, 44.4 percent (16/36) always recommended their students use plagiarism detection software/services to detect unintentional plagiarism. For those faculty members who caught students plagiarizing, 52.9 percent (27/51) reported they "always or often" handled the incident within their dental hygiene department, and 76.5 percent (39/51) said they had never reported the student's violation to an academic review board.

  1. Plagiarism and self-plagiarism: What every author should know

    OpenAIRE

    Roig, Miguel

    2010-01-01

    The scientific community is greatly concerned about the problem of plagiarism and self-plagiarism. In this paper I explore these two transgressions and their various manifestations with a focus on the challenges faced by authors with limited English profi ciency.

  2. Plagiarism: More than Meets the Eye

    Directory of Open Access Journals (Sweden)

    Habsah Hussin

    2013-07-01

    Full Text Available Plagiarism is the euphemism for ‘academic theft’, ‘academic dishonesty’ and ‘academic misconduct in academia’; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally ‘the practitioners’ of plagiarism, be it un-intentionally or otherwise, factors contributing to the practise of plagiarism, effects and implications of plagiarism on the ‘practitioners’, and offers suggestions on how to reduce (if not eliminate any involvement in plagiarism. Knowledge and awareness about plagiarism would help academics and aspiring scholars to steer away from this act, as plagiarism would have dire and long term repercussions on their career, reputation and those who come to be associated with them.

  3. [High frequency of plagiarism in medical thesis from a Peruvian public university].

    Science.gov (United States)

    Saldaña-Gastulo, J Jhan C; Quezada-Osoria, C Claudia; Peña-Oscuvilca, Américo; Mayta-Tristán, Percy

    2010-03-01

    An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479) of all the paragraphs analyzed had some degree of plagiarism, literal plagiarism was the most frequent (20/27) and journals were the most common sources of plagiarism (19/27). The characteristics of the studies were observational (32/33), cross-sectional (30/33), descriptive (25/33) and retrospective (19/33). None of the authors had published in a scientific journal, and only nine of his tutors of them had at least one publication. No association was found between the characteristics of the thesis and the presence of plagiarism. In conclusion, we found a high frequency of plagiarism in theses analyzed. Is responsibility of medical schools take the necessary actions to detect and avoid plagiarism among their students.

  4. Measuring students' perceptions of plagiarism: modification and Rasch validation of a plagiarism attitude scale.

    Science.gov (United States)

    Howard, Steven J; Ehrich, John F; Walton, Russell

    2014-01-01

    Plagiarism is a significant area of concern in higher education, given university students' high self-reported rates of plagiarism. However, research remains inconsistent in prevalence estimates and suggested precursors of plagiarism. This may be a function of the unclear psychometric properties of the measurement tools adopted. To investigate this, we modified an existing plagiarism scale (to broaden its scope), established its psychometric properties using traditional (EFA, Cronbach's alpha) and modern (Rasch analysis) survey evaluation approaches, and examined results of well-functioning items. Results indicated that traditional and modern psychometric approaches differed in their recommendations. Further, responses indicated that although most respondents acknowledged the seriousness of plagiarism, these attitudes were neither unanimous nor consistent across the range of issues assessed. This study thus provides rigorous psychometric testing of a plagiarism attitude scale and baseline data from which to begin a discussion of contextual, personal, and external factors that influence students' plagiarism attitudes.

  5. Investigating Plagiarism: The Form and The Motivation in Performing Plagiarism in High Education

    OpenAIRE

    S Sariffuddin; Khristiana Dwi Astuti; Riyan Arthur

    2017-01-01

    The rapid development of information technology, especially the Internet is pointed out to be factor driving the student to practice plagiarism. Prevention efforts continue to be made both from government policies and stakeholder by creating software anti-plagiarism. However, in the reality the practice of plagiarism re-mains common and relatively more widespread. This practice continues to be varied, so that we need to up-date the information and findings through investigations plagiarism pr...

  6. Students' Perception on Plagiarism

    OpenAIRE

    Manalu, Mika Hatigoran

    2013-01-01

    This research is intended to find out how far college students' knowledge within act of plagiarism. Also, the issue of plagiarism was lifted to the surface because issues of plagiarism that have been revealed to the public is spread rapidly. One of the main reasons why plagiarism exists because teaching processing in classroom doesn't care on this issue. In this research, respondents were given a questionnaire that consists of 20 questions. Analysis of completed questionnaire showed student u...

  7. Undergraduate and Postgraduate Pharmacy Students' Perceptions of Plagiarism and Academic Honesty

    Science.gov (United States)

    Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-01-01

    Objectives To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. Methods A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Results Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. Conclusions The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty. PMID:19885074

  8. Undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty.

    Science.gov (United States)

    Ryan, Greg; Bonanno, Helen; Krass, Ines; Scouller, Karen; Smith, Lorraine

    2009-10-01

    To assess undergraduate and postgraduate pharmacy students' perceptions of plagiarism and academic honesty. A questionnaire was administered to undergraduate and postgraduate pharmacy students to determine their levels of awareness of university policy concerning academic honesty; attitudes to plagiarism by rating the acceptability of a range of plagiarizing and cheating practices; and choice of appropriate penalties for a first and second occurrence. The choice of behaviors in response to a scenario about the preparation of a reading-based written assignment and the strategies that students would be prepared to use in order to submit the assignment on time were also assessed. Findings indicated widespread deficiencies in student knowledge of, and attitudes towards, plagiarism. Students did not perceive plagiarism as a serious issue and the use of inappropriate strategies for sourcing and acknowledging material was common. The study highlights the importance of achieving a balance among the 3 dimensions of plagiarism management: prevention, detection and penalty.

  9. Helping Students Avoid Plagiarism.

    Science.gov (United States)

    Wilhoit, Stephen

    1994-01-01

    Discusses how and why college students commit plagiarism, suggesting techniques that instructors can use to help student avoid plagiarism. Instructors should define and discuss plagiarism thoroughly; discuss hypothetical cases; review the conventions of quoting and documenting material; require multiple drafts of essays; and offer responses…

  10. A Comprehensive Definition of Plagiarism.

    Science.gov (United States)

    Liddell, Jean

    2003-01-01

    Explains how the internet has made it easy for students to plagiarize papers. Gives definitions for plagiarism. Explains reasons why students plagiarize including the following: they don't understand what it is, they think they won't get caught, etc. Describes ways to detect and prevent plagiarism. (ontains 58 references.)(MZ)

  11. Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?

    Science.gov (United States)

    Youmans, Robert J.

    2011-01-01

    In two studies, students at California State University, Northridge wrote papers that were checked for plagiarism using plagiarism-detection software. In the first study, half of the students in two classes were randomly selected and told by the professor that their term papers would be scanned for plagiarism using the software. Students in the…

  12. Plagiarism in the Context of Education and Evolving Detection Strategies.

    Science.gov (United States)

    Gasparyan, Armen Yuri; Nurmashev, Bekaidar; Seksenbayev, Bakhytzhan; Trukhachev, Vladimir I; Kostyukova, Elena I; Kitas, George D

    2017-08-01

    Plagiarism may take place in any scientific journals despite currently employed anti-plagiarism tools. The absence of widely acceptable definitions of research misconduct and reliance solely on similarity checks do not allow journal editors to prevent most complex cases of recycling of scientific information and wasteful, or 'predatory,' publishing. This article analyses Scopus-based publication activity and evidence on poor writing, lack of related training, emerging anti-plagiarism strategies, and new forms of massive wasting of resources by publishing largely recycled items, which evade the 'red flags' of similarity checks. In some non-Anglophone countries 'copy-and-paste' writing still plagues pre- and postgraduate education. Poor research management, absence of courses on publication ethics, and limited access to quality sources confound plagiarism as a cross-cultural and multidisciplinary phenomenon. Over the past decade, the advent of anti-plagiarism software checks has helped uncover elementary forms of textual recycling across journals. But such a tool alone proves inefficient for preventing complex forms of plagiarism. Recent mass retractions of plagiarized articles by reputable open-access journals point to critical deficiencies of current anti-plagiarism software that do not recognize manipulative paraphrasing and editing. Manipulative editing also finds its way to predatory journals, ignoring the adherence to publication ethics and accommodating nonsense plagiarized items. The evolving preventive strategies are increasingly relying on intelligent (semantic) digital technologies, comprehensively evaluating texts, keywords, graphics, and reference lists. It is the right time to enforce adherence to global editorial guidance and implement a comprehensive anti-plagiarism strategy by helping all stakeholders of scholarly communication. © 2017 The Korean Academy of Medical Sciences.

  13. Academy Policy on Plagiarism

    Indian Academy of Sciences (India)

    IAS Admin

    any evidence of plagiarism including self-plagiarism in manuscripts submitted to them. Every reasonable effort will be made to investigate any allegations of plagiarism brought to their attention, as well as instances that come up during the peer review process. Such behaviour when proven beyond doubt is unacceptable, ...

  14. Why Do Students Plagiarize? Efl Undergraduates’ Views on the Reasons Behind Plagiarism

    Directory of Open Access Journals (Sweden)

    Doró Katalin

    2014-03-01

    Full Text Available Cheating and plagiarism spread like pandemics in many educational contexts and are difficulty to detect, fight and also to understand. The purpose of this exploratory study is to investigate what first-year students of English at a large Hungarian university believe to be the main reasons for plagiarism. Twenty-five students were asked to express their views in a free opinion essay. Perceived reasons were categorized into twelve main groups based on the literature and the reasons for plagiarism provided by faculty members at the same university. The most often mentioned reasons included saving time and effort and unintentional plagiarism.

  15. Plagiarism: More than Meets the Eye

    OpenAIRE

    Habsah Hussin; Maimunah Ismail

    2013-01-01

    Plagiarism is the euphemism for ‘academic theft’, ‘academic dishonesty’ and ‘academic misconduct in academia’; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally ‘the practitioners’ of plagiarism, be it un-intentionally or otherwise, factors contributing to the practise of plagiarism, effects and implications of plagiarism on the ‘practitioners’, and offers suggestions on how to reduce (if n...

  16. JOURNAL CLUB: Plagiarism in Manuscripts Submitted to the AJR: Development of an Optimal Screening Algorithm and Management Pathways.

    Science.gov (United States)

    Taylor, Donna B

    2017-04-01

    The objective of this study was to investigate the incidence of plagiarism in a sample of manuscripts submitted to the AJR using CrossCheck, develop an algorithm to identify significant plagiarism, and formulate management pathways. A sample of 110 of 1610 (6.8%) manuscripts submitted to AJR in 2014 in the categories of Original Research or Review were analyzed using CrossCheck and manual assessment. The overall similarity index (OSI), highest similarity score from a single source, whether duplication was from single or multiple origins, journal section, and presence or absence of referencing the source were recorded. The criteria outlined by the International Committee of Medical Journal Editors were the reference standard for identifying manuscripts containing plagiarism. Statistical analysis was used to develop a screening algorithm to maximize sensitivity and specificity for the detection of plagiarism. Criteria for defining the severity of plagiarism and management pathways based on the severity of the plagiarism were determined. Twelve manuscripts (10.9%) contained plagiarism. Nine had an OSI excluding quotations and references of less than 20%. In seven, the highest similarity score from a single source was less than 10%. The highest similarity score from a single source was the work of the same author or authors in nine. Common sections for duplication were the Materials and Methods, Discussion, and abstract. Referencing the original source was lacking in 11. Plagiarism was undetected at submission in five of these 12 articles; two had been accepted for publication. The most effective screening algorithm was to average the OSI including quotations and references and the highest similarity score from a single source and to submit manuscripts with an average value of more than 12% for further review. The current methods for detecting plagiarism are suboptimal. A new screening algorithm is proposed.

  17. Plagiarism, Cheating and Research Integrity: Case Studies from a Masters Program in Peru.

    Science.gov (United States)

    Carnero, Andres M; Mayta-Tristan, Percy; Konda, Kelika A; Mezones-Holguin, Edward; Bernabe-Ortiz, Antonio; Alvarado, German F; Canelo-Aybar, Carlos; Maguiña, Jorge L; Segura, Eddy R; Quispe, Antonio M; Smith, Edward S; Bayer, Angela M; Lescano, Andres G

    2017-08-01

    Plagiarism is a serious, yet widespread type of research misconduct, and is often neglected in developing countries. Despite its far-reaching implications, plagiarism is poorly acknowledged and discussed in the academic setting, and insufficient evidence exists in Latin America and developing countries to inform the development of preventive strategies. In this context, we present a longitudinal case study of seven instances of plagiarism and cheating arising in four consecutive classes (2011-2014) of an Epidemiology Masters program in Lima, Peru, and describes the implementation and outcomes of a multifaceted, "zero-tolerance" policy aimed at introducing research integrity. Two cases involved cheating in graded assignments, and five cases correspond to plagiarism in the thesis protocol. Cases revealed poor awareness of high tolerance to plagiarism, poor academic performance, and widespread writing deficiencies, compensated with patchwriting and copy-pasting. Depending on the events' severity, penalties included course failure (6/7) and separation from the program (3/7). Students at fault did not engage in further plagiarism. Between 2011 and 2013, the Masters program sequentially introduced a preventive policy consisting of: (i) intensified research integrity and scientific writing education, (ii) a stepwise, cumulative writing process; (iii) honor codes; (iv) active search for plagiarism in all academic products; and (v) a "zero-tolerance" policy in response to documented cases. No cases were detected in 2014. In conclusion, plagiarism seems to be widespread in resource-limited settings and a greater response with educational and zero-tolerance components is needed to prevent it.

  18. Plagiarism Prevention

    Science.gov (United States)

    Probett, Christine

    2011-01-01

    Plagiarism does exist at universities today. In some cases, students are naive with respect to understanding what plagiarism is and how to avoid it. In other cases, students blatantly disregard and disrespect the written work of others, claiming it as their own. Regardless, educators must be vigilant in their efforts to discourage and prevent…

  19. Plagiarism: An Egregious Form of Misconduct

    Science.gov (United States)

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-01-01

    Background: Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. Discussion: With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as “fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results.” Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being “theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work.” Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Conclusion: Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders. PMID:25789254

  20. Plagiarism: an egregious form of misconduct.

    Science.gov (United States)

    Juyal, Deepak; Thawani, Vijay; Thaledi, Shweta

    2015-02-01

    Publishing research papers for academic fraternity has become important for career advancement and promotion. Number of publications in peer reviewed journals and subsequent citations are recognized as measures of scientific success. Non-publishing academicians and researchers are invisible to the scientific community. With pressure to publish, misconduct has crept into scientific writing with the result that research misconduct, plagiarism, misappropriation of intellectual property, and substantial unattributed textual copying of another's publication have become common. The Office of Research Integrity, USA, defines research misconduct as "fabrication, falsification or plagiarism in proposing, performing or reviewing research, or in reporting research results." Although plagiarism is difficult to define in few words, it can be viewed as the stealing of another person's ideas, methods, results, or words without giving proper attribution. The Office of Research Integrity defines plagiarism as being "theft or misappropriation of intellectual property and the substantial unattributed textual copying of another's work." Plagiarism is one of the most vehemently derided breaches of research integrity as it undermines the original and honest contribution to an existing body of knowledge. Plagiarism has many forms viz. blatant plagiarism, technical plagiarism, patchwork plagiarism, and self-plagiarism. In any form, the plagiarism is a threat to the research integrity and is unacceptable. We do need to detect such acts and effectively prosecute the offenders.

  1. CYBER-DIGITAL PLAGIARISM: AN AWARENESS APPROACH*

    African Journals Online (AJOL)

    Lehobye

    Internet plagiarism, it is imperative to deal with the following questions: Do ... source by using its phrases or sentences, with a few changes in grammar or ..... Brinson JD et al Analysing E-Commerce and Internet Law (Prentice-Hall Upper.

  2. Plagiarism and Self-plagiarism. A Reflexion

    Directory of Open Access Journals (Sweden)

    Renzo Ramirez Bacca

    2016-07-01

    Full Text Available En el año 2011, el Ministro de Defensa Alemán Karl Theodor zu Guttenberg renunció a su cargo por ser acusado de plagiar su tesis doctoral (Luchini 2011.  Además, por primera vez en la historia de El Colegio de México, se decidió en el 2015 revocar el título de Doctor en Historia conferido en 2004 a Rodrigo Christian Núñez por plagiar su tesis doctoral (Martínez 2015. El otro caso reciente es el de César Acuña Peralta, excandidato a la presidencia en el Perú, fundador y dueño de la Universidad César Vallejo quien ha sido señalado de plagiar todos sus títulos y la autoría de un libro (Fowks 2016. Estos sucesos a nivel internacional, ofrecen un panorama para la reflexión sobre el plagio y el “auto-plagio”  en las publicaciones científicas y académicas.

  3. Plagiarism: More than Meets the Eye

    Science.gov (United States)

    Hussin, Habsah; Ismail, Maimunah

    2013-01-01

    Plagiarism is the euphemism for "academic theft", "academic dishonesty" and "academic misconduct in academia"; and is the taboo word among academics in academia. This paper discusses the issue of plagiarism in terms of what constitutes plagiarism, who are normally "the practitioners" of plagiarism, be it…

  4. Authors, editors, and the signs, symptoms and causes of plagiarism

    Science.gov (United States)

    Shashok, Karen

    2011-01-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or “the English” (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors’ ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism. PMID:21957412

  5. Authors, editors, and the signs, symptoms and causes of plagiarism

    Directory of Open Access Journals (Sweden)

    Karen Shashok

    2011-01-01

    Full Text Available Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or "the English" (which has become a common practice should be distinguished from intentional deceit for the purpose of stealing other authors′ ideas (which appears to remain a very rare practice. Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism.

  6. Authors, editors, and the signs, symptoms and causes of plagiarism.

    Science.gov (United States)

    Shashok, Karen

    2011-07-01

    Plagiarism and inadequate citing appear to have reached epidemic proportions in research publication. This article discusses how plagiarism is defined and suggests some possible causes for the increase in the plagiarism disease. Most editors do not have much tolerance for text re-use with inadequate citation regardless of reasons why words are copied from other sources without correct attribution. However, there is now some awareness that re-use of words in research articles to improve the writing or "the English" (which has become a common practice) should be distinguished from intentional deceit for the purpose of stealing other authors' ideas (which appears to remain a very rare practice). Although it has become almost as easy for editors to detect duplicate text as it is for authors to re-use text from other sources, editors often fail to consider the reasons why researchers resort to this strategy, and tend to consider any text duplication as a symptom of serious misconduct. As a result, some authors may be stigmatized unfairly by being labeled as plagiarists. The article concludes with practical advice for researchers on how to improve their writing and citing skills and thus avoid accusations of plagiarism.

  7. The problem of plagiarism.

    Science.gov (United States)

    Cronin, Sherill Nones

    2007-01-01

    Unfortunately, the frequency of plagiarism is increasing in the nursing profession. We are encouraged to write, especially those of us in academia, and we all live very active lives. Pressure to publish, especially when coupled with lack of time, can lead to plagiarism, whether inadvertent or not. This article will discuss the problem of plagiarism and provide tips on how to avoid it in your own work.

  8. Analyzing and reducing plagiarism at university

    OpenAIRE

    Jorge López Puga

    2014-01-01

    Plagiarism is one of the less desirable practises in the academic context. This paper presents an experience of massive plagiarism detection at university and the steps taken to prevent its subsequent occurrence. Plagiarism was detected in the first assessment phase of a research project practise. As a result, students were required to arrange ethical group discussions with the professor to prevent plagiarism in the future. A substantial reduction in the rate of plagiarism was observed from t...

  9. The confounding factors leading to plagiarism in academic writing and some suggested remedies: A systematic review.

    Science.gov (United States)

    Guraya, Salman Yousuf; Guraya, Shaista Salman

    2017-05-01

    There is a staggering upsurge in the incidence of plagiarism of scientific literature. Literature shows divergent views about the factors that make plagiarism reprehensible. This review explores the causes and remedies for the perennial academic problem of plagiarism. Data sources were searched for full text English language articles published from 2000 to 2015. Data selection was done using medical subject headline (MeSH) terms plagiarism, unethical writing, academic theft, retraction, medical field, and plagiarism detection software. Data extraction was undertaken by selecting titles from retrieved references and data synthesis identified key factors leading to plagiarism such as unawareness of research ethics, poor writing skills and pressure or publish mantra. Plagiarism can be managed by a balance among its prevention, detection by plagiarism detection software, and institutional sanctions against proven plagiarists. Educating researchers about ethical principles of academic writing and institutional support in training writers about academic integrity and ethical publications can curtail plagiarism.

  10. Note on plagiarism

    Indian Academy of Sciences (India)

    especially of plagiarism (including selfplagiarism), as something directly affecting the integrity of the sci- entific process. Such behaviour is unacceptable and deserves exposure and an appropriate level of penalty. In case it is inadvertently published, a paper containing plagiarized material steals credit from the original.

  11. Combating student plagiarism an academic librarian's guide

    CERN Document Server

    Lampert, Lynn D

    2014-01-01

    This practical book introduces readers to the current issues facing todays academic reference and instruction librarians grappling with the growing problem of student plagiarism. The book provides up-to-date overviews of student plagiarism, examples of ways in which librarians can educate students through proven instructional techniques, collaboration approaches and outreach methods, and discusses common problems and questions librarians may encounter when incorporating current anti-plagiarism instruction into their instructional services. Topics include: role of the academic librarian in combating student plagiarism, discipline-based approaches to combating student plagiarism, information literacy techniques and faculty/librarian collaboration. Investigates the issues surrounding the growth of instances of student plagiarism Discusses the academic librarian's role in combating student plagiarism Recommends effective outreach techniques and instructional methods for preventing plagiarism.

  12. Plagiarism and scientific writing: a personal commentary.

    Science.gov (United States)

    Ponniah, Irulandy

    2012-11-01

    There have been a number of papers that have addressed the issue of plagiarism. Nevertheless, the charges of plagiarism usually merit little attention with experts, because it is still not clear what sort of copying actually constitutes plagiarism. Another problem that eludes consensus is whether plagiarism was committed with or without intention. This paper discusses certain issues relating to plagiarism and differentiates between intentional and unintentional forms of plagiarism. © 2011 Blackwell Publishing Asia Pty Ltd.

  13. Plagiarism by Adult Learners Online: A case study in detection and remediation

    Directory of Open Access Journals (Sweden)

    Christine Jocoy

    2006-06-01

    Full Text Available Detecting and combating plagiarism from Web-based sources is a concern for administrators and instructors involved in online distance education. In this paper, we quantify copy-and-paste plagiarism among adult learners in an online geography course offered through Penn State’s World Campus Geographic Information Systems (GIS certificate program. We also evaluate the effectiveness of an “expectation management” strategy intended to discourage adult learners from unintentional violations. We found that while manual methods detected plagiarism in only about 3 percent of assignments, Turnitin.com revealed a 13 percent plagiarism rate among the same assignments. Our attempts to increase awareness and manage expectations decreased infractions measurably, but not significantly. In contrast, Turnitin.com substantially improved our ability to detect infractions. We conclude that raising awareness and managing expectations about plagiarism may be worthwhile, but is no substitute for systematic detection and vigilant enforcement, even among adult learners.

  14. Beyond the Accusation of Plagiarism

    Science.gov (United States)

    Gu, Qing; Brooks, Jane

    2008-01-01

    The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon [Russikoff, K., Fucaloro, L., Salkauskiene, D., 2003. "Plagiarism as a cross-cultural phenomenon." "The CAL Poly Pomona Journal of Interdisciplinary Studies" 16, 109-120.…

  15. Plagiarism and Responsibility.

    Science.gov (United States)

    Martin, Brian

    1984-01-01

    There are several kinds of plagiarism, and its significance varies with its circumstances. College administrations seem to avoid responsibility for examining allegations of academic plagiarism, and few procedures exist for addressing them. Until standard and open procedures are established and accepted, rigid and unrealistic attitudes will prevail…

  16. The Plagiarism Polyconundrum

    Science.gov (United States)

    Bethany, Reine D.

    2016-01-01

    Plagiarism hinders student success because it shortcuts genuine writing practice and incurs penalties when discovered. Although students are aware of its potential consequences, plagiarism continues. This article reflects on the polyconundrum of empathizing with the many hindrances to student writing while deploying strategies to reduce plagiarism…

  17. Plagiarism in the Internet Age

    Science.gov (United States)

    Howard, Rebecca Moore; Davies, Laura J.

    2009-01-01

    In an age when students gravitate to online sources for research--and when tremendous amounts of both reputable and questionable information are available online--many have come to regard the Internet itself as a culprit in students' plagiarism. Some teachers go so far as to forbid students from researching online, in the mistaken assumption that…

  18. Managing Plagiarism: A Preventative Approach

    Science.gov (United States)

    Insley, Robert

    2011-01-01

    Plagiarism is a reality in most college classes where some students plagiarize unknowingly and others do so knowingly. This situation requires instructors to decide how to manage the situation. Some may take the easy way out by ignoring the problem, simply pretending that none of their students plagiarize. In contrast, other instructors embrace…

  19. Plagiarism and Cheating.

    Science.gov (United States)

    Mawdsley, Ralph D.; Permuth, Steve

    Plagiarism and cheating can be defined as academic dishonesty and represent policy concerns among all levels of education. Such cases involve academic versus disciplinary decisions and the need to determine the student's understanding of the definition of plagiarism or cheating. This paper analyzes six legal issues raised in court cases and…

  20. Students' Perceptions of Plagiarism

    Science.gov (United States)

    Fish, Reva; Hura, Gerri

    2013-01-01

    While plagiarism by college students is a serious problem that must be addressed, students generally overestimate the frequency of plagiarism at their schools and blame students they do not know for the majority of incidents. This study looked at students' estimations of the frequency of plagiarism at a large urban college and explored how…

  1. Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model

    Directory of Open Access Journals (Sweden)

    Salha M. Alzahrani

    2015-07-01

    Full Text Available Highly obfuscated plagiarism cases contain unseen and obfuscated texts, which pose difficulties when using existing plagiarism detection methods. A fuzzy semantic-based similarity model for uncovering obfuscated plagiarism is presented and compared with five state-of-the-art baselines. Semantic relatedness between words is studied based on the part-of-speech (POS tags and WordNet-based similarity measures. Fuzzy-based rules are introduced to assess the semantic distance between source and suspicious texts of short lengths, which implement the semantic relatedness between words as a membership function to a fuzzy set. In order to minimize the number of false positives and false negatives, a learning method that combines a permission threshold and a variation threshold is used to decide true plagiarism cases. The proposed model and the baselines are evaluated on 99,033 ground-truth annotated cases extracted from different datasets, including 11,621 (11.7% handmade paraphrases, 54,815 (55.4% artificial plagiarism cases, and 32,578 (32.9% plagiarism-free cases. We conduct extensive experimental verifications, including the study of the effects of different segmentations schemes and parameter settings. Results are assessed using precision, recall, F-measure and granularity on stratified 10-fold cross-validation data. The statistical analysis using paired t-tests shows that the proposed approach is statistically significant in comparison with the baselines, which demonstrates the competence of fuzzy semantic-based model to detect plagiarism cases beyond the literal plagiarism. Additionally, the analysis of variance (ANOVA statistical test shows the effectiveness of different segmentation schemes used with the proposed approach.

  2. Teaching about Plagiarism in the Age of the Internet.

    Science.gov (United States)

    Klausman, Jeffrey

    1999-01-01

    Considers how the Internet provides new opportunities for teaching about plagiarism and how to avoid it. Defines and gives examples of three different kinds of plagiarism: direct plagiarism, paraphrase plagiarism, and patchwork plagiarism. Discusses a way of teaching students about plagiarism. Concludes that plagiarism is usually unintentional.…

  3. Useful Tips on Avoiding Plagiarism

    Science.gov (United States)

    Hamalainen, Maryellen

    2007-01-01

    Teachers are generally kind and nurturing people. Students who plagiarize their assignments from these kind and nurturing teachers are often given a second chance when caught and encouraged to do their work over, but it would be better to eliminate their need to plagiarize. The first tip for eliminating plagiarism has not so much to do with what…

  4. Plagiarism-Proofing Assignments

    Science.gov (United States)

    Johnson, Doug

    2004-01-01

    Mr. Johnson has discovered that the higher the level of student engagement and creativity, the lower the probability of plagiarism. For teachers who would like to see such desirable results, he describes the characteristics of assignments that are most likely to produce them. Two scenarios of types of assignments that avoid plagiarism are…

  5. Plagiarism in Publications Using the Unpublished Raw Data of Archived Research.

    Science.gov (United States)

    Yahaghi, Javad; Beddu, Salmia Bnt; Muda, Zakaria Che

    2017-04-01

    It is obligatory to educate student researchers before they start their work by teaching them about the various types of plagiarism and how to avoid them. It is also vital that research supervisors take into account the sources of data that are explored in their students' manuscripts. This article tries to draw the reader's attention to the importance of avoiding all types of plagiarism in their research.

  6. Analyzing and reducing plagiarism at university

    Directory of Open Access Journals (Sweden)

    Jorge López Puga

    2014-12-01

    Full Text Available Plagiarism is one of the less desirable practises in the academic context. This paper presents an experience of massive plagiarism detection at university and the steps taken to prevent its subsequent occurrence. Plagiarism was detected in the first assessment phase of a research project practise. As a result, students were required to arrange ethical group discussions with the professor to prevent plagiarism in the future. A substantial reduction in the rate of plagiarism was observed from the first practical assessment to the second one, t(16=2.5, p=.02, d=0.83, 1-?=.63, unilateral contrast. Additionally, a survey was developed to analyse students’ opinions and attitudes about plagiarism. A sample of 64 students (15 boys and 49 girls with an average age of 22.69 (SD=2.8 filled in an electronic questionnaire. More than a half of the sample (56.92% admitted that they had plagiarised before but most of the students (83.08% agreed they would not like someone else plagiarising their reports. A preliminary short scale to measure attitude towards plagiarism in undergraduate students at university is provided. Finally, a set of recommendations are given based on this experience to prevent and to reduce the level of plagiarism in the university contex.

  7. Plagiarism Detection Based on SCAM Algorithm

    DEFF Research Database (Denmark)

    Anzelmi, Daniele; Carlone, Domenico; Rizzello, Fabio

    2011-01-01

    Plagiarism is a complex problem and considered one of the biggest in publishing of scientific, engineering and other types of documents. Plagiarism has also increased with the widespread use of the Internet as large amount of digital data is available. Plagiarism is not just direct copy but also...... paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. Plagiarism detection techniques are applied by making a distinction between natural and programming languages. Our proposed detection process is based on natural language...... document. Our plagiarism detection system, like many Information Retrieval systems, is evaluated with metrics of precision and recall....

  8. Fostering academic competence or putting students under general suspicion? Voluntary plagiarism check of academic papers by means of a web-based plagiarism detection system

    Directory of Open Access Journals (Sweden)

    Kerstin Eleonora Kohl

    2011-02-01

    Full Text Available In view of the increasing number of cases of plagiarism and the ease of use of online published texts, universities are faced with a considerable challenge to prevent and take action against plagiarism in academic student papers. In reaction to plagiarism, web-based plagiarism detection systems (PDSs are increasingly used to check submitted papers - this checking entails various problems, for example the percentage of plagiarism found is only an indication of the actual extent of plagiarism and not all types of plagiarism can be identified. To cope with this problematic situation the voluntary plagiarism check (VPC, an alternative preventive university didactic concept, was developed at the University of Education, Freiburg (Germany. It focused on the development of individual skills. Students were able to submit their academic papers (e.g. an undergraduate paper, final thesis anonymously. These were then tested with the PDS Ephorus. Following interpretation and summary of the findings by the project team - plagiarism as well as referencing mistakes - we advised the students on a suitable approach to academic writing based on their own typical mistakes. The VPC was conducted as a three-semester research project and was later evaluated. About 500 academic papers were tested. In 90% of the undergraduates' work incorrect and/or missing citations were found. This high percentage decreased among students in later semesters. Instances of plagiarism were detected in about 40% of the papers when the texts of advanced students (≥6th semester were tested. At the same time the length of the plagiarised texts decreased. Around half of the students stated that it was acceptable to copy single sentences or short passages from other sources without citation; they did not consider plagiarising on a limited scale as cheating. A similar number of students admitted to having doubts about whether they could write a good paper without plagiarising. Almost all

  9. Whose Line Is It? Plagiarism in Economics

    OpenAIRE

    Gary A. Hoover

    2004-01-01

    This paper reports the results of a survey regarding the instances of plagiarism reported by journal editors in the economics profession. The survey finds that nearly 24% of responding editors encounter one case of plagiarism in a typical year. In addition, the survey reveals that less than 19% of responding journals have a formal policy regarding plagiarism. Moreover, there is a great deal of variance in what is considered plagiarism and what an appropriate response to plagiarism should be. ...

  10. Plagiarism Continues to Affect Scholarly Journals.

    Science.gov (United States)

    Hong, Sung Tae

    2017-02-01

    I have encountered 3 cases of plagiarism as editor of the Journal of Korean Medical Science (JKMS). The first one was copying figures from a JKMS article without citation, the second was submission of a copied manuscript of a published article to JKMS, and the third was publishing a copied JKMS article in another journal. The first and third cases violated copyrights of JKMS, but the violating journals made no action on the misconduct. The second and third cases were slightly modified copies of the source articles but similarity check by the Crosscheck could not identify the text overlap initially and after one year reported 96% overlap for the second case. The similarity of the third case was reported 3%. The Crosscheck must upgrade its system for better reliable screening of text plagiarism. The copy of the second case was committed by a corrupt Chinese editing company and also by some unethical researchers. In conclusion, plagiarism still threatens the trustworthiness of the publishing enterprises and is a cumbersome burden for editors of scholarly journals. We require a better system to increase the vigilance and to prevent the misconduct.

  11. Stolen science: why plagiarism and self-plagiarism are unacceptable

    OpenAIRE

    Kulikova E.Yu.

    2016-01-01

    Plagiarism is appropriation of someone else's ideas, texts, images and other materials without acknowledging their author. It is a serious violation of publication ethics that once detected results in the retraction of the submitted article. It has a disastrous impact on the author's reputation, because the publication is not removed from online databases, but stored there with a retracted publication tag. Plagiarism comes in different forms many of which still cannot be detected even by a sp...

  12. Plagiarism Detection by Online Solutions.

    Science.gov (United States)

    Masic, Izet; Begic, Edin; Dobraca, Amra

    2017-01-01

    The problem of plagiarism represents one of the burning issues of the modern scientific world. Detection of plagiarism is a problem that the Editorial Board encounters in their daily work. Software solutions represent a good solution for the detection of plagiarism. The problem of plagiarism will become most discussed topic of the modern scientific world, especially due to the development of standard measures, which rank the work of one author. Investment in education, education of young research personnel about the importance of scientific research, with paying particular attention on ethical behavior, becomes an imperative of academic staff. Editors have to invest additional effort in the development of the base of reviewers team as well as in their proper guidance, because after all, despite the software solutions, they are the best weapon to fight plagiarism. Peer review process should be a key of successful operation of each journal.

  13. Combating plagiarism: a shared responsibility.

    Science.gov (United States)

    Rathod, Sujit D

    2010-01-01

    Scientific progress depends on the free dissemination of original thinking and research. With the evidence base formed by publication, investigators develop and implement additional studies, and policy makers propose new laws and regulations. The ramifications of this evidence can affect millions of lives and reallocate considerable resources for programmes or research. As such, it is incumbent on investigators to conduct rigorous research, which precludes engaging in scientific misconduct such as falsification, fabrication and plagiarism. This article addresses the causes and consequences of plagiarism and the processes by which plagiarism is discovered. It concludes by considering the responsibilities of members of the research community in preventing and addressing plagiarism.

  14. An IR-Based Approach Utilizing Query Expansion for Plagiarism Detection in MEDLINE.

    Science.gov (United States)

    Nawab, Rao Muhammad Adeel; Stevenson, Mark; Clough, Paul

    2017-01-01

    The identification of duplicated and plagiarized passages of text has become an increasingly active area of research. In this paper, we investigate methods for plagiarism detection that aim to identify potential sources of plagiarism from MEDLINE, particularly when the original text has been modified through the replacement of words or phrases. A scalable approach based on Information Retrieval is used to perform candidate document selection-the identification of a subset of potential source documents given a suspicious text-from MEDLINE. Query expansion is performed using the ULMS Metathesaurus to deal with situations in which original documents are obfuscated. Various approaches to Word Sense Disambiguation are investigated to deal with cases where there are multiple Concept Unique Identifiers (CUIs) for a given term. Results using the proposed IR-based approach outperform a state-of-the-art baseline based on Kullback-Leibler Distance.

  15. Attitude toward plagiarism among Iranian medical faculty members.

    Science.gov (United States)

    Ghajarzadeh, Mahsa; Norouzi-Javidan, Abbas; Hassanpour, Kiana; Aramesh, Kiarash; Emami-Razavi, Seyed Hassan

    2012-01-01

    The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members of Tehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6±3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7±0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4±0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1). It is essential to provide materials (such as workshops, leaflets and mandatory courses) to make Iranian medical faculty members familiar with medical research ethics issues such as plagiarism.

  16. Attitude toward Plagiarism among Iranian Medical Faculty Members

    Directory of Open Access Journals (Sweden)

    Seyed Hassan Emami-Razavi

    2012-11-01

    Full Text Available The goal of this study was to assess attitude towards plagiarism in faculty members of Medical School at Tehran University of Medical Sciences. One hundred and twenty medical faculty members ofTehran University of Medical Sciences were enrolled in this cross-sectional study. They were asked to answer to valid and reliable Persian version of attitude towards plagiarism questionnaire. Attitude toward plagiarism, positive attitude toward self-plagiarism and plagiarism acceptance were assessed. Eighty seven filled-up questionnaires were collected. Mean total number of correct answers was 11.6 ± 3.1. Mean number of correct answers to questions evaluating self-plagiarism was 1.7 ± 0.4 and mean number of correct answers to questions evaluating plagiarism acceptance was 1.4 ± 0.2. There was no significant correlation between plagiarism acceptance and self-plagiarism (r=0.17, P=0.1. It is essential to provide materials (such as workshops, leaflets and mandatory courses to make Iranian medical faculty members familiar with medicalresearch ethics issues such as plagiarism.

  17. Plagiarism explainer for students

    OpenAIRE

    Barba, Lorena A.

    2016-01-01

    A slide deck to serve as an explainer of plagiarism in academic settings, with a personal viewpoint. For my students.Also on SpeakerDeck:https://speakerdeck.com/labarba/plagiarism-explainer-for-students(The slide viewer on SpeakerDeck is much nicer.)

  18. Plagiarism in Academic Texts

    Directory of Open Access Journals (Sweden)

    Marta Eugenia Rojas-Porras

    2012-08-01

    Full Text Available The ethical and social responsibility of citing the sources in a scientific or artistic work is undeniable. This paper explores, in a preliminary way, academic plagiarism in its various forms. It includes findings based on a forensic analysis. The purpose of this paper is to raise awareness on the importance of considering these details when writing and publishing a text. Hopefully, this analysis may put the issue under discussion.

  19. Why do I always have the best ideas? The role of idea quality in unconscious plagiarism.

    Science.gov (United States)

    Perfect, Timothy J; Stark, Louisa-Jayne

    2008-05-01

    Groups of individuals often work together to generate solutions to a problem. Subsequently, one member of the group can plagiarise another either by recalling that person's idea as their own (recall-own plagiarism), or by generating a novel solution that duplicates a previous idea (generate-new plagiarism). The current study examines the extent to which these forms of plagiarism are influenced by the quality of the ideas. Groups of participants initially generated ideas, prior to an elaboration phase in which idea quality was manipulated in two ways: participants received feedback on the quality of the ideas as rated by independent judges, and they generated improvements to a subset of the ideas. Unconscious plagiarism was measured in recall-own and generate-new tasks. For recall, idea improvement led to increased plagiarism, while for the generate-new task, the independent ratings influenced plagiarism. These data indicate that different source-judgement processes underlie the two forms of plagiarism, neither of which can be reduced simply to memory strength.

  20. Plagiarism in Personal Statements of Anesthesiology Residency Applicants.

    Science.gov (United States)

    Parks, Lance J; Sizemore, Daniel C; Johnstone, Robert E

    2016-02-15

    Plagiarism by residency applicants in their personal statements, as well as sites that sell personal statements, have been described, and led in 2011 to advice to avoid plagiarism and the caution that plagiarism detection software was available. We screened personal statements of 467 anesthesiology residency applicants from 2013-2014 using Viper Plagiarism Scanner software, and studied them for plagiarism. After quotes and commonly used phrases were removed, 82 statements contained unoriginal content of 8 or more consecutive words. After the study, 13.6% of personal statements from non-United States medical school graduates, and 4.0% from United States medical school graduates, contained plagiarized material, a significant difference. Plagiarized content ranged up to 58%. Plagiarism continues to occur in anesthesiology residency personal statements, with a higher incidence among graduates of non-United States medical schools.

  1. LDGM Codes for Channel Coding and Joint Source-Channel Coding of Correlated Sources

    Directory of Open Access Journals (Sweden)

    Javier Garcia-Frias

    2005-05-01

    Full Text Available We propose a coding scheme based on the use of systematic linear codes with low-density generator matrix (LDGM codes for channel coding and joint source-channel coding of multiterminal correlated binary sources. In both cases, the structures of the LDGM encoder and decoder are shown, and a concatenated scheme aimed at reducing the error floor is proposed. Several decoding possibilities are investigated, compared, and evaluated. For different types of noisy channels and correlation models, the resulting performance is very close to the theoretical limits.

  2. [Plagiarism in medical schools, and its prevention].

    Science.gov (United States)

    Annane, Djillali; Annane, Frédérique

    2012-09-01

    The plagiarism has become very common in universities and medical school. Undoubtedly, the easy access to a huge amount of electronic documents is one explanation for the increasing prevalence of plagiarism among students. While most of universities and medical school have clear statements and rules about plagiarism, available tools for the detection of plagiarism remain inefficient and dedicate training program for students and teachers too scarce. As lack of time is one reason for students to choose plagiarism, it should be one main target for educational programs. Copyright © 2012. Published by Elsevier Masson SAS.

  3. Rethinking Plagiarism in the Digital Age

    Science.gov (United States)

    Evering, Lea Calvert; Moorman, Gary

    2012-01-01

    Plagiarism is a complex issue in need of reexamination. A common misconception is there is consensus on what constitute plagiarism, and general agreement that engaging in plagiarism and other forms of academic dishonesty is a major breech of ethics. There seems to be little concern for differentiating degrees of seriousness; the intentional…

  4. Beyond Plagiarism: Transgressive and Nontransgressive Intertextuality

    Science.gov (United States)

    Chandrasoma, Ranamukalage; Thompson, Celia; Pennycook, Alastair

    2004-01-01

    The debate about what constitutes plagiarism and how it should be dealt with in the academy continues to gain momentum. The response from many higher education institutions is to channel ever-increasing amounts of resources into plagiarism detection technologies, rather than trying to ascertain why plagiarism might be occurring in the first place.…

  5. How Australian and Indonesian Universities Treat Plagiarism: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Bambang Yudi Cahyono

    2016-02-01

    Full Text Available This article is a part of a larger study comparing various aspects of policies on plagiarism in two university contexts. It compares policies on plagiarism in universities in Australia and Indonesia. The results of this comparative study showed that Australian and Indonesian universities treat plagiarism differently. Australian universities treat plagiarism explicitly in their university policies. In Australian universities, plagiarism is defined clearly and forms of plagiarism are explained thoroughly, policies on plagiarism are informed to all university academic members, and there are mechanisms to manage cases related to plagiarism. In contrast, not all Indonesian universities treat plagiarism directly. Some universities depend on religious morality and academic ethics in dealing with plagiarism. Accordingly, this article recommends the explicit treatment of plagiarism in Indonesian universities.

  6. Online plagiarism training falls short in biology classrooms.

    Science.gov (United States)

    Holt, Emily A; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students' ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time.

  7. Online Plagiarism Training Falls Short in Biology Classrooms

    Science.gov (United States)

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework assignment) and their impacts on students’ ability to accurately discriminate plagiarism from text that is properly quoted, paraphrased, and attributed. Using pre- and postsurveys of 173 undergraduate students in three general ecology courses, we found that students given the homework assignment had far greater success in identifying plagiarism or the lack thereof compared with students given no training. In general, students trained with the homework assignment more successfully identified plagiarism than did students trained with the online tutorial. We also found that the summative assessment associated with the plagiarism-avoidance training formats (i.e., homework grade and online tutorial assessment score) did not correlate with student improvement on surveys through time. PMID:24591507

  8. Exploring Student Self-Plagiarism

    Science.gov (United States)

    Halupa, Colleen M.

    2014-01-01

    Student self-plagiarism is a confusing issue for both faculty and students alike. This problem is compounded because both groups perceive the concept very differently. Recent literature regarding these perceptions is reviewed and some brief preliminary results of an exploratory multi-university study of student perceptions of self-plagiarism are…

  9. An Instructional Approach to Practical Solutions for Plagiarism

    Science.gov (United States)

    Leung, Chi Hong; Cheng, Simone Chung Ling

    2017-01-01

    Plagiarism is an academic misconduct commonly found in the educational institutions nowadays. This paper first defines the types of plagiarism and explains the typical reasons for university students to engage in plagiarism. Then, the factors influencing plagiarism are discussed, including the access of materials on the Internet, the social norm…

  10. Online Plagiarism Training Falls Short in Biology Classrooms

    Science.gov (United States)

    Holt, Emily A.; Fagerheim, Britt; Durham, Susan

    2014-01-01

    Online plagiarism tutorials are increasingly popular in higher education, as faculty and staff try to curb the plagiarism epidemic. Yet no research has validated the efficacy of such tools in minimizing plagiarism in the sciences. Our study compared three plagiarism-avoidance training regimens (i.e., no training, online tutorial, or homework…

  11. Beyond Culture: Helping International Students Avoid Plagiarism

    Science.gov (United States)

    Adhikari, Soni

    2018-01-01

    With the rapid increase in the number of international students from different academic backgrounds around the world, college and university teachers in the West find it harder to understand the many and complex reasons when these students plagiarize or use sources ineffectively. Reviewing relevant literature, I first make a pedagogical analysis…

  12. Plagiarism in Grant Proposals

    Science.gov (United States)

    Markin, Karen M.

    2012-01-01

    It is not news that software exists to check undergraduate papers for plagiarism. What is less well known is that some federal grant agencies are using technology to detect plagiarism in grant proposals. That variety of research misconduct is a growing problem, according to federal experts. The National Science Foundation, in its most recent…

  13. The challenges for scientists in avoiding plagiarism.

    Science.gov (United States)

    Fisher, E R; Partin, K M

    2014-01-01

    Although it might seem to be a simple task for scientists to avoid plagiarism and thereby an allegation of research misconduct, assessment of trainees in the Responsible Conduct of Research and recent findings from the National Science Foundation Office of Inspector General regarding plagiarism suggests otherwise. Our experiences at a land-grant academic institution in assisting researchers in avoiding plagiarism are described. We provide evidence from a university-wide multi-disciplinary course that understanding how to avoid plagiarism in scientific writing is more difficult than it might appear, and that a failure to learn the rules of appropriate citation may cause dire consequences. We suggest that new strategies to provide training in avoiding plagiarism are required.

  14. Education Improves Plagiarism Detection by Biology Undergraduates

    Science.gov (United States)

    Holt, Emily A.

    2012-01-01

    Regrettably, the sciences are not untouched by the plagiarism affliction that threatens the integrity of budding professionals in classrooms around the world. My research, however, suggests that plagiarism training can improve students' recognition of plagiarism. I found that 148 undergraduate ecology students successfully identified plagiarized…

  15. Wishing away Plagiarism in Scientific Publications! Will it work? A situational analysis of Plagiarism policy of journals in PubMed.

    Science.gov (United States)

    Debnath, Jyotindu; Cariappa, M P

    2018-04-01

    Plagiarism remains a scourge for the modern academia. There are inconsistencies in the plagiarism policy scientific journals. The aims of this study was to analyze types of published articles on 'Plagiarism' available on PubMed over last two decades against a backdrop of the plagiarism policy of the journals publishing such articles. A literature search on PubMed (https://www.ncbi.nlm.nih.gov/pubmed) was made using the search term "plagiarism" from 01 January 1997 till 29 March 17. All publications having 'plagiarism' in the title formed the study group. The following were noted: types of articles published, ethical and plagiarism policy of the journal as available in the Instructions to authors and or in the journal home page. A total of 582 publications from 320 journals were studied. Editorials (165, 28.3%) and Letters to the Editor (159, 27.3%) formed the bulk. Research articles (56, 9.6%), Review articles (51, 8.7%) and Commentaries (47, 8%) formed the remainder. Detailed ethical guidelines were present in 221 (69%). Outline ethical guidelines only were present in 15 (4.7%) journals. 49 (15.3%) journals did not have any ethical guidelines. Detailed description of the policy on plagiarism was found in 80 (25%) journals. Only an outline description was found in 29 (9%) journals while a plagiarism policy/statement was totally absent in 176 (55%) journals. There is a need to have a well defined plagiarism policy/statement for all scholarly journals easily visible on their home pages on the internet and also in their Instructions to Authors.

  16. The academic plagiarism and its punishments - a review

    Directory of Open Access Journals (Sweden)

    Roberto G. S. Berlinck

    2011-06-01

    Full Text Available Currently there is an increase in the occurrence of plagiarism in varied types of academic texts. Therefore, in agreement with the Brazilian Coordination of Improvement of Higher Education Personnel (CAPES policies, Brazilian higher education institutions should establish guidelines for the detection and inhibition of academic plagiarism. However, the notion of plagiarism is extremely complex, since the ability of textual construction acquired during education is also developed using others' words. Thus, it is necessary to better know the concept of plagiarism and its implications, as well as the consequences of plagiarism and the punishments that may result from it. Consequently, rules and policies to be established will be better founded in order to address the problem of plagiarism in academic texts in a comprehensive and consistent way, not only to inhibit plagiarism but also to promote education on how is possible to create texts in an original fashion.

  17. Plagiarism: Moving from Punitive to Proactive Approaches

    Science.gov (United States)

    Eaton, Sarah Elaine; Guglielmin, Melanie; Otoo, Benedict Kojo

    2017-01-01

    Plagiarism continues to be an issue in postsecondary contexts. This paper discusses how educators can take a proactive stance to prevent plagiarism and cultivate students' sense of honour and academic integrity, rather than focusing on punitive consequences after plagiarism has already occurred. Strategies include assessment design, formative…

  18. Guidelines on What Constitutes Plagiarism and Electronic Tools to Detect it.

    Science.gov (United States)

    Luksanapruksa, Panya; Millhouse, Paul W

    2016-04-01

    Plagiarism is a serious ethical problem among scientific publications. There are various definitions of plagiarism, and the major categories include unintentional (unsuitable paraphrasing or improper citations) and intentional. Intentional plagiarism includes mosaic plagiarism, plagiarism of ideas, plagiarism of text, and self-plagiarism. There are many Web sites and software packages that claim to detect plagiarism effectively. A violation of plagiarism laws can lead to serious consequences including author banning, loss of professional reputation, termination of a position, and even legal action.

  19. Patchwork plagiarism--a jigsaw of stolen puzzle pieces.

    Science.gov (United States)

    Supak Smolcić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes "below the radar" of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals.

  20. Rapid assessment of assignments using plagiarism detection software.

    Science.gov (United States)

    Bischoff, Whitney R; Abrego, Patricia C

    2011-01-01

    Faculty members most often use plagiarism detection software to detect portions of students' written work that have been copied and/or not attributed to their authors. The rise in plagiarism has led to a parallel rise in software products designed to detect plagiarism. Some of these products are configurable for rapid assessment and teaching, as well as for plagiarism detection.

  1. Plagiarism Due to Misunderstanding: Online Instructor Perceptions

    Science.gov (United States)

    Greenberger, Scott; Holbeck, Rick; Steele, John; Dyer, Thomas

    2016-01-01

    Plagiarism is an ongoing problem in higher education. This problem exists in both online and face-to-face modalities. The literature indicates that there are three ways higher education institutions define plagiarism, which includes theft, deception, and misunderstanding. Plagiarism due to misunderstanding has received less attention in the…

  2. Avoiding Plagiarism in Writing a Research Paper

    Directory of Open Access Journals (Sweden)

    Majid Wajdi

    2018-03-01

    Full Text Available This paper discusses how to avoid plagiarism in a research paper. Avoiding plagiarism is part of a scientific writing ethic that always stated in any publication. Every writer should pay attention to their papers submitted to a journal or a scientific forum that they are free from unethical conduct. Writing a research paper needs overall accuracy especially in avoiding plagiarism in the paper that is to be published in a journal or to be presented at a certain scientific meeting, seminar or symposium. It is based on writers’ experience as a paper writer as well as a journal reviewer. The first application that the writers use is ‘checker’, a Mac computer application, used to check spelling and grammar. It assists the writers to check how misspelling and an ungrammatical inaccuracy in the writers’ papers. The second free application is ‘plagiarism checker’. Checking originality of a paper is essential and it is not too difficult to do today. It is freely accessible that plagiarism checker can be used to check how original the paper is. By visiting “Google” then write down ‘plagiarism checker’, it will appear ‘smallseatools’ and then the writers could choose and check how original the paper is. This application is freely accessed and helps immensely to check how original a paper is and how far a paper is free from plagiarism. The unoriginal phrase will be underlined and marked red and finally will be shown how inimitable the paper is. Plagiarism scan report which consists of the date of the report, plagiarism status, total words and total characters can be downloaded.

  3. Text-based plagiarism in scientific publishing: issues, developments and education.

    Science.gov (United States)

    Li, Yongyan

    2013-09-01

    Text-based plagiarism, or copying language from sources, has recently become an issue of growing concern in scientific publishing. Use of CrossCheck (a computational text-matching tool) by journals has sometimes exposed an unexpected amount of textual similarity between submissions and databases of scholarly literature. In this paper I provide an overview of the relevant literature, to examine how journal gatekeepers perceive textual appropriation, and how automated plagiarism-screening tools have been developed to detect text matching, with the technique now available for self-check of manuscripts before submission; I also discuss issues around English as an additional language (EAL) authors and in particular EAL novices being the typical offenders of textual borrowing. The final section of the paper proposes a few educational directions to take in tackling text-based plagiarism, highlighting the roles of the publishing industry, senior authors and English for academic purposes professionals.

  4. Avoiding plagiarism in academic writing.

    Science.gov (United States)

    Anderson, Irene

    Plagiarism means taking the work of another and presenting it as one's own, resulting in potential upset for the original author and disrepute for the professions involved. This article aims to explore the issue of plagiarism and some mechanisms for detection and avoidance.

  5. Plagiarism challenges at Ukrainian science and education

    Directory of Open Access Journals (Sweden)

    Denys Svyrydenko

    2016-12-01

    Full Text Available The article analyzes the types and severity of plagiarism violations at the modern educational and scientific spheres using the philosophic methodological approaches. The author analyzes Ukrainian context as well as global one and tries to formulate "order of the day" of plagiarism challenges. The plagiarism phenomenon is intuitively comprehensible for academicians but in reality it has a very complex nature and a lot of manifestation. Using approaches of ethics, philosophical anthropology, philosophy of science and education author formulates the series of recommendation for overcoming of plagiarism challenges at Ukrainian science and education.

  6. How Australian and Indonesian Universities Treat Plagiarism: a Comparative Study

    OpenAIRE

    Cahyono, Bambang Yudi

    2005-01-01

    This article is a part of a larger study comparing various aspects of policies on plagiarism in two university contexts. It compares policies on plagiarism in universities in Australia and Indonesia. The results of this comparative study showed that Australian and Indonesian universities treat plagiarism differently. Australian universities treat plagiarism explicitly in their university policies. In Australian universities, plagiarism is defined clearly and forms of plagiarism are explained ...

  7. Educational approaches for discouraging plagiarism.

    Science.gov (United States)

    Fischer, Beth A; Zigmond, Michael J

    2011-01-01

    Suggested approaches to reduce the occurrence of plagiarism in academia, particularly among trainees. These include (1) educating individuals as to the definition of plagiarism and its consequences through written guidelines, active discussions, and practice in identifying proper and improper citation practices; (2) distributing checklists that break the writing task into more manageable steps, (3) requiring the submission of an outline and then a first draft prior to the deadline for a paper; (4) making assignments relevant to individual interests; and (5) providing trainees with access to software programs that detect plagiarism. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Patchwork plagiarism – a jigsaw of stolen puzzle pieces

    OpenAIRE

    Šupak Smolčić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes “below the radar” of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism...

  9. The Illusory Dichotomy of Plagiarism

    Science.gov (United States)

    Stuhmcke, Anita; Booth, Tracey; Wangmann, Jane

    2016-01-01

    Plagiarism has been characterised as a "major problem" for universities. While tensions between students and universities are inevitable, the problem with the existing system of plagiarism management and prevention is that it operates to problematise the relationship between the university and the student, rather than address the core…

  10. Rate-adaptive BCH codes for distributed source coding

    DEFF Research Database (Denmark)

    Salmistraro, Matteo; Larsen, Knud J.; Forchhammer, Søren

    2013-01-01

    This paper considers Bose-Chaudhuri-Hocquenghem (BCH) codes for distributed source coding. A feedback channel is employed to adapt the rate of the code during the decoding process. The focus is on codes with short block lengths for independently coding a binary source X and decoding it given its...... strategies for improving the reliability of the decoded result are analyzed, and methods for estimating the performance are proposed. In the analysis, noiseless feedback and noiseless communication are assumed. Simulation results show that rate-adaptive BCH codes achieve better performance than low...... correlated side information Y. The proposed codes have been analyzed in a high-correlation scenario, where the marginal probability of each symbol, Xi in X, given Y is highly skewed (unbalanced). Rate-adaptive BCH codes are presented and applied to distributed source coding. Adaptive and fixed checking...

  11. An ELT's Solution to Combat Plagiarism: "Birth" of CALL.

    Science.gov (United States)

    Sabieh, Christine

    One English-as-a Second-Language professor fought plagiarism using computer assisted language learning (CALL). She succeeded in getting half of her class to write documented research papers free of plagiarism. Although all of the students claimed to know how to avoid plagiarizing, 35 percent presented the work with minor traces of plagiarism. The…

  12. How do we handle self-plagiarism in submitted manuscripts?

    Science.gov (United States)

    Supak-Smocić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE).

  13. How do we handle self-plagiarism in submitted manuscripts?

    Science.gov (United States)

    Šupak-Smolčić, Vesna; Bilić-Zulle, Lidija

    2013-01-01

    Self-plagiarism is a controversial issue in scientific writing and presentation of research data. Unlike plagiarism, self-plagiarism is difficult to interpret as intellectual theft under the justification that one cannot steal from oneself. However, academics are concerned, as self-plagiarized papers mislead readers, do not contribute to science, and bring undeserved credit to authors. As such, it should be considered a form of scientific misconduct. In this paper, we explain different forms of self-plagiarism in scientific writing and then present good editorial policy toward questionable material. The importance of dealing with self-plagiarism is emphasized by the recently published proposal of Text Recycling Guidelines by the Committee on Publication Ethics (COPE). PMID:23894861

  14. Experiences of experts about the instances of plagiarism.

    Science.gov (United States)

    Keyvanara, Mahmod; Ojaghi, Rezvan; Sohrabi, Mozafar Cheshmeh; Papi, Ahmad

    2013-01-01

    Plagiarism is defined as intentional deceiving or lack of honesty, which deprives others from both material and spiritual possessions. Ethics is considered as one of the most important aspects of evaluating the quality of higher education. Moreover, scientific ethics should be reflected from university values, as a specialized institution, rather than being a reflection of the others cares. Therefore, the main aim of the present study is explore of expert experiences about plagiarism in Isfahan University of Medical Sciences. This study employed qualitative method with using in-deep interview. The research participants consisted of 21, who tend to this work. Semi structure interview were conducted and recorded. The method of analyzing data was 'thematic analysis'. The data were transcribed and saved on computer after each interview. Themes and sub-themes were extracted. Finally, relevant sub-themes were arranged in a category and suggested were presented. Analyzing data showed 600 primary codes, 40 sub-themes and 6 themes. The main themes included repeated works, non-normative adoption, non-normative adaptation, shares distribution, forging, and profit-seeking, each of which consisted of one or several subgroups. The findings of this study show that since, there are numerous ways of cheating, the universities' research committees must create institutions in order to educate the individuals how to avoid plagiarism. In addition, providing information about different types of scientific violations, as well as their following punishments might lead to the decrease of such misbehaviors.

  15. Technology Enhanced Learning and Plagiarism in Entrepreneurship Education

    Science.gov (United States)

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2011-01-01

    Purpose: This paper seeks to explore the relationship between entrepreneurship students' ethical views on plagiarism, their self reported engagement in plagiarism and their participation in an online plagiarism prevention tutorial. Design/methodology/approach: The study is based on a questionnaire administered to 434 undergraduate university…

  16. Patchwork plagiarism – a jigsaw of stolen puzzle pieces

    Science.gov (United States)

    Smolčić, Vesna Šupak; Bilić-Zulle, Lidija

    2013-01-01

    Plagiarism remains at the top in terms of interest to the scientific community. In its many vicious forms, patchwork plagiarism is characterized by numerous unresolved issues and often passes “below the radar” of editors and reviewers. The problem of detecting the complexity of misconduct has been partially resolved by plagiarism detection software. However, interpretation of relevant reports is not always obvious or easy. This article deals with plagiarism in general and patchwork plagiarism in particular, as well as related problems that editors must deal with to maintain the integrity of scientific journals. PMID:23457762

  17. Is there an effective approach to deterring students from plagiarizing?

    Science.gov (United States)

    Bilic-Zulle, Lidija; Azman, Josip; Frkovic, Vedran; Petrovecki, Mladen

    2008-03-01

    The purpose of this study was to evaluate the effectiveness of plagiarism detection software and penalty for plagiarizing in detecting and deterring plagiarism among medical students. The study was a continuation of previously published research in which second-year medical students from 2001/2002 and 2002/2003 school years were required to write an essay based on one of the four scientific articles offered by the instructor. Students from 2004/2005 (N = 92) included in present study were given the same task. Topics of two of the four articles were considered less complex, and two were more complex. One less and one more complex articles were available only as hardcopies, whereas the other two were available in electronic format. The students from 2001/2002 (N = 111) were only told to write an original essay, whereas the students from 2002/2003 (N = 87) were additionally warned against plagiarism, explained what plagiarism was, and how to avoid it. The students from 2004/2005 were warned that their essays would be examined by plagiarism detection software and that those who had plagiarized would be penalized. Students from 2004/2005 plagiarized significantly less of their essays than students from the previous two groups (2% vs. 17% vs. 21%, respectively, P plagiarism. Use of plagiarism detection software in evaluation of essays and consequent penalties had effectively deterred students from plagiarizing.

  18. Undergraduate Plagiarism: A Pedagogical Perspective

    Science.gov (United States)

    Ellery, Karen

    2008-01-01

    Student plagiarism is a pervasive and increasing problem at all levels of study in tertiary institutions. This study attempted explicitly and implicitly to address issues of plagiarism within the broad context of an academic writing framework in tutorials in a first-year module at the University of KwaZulu-Natal in South Africa. Despite these…

  19. Plagiarism and the medical fraternity: a study of knowledge and attitudes.

    Science.gov (United States)

    Shirazi, Bushra; Jafarey, Aamir M; Moazam, Farhat

    2010-04-01

    To assess knowledge and perceptions of plagiarism in medical students and faculty of private and public medical colleges in Karachi. A questionnaire based study was conducted on groups of 4th year medical students and medical faculty members. Group A consisted of medical students while group B comprised faculty members. The questionnaire contained 19 questions that assessed knowledge and attitudes of the respondents regarding various aspects of plagiarism. The total number of medical students (Group A) studied was 114 while the faculty number (Group B) was 82. Nineteen percent Group A and 22% of Group B displayed the correct knowledge about referencing materials from the internet or other sources. Seventeen percent of respondents in Group A and 16% in Group B had correct information about the use of quotation marks when incorporating verbatim phrases from external sources. Regarding Power Point presentations, 53% of respondents from Group A and 57% from Group B knew the appropriate requirements. There was a statistically significant difference among the two groups regarding the issue of self plagiarism, with 63% of respondents in Group A and 88% in Group B demonstrating correct understanding. Both groups showed a general lack of understanding regarding copyright rules and 18% of Group A and 23% of respondents in Group B knew the correct responses. Eighteen percent of respondents in Group A and 27% in Group B claimed to have never indulged in this practice. There is a general lack of information regarding plagiarism among medical students and faculty members.

  20. Plagiarism: A silent epidemic in scientific writing - Reasons, recognition and remedies.

    Science.gov (United States)

    Debnath, Jyotindu

    2016-04-01

    Plagiarism is one of the most serious forms of scientific misconduct prevalent today and is an important reason for significant proportion of rejection of manuscripts and retraction of published articles. It is time for the medical fraternity to unanimously adopt a 'zero tolerance' policy towards this menace. While responsibility for ensuring a plagiarism-free manuscript primarily lies with the authors, editors cannot absolve themselves of their accountability. The only way to write a plagiarism-free manuscript for an author is to write an article in his/her own words, literally and figuratively. This article discusses various types of plagiarism, reasons for increasingly reported instances of plagiarism, pros and cons of use of plagiarism detection tools for detecting plagiarism and role of authors and editors in preventing/avoiding plagiarism in a submitted manuscript. Regular usage of professional plagiarism detection tools for similarity checks with critical interpretation by the editorial team at the pre-review stage will certainly help in reducing the menace of plagiarism in submitted manuscripts.

  1. What is Plagiarism?

    Science.gov (United States)

    Vishniac, Ethan T.

    2012-01-01

    Manuscripts submitted to The Astrophysical Journal are required to contain "novel and significant" material and to be free of plagiarism. There is a surprising amount of confusion regarding the definition of plagiarism and what constitutes prior publication. I will discuss the definitions used by the ApJ and the procedures we follow to to support this rule. Individual members of the community frequently show a very different understanding of these standards and are surprised at the conflict. Time allowing, I will briefly discuss some of the other common ethical problems that arise during the preparation and publication of articles.

  2. University Students' Perceptions of Plagiarism

    Science.gov (United States)

    Power, Lori G.

    2009-01-01

    Plagiarism is an intriguing topic with many avenues for exploration. Students' perceptions of plagiarism certainly differ from their professors' and it is valuable to attempt to listen in some small measure to what those perceptions are. The purpose of this study was to gain an understanding of some of the ways first- and second-year university…

  3. Social Network Aided Plagiarism Detection

    Science.gov (United States)

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  4. Perceptions about Plagiarism between Faculty and Undergraduate Students

    Science.gov (United States)

    Pritchett, Serene

    2010-01-01

    The problem. Through observation and the review of literature, students often receive inconsistent and vague messages about plagiarism from faculty. Marcoux (2002) and Roig (2001) found a lack of consensus between faculty concerning definitions and forms of plagiarism. Although some students develop skills in order to avoid plagiarism, almost half…

  5. Plagiarism in Second-Language Writing

    Science.gov (United States)

    Pecorari, Diane; Petric, Bojana

    2014-01-01

    Plagiarism is a broad and multidisciplinary field of study, and within second-language (L2) writing, research on the topic goes back to the mid-1980s. In this review article we first discuss the received view of plagiarism as a transgressive act and alternative understandings which have been presented in the L1 and L2 writing literature. We then…

  6. The Toolbox for Local and Global Plagiarism Detection

    Science.gov (United States)

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  7. The Issue of (Software) Plagiarism: A Student View

    Science.gov (United States)

    Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P.

    2012-01-01

    The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…

  8. Adaptive distributed source coding.

    Science.gov (United States)

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  9. Inoculating against Pro-Plagiarism Justifications: Rational and Affective Strategies

    Science.gov (United States)

    Compton, Josh; Pfau, Michael

    2008-01-01

    Student plagiarism continues to threaten academic integrity. This investigation assessed whether an inoculation message strategy could combat university plagiarism by protecting student attitudes against pro-plagiarism justification arguments. Additionally, we sought theoretical confirmation of previous findings on involvement and accessibility in…

  10. Plagiarism In English Language Theses In Indonesia

    Directory of Open Access Journals (Sweden)

    Like Raskova Octaberlina

    2016-02-01

    Full Text Available This article argues that plagiarism in Indonesia exists due to some reasons. The reasons range from the requirements on the part of the students to adhere to uniformity in terms of thesis format to failure on the part of the government to effectively enforce a regulation dealing with plagiarism. Anecdotal observations as a student in one Indonesian university will give color to the discussion throughout this article. A recommendation to subdue plagiarism in Indonesia will conclude the article.

  11. The significance of anti-plagiarism in modern day authorship ...

    African Journals Online (AJOL)

    Institutions should set policies and take responsibility for integrity of research reporting. This is particularly important for boosting potentials of novice researchers. This in turn ensures the quality of education most especially in developing countries. Keywords: Plagiarism, self-plagiarism, plagiarism process, research integrity, ...

  12. The Plagiarism in the Theses of English Education Students at Kabupaten Bone

    Directory of Open Access Journals (Sweden)

    Rizkariani Sulaiman

    2015-02-01

    Full Text Available The topic of this study is “Plagiarism in the Theses of English Education Students: Forms and Causes. In this study, the researcher limits the discussion by the following research questions: “what are the forms of students’ plagiarism in theses? and what are the causes that make students engage in the plagiarism?”. The objective of the study is specifically to know the forms of students’ plagiarism in theses; and to know the causes that make students engage in the plagiarism. In order to achieve the objective of this study, the researcher applied descriptive quantitative research. The population of this study was the theses of English education students that were submitted in 2011 and lecturers from two colleges. As instrument of the research, plagiarism forms according to government rule No. 17, 2010 and duplichecker application used to investigate the first research question; and questionnaire used to investigate the second research question. The result of the study revealed that plagiarism type 1 was the dominant type occurred in students theses, followed by plagiarism type 2, 3 and 4; chapter 1 and 2 of most of the theses are the most frequent place for plagiarism types occurred; another type of plagiarism found was chained plagiarism; and the causes of students engage in plagiarism can be divided into four main causes: a lack of knowledge in referencing and quoting; b limited access of literature; c attitude; and d plagiarism is not managed yet administratively. In line with the result, the researcher suggests that plagiarism in colleges should be familiarized, socialized and actively founded; the students also should enrich the knowledge of referencing and paraphrasing; and colleges should try to organize the standard rule clearly and firmly and introduce plagiarism detectors to reduce the plagiarism action.

  13. Exploring Reflective Means to Handle Plagiarism

    Science.gov (United States)

    Dalal, Nikunj

    2016-01-01

    Plagiarism has become widespread in the university teaching environment. This article presents practical wisdom from several years of experience handling plagiarism in two Information Systems (IS) courses with the exploratory use of reflective means such as dialogues and essays. There has been very little work on the use of reflective approaches…

  14. Plagiarism prevention challenging writing didactics. An account from the writing center at the FHWien, the University of Applied Sciences of the Viennese Economic Chamber

    OpenAIRE

    Fenzl, R; Miglar, K

    2015-01-01

    Plagiarism could be defined as the unlawful use of the intellectual property of others, e.g. when the original source of literature is not correctly cited in a paper. Colleges and universities are obliged to sanction plagiarism. Moreover they have the duty to prevent plagiarism in the first place.The focus of the academic writing center of the FHWien of the Viennese Economic Chamber is to prevent students from the temptations and risks of plagiarism. The center provides assistance for the eff...

  15. Examination of Plagiarism Tendency of Faculty of Education Students

    Directory of Open Access Journals (Sweden)

    Adem DAĞAŞAN

    2017-12-01

    Full Text Available This research examines the tendency among students of the Faculty of Education to commit plagiarism. The research was conducted using a screening model, and was made on a sample of 1,136 students studying Classroom Teaching, Mathematics Teaching, Preschool Teaching, Social Sciences Teaching, Turkish Teaching, and Science Teaching at the Faculty of Education of Kafkas University, Kars, Turkey, during the 2016-2017 academic year. The Academic Fraud Tendency Scale (ASEÖ developed by Eminoğlu and Nartgün (2009 was used for data collection. From the findings of the research it was concluded that the plagiarism tendencies among students studying in the Faculty of Education were at low levels; male students were found to be more likely to commit plagiarism than female students; students who study in the science departments were found to be more likely to commit plagiarism than those studying in the social sciences departments; the tendency to plagiarize becomes greater as the grade level increases; the students who believe they are unsuccessful were found to have higher tendencies towards plagiarism than those who believe they are successful; students who are anxious about failure were found to have higher tendencies towards plagiarism than those who are not anxious about failure; and students who were not in the habit of studying on a regular basis were found to have higher tendencies towards plagiarism than those who were.

  16. A Plagiarism Detection Algorithm based on Extended Winnowing

    Directory of Open Access Journals (Sweden)

    Duan Xuliang

    2017-01-01

    Full Text Available Plagiarism is a common problem faced by academia and education. Mature commercial plagiarism detection system has the advantages of comprehensive and high accuracy, but the expensive detection costs make it unsuitable for real-time, lightweight application environment such as the student assignments plagiarism detection. This paper introduces the method of extending classic Winnowing plagiarism detection algorithm, expands the algorithm in functionality. The extended algorithm can retain the text location and length information in original document while extracting the fingerprints of a document, so that the locating and marking for plagiarism text fragment are much easier to achieve. The experimental results and several years of running practice show that the expansion of the algorithm has little effect on its performance, normal hardware configuration of PC will be able to meet small and medium-sized applications requirements. Based on the characteristics of lightweight, high efficiency, reliability and flexibility of Winnowing, the extended algorithm further enhances the adaptability and extends the application areas.

  17. A Review of Literature: Plagiarism in the Papers of Turkish Context

    Science.gov (United States)

    Gokmenoglu, Tuba

    2017-01-01

    The present review attempted to address the direction of plagiarism literature in Turkish context. 15 studies conducted in Turkey on plagiarism were analyzed through content analysis. The context, purposes, methodological issues and results of researching plagiarism were categorized. The findings of this review indicated that although plagiarism's…

  18. On academic plagiarism in Europe. An analytical approach based on four studies

    Directory of Open Access Journals (Sweden)

    Vanja Pupovac

    2008-12-01

    Full Text Available With the development of information and communication technology (ICT, plagiarism becomes an ever more serious problem in the academic community. According to the studies on academic plagiarism conducted at universities in four different European countries, plagiarism rates among students are quite high and students mostly ignore or allow plagiarism because of a lack of knowledge, lack of consequences, or simply because ICT makes plagiarism easy to commit. The findings of the studies presented in this paper indicate that strict policies against plagiarism need to be introduced at universities. We believe that the problem of plagiarism should be brought to public attention and discussed at a higher level and that effective measures against plagiarism should be implemented. Prevalence of plagiarism among students and their attitudes towards plagiarism are influenced by cultural environment as well as the academic setting. In multicultural communities, such as the European community, it is necessary to investigate and compare academic behaviour in different countries in order to establish equivalent standards in education across Europe.

  19. Exploring Plagiarism into Perspectives of Indonesian Academics and Students

    Directory of Open Access Journals (Sweden)

    Rina Agustina

    2017-08-01

    Full Text Available Plagiarism has been done by students from around the globes. There has been a heated discussion of finding reasons why plagiarism occurred in academic world and Eastern students in particular. This research wants to explore how actually students perceive plagiarism in their academic writing as well as how lecturers coped with plagiarism in the students’ assignments. The research participants were taken from 2 different majors, 32 English Education students and 10 Psychology students as well as 5 lecturers from English Education Department and 3 lecturers from Psychology Faculty in one of private universities in Central Java Province, Indonesia. Questionnaires were distributed to those respondents and also interviews were conducted to several lecturers and students. The results of questionnaire and interview showed that both students and lecturers knew and understand the essence of plagiarism, however, students admitted that they still plagiarised in their assignment. Lecturers, on the other hand, revealed that they could figure out when students plagiarised others’ works. However, it was limited to crossing over assignments between students. In other words, detecting plagiarism was done manually and restricted to students’ written works only. In conclusion, despite comprehending the meaning of plagiarism, student still plagiarised since there was not any real action from lecturers to encounter it.

  20. False feathers a perspective on academic plagiarism

    CERN Document Server

    Weber-Wulff, Debora

    2014-01-01

    With plagiarism a growing problem on university campuses, this book explains a range of strategies to identify instances of the offence. Written by an activist in the VroniPlag Wiki group, it shows how members find and document plagiarism in dissertations.

  1. Beyond the accusation of plagiarism

    OpenAIRE

    Gu, Qing; Brooks, A. Jane

    2008-01-01

    The paper explores the complexity of the notion of plagiarism from sociocultural and psychological perspectives. Plagiarism is a dynamic and multi-layered phenomenon (Russikoff et al., 2003; Sutherland-Smith, 2005) and needs to be understood in relation to a specific context of academic conventions and environment. Drawing upon the experiences of ten Chinese students on a pre-sessional course and subsequently their postgraduate courses, the paper investigates change in these students’ percept...

  2. Automatic Student Plagiarism Detection: Future Perspectives

    Science.gov (United States)

    Mozgovoy, Maxim; Kakkonen, Tuomo; Cosma, Georgina

    2010-01-01

    The availability and use of computers in teaching has seen an increase in the rate of plagiarism among students because of the wide availability of electronic texts online. While computer tools that have appeared in recent years are capable of detecting simple forms of plagiarism, such as copy-paste, a number of recent research studies devoted to…

  3. International perspectives on plagiarism and considerations for teaching international trainees.

    Science.gov (United States)

    Heitman, Elizabeth; Litewka, Sergio

    2011-01-01

    In the increasingly global community of biomedical science and graduate science education, many US academic researchers work with international trainees whose views on scientific writing and plagiarism can be strikingly different from US norms. Although a growing number of countries and international professional organizations identify plagiarism as research misconduct, many international trainees come from research environments where plagiarism is ill-defined and even commonly practiced. Two research-ethics educators consider current perspectives on plagiarism around the world and contend that US research-training programs should focus on trainees' scientific writing skills and acculturation, not simply on preventing plagiarism. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. CASE STUDY: POLICIES, STRATEGIES AND RESPONSES TO PLAGIARISM IN SLOVAKIA

    OpenAIRE

    FOLTYNEK, Tomas; KRAVJAR, Julius; GLENDINNING, Irene

    2014-01-01

    The European project “Impact of Policies for Plagiarism in Higher Education Across Europe“ has identified best practices and gaps related to plagiarism in different European countries. Slovakia is one of interesting ones, where national repository for plagiarism detection was established. However, there are still gaps in terms of policies and overall understanding of plagiarism. This case study describes what happened in Slovakia in last few years, compares the situation with other European c...

  5. Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

    OpenAIRE

    Bakhtiyari, Kaveh; Salehi, Hadi; Embi, Mohamed Amin; Shakiba, Masoud; Zavvari, Azam; Shahbazi-Moghadam, Masoomeh; Ale Ebrahim, Nader; Mohammadjafari, Marjan

    2014-01-01

    This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or iThenticate for cross checking and plagiarism detection. The efficiency of the proposed techniques is evaluated on five different texts using student...

  6. Screening for self-plagiarism in a subspecialty-versus-general imaging journal using iThenticate.

    Science.gov (United States)

    Kalnins, A U; Halm, K; Castillo, M

    2015-06-01

    Self-plagiarism is a form of research misconduct that can dilute the credibility and reputation of a scientific journal, as well as the represented specialty. Journal editors are aware of this problem when reviewing submissions and use on-line plagiarism-analysis programs to facilitate detection. The American Journal of Neuroradiology (AJNR) uses iThenticate to screen several submitted original research manuscripts selected for review per issue and retrospectively assesses 3 issues per year. The prevalence of self-plagiarism in AJNR was compared with that in Radiology; the necessity and cost of more extensive screening in AJNR were evaluated. The self-duplication rate in AJNR original research articles was compared with that in Radiology, a general imaging journal that screens all submitted original research manuscripts selected for review by using iThenticate. The rate of self-duplication in original research articles from 2 randomly selected 2012 AJNR issues was compared with the rate in the prior year to gauge the need for more extensive screening. A cost analysis of screening all submitted original research manuscripts selected for review by using iThenticate was performed. Using an empiric 15% single-source duplication threshold, we found that the rate of significant self-plagiarism in original research articles was low for both journals. While AJNR had more articles exceeding this threshold, most instances were insignificant. Analyzing 2 randomly chosen issues of AJNR for single-source duplication of >15% in original research articles yielded no significant differences compared with an entire year. The approximate annual cost of screening all submitted original research manuscripts selected for review was US $6800.00. While the rate of self-plagiarism was low in AJNR and similar to that in Radiology, its potential cost in negative impact on AJNR and the subspecialty of neuroradiology justifies the costs of broader screening. © 2015 by American Journal of

  7. Chinese University EFL Teachers' Perceptions of Plagiarism

    Science.gov (United States)

    Lei, Jun; Hu, Guangwei

    2015-01-01

    Although Chinese university students' perceptions of plagiarism have been extensively investigated, those of their teachers have been surprisingly under-researched. This study sought to address this gap by investigating 112 Chinese university English teachers' knowledge of and attitudes towards plagiarism. While 57 participating teachers had…

  8. Plagiarism in South African management journals

    Directory of Open Access Journals (Sweden)

    Adele Thomas

    2015-01-01

    Full Text Available Plagiarism by academics has been relatively unexplored thus far. However, there has been a growing awareness of this problem in recent years. We submitted 371 published academic articles appearing in 19 South African management journals in 2011 through the plagiarism detection software program Turnitin. High and excessive levels of plagiarism were detected. The cost to government of subsidising unoriginal work in these journals was calculated to approximate ZAR7 million for the period under review. As academics are expected to role model ethical behaviour to students, such a finding is disturbing and has implications for the reputations of the institutions to which the authors are affiliated as well as that of the journals that publish articles that contain plagiarised material.

  9. Syndrome-source-coding and its universal generalization. [error correcting codes for data compression

    Science.gov (United States)

    Ancheta, T. C., Jr.

    1976-01-01

    A method of using error-correcting codes to obtain data compression, called syndrome-source-coding, is described in which the source sequence is treated as an error pattern whose syndrome forms the compressed data. It is shown that syndrome-source-coding can achieve arbitrarily small distortion with the number of compressed digits per source digit arbitrarily close to the entropy of a binary memoryless source. A 'universal' generalization of syndrome-source-coding is formulated which provides robustly effective distortionless coding of source ensembles. Two examples are given, comparing the performance of noiseless universal syndrome-source-coding to (1) run-length coding and (2) Lynch-Davisson-Schalkwijk-Cover universal coding for an ensemble of binary memoryless sources.

  10. Construction and validation of attitudes toward plagiarism questionnaire.

    Science.gov (United States)

    Mavrinac, Martina; Brumini, Gordana; Bilić-Zulle, Lidija; Petrovecki, Mladen

    2010-06-01

    To develop and test the psychometric characteristics of a questionnaire measuring attitudes toward plagiarism. Participants were 227 undergraduates and graduate students (128 women and 99 men) from three Croatian universities, with a median age of 21 years (range 18 to 48). Research was conducted from March to June 2009. For the purpose of construction of the first version of the questionnaire, 67 statements (items) were developed. The statements were based on the relevant literature and were developed following rules and recommendations for questionnaire writing, and 36 items were chosen for final validation. Factor analysis was used to find out the factor structure of the questionnaire and to measure construct validity. The final version of the questionnaire consisted of 29 items divided into a three-factor structure: factor I - positive attitude toward plagiarism (12 items); factor II - negative attitude toward plagiarism (7 items); and factor III - subjective norms toward plagiarism (10 items). Cronbach alpha was calculated to confirm the reliability of the scale: factor I - alpha=0.83; factor II - alpha=0.79; and factor III - alpha=0.85. Correlations between factors were: -0.37 between I and II, -0.41 between I and III, and +0.31 between II and III. Attitudes Toward Plagiarism questionnaire was developed, with good psychometric characteristics. It will be used in future research as a standardized tool for measuring attitudes toward plagiarism.

  11. Joint source-channel coding using variable length codes

    NARCIS (Netherlands)

    Balakirsky, V.B.

    2001-01-01

    We address the problem of joint source-channel coding when variable-length codes are used for information transmission over a discrete memoryless channel. Data transmitted over the channel are interpreted as pairs (m k ,t k ), where m k is a message generated by the source and t k is a time instant

  12. Knowledge and Attitude of Dental Professionals of North India Toward Plagiarism

    Science.gov (United States)

    Singh, Harkanwal Preet; Guram, Namrata

    2014-01-01

    Background: Plagiarism is stealing of some others work or idea without proper citation. It is one of the biggest challenges faced by the scholarly world and by far a grim form of delinquency in academics. Aim: The study was designed to explore the knowledge and attitudes of dental professionals toward plagiarism. Materials and Methods: A questionnaire having 14 questions was sent either via e-mails or by sending printed copies to 5000 dental professionals, while maintaining anonymity of all the participants. Result: Most of the dental professionals know about plagiarism, and they believe that plagiarism cannot be avoided successfully. Pressure to publish was a major reason along with several others, which accounts for more and more indulgence in plagiarism. At the same time lack of facilities in private institutions and lack of funding for research work were the major factors as well, which hinder in creating research environment and hence promotes plagiarism and false studies to publish it. Conclusion: Plagiarism is present in dental professionals and that significant reduction can only be brought by awareness, objective check methods and stringent punishment. Plagiarism and other forms of academic misconduct must be recognized and must not be tolerated. PMID:24678470

  13. Knowledge and attitude of dental professionals of north India toward plagiarism.

    Science.gov (United States)

    Singh, Harkanwal Preet; Guram, Namrata

    2014-01-01

    Plagiarism is stealing of some others work or idea without proper citation. It is one of the biggest challenges faced by the scholarly world and by far a grim form of delinquency in academics. The study was designed to explore the knowledge and attitudes of dental professionals toward plagiarism. A questionnaire having 14 questions was sent either via e-mails or by sending printed copies to 5000 dental professionals, while maintaining anonymity of all the participants. Most of the dental professionals know about plagiarism, and they believe that plagiarism cannot be avoided successfully. Pressure to publish was a major reason along with several others, which accounts for more and more indulgence in plagiarism. At the same time lack of facilities in private institutions and lack of funding for research work were the major factors as well, which hinder in creating research environment and hence promotes plagiarism and false studies to publish it. Plagiarism is present in dental professionals and that significant reduction can only be brought by awareness, objective check methods and stringent punishment. Plagiarism and other forms of academic misconduct must be recognized and must not be tolerated.

  14. On academic plagiarism in Europe. An analytical approach based on four studies

    OpenAIRE

    Vanja Pupovac; Lidija Bilic-Zulle; Mladen Petrovecki

    2008-01-01

    With the development of information and communication technology (ICT), plagiarism becomes an ever more serious problem in the academic community. According to the studies on academic plagiarism conducted at universities in four different European countries, plagiarism rates among students are quite high and students mostly ignore or allow plagiarism because of a lack of knowledge, lack of consequences, or simply because ICT makes plagiarism easy to commit. The findings of the studies present...

  15. Minimizing Cyber-Plagiarism through Turnitin: Faculty’s & Students’ Perspectives

    Directory of Open Access Journals (Sweden)

    Holi Ibrahim Holi Ali

    2013-03-01

    Full Text Available This is an attempt to investigate and evaluate students’ and faculty’s experiences and understanding to the strengths and limitations of anti-plagiarism software, specifically, Turnitin and how it could be used to promote academic integrity among engineering students. 50 engineering students and 20 professors were surveyed and interviewed. The paper argues that although Turnitin is widely used these days to tackle and minimize plagiarism practices, however cyber-plagiarism is increasing and the software might be inadequate in fighting such practice. The paper also questions the effectiveness and limitations of the software in relation to current practices. The findings revealed that most of the respondents perceive Turnitin positively; limitations of the software are not many and they believed that the software is effective in detecting and minimizing plagiarism incidents among their students’ papers. The study puts forward some recommendations which might help practitioners in minimizing plagiarism practices.

  16. Plagiarism: a case study of quality improvement in a taught postgraduate programme.

    Science.gov (United States)

    Marshall, Tom; Taylor, Beck; Hothersall, Ellie; Pérez-Martín, Leticia

    2011-01-01

    Plagiarism is a common issue in education. Software can detect plagiarism but little is known about prevention. To identify ways to reduce the incidence of plagiarism in a postgraduate programme. From 2006, all student assignments were monitored using plagiarism detection software (Turn It In) to produce percentage text matches for each assignment. In 2007, students were advised software was being used, and that plagiarism would result in penalties. In 2008, students attending a key module took part in an additional interactive seminar on plagiarism. A separate cohort of students did not attend the seminar, allowing comparison between attendees and non-attendees. Between 2006 and 2007, mean percentage text match values were consistent with a stable process, indicating advice and warnings were ineffective. Control chart analysis revealed that between 2007 and 2008, mean percentage text match changes showed a reduced text match in all nine modules, where students attended the interactive seminar, but none where students did not. This indicated that the interactive seminar had an effect. In 2008, there were no occurrences of plagiarism. Improvements were maintained in 2009. Advice and warnings against plagiarism were ineffective but a subsequent interactive seminar was effective at reducing plagiarism.

  17. Publication misconduct and plagiarism retractions: a systematic, retrospective study.

    Science.gov (United States)

    Stretton, Serina; Bramich, Narelle J; Keys, Janelle R; Monk, Julie A; Ely, Julie A; Haley, Cassandra; Woolley, Mark J; Woolley, Karen L

    2012-10-01

    To investigate whether plagiarism is more prevalent in publications retracted from the medical literature when first authors are affiliated with lower-income countries versus higher-income countries. Secondary objectives included investigating other factors associated with plagiarism (e.g., national language of the first author's country affiliation, publication type, journal ranking). Systematic, controlled, retrospective, bibliometric study. Retracted publications dataset in MEDLINE (search filters: English, human, January 1966-February 2008). Retracted misconduct publications were classified according to the first author's country affiliation, country income level, and country national language, publication type, and ranking of the publishing journal. Standardised definitions and data collection tools were used; data were analysed (odds ratio [OR], 95% confidence limits [CL], chi-squared tests) by an independent academic statistician. Of the 213 retracted misconduct publications, 41.8% (89/213) were retracted for plagiarism, 52.1% (111/213) for falsification/fabrication, 2.3% (5/213) for author disputes, 2.3% (5/213) for ethical issues, and 1.4% (3/213) for unknown reasons. The OR (95% CL) of plagiarism retractions (other misconduct retractions as reference) were higher (P 1 retraction) with publications retracted for plagiarism (11.5%, 9/78) than other types of misconduct (28.9%, 24/83). This is the first study to demonstrate that publications retracted for plagiarism are significantly associated with first authors affiliated with lower-income countries. These findings have implications for developing appropriate evidence-based strategies and allocation of resources to help mitigate plagiarism misconduct.

  18. Plagiarism, Cultural Diversity and Metaphor--Implications for Academic Staff Development

    Science.gov (United States)

    Leask, Betty

    2006-01-01

    Plagiarism is a complex, culturally loaded concept which causes much anxiety for both academics and students. Exactly what constitutes plagiarism is dependent on a number of contextual factors. Despite the difficulties associated with defining and detecting plagiarism, it is said to be on the increase, and students from "other cultures"…

  19. Viewpoint of Undergraduate Engineering Students on Plagiarism

    Science.gov (United States)

    Starovoytova, Diana; Namango, Saul Sitati

    2016-01-01

    Undoubtedly, plagiarism has been a global concern, especially so, in institutions of higher learning. Furthermore, over the past decades, cases of student plagiarism, in higher education, have increased, substantially. This issue cannot be taken, without due consideration, and it is crucial for educators, and universities, at large, to find the…

  20. Plagiarism education and prevention a subject-driven case-based approach

    CERN Document Server

    Bradley, Cara

    2011-01-01

    Academic librarians and university instructors worldwide are grappling with an increasing incidence of student plagiarism. Recent publications urge educators to prevent plagiarism by teaching students about the issue, and some have advocated the value of a subject-specific approach to plagiarism prevention education. There is, however, a complete lack of resources and guidance for librarians and instructors who want to adopt this approach in their teaching. This book opens with a brief overview of plagiarism today, followed by arguments in favour of a subject-based approach. The rest of the bo

  1. "You Fail": Plagiarism, the Ownership of Writing, and Transnational Conflicts

    Science.gov (United States)

    Lyon, Arabella

    2009-01-01

    Responding to cultural concerns about the ownership of writing and the nature of plagiarism, this article examines discourses about plagiarism by ESL students and argues for a plurality of approaches to understanding the ownership of language and textual appropriation. First, it uses speech act theory to explain the dynamics of plagiarism; second,…

  2. First-Year University Science and Engineering Students' Understanding of Plagiarism

    Science.gov (United States)

    Yeo, Shelley

    2007-01-01

    This paper is a case study of first-year science and engineering students' understandings of plagiarism. Students were surveyed for their views on scenarios illustrating instances of plagiarism in the context of the academic work and assessment of science and engineering students. The aim was to explore their understandings of plagiarism and their…

  3. Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

    Science.gov (United States)

    Bakhtiyari, Kaveh; Salehi, Hadi; Embi, Mohamed Amin; Shakiba, Masoud; Zavvari, Azam; Shahbazi-Moghadam, Masoomeh; Ebrahim, Nader Ale; Mohammadjafari, Marjan

    2014-01-01

    This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or…

  4. Rational Ignorance in Education: A Field Experiment in Student Plagiarism

    Science.gov (United States)

    Dee, Thomas S.; Jacob, Brian A.

    2012-01-01

    Plagiarism appears to be a common problem among college students, yet there is little evidence on the effectiveness of interventions designed to minimize plagiarism. This study presents the results of a field experiment that evaluated the effects of a web-based educational tutorial in reducing plagiarism. We found that assignment to the treatment…

  5. Students' Views on Prevention of Coursework Plagiarism | Bada ...

    African Journals Online (AJOL)

    ... and unrealistic coursework timeframes were cited for plagiarism in doing coursework assignments. Recommendations for preventing plagiarism are drawn out of these findings. Thereafter, a framework for administering coursework is developed. Keywords: Academic dishonesty; Higher education evaluation; Research ...

  6. Non-Native University Students' Perception of Plagiarism

    Science.gov (United States)

    Ahmad, Ummul Khair; Mansourizadeh, Kobra; Ai, Grace Koh Ming

    2012-01-01

    Plagiarism is a complex issue especially among non-native students and it has received a lot of attention from researchers and scholars of academic writing. Some scholars attribute this problem to cultural perceptions and different attitudes toward texts. This study evaluates student perception of different aspects of plagiarism. A small group of…

  7. Plagiarism governance in nurse education; dispositions, dimensions and tensions.

    Science.gov (United States)

    Welsh, Marion

    2017-11-01

    The reality of managing plagiarism in nurse education is indicative of multilayered and cumulative governance processes, which exist to fit with the needs of both the higher education institution and that of the Professional Statutory and Regulatory Body. However, the relationship between these entities is diffuse, particularly when this involves major plagiarism by post-qualified learners. This study sought to explore the strategic governance of plagiarism in Scottish higher education institutions offering nurse education and its articulation with the professional requirements of nurse education. The design involved a retrospective quantitative documentary analysis of plagiarism policies within 11 Scottish higher education institutions and a national on-line survey involving nurse educators with an active teaching role (n = 187). The documentary analysis demonstrated deficits and variations in how Scottish higher education institutions communicated the dimensions of plagiarism, and its subsequent management. Statistically significant findings from the on-line survey provided a clear mandate for educational providers to make visible the connectivity between organisational and professional governance processes to support responsive and proportional approaches to managing plagiarism by nurse learners. Significant findings also confirmed role implications and responsibilities, which nurse educators in this study, viewed as primarily pedagogical but crucially remain professionally centric. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. The Plagiarism in the Theses of English Education Students at Kabupaten Bone

    OpenAIRE

    Rizkariani Sulaiman

    2015-01-01

    The topic of this study is “Plagiarism in the Theses of English Education Students: Forms and Causes. In this study, the researcher limits the discussion by the following research questions: “what are the forms of students’ plagiarism in theses? and what are the causes that make students engage in the plagiarism?”. The objective of the study is specifically to know the forms of students’ plagiarism in theses; and to know the causes that make students engage in the plagiarism. In order to achi...

  9. Self-plagiarism in academic publishing: the anatomy of a misnomer.

    Science.gov (United States)

    Andreescu, Liviu

    2013-09-01

    The paper discusses self-plagiarism and associated practices in scholarly publishing. It approaches at some length the conceptual issues raised by the notion of self-plagiarism. It distinguishes among and then examines the main families of arguments against self-plagiarism, as well as the question of possibly legitimate reasons to engage in this practice. It concludes that some of the animus frequently reserved for self-plagiarism may be the result of, among others, poor choice of a label, unwarranted generalizations as to its ill effects based on the specific experience (and goals) of particular disciplines, and widespread but not necessarily beneficial publishing practices.

  10. Rate-adaptive BCH coding for Slepian-Wolf coding of highly correlated sources

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Salmistraro, Matteo; Larsen, Knud J.

    2012-01-01

    This paper considers using BCH codes for distributed source coding using feedback. The focus is on coding using short block lengths for a binary source, X, having a high correlation between each symbol to be coded and a side information, Y, such that the marginal probability of each symbol, Xi in X......, given Y is highly skewed. In the analysis, noiseless feedback and noiseless communication are assumed. A rate-adaptive BCH code is presented and applied to distributed source coding. Simulation results for a fixed error probability show that rate-adaptive BCH achieves better performance than LDPCA (Low......-Density Parity-Check Accumulate) codes for high correlation between source symbols and the side information....

  11. Legality, Quality Assurance and Learning: Competing Discourses of Plagiarism Management in Higher Education

    Science.gov (United States)

    Sutherland-Smith, Wendy

    2014-01-01

    In universities around the world, plagiarism management is an ongoing issue of quality assurance and risk management. Plagiarism management discourses are often framed by legal concepts of authorial rights, and plagiarism policies outline penalties for infringement. Learning and teaching discourses argue that plagiarism management is, and should…

  12. Plagiarism issues in post-1998 Indonesian film posters

    Directory of Open Access Journals (Sweden)

    Ekky Imanjaya

    2012-04-01

    Full Text Available There are online articles, with visual materials, stating that some post-1998 Indonesian film posters were accused as plagiarism by common people. However, academically speaking, it needs deeper skills and knowledge to prove acts of plagiarism. This paper will discuss the issues around Indonesian film posters and plagiarism, including the possibility of citing in graphic design. The research will treat film posters not only as marketing tools to promote the movies, as many people consider, but also as graphic design materials. Some terms such as appropriation, homage, and pastiche will be discussed to analyze the phenomenon.

  13. Multiple LDPC decoding for distributed source coding and video coding

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Luong, Huynh Van; Huang, Xin

    2011-01-01

    Distributed source coding (DSC) is a coding paradigm for systems which fully or partly exploit the source statistics at the decoder to reduce the computational burden at the encoder. Distributed video coding (DVC) is one example. This paper considers the use of Low Density Parity Check Accumulate...... (LDPCA) codes in a DSC scheme with feed-back. To improve the LDPC coding performance in the context of DSC and DVC, while retaining short encoder blocks, this paper proposes multiple parallel LDPC decoding. The proposed scheme passes soft information between decoders to enhance performance. Experimental...

  14. Addressing Plagiarism in Online Programmes at a Health Sciences University: A Case Study

    Science.gov (United States)

    Ewing, Helen; Anast, Ade; Roehling, Tamara

    2016-01-01

    Plagiarism continues to be a concern for all educational institutions. To build a solid foundation for high academic standards and best practices at a graduate university, aspects of plagiarism were reviewed to develop better management processes for reducing plagiarism. Specifically, the prevalence of plagiarism and software programmes for…

  15. Scientists Admitting to Plagiarism: A Meta-analysis of Surveys.

    Science.gov (United States)

    Pupovac, Vanja; Fanelli, Daniele

    2015-10-01

    We conducted a systematic review and meta-analysis of anonymous surveys asking scientists whether they ever committed various forms of plagiarism. From May to December 2011 we searched 35 bibliographic databases, five grey literature databases and hand searched nine journals for potentially relevant studies. We included surveys that asked scientists if, in a given recall period, they had committed or knew of a colleague who committed plagiarism, and from each survey extracted the proportion of those who reported at least one case. Studies that focused on academic (i.e. student) plagiarism were excluded. Literature searches returned 12,460 titles from which 17 relevant survey studies were identified. Meta-analysis of studies reporting committed (N = 7) and witnessed (N = 11) plagiarism yielded a pooled estimate of, respectively, 1.7% (95% CI 1.2-2.4) and 30% (95% CI 17-46). Basic methodological factors, including sample size, year of survey, delivery method and whether survey questions were explicit rather than indirect made a significant difference on survey results. Even after controlling for these methodological factors, between-study differences in admission rates were significantly above those expected by sampling error alone and remained largely unexplained. Despite several limitations of the data and of this meta-analysis, we draw three robust conclusions: (1) The rate at which scientists report knowing a colleague who committed plagiarism is higher than for data fabrication and falsification; (2) The rate at which scientists report knowing a colleague who committed plagiarism is correlated to that of fabrication and falsification; (3) The rate at which scientists admit having committed either form of misconduct (i.e. fabrication, falsification and plagiarism) in surveys has declined over time.

  16. Strategies for Using Plagiarism Software in the Screening of Incoming Journal Manuscripts

    DEFF Research Database (Denmark)

    Lykkesfeldt, Jens

    2016-01-01

    In recent years, several online tools have appeared capable of identifying potential plagiarism in science. While such tools may help to maintain or even increase the originality and ethical quality of the scientific literature, no apparent consensus exists among editors on the degree of plagiarism...... or self-plagiarism necessary to reject or retract manuscripts. In this study, two entire volumes of published original papers and reviews from Basic & Clinical Pharmacology & Toxicology were retrospectively scanned for similarity in anonymized form using iThenticate software to explore measures...... to predictively identify true plagiarism and self-plagiarism and to potentially provide guidelines for future screening of incoming manuscripts. Several filters were applied, all of which appeared to lower the noise from irrelevant hits. The main conclusions were that plagiarism software offers a unique...

  17. CASE STUDY: POLICIES, STRATEGIES AND RESPONSES TO PLAGIARISM IN SLOVAKIA

    Directory of Open Access Journals (Sweden)

    FOLTYNEK, Tomas

    2014-03-01

    Full Text Available The European project “Impact of Policies for Plagiarism in Higher Education Across Europe“ has identified best practices and gaps related to plagiarism in different European countries. Slovakia is one of interesting ones, where national repository for plagiarism detection was established. However, there are still gaps in terms of policies and overall understanding of plagiarism. This case study describes what happened in Slovakia in last few years, compares the situation with other European countries and discusses the results. Additionally, the number of occurrences of the terms “plagiarism” and “academic integrity” in media and on the Internet is examined in relation to recent changes.

  18. Do medical students really understand plagiarism? - Case study.

    Science.gov (United States)

    Badea, Oana

    2017-01-01

    In the last decade, more and more medicine students are involved in research, either in the form of a research project within specialized courses or as a scientific article to be presented at student international conferences or published in prestigious medical journals. The present study included 250 2nd year medical students, currently studying within the University of Medicine and Pharmacy of Craiova, Romania. There were collected 239 responses, with a response rate of 95.6%. In our study, the results showed that foreign students within the University of Medicine and Pharmacy of Craiova did have some issues understanding plagiarism with fewer foreign students (34%) than Romanian students (66%) recognizing that simply changing words does not avoid plagiarism. In our opinion, there should be put more emphasis upon plagiarism implications and its aspects, as well, with a permanent order to try to prevent future attempts of plagiarizing among medical students as future researchers within the medical science field.

  19. A Model for Determining Student Plagiarism: Electronic Detection and Academic Judgement

    Science.gov (United States)

    Bretag, Tracey; Mahmud, Saadia

    2009-01-01

    This paper provides insights based on the authors' own practice as university instructors, researchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common element between the various types of plagiarism to be the lack of…

  20. Do medical students require education on issues related to plagiarism?

    Science.gov (United States)

    Varghese, Joe; Jacob, Molly

    2015-01-01

    In the course of our professional experience, we have seen that many medical students plagiarise. We hypothesised that they do so out of ignorance and that they require formal education on the subject. With this objective in mind, we conducted a teaching session on issues related to plagiarism. As a part of this, we administered a quiz to assess their baseline knowledge on plagiarism and a questionnaire to determine their attitudes towards it. We followed this up with an interactive teaching session, in which we discussed various aspects of plagiarism. We subjected the data obtained from the quiz and questionnaire to bivariate and multivariate analysis. A total of 423 medical students participated in the study. Their average score for the quiz was 4.96±1.67 (out of 10). Age, gender and years in medical school were not significantly associated with knowledge regarding plagiarism. The knowledge scores were negatively correlated with permissive attitudes towards plagiarism and positively correlated with attitudes critical of the practice. Men had significantly higher scores on permissive attitudes compared to women . In conclusion, we found that the medical students' knowledge regarding plagiarism was limited. Those with low knowledge scores tended to have permissive attitudes towards plagiarism and were less critical of the practice. We recommend the inclusion of formal instruction on this subject in the medical curriculum, so that this form of academic misconduct can be tackled.

  1. Construction of knowledge, attitude and practice questionnaire for assessing plagiarism.

    Science.gov (United States)

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach's alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (Pplagiarism and to estimate the prevalence and the type of plagiarism commission.

  2. Construction of Knowledge, Attitude and Practice Questionnaire for Assessing Plagiarism

    Science.gov (United States)

    Poorolajal, J; Cheraghi, P; Irani, A Doosti; Cheraghi, Z; Mirfakhraei, M

    2012-01-01

    Background This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. Methods: A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine questions regarding attitude (Min=9, Max=27); and (d) eight questions regarding practice (Min=0, Max=8). A pilot study was conducted to assess reliability of the questions regarding knowledge and attitude. Cronbach’s alpha coefficient for the knowledge and attitude questions was 0.70 and 0.74 respectively. Results: The overall prevalence of at least once plagiarism commission was 38% (SD=0.035). The overall mean score of knowledge, attitude and practice was 5.94 (SD=1.66), 24.12 (SD=2.99), and 0.66 (SD=1.15) respectively. Knowledge of plagiarism was significantly higher among higher academic degrees and females. Their negative attitude toward plagiarism was stronger too. No statistically significant difference regarding plagiarism commission was observed among different academic degrees in both sexes. According to linear regression analysis, plagiarism commission decreased 13% per one unit increase in score of knowledge (P=0.005) and 16% per one unit increase in score of attitude (Pplagiarism and to estimate the prevalence and the type of plagiarism commission. PMID:23304676

  3. The Visual Code Navigator : An Interactive Toolset for Source Code Investigation

    NARCIS (Netherlands)

    Lommerse, Gerard; Nossin, Freek; Voinea, Lucian; Telea, Alexandru

    2005-01-01

    We present the Visual Code Navigator, a set of three interrelated visual tools that we developed for exploring large source code software projects from three different perspectives, or views: The syntactic view shows the syntactic constructs in the source code. The symbol view shows the objects a

  4. Pharmacy Students’ Ability to Identify Plagiarism After an Educational Intervention

    Science.gov (United States)

    Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C.; Nuzum, Donald S.; Compton, Cynthia; Gibson, Whitney

    2014-01-01

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students’ ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (pplagiarism can significantly improve students’ ability to identify plagiarism. PMID:24672066

  5. Pharmacy students' ability to identify plagiarism after an educational intervention.

    Science.gov (United States)

    Degeeter, Michelle; Harris, Kira; Kehr, Heather; Ford, Carolyn; Lane, Daniel C; Nuzum, Donald S; Compton, Cynthia; Gibson, Whitney

    2014-03-12

    Objective. To determine if an educational intervention in a doctor of pharmacy (PharmD) degree program increases pharmacy students' ability to identify plagiarism. Methods. First-year (P1), second-year (P2), and third-year (P3) pharmacy students attended an education session during which types of plagiarism and methods for avoiding plagiarism were reviewed. Students completed a preintervention assessment immediately prior to the session and a postintervention assessment the following semester to measure their ability. Results. Two hundred fifty-two students completed both preintervention and postintervention assessments. There was a 4% increase from preintervention to postintervention in assessment scores for the overall student sample (pplagiarism can significantly improve students' ability to identify plagiarism.

  6. CrossCheck plagiarism screening : Experience of the Journal of Epidemiology

    Science.gov (United States)

    Hashimoto, Katsumi

    Due to technological advances in the past two decades, researchers now have unprecedented access to a tremendous amount of useful information. However, because of the extreme pressure to publish, this abundance of information can sometimes tempt researchers to commit scientific misconduct. A serious form of such misconduct is plagiarism. Editors are always concerned about the possibility of publishing plagiarized manuscripts. The plagiarism detection tool CrossCheck allows editors to scan and analyze manuscripts effectively. The Journal of Epidemiology took part in a trial of CrossCheck, and this article discusses the concerns journal editors might have regarding the use of CrossCheck and its analysis. In addition, potential problems identified by CrossCheck, including self-plagiarism, are introduced.

  7. Plagiarism: A Shared Responsibility of All, Current Situation, and Future Actions in Yemen.

    Science.gov (United States)

    Muthanna, Abdulghani

    2016-01-01

    As combating plagiarism is a shared responsibility of all, this article focuses on presenting the current situation of higher education in Yemen. The critical review of four implementable policy documents and interviews revealed the absence of research ethics code, research misconduct policy, and institutional policies in the country. This led to the presence of several acts of research dishonesty. The article concludes with an initiative for necessary future actions in the nation.

  8. Arresting Student Plagiarism: Are We Investigators or Educators?

    Science.gov (United States)

    Davis, Lajuan

    2011-01-01

    Managing student plagiarism can cause instructors to feel as if they are serving educational institutions in the role of investigator rather than educator. Since many educators continue to struggle with the issue of student plagiarism, the author interviewed some of her colleagues. In this article, she shares her and her colleagues' antiplagiarism…

  9. Plagiarism Litigation Trends in the USA and Australia

    Science.gov (United States)

    Mawdsley, Ralph D.; Cumming, J. Joy

    2008-01-01

    In this article we explore the increasing complexity of plagiarism litigation in the USA and Australia. Plagiarism has always been a serious academic issue and academic staff and students have wrestled with its definition and appropriate penalties for some time. However, the advent of the Internet and more freely accessible information resources,…

  10. Academic Integrity and Plagiarism Prevention at Tata Institute of Social Sciences, Mumbai: A case Study

    OpenAIRE

    Bandi, Shekappa; Pothare, Devyani; Angadi, Mallikarjun; Jange, Suresh

    2016-01-01

    Plagiarism is not always a black and white issue. The boundary between plagiarism and research is often unclear. Learning to recognize the various forms of plagiarism, especially the more ambiguous ones, is an important step towards effective prevention. The study overview the concept and types of plagiarism and it`s benefits, Plagiarism Policies in India, and also discussed turnitin and its workflow process of the TISS comparison of the Turnitin and iThenticate plagiarism tools and other rel...

  11. Digital plagiarism--the Web giveth and the Web shall taketh.

    Science.gov (United States)

    Barrie, J M; Presti, D E

    2000-01-01

    Publishing students' and researchers' papers on the World Wide Web (WWW) facilitates the sharing of information within and between academic communities. However, the ease of copying and transporting digital information leaves these authors' ideas open to plagiarism. Using tools such as the Plagiarism.org database, which compares submissions to reports and papers available on the Internet, could discover instances of plagiarism, revolutionize the peer review process, and raise the quality of published research everywhere.

  12. Transmission imaging with a coded source

    International Nuclear Information System (INIS)

    Stoner, W.W.; Sage, J.P.; Braun, M.; Wilson, D.T.; Barrett, H.H.

    1976-01-01

    The conventional approach to transmission imaging is to use a rotating anode x-ray tube, which provides the small, brilliant x-ray source needed to cast sharp images of acceptable intensity. Stationary anode sources, although inherently less brilliant, are more compatible with the use of large area anodes, and so they can be made more powerful than rotating anode sources. Spatial modulation of the source distribution provides a way to introduce detailed structure in the transmission images cast by large area sources, and this permits the recovery of high resolution images, in spite of the source diameter. The spatial modulation is deliberately chosen to optimize recovery of image structure; the modulation pattern is therefore called a ''code.'' A variety of codes may be used; the essential mathematical property is that the code possess a sharply peaked autocorrelation function, because this property permits the decoding of the raw image cast by th coded source. Random point arrays, non-redundant point arrays, and the Fresnel zone pattern are examples of suitable codes. This paper is restricted to the case of the Fresnel zone pattern code, which has the unique additional property of generating raw images analogous to Fresnel holograms. Because the spatial frequency of these raw images are extremely coarse compared with actual holograms, a photoreduction step onto a holographic plate is necessary before the decoded image may be displayed with the aid of coherent illumination

  13. From Tavarod to Plagiarism

    Directory of Open Access Journals (Sweden)

    S. Gavad Mortezaei

    2014-08-01

    Full Text Available Abstract “Plagiarism” has been one of the important subjects in the field of literary criticism and argued in the press and meetings from past till now. Today, there isn't any day and month that will go by without seeing a case in this field being presented or claimed in books, journals or newspapers. However, thanks to the expanse of operation and wide scope of the Judiciary, mentioned claims are studied in Judicial courts as well (you can just search “Plagiarism” in Google search engine, and then you will encounter with hundred different pages on this subject. In countries that they have copyright rule, this subject is taken into account seriously and if someone adapts a subject or extracts some text from another one's, without mentioning its reference, he will be punished firmly in accordance with rules and regulations. Despite the importance of this subject in literary criticism, unfortunately it is not considered as it deserves in our country. Regardless of definition and categorization of Plagiarism by rhetoricians, there is disagreement for making decision whether a Plagiarism is happened or it is some other cases such as Tavarod (occurrence of one thought in two persons' minds or Intertextuality. Considering the fact that contents and concepts are common between people in every inches of our planet, it is so hard to determine and prove that someone is innovator and creator of concept or content and if someone else uses the same content, he is copying the original creator. We know that sometimes the same word or phrase comes to the minds of two persons accidentally, so accusing somebody of plagiary should be done with care and comprehensive study and it should be provable. In other words, definition of Plagiarism boundaries based on rate of uniformity and similarity of terms and concepts of two works is very hard and the border between plagiarism and Tavarod is very narrow and skeptical.

  14. Protecting Student Intellectual Property in Plagiarism Detection Process

    Science.gov (United States)

    Butakov, Sergey; Barber, Craig

    2012-01-01

    The rapid development of the Internet along with increasing computer literacy has made it easy and tempting for digital natives to copy-paste someone's work. Plagiarism is now a burning issue in education, industry and even in the research community. In this study, the authors concentrate on plagiarism detection with particular focus on the…

  15. Decreasing Plagiarism: What Works and What Doesn't

    Science.gov (United States)

    Houtman, Anne M.; Walker, Sean

    2010-01-01

    The authors tested the predictions of a game theory model of plagiarism, using a test population of student papers submitted to an online plagiarism detection program, over five semesters in a non-majors biology course with multiple sections and high enrollment. Consistent with the model, as the probability of detection and the penalty if caught…

  16. WHY MUSLIM STUDENTS PLAGIARIZE IN WRITING ENGLISH TEXTS

    Directory of Open Access Journals (Sweden)

    Wakhid Nashruddin

    2015-12-01

    Full Text Available Reasons for copy-pasting someone else’s works has attracted attention from many sides that copy-pasting activities, or more popular with term plagiarism, have been considered as a threat for academic life. It also happens at the case of muslim students, in which Islam teaches the students to be honest and not to steal from others. For understanding why it happens, this exploration is conducted. The students of English Department of IAIN Syekh Nurjati Cirebon have to write many of their assignments in English. The result of my observations, the quality of the students’ writing is not good enough. One of the cases found is the copy-paste works, or plagiarism. Using interviews instrument, I try to figure out why students of English Department of IAIN Syekh Nurjati Cirebon. There are at least three reasons behind why students act plagiarism; ignorance on the quotation and citation rules, poor writing skills, and the need of instant writing result. This paper tries to explore these reasons. Keywords: copy-paste, plagiarism, writing in English

  17. Writing a research paper at the university: authorship vs plagiarism

    Directory of Open Access Journals (Sweden)

    Maria Fátima Alves

    2016-09-01

    Full Text Available Considering the need of producing academic texts at the university, many undergraduate students do it by copying texts that were already published. In this study we discuss the presence of plagiarism versus authorship marks in the introduction of academic articles produced by freshmen in a licenciateship degree. Therefore, we emphasize the issue of plagiarism and authorship, particularly from the perspective of the enunciative bakhtinian studies and then present the theoretical basis of Literacies, with the most recent studies on Literacies and Socio-Rhetorics. Data analysis revealed and confirmed the academic writing as a complex activity, given the practice of plagiarism found in the analyzed productions. The lack of knowledge of academic writing together not the theme domain contributed to the practice of plagiarism.

  18. Plagiarism Detection for Indonesian Language using Winnowing with Parallel Processing

    Science.gov (United States)

    Arifin, Y.; Isa, S. M.; Wulandhari, L. A.; Abdurachman, E.

    2018-03-01

    The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There are many previous research that related with plagiarism detection in Indonesian Language with different method. But there are still some part that still has opportunity to improve. This research proposed the solution that can improve the plagiarism detection technique that can detect not only copy paste form but more advance than that. The proposed solution is using Winnowing with some addition process in pre-processing stage. With stemming processing in Indonesian Language and generate fingerprint in parallel processing that can saving time processing and produce the plagiarism result on the suspected document.

  19. Digital plagiarism - The web giveth and the web shall taketh

    Science.gov (United States)

    Presti, David E

    2000-01-01

    Publishing students' and researchers' papers on the World Wide Web (WWW) facilitates the sharing of information within and between academic communities. However, the ease of copying and transporting digital information leaves these authors' ideas open to plagiarism. Using tools such as the Plagiarism.org database, which compares submissions to reports and papers available on the Internet, could discover instances of plagiarism, revolutionize the peer review process, and raise the quality of published research everywhere. PMID:11720925

  20. Research on Primary Shielding Calculation Source Generation Codes

    Science.gov (United States)

    Zheng, Zheng; Mei, Qiliang; Li, Hui; Shangguan, Danhua; Zhang, Guangchun

    2017-09-01

    Primary Shielding Calculation (PSC) plays an important role in reactor shielding design and analysis. In order to facilitate PSC, a source generation code is developed to generate cumulative distribution functions (CDF) for the source particle sample code of the J Monte Carlo Transport (JMCT) code, and a source particle sample code is deveoped to sample source particle directions, types, coordinates, energy and weights from the CDFs. A source generation code is developed to transform three dimensional (3D) power distributions in xyz geometry to source distributions in r θ z geometry for the J Discrete Ordinate Transport (JSNT) code. Validation on PSC model of Qinshan No.1 nuclear power plant (NPP), CAP1400 and CAP1700 reactors are performed. Numerical results show that the theoretical model and the codes are both correct.

  1. REFLECTIONS ON THE CONDUCT OF PEOPLE WHO CHECK AND SANCTION PLAGIARISM

    Directory of Open Access Journals (Sweden)

    Bujorel Florea

    2017-12-01

    Full Text Available The establishment of a general framework for the evaluation of plagiarism, accepted by the majority of those involved in the creation of intellectual works, is the main objective pursued in the present study. Obviously, the author does not propose to definitively outline the limits of such a plagiarism assessment framework, but outlines some criteria and exigencies that characterize it, being aware that only through the contribution of those interested in different spiritual fields can one agree such a standard. The question of the plagiarism, old-fashioned and the punishment of the plagiarists, which is necessary for justice, has a wide range of difficulties of appreciation. That is why the present study was born on the basis of the lack of unanimously accepted criteria for assessing the originality of intellectual creations. The author hopes that his imperfect approach will be welcome and arouse approval and interest. The author believes that in the world of today, the Internet and computer science, where an IT program can show the degree of plagiarism of any literary, artistic or scientific work, the evaluation of the suspect work of plagiarism must be done primarily by man and not by technical equipment, either very sophisticated. The man, endowed with correct thinking, artistic and scientific sense, vocation, modesty, temperament, etc., can control and weigh better than the IT apparatus of plagiarism and especially, can better determine the applicable sanction. This is why the present study is based on the truth that plagiarism judges, specialists dedicated to intellectual creation, are able to value the criteria of the plagiarism authors, correct their flaws and give them the chance to -and develops the natural vocation.

  2. An Empirical Research Study of the Efficacy of Two Plagiarism-Detection Applications

    Science.gov (United States)

    Hill, Jacob D.; Page, Elaine Fetyko

    2009-01-01

    This article describes a study of the two most popular plagiarism-detection software platforms available on today's market--Turnitin (http://www.turnitin.com/static/index.html) and SafeAssign (http://www.safeassign.com/). After a brief discussion of plagiarism's relevance to librarians, the authors examine plagiarism-detection methodology and…

  3. Technical and Non-Technical Programme Students' Attitudes and Reasons for Plagiarism

    Science.gov (United States)

    Harji, Madhubala Bava; Ismail, Zalina; Chetty, Thiba Naraina; Letchumanan, Krishnaveni

    2017-01-01

    To date, plagiarism continues to be a widespread problem in higher education. Deemed to be endemic, researchers continue to examine various aspects of plagiarism, including students' perception, practices, attitudes and reasons for plagiarism, in addressing this growing concern. Most studies, however, tend to examine these aspects independently.…

  4. Plagiarism in Scientific Research and Publications and How to Prevent It

    Science.gov (United States)

    Masic, Izet

    2014-01-01

    Quality is assessed on the basis of adequate evidence, while best results of the research are accomplished through scientific knowledge. Information contained in a scientific work must always be based on scientific evidence. Guidelines for genuine scientific research should be designed based on real results. Dynamic research and use correct methods of scientific work must originate from everyday practice and the fundamentals of the research. The original work should have the proper data sources with clearly defined research goals, methods of operation which are acceptable for questions included in the study. When selecting the methods it is necessary to obtain the consent of the patients/respondents to provide data for execution of the project or so called informed consent. Only by the own efforts can be reached true results, from which can be drawn conclusions and which finally can give a valid scholarly commentary. Text may be copied from other sources, either in whole or in part and marked as a result of the other studies. For high-quality scientific work necessary are expertise and relevant scientific literature, mostly taken from publications that are stored in biomedical databases. These are scientific, professional and review articles, case reports of disease in physician practices, but the knowledge can also be acquired on scientific and expert lectures by renowned scientists. Form of text publications must meet standards on writing a paper. If the article has already been published in a scientific journal, the same article cannot be published in any other journal with a few minor adjustments, or without specifying the parts of the first article which is used in another article. Copyright infringement occurs when the author of a new article, with or without mentioning the author, uses a substantial portion of previously published articles, including past contributions in the first article. With the permission of the publisher and the author, another journal

  5. Plagiarism: Examination of Conceptual Issues and Evaluation of Research Findings on Using Detection Services

    Science.gov (United States)

    Konstantinidis, Angelos; Theodosiadou, Dimitra; Pappos, Christos

    2013-01-01

    The purpose of this review is to analyze and evaluate the research findings on using Plagiarism Detection Services (PDS) in universities. In order to do that, conceptual issues about plagiarism are examined and the complex nature of plagiarism is discussed. Subsequently, the pragmatic forms of student plagiarism are listed and PDS strategies on…

  6. Instructor Perceptions of Plagiarism: Are We Finding Common Ground?

    Science.gov (United States)

    Bennett, Kymberley K.; Behrendt, Linda S.; Boothby, Jennifer L.

    2011-01-01

    This study examined instructor views of what constitutes plagiarism. The authors collected questionnaire data from 158 participants recruited through three teaching-related electronic listservs. Results showed that most participants agreed that behaviors that claim credit for someone else's work constituted plagiarism. Instructors differed in…

  7. The dictatorship of plagiarism and the obsession with quotations

    Directory of Open Access Journals (Sweden)

    Marcelo Krokoscz

    2014-10-01

    Full Text Available In recent years, plagiarism has become a concern in the national academic realm, although internationally this subject has been debated for decades. Considering some of these aspects may be important not to repeat mistakes already made ​​and overcome in relation to plagiarism and at the same time represent an opportunity to deal with the problem at a national level from what is already consolidated globally. In this sense, the aim of this text is to present some of these perspectives without intending to indicate immediate solutions to exterminate plagiarism, but rather contribute to a debate on the subject.

  8. Distributed source coding of video

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Van Luong, Huynh

    2015-01-01

    A foundation for distributed source coding was established in the classic papers of Slepian-Wolf (SW) [1] and Wyner-Ziv (WZ) [2]. This has provided a starting point for work on Distributed Video Coding (DVC), which exploits the source statistics at the decoder side offering shifting processing...... steps, conventionally performed at the video encoder side, to the decoder side. Emerging applications such as wireless visual sensor networks and wireless video surveillance all require lightweight video encoding with high coding efficiency and error-resilience. The video data of DVC schemes differ from...... the assumptions of SW and WZ distributed coding, e.g. by being correlated in time and nonstationary. Improving the efficiency of DVC coding is challenging. This paper presents some selected techniques to address the DVC challenges. Focus is put on pin-pointing how the decoder steps are modified to provide...

  9. Comparative Analysis of Institutional Policy Definitions of Plagiarism: A Pan-Canadian University Study

    Science.gov (United States)

    Eaton, Sarah Elaine

    2017-01-01

    This article shares the findings of a study investigating institutional policy definitions of plagiarism at twenty English-speaking Canadian universities. The types of primary sources consulted for this study included: (1) university academic calendars for 2016-2017, (2) institutional policies on academic misconduct, and (3) student academic codes…

  10. Plagiarism Awareness among Students: Assessing Integration of Ethics Theory into Library Instruction

    Science.gov (United States)

    Strittmatter, Connie; Bratton, Virginia K.

    2014-01-01

    The library literature on plagiarism instruction focuses on students' understanding of what plagiarism is and is not. This study evaluates the effect of library instruction from a broader perspective by examining the pre- and posttest (instruction) levels of students' perceptions toward plagiarism ethics. Eighty-six students completed a pre- and…

  11. Investigating Some Main Causes and Reasons of Writing Plagiarism in an EFL Context

    Directory of Open Access Journals (Sweden)

    Elham Zarfsaz

    2017-07-01

    Full Text Available The present study aimed at exploring the causes and reasons of the EFL learners’ plagiarism. To this end, 150 females and males TEFL students from State and Azad universities in Iran, participated the study. A questionnaire developed by Rezanejad and Rezaeibased (2013 and a semi-structured interview which were piloted on a similar sample before administering were used as the instruments of the study. To triangulate the findings, for the qualitative part of the study, a semi-structured interview including 16 questions was run with 10 learners to collect the quantitative data at the end of the study. Based on the findings of this study, it was revealed that most of the students were aware of the concept of plagiarism and had the same definition of it. Moreover, their professors used the Internet and search engines to detect plagiarism and warned them about plagiarism continuously.  The students claimed inadequate information about how not to plagiarize and less command over English language to be the main reason of plagiarism. They heard of it from their university professors, then in workshops or seminars on plagiarism, and finally from their high school teachers. Moreover, they got familiar with the concept of plagiarism through university professors, friends or family members, newspapers and magazines, Internet, TV, and radio. The implications are discussed in terms of raising learners' awareness about plagiarism in EFL contexts.

  12. Applying an Employee-Motivation Model to Prevent Student Plagiarism.

    Science.gov (United States)

    Malouff, John M.; Sims, Randi L.

    1996-01-01

    A model based on Vroom's expectancy theory of employee motivation posits that instructors can prevent plagiarism by ensuring that students understand the rules of ethical writing, expect assignments to be manageable and have personal benefits, and expect plagiarism to be difficult and have important personal costs. (SK)

  13. Perceptions of undergraduate pharmacy students on plagiarism in three major public universities in Egypt.

    Science.gov (United States)

    Mohamed, Moataz Ehab; Mohy, Nagla; Salah, Sarah

    2018-01-01

    The survey aimed to capture the perceptions of undergraduate pharmacy students towards plagiarism in three major public universities in Cairo, Egypt: Helwan, Ain-Shams, and Cairo Universities. This was a paper-based self-administrated survey study. The questionnaire was validated by both content and face validation. The final survey form captured the knowledge of the students on plagiarism in terms of definitions, attitudes, and practices. Four hundred and fourteen students, 320 females and 94 males, participated in the study. There was a significant difference between the students who knew the definition of plagiarism among the three universities with p-value = .01. More than half of the participants (67%) claimed that they had no previous education or training on plagiarism. However, after being informed about plagiarism, most of them agreed that plagiarism should be regarded as stealing and a punishment. Additionally, poor study skills and the ease of copying and pasting from the Internet were identified by the majority of the students to be the leading causes of plagiarism. Pharmacy students need to be more educated on plagiarism and its consequences on research and educational ethics. Finally, more strict policies should be incorporated to monitor and control plagiarism in undergraduate sections.

  14. Beyond Trust: Plagiarism and Truth.

    Science.gov (United States)

    Penders, Bart

    2018-03-01

    Academic misconduct distorts the relationship between scientific practice and the knowledge it produces. The relationship between science and the knowledge it produces is, however, not something universally agreed upon. In this paper I will critically discuss the moral status of an act of research misconduct, namely plagiarism, in the context of different epistemological positions. While from a positivist view of science, plagiarism only influences trust in science but not the content of the scientific corpus, from a constructivist point of view both are at stake. Consequently, I argue that discussions of research misconduct and responsible research ought to be explicitly informed by the authors' views on the relationship between science and the knowledge it produces.

  15. Statement on Plagiarism

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 13; Issue 5. Statement on Plagiarism. S Mahadevan N Mukunda. Editorial Volume 13 Issue 5 May 2008 pp 403-404. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/013/05/0403-0404. Author Affiliations.

  16. Who Has Read the Policy on Plagiarism? Unpacking Students' Understanding of Plagiarism

    Science.gov (United States)

    Gullifer, J. M.; Tyson, G. A.

    2014-01-01

    Research has established that the term "plagiarism" is open to different interpretations, resulting in confusion among students and staff alike. University policy on academic integrity/misconduct defines the behaviours that all stakeholders must abide by, and the parameters for reporting, investigating and penalising infringements. These…

  17. An Institutional Code of Ethics--A Response to Attitude of Israeli Teachers' Education College Students towards Academic Plagiarism

    Science.gov (United States)

    Reingold,, Roni; Baratz, Lea

    2011-01-01

    Academic plagiarism becomes very easy due to new opportunities provided by the Internet era (Scrinber, 2003; Underwood & Sazabo, 2003; Ross, 2005). We believe that academic dishonesty is a major issue, because it strikes at the heart of the academic and social values: honesty, trust and integrity. When dealing with education students, the…

  18. Using Computer Simulations and Games to Prevent Student Plagiarism

    Science.gov (United States)

    Bradley, Elizabeth G.

    2015-01-01

    In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…

  19. Realigning the Focus of Plagiarism Detection Using "Plagiarismdetect.com"

    Science.gov (United States)

    Sabapathy, Elangkeeran A/L; Rahim, Rozlan Abd; Jusoff, Kamaruzaman

    2009-01-01

    The purpose of this article is to examine the extent to which "plagiarismdetect.com," an internet help/tool to detect plagiarism helps academicians tackle the ever-growing problem of plagiarism. Concerned with term papers, essays and most of the time with full-blown research reports, a tool like "plagiarismdetect.com" may…

  20. Reducing Plagiarism by Using Online Software: An Experimental Study

    Science.gov (United States)

    Kose, Ozgur; Arikan, Arda

    2011-01-01

    This action research attempts to explore the perceptions of Turkish university students on plagiarism while evaluating the effectiveness of an online application used to deter plagiarism. The participants were 40 first year university students studying in two different sections of an academic writing class. The findings show that the participants…

  1. Writing a research paper at the university: authorship vs plagiarism

    Directory of Open Access Journals (Sweden)

    Maria Fátima Alves

    2016-09-01

    Full Text Available http://dx.doi.org/10.5007/2175-8026.2016v69n3p77 Considering the need of producing academic texts at the university, many undergraduate students do it by copying texts that were already published. In this study we discuss the presence of plagiarism versus authorship marks in the introduction of academic articles produced by freshmen in a licenciateship degree. Therefore, we emphasize the issue of plagiarism and authorship, particularly from the perspective of the enunciative bakhtinian studies and then present the theoretical basis of Literacies, with the most recent studies on Literacies and Socio-Rhetorics. Data analysis revealed and confirmed the academic writing as a complex activity, given the practice of plagiarism found in the analyzed productions. The lack of knowledge of academic writing together not the theme domain contributed to the practice of plagiarism.

  2. Students' Perceptions of Cheating and Plagiarism in Higher Institutions

    Science.gov (United States)

    Owunwanne, Daniel; Rustagi, Narendra; Dada, Remi

    2010-01-01

    There is a growing body of evidence that cheating and plagiarism are prominent problems in many universities. In informal conversations, it seems that different students perceive plagiarism differently. In this paper, we conducted a survey at Howard University to examine or to follow up with this growing trend. Specifically, team leaders in school…

  3. Teaching Students about Plagiarism Using a Web-Based Module

    Science.gov (United States)

    Stetter, Maria Earman

    2013-01-01

    The following research delivered a web-based module about plagiarism and paraphrasing to avoid plagiarism in both a blended method, with live instruction paired with web presentation for 105 students, and a separate web-only method for 22 other students. Participants were graduates and undergraduates preparing to become teachers, the majority of…

  4. Ethical conduct for research : a code of scientific ethics

    Science.gov (United States)

    Marcia Patton-Mallory; Kathleen Franzreb; Charles Carll; Richard Cline

    2000-01-01

    The USDA Forest Service recently developed and adopted a code of ethical conduct for scientific research and development. The code addresses issues related to research misconduct, such as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research or in reporting research results, as well as issues related to professional misconduct, such...

  5. The Effect of Enrollment Status on Plagiarism among Traditional and Non-Traditional Students

    Science.gov (United States)

    Roth, Robert

    2017-01-01

    Previous research has consistently shown that plagiarism in higher education exists. Most of the previous research had measured the number of incidents of plagiarism at different institutions of higher learning. Recently, research has tried to identify incidents of plagiarism in relation to student demographics or academic discipline. With the…

  6. Turnitin Systems: A Deterrent to Plagiarism in College Classrooms

    Science.gov (United States)

    Heckler, Nina C.; Rice, Margaret; Bryan, C. Hobson

    2013-01-01

    Computer technology and the Internet now make plagiarism an easier enterprise. As a result, faculty must be more diligent in their efforts to mitigate the practice of academic integrity, and institutions of higher education must provide the leadership and support to ensure the context for it. This study explored the use of a plagiarism detection…

  7. Combating plagiarism: the role of the health librarian.

    Science.gov (United States)

    Spring, Hannah; Adams, Rachel

    2013-12-01

    This feature looks at the issue of plagiarism in health care students and the role of the health librarian in combating the problem. In particular, consideration is given to how plagiarism can occur and provides some examples from two UK universities of approaches health librarians can take in supporting students to avoid these common pitfalls. © 2013 The authors. Health Information and Libraries Journal © 2013 Health Libraries Group.

  8. Where Does Originality End and Plagiarism Start? Discussing Plagiarism in Information Science

    DEFF Research Database (Denmark)

    Greifeneder, Elke Susanne; Connaway, Lynn Silipigni; Jiang, Tingting

    2014-01-01

    no longer be considered to be original and starts to be considered self-plagiarism. Parts of the discussion will center on the question of whether information science researchers can actually avoid repeating the same words when today they have to publish results from research projects in as many...

  9. An editorial on plagiarism

    Directory of Open Access Journals (Sweden)

    Nico Keilman

    2011-03-01

    Full Text Available In January this year, we were confronted with a case of plagiarism. One paper that had been submitted last year by a certain person turned out to be written by three other persons. It was presented by the three true authors at a conference in 2010, where they distributed copies of their paper. One of the reviewers of the paper informed us about that fact. We asked the three authors for a copy, which turned out to be identical with the submission, except for a few minor details. When confronted with these facts, the person who had submitted the paper was unable to give us a satisfactory explanation. This is a case of serious scientific misconduct. The editors and the publisher of Demographic Research cannot and will not accept any form of plagiarism. Nor will we accept any other form of misconduct in science, including fabrication, falsification, or other practices that seriously deviate from those that are commonly accepted within the scientific community for proposing, conducting, or reporting research. With Long et al. ("Responding to possible plagiarism", Science 6 March 2009, we are of the opinion that the responsibility for research integrity ultimately lies in the hands of the scientific community: educators, students, authors, and those who provide peer reviews. Journal editors must take appropriate action and verify the originality of suspected manuscripts. The Office of Research Integrity provides useful guidelines (http://ori.dhhs.gov/. We have decided that any future submission to Demographic Research that lists the plagiarist as an author or co-author will be rejected automatically.

  10. Code Forking, Governance, and Sustainability in Open Source Software

    OpenAIRE

    Juho Lindman; Linus Nyman

    2013-01-01

    The right to fork open source code is at the core of open source licensing. All open source licenses grant the right to fork their code, that is to start a new development effort using an existing code as its base. Thus, code forking represents the single greatest tool available for guaranteeing sustainability in open source software. In addition to bolstering program sustainability, code forking directly affects the governance of open source initiatives. Forking, and even the mere possibilit...

  11. Plagiarism for beginners: how do we communicate academic honesty with students?

    OpenAIRE

    Pejić Bach, Mirjana; Stojanovski, Jadranka

    2017-01-01

    Abstract. Plagiarism can be considered one of the most important topics related to scientific work. Previous research has indicated that plagiarism occurs more often in countries with the lower level of scientific output measured in number of papers cited in top journals. These countries at the same time have in most of the cases longer tradition of scientific research [1]. Plagiarism, like any other fraud, can be fought in three manners [2]. First, educational actions can be implemented in o...

  12. The Ethics of Plagiarism.

    Science.gov (United States)

    Jolly, Peggy

    Within the academy the commonly held definition of plagiarism--using another's words, ideas, or stylistic individuality without attribution--is widespread, appearing on most English course syllabi. Judicial guidelines are followed: neither stealing nor ignorance of the law is to be sanctioned. Furthermore, penalties for students can be severe: a…

  13. Plagiarism detection and prevention techniques in engineering education

    OpenAIRE

    Halak, Basel; El-Hajjar, Mohammed

    2016-01-01

    Plagiarism seriously damages the education process in a number of ways; it prevents students from developing the skills of creative thinking and critical analysis; it undermines the trust between lectures and students, and if goes undetected, it can impact the reputation of the academic institution and devalue its degrees. In this paper, we present two techniques for plagiarism detection and prevention. The first method is based on the allocation of a unique assignment for each student, and t...

  14. Placing the Library at the Heart of Plagiarism Prevention: The University of Bradford Experience

    Science.gov (United States)

    George, Sarah; Costigan, Anne; O'hara, Maria

    2013-01-01

    Plagiarism is a vexing issue for Higher Education, affecting student transition, retention, and attainment. This article reports on two initiatives from the University of Bradford library aimed at reducing student plagiarism. The first initiative is an intensive course for students who have contravened plagiarism regulations. The second course…

  15. Self-Assessment of the Use of Plagiarism Avoiding Techniques to Create Ethical Scholarship Among Research Students

    Directory of Open Access Journals (Sweden)

    Saeed Ahmad

    2015-11-01

    Full Text Available The use of plagiarism avoiding techniques can be helpful to maintain academic integrity, a better learning environment and intellectual honesty. This explored the use of plagiarism avoiding techniques for creating ethical scholarship among research students. It also measured the association between the frequency of using plagiarism avoiding techniques and the satisfaction about knowledge of plagiarism. Data were collected from seven universities through an online self-structured questionnaire. Ordinal logistic regression analysis was used to explore the variance. The association between the frequency of using plagiarism avoiding techniques and satisfaction about knowledge of plagiarism was indicated. Differences were also found on the basis of gender, discipline, level and stage of study.

  16. Using an ethical decision-making model to determine consequences for student plagiarism.

    Science.gov (United States)

    Kiehl, Ermalynn M

    2006-06-01

    The incidence of plagiarism, intentional or unintentional, in the professional nursing arena has increased in recent years, as has the occurrence of plagiarism among nursing students. Strategies for cheating have become very sophisticated with the use of aids such as personal digital assistants, camera phones, and instant messaging. Cheating on written papers has also increased. The Internet provides students with ready-made research and academic papers, and access to Web sites on a plethora of topics. In this article, I describe my experience with plagiarism of ethics papers during students' final semester before graduation. How I discovered the plagiarized work and used the A-B-C-D-E ethical decision-making model in determining the student consequences for the event are presented.

  17. Application of Plagiarism Screening Software in the Chemical Engineering Curriculum

    Science.gov (United States)

    Cooper, Matthew E.; Bullard, Lisa G.

    2014-01-01

    Plagiarism is an area of increasing concern for written ChE assignments, such as laboratory and design reports, due to ease of access to text and other materials via the internet. This study examines the application of plagiarism screening software to four courses in a university chemical engineering curriculum. The effectiveness of plagiarism…

  18. Journals May Soon Use Anti-Plagiarism Software on Their Authors

    Science.gov (United States)

    Rampell, Catherine

    2008-01-01

    This spring, academic journals may turn the anti-plagiarism software that professors have been using against their students on the professors themselves. CrossRef, a publishing industry association, and the software company iParadigms announced a deal last week to create CrossCheck, an anti-plagiarism program for academic journals. The software…

  19. An analysis of student privacy rights in the use of plagiarism detection systems.

    Science.gov (United States)

    Brinkman, Bo

    2013-09-01

    Plagiarism detection services are a powerful tool to help encourage academic integrity. Adoption of these services has proven to be controversial due to ethical concerns about students' rights. Central to these concerns is the fact that most such systems make permanent archives of student work to be re-used in plagiarism detection. This computerization and automation of plagiarism detection is changing the relationships of trust and responsibility between students, educators, educational institutions, and private corporations. Educators must respect student privacy rights when implementing such systems. Student work is personal information, not the property of the educator or institution. The student has the right to be fully informed about how plagiarism detection works, and the fact that their work will be permanently archived as a result. Furthermore, plagiarism detection should not be used if the permanent archiving of a student's work may expose him or her to future harm.

  20. Text-based plagiarism in scientific writing: what Chinese supervisors think about copying and how to reduce it in students' writing.

    Science.gov (United States)

    Li, Yongyan

    2013-06-01

    Text-based plagiarism, or textual copying, typically in the form of replicating or patchwriting sentences in a row from sources, seems to be an issue of growing concern among scientific journal editors. Editors have emphasized that senior authors (typically supervisors of science students) should take the responsibility for educating novices against text-based plagiarism. To address a research gap in the literature as to how scientist supervisors perceive the issue of textual copying and what they do in educating their students, this paper reports an interview study with 14 supervisors at a research-oriented Chinese university. The study throws light on the potentiality of senior authors mentoring novices in English as an Additional Language (EAL) contexts and has implications for the efforts that can be made in the wider scientific community to support scientists in writing against text-based plagiarism.

  1. Student Plagiarism in Higher Education in Vietnam: An Empirical Study

    Science.gov (United States)

    Do Ba, Khang; Do Ba, Khai; Lam, Quoc Dung; Le, Dao Thanh Binh An; Nguyen, Phuong Lien; Nguyen, Phuong Quynh; Pham, Quoc Loc

    2017-01-01

    This paper assesses and compares the prevalence of plagiarism across different student and assignment characteristics at a university in Vietnam, using the similarity index reported by the text-matching software Turnitin as a proxy measure of plagiarism on a sample of 681 student papers. The findings present a level of match higher than reported…

  2. Is Cheating Always Intentional? The Perception of College Students toward the Issues of Plagiarism

    Science.gov (United States)

    Tabor, Erin L.

    2013-01-01

    The definition of plagiarism that is used in university handbooks is a simple one, and policies along with tiers of disciplinary strategies are used by faculty members in higher education to deter students from committing a plagiarism infraction based on this simple definition. However, plagiarism still occurs on college campuses, and this may be…

  3. Development of a Rubric to Assess Academic Writing Incorporating Plagiarism Detectors

    Directory of Open Access Journals (Sweden)

    Salim Razı

    2015-06-01

    Full Text Available Similarity reports of plagiarism detectors should be approached with caution as they may not be sufficient to support allegations of plagiarism. This study developed a 50-item rubric to simplify and standardize evaluation of academic papers. In the spring semester of 2011-2012 academic year, 161 freshmen’s papers at the English Language Teaching Department of Çanakkale Onsekiz Mart University, Turkey, were assessed using the rubric. Validity and reliability were established. The results indicated citation as a particularly problematic aspect, and indicated that fairer assessment could be achieved by using the rubric along with plagiarism detectors’ similarity results.

  4. The plagiarism menace

    OpenAIRE

    Mahadevan, S

    2008-01-01

    With the rapid advancement of science, there has been a phenomenal increase in output in the form of publications in all scientific disciplines, particularly in the biomedical field. Unfortunately, there has also been a concomitant increase in unethical practices that include plagiarism (publishing writings that have substantial overlap in contents with those of others, including verbatim reproduction of the text), duplicate publication (publishing one’s own data already published in another ...

  5. Hermetic and Web Plagiarism Detection Systems for Student Essays--An Evaluation of the State-of-the-Art

    Science.gov (United States)

    Kakkonen, Tuomo; Mozgovoy, Maxim

    2010-01-01

    Plagiarism has become a serious problem in education, and several plagiarism detection systems have been developed for dealing with this problem. This study provides an empirical evaluation of eight plagiarism detection systems for student essays. We present a categorical hierarchy of the most common types of plagiarism that are encountered in…

  6. Good intentions: providing students with skills to avoid accidental plagiarism.

    Science.gov (United States)

    Zafron, Michelle L

    2012-01-01

    This article explores one librarian's experience with creating and implementing a plagiarism seminar as part of the library liaison program to the School of Public Health and Health Professions at the University at Buffalo. The changes and evolution of the seminar over several iterations are described. This article also examines student perceptions, misperceptions, and reactions to the plagiarism workshop.

  7. Self-Assessment of the Use of Plagiarism Avoiding Techniques to Create Ethical Scholarship Among Research Students

    OpenAIRE

    Saeed Ahmad; Ahsan Ullah

    2015-01-01

    The use of plagiarism avoiding techniques can be helpful to maintain academic integrity, a better learning environment and intellectual honesty. This explored the use of plagiarism avoiding techniques for creating ethical scholarship among research students. It also measured the association between the frequency of using plagiarism avoiding techniques and the satisfaction about knowledge of plagiarism. Data were collected from seven universities through an online self-struct...

  8. Retribution, Deterrence and Reform: The Dilemmas of Plagiarism Management in Universities

    Science.gov (United States)

    Sutherland-Smith, Wendy

    2010-01-01

    Universities face constant scrutiny about their plagiarism management strategies, policies and procedures. A resounding theme, usually media inspired, is that plagiarism is rife, unstoppable and university processes are ineffectual in its wake. This has been referred to as a "moral panic" approach (Carroll & Sutherland-Smith,…

  9. A Comparison of Chinese and Australian University Students' Attitudes towards Plagiarism

    Science.gov (United States)

    Ehrich, John; Howard, Steven J.; Mu, Congjun; Bokosmaty, Sahar

    2016-01-01

    Student plagiarism is a growing problem within Australian universities and abroad. Potentially exacerbating this situation, research indicates that students' attitudes toward plagiarism are typically more permissive and lenient than the policies of their tertiary institutions. There has been suggestion that this is especially so in Asian countries…

  10. Plagiarism in submitted manuscripts: incidence, characteristics and optimization of screening-case study in a major specialty medical journal.

    Science.gov (United States)

    Higgins, Janet R; Lin, Feng-Chang; Evans, James P

    2016-01-01

    Plagiarism is common and threatens the integrity of the scientific literature. However, its detection is time consuming and difficult, presenting challenges to editors and publishers who are entrusted with ensuring the integrity of published literature. In this study, the extent of plagiarism in manuscripts submitted to a major specialty medical journal was documented. We manually curated submitted manuscripts and deemed an article contained plagiarism if one sentence had 80 % of the words copied from another published paper. Commercial plagiarism detection software was utilized and its use was optimized. In 400 consecutively submitted manuscripts, 17 % of submissions contained unacceptable levels of plagiarized material with 82 % of plagiarized manuscripts submitted from countries where English was not an official language. Using the most commonly employed commercial plagiarism detection software, sensitivity and specificity were studied with regard to the generated plagiarism score. The cutoff score maximizing both sensitivity and specificity was 15 % (sensitivity 84.8 % and specificity 80.5 %). Plagiarism was a common occurrence among manuscripts submitted for publication to a major American specialty medical journal and most manuscripts with plagiarized material were submitted from countries in which English was not an official language. The use of commercial plagiarism detection software can be optimized by selecting a cutoff score that reflects desired sensitivity and specificity.

  11. "It's Not Fair": Policy Discourses and Students' Understandings of Plagiarism in a New Zealand University

    Science.gov (United States)

    Adam, Lee; Anderson, Vivienne; Spronken-Smith, Rachel

    2017-01-01

    Plagiarism is a concept that is difficult to define. Although most higher education institutions have policies aimed at minimising and addressing student plagiarism, little research has examined the ways in which plagiarism is discursively constructed in university policy documents, or the connections and disconnections between institutional and…

  12. Knowledge of Medical Students of Tehran University of Medical Sciences Regarding Plagiarism

    Directory of Open Access Journals (Sweden)

    Mohammad Hadi Gharedaghi

    2013-06-01

    Full Text Available The core concept of plagiarism is defined as the use of other people’s ideas or words without proper acknowledgement. Herein, we used a questionnaire to assess the knowledge of students of Tehran University of Medical Sciences (TUMS regarding plagiarism and copyright infringement. The questionnaire comprised 8 questions. The first six questions of the questionnaire were translations of exercises of a book about academic writing and were concerning plagiarism in preparing articles. Questions number 7 and 8 (which were concerning plagiarism in preparing Microsoft PowerPoint slideshows and copyright infringement, respectively were developed by the authors of the present study. The validity of the questionnaire was approved by five experts in the field of epidemiology and biostatistics. A pilot study consisting of a test and retest was carried to assess the reliability of the questionnaire. The sampling method was stratified random sampling, and the questionnaire was handed out to 74 interns of TUMS during July and August 2011. 14.9% of the students correctly answered the first six questions. 44.6% of the students were adequately familiar with proper referencing in Microsoft PowerPoint slideshows. 16.2% of the students understood what constitutes copyright infringement. The number of correctly answered questions by the students was directly proportionate to the number of their published articles. Knowledge of students of TUMS regarding plagiarism and copyright infringement is quite poor. Courses with specific focus on plagiarism and copyright infringement might help in this regard.

  13. Knowledge of medical students of Tehran University of Medical Sciences regarding plagiarism.

    Directory of Open Access Journals (Sweden)

    Mohammad Hadi Gharedaghi

    2013-06-01

    Full Text Available The core concept of plagiarism is defined as the use of other people's ideas or words without proper acknowledgement. Herein, we used a questionnaire to assess the knowledge of students of Tehran University of Medical Sciences (TUMS regarding plagiarism and copyright infringement. The questionnaire comprised 8 questions. The first six questions of the questionnaire were translations of exercises of a book about academic writing and were concerning plagiarism in preparing articles. Questions number 7 and 8 (which were concerning plagiarism in preparing Microsoft PowerPoint slideshows and copyright infringement, respectively were developed by the authors of the present study. The validity of the questionnaire was approved by five experts in the field of epidemiology and biostatistics. A pilot study consisting of a test and retest was carried to assess the reliability of the questionnaire. The sampling method was stratified random sampling, and the questionnaire was handed out to 74 interns of TUMS during July and August 2011. 14.9% of the students correctly answered the first six questions. 44.6% of the students were adequately familiar with proper referencing in Microsoft PowerPoint slideshows. 16.2% of the students understood what constitutes copyright infringement. The number of correctly answered questions by the students was directly proportionate to the number of their published articles. Knowledge of students of TUMS regarding plagiarism and copyright infringement is quite poor. Courses with specific focus on plagiarism and copyright infringement might help in this regard.

  14. Knowledge of medical students of Tehran University of Medical Sciences regarding plagiarism.

    Science.gov (United States)

    Gharedaghi, Mohammad Hadi; Nourijelyani, Keramat; Salehi Sadaghiani, Mohammad; Yousefzadeh-Fard, Yashar; Gharedaghi, Azadeh; Javadian, Pouya; Morteza, Afsaneh; Andrabi, Yasir; Nedjat, Saharnaz

    2013-07-13

    The core concept of plagiarism is defined as the use of other people's ideas or words without proper acknowledgement. Herein, we used a questionnaire to assess the knowledge of students of Tehran University of Medical Sciences (TUMS) regarding plagiarism and copyright infringement. The questionnaire comprised 8 questions. The first six questions of the questionnaire were translations of exercises of a book about academic writing and were concerning plagiarism in preparing articles. Questions number 7 and 8 (which were concerning plagiarism in preparing Microsoft PowerPoint slideshows and copyright infringement, respectively) were developed by the authors of the present study. The validity of the questionnaire was approved by five experts in the field of epidemiology and biostatistics. A pilot study consisting of a test and retest was carried to assess the reliability of the questionnaire. The sampling method was stratified random sampling, and the questionnaire was handed out to 74 interns of TUMS during July and August 2011. 14.9% of the students correctly answered the first six questions. 44.6% of the students were adequately familiar with proper referencing in Microsoft PowerPoint slideshows. 16.2% of the students understood what constitutes copyright infringement. The number of correctly answered questions by the students was directly proportionate to the number of their published articles. Knowledge of students of TUMS regarding plagiarism and copyright infringement is quite poor. Courses with specific focus on plagiarism and copyright infringement might help in this regard.

  15. An Integrated Academic Literacy Approach to Improving Students' Understanding of Plagiarism in an Accounting Course

    Science.gov (United States)

    Powell, Lisa; Singh, Nishani

    2016-01-01

    Plagiarism in higher education is a widespread and complex issue. Students' understanding of plagiarism differs as a result of combining their prior learning about referencing with their current experience of institutional policies and generic resources. Plagiarism was identified as a major learning issue in a core second-year undergraduate…

  16. An intervention aimed at reducing plagiarism in undergraduate nursing students.

    Science.gov (United States)

    Smedley, Alison; Crawford, Tonia; Cloete, Linda

    2015-05-01

    Plagiarism is a current and developing problem in the tertiary education sector where students access information and reproduce it as their own. It is identified as occurring in many tertiary level degrees including nursing and allied health profession degrees. Nursing specifically, is a profession where standards and ethics are required and honesty is paramount. The aim of this study was to evaluate the change in nursing student's knowledge and understanding of plagiarism before and after an educational intervention in their first semester of the Bachelor of nursing degree at a private college of higher education in Sydney, Australia. This study concluded that an educational intervention can increase knowledge and awareness of plagiarism among nursing students. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. The ethics of scholarly publishing: exploring differences in plagiarism and duplicate publication across nations*

    Science.gov (United States)

    Amos, Kathleen A.

    2014-01-01

    This study explored national differences in plagiarism and duplicate publication in retracted biomedical literature. The national affiliations of authors and reasons for retraction of papers accessible through PubMed that were published from 2008 to 2012 and subsequently retracted were determined in order to identify countries with the largest numbers and highest rates of retraction due to plagiarism and duplicate publication. Authors from more than fifty countries retracted papers. While the United States retracted the most papers, China retracted the most papers for plagiarism and duplicate publication. Rates of plagiarism and duplicate publication were highest in Italy and Finland, respectively. Unethical publishing practices cut across nations. PMID:24860263

  18. The ethics of scholarly publishing: exploring differences in plagiarism and duplicate publication across nations.

    Science.gov (United States)

    Amos, Kathleen A

    2014-04-01

    This study explored national differences in plagiarism and duplicate publication in retracted biomedical literature. The national affiliations of authors and reasons for retraction of papers accessible through PubMed that were published from 2008 to 2012 and subsequently retracted were determined in order to identify countries with the largest numbers and highest rates of retraction due to plagiarism and duplicate publication. Authors from more than fifty countries retracted papers. While the United States retracted the most papers, China retracted the most papers for plagiarism and duplicate publication. Rates of plagiarism and duplicate publication were highest in Italy and Finland, respectively. Unethical publishing practices cut across nations.

  19. Methods for Helping Students Avoid Plagiarism.

    Science.gov (United States)

    Landau, Joshua D.; Druen, Perri B.; Arcuri, Jennifer A.

    2002-01-01

    Describes an experiment used with undergraduate students to educate students about plagiarism and paraphrasing techniques. Discusses the procedure used for the experiment as well as results from the experiment and a postexperiement questionnaire. (CMK)

  20. Code Forking, Governance, and Sustainability in Open Source Software

    Directory of Open Access Journals (Sweden)

    Juho Lindman

    2013-01-01

    Full Text Available The right to fork open source code is at the core of open source licensing. All open source licenses grant the right to fork their code, that is to start a new development effort using an existing code as its base. Thus, code forking represents the single greatest tool available for guaranteeing sustainability in open source software. In addition to bolstering program sustainability, code forking directly affects the governance of open source initiatives. Forking, and even the mere possibility of forking code, affects the governance and sustainability of open source initiatives on three distinct levels: software, community, and ecosystem. On the software level, the right to fork makes planned obsolescence, versioning, vendor lock-in, end-of-support issues, and similar initiatives all but impossible to implement. On the community level, forking impacts both sustainability and governance through the power it grants the community to safeguard against unfavourable actions by corporations or project leaders. On the business-ecosystem level forking can serve as a catalyst for innovation while simultaneously promoting better quality software through natural selection. Thus, forking helps keep open source initiatives relevant and presents opportunities for the development and commercialization of current and abandoned programs.

  1. Student Perceptions of Plagiarism Avoidance Competencies: An Action Research Case Study

    Science.gov (United States)

    MacLennan, Helen

    2018-01-01

    Student plagiarism in higher education is widespread and presents a growing concern for faculty and administrators who are intent on upholding academic integrity. However, a myopic view of plagiarism as a purely ethical issue is misguided. It is not always simply a deliberate attempt to deceive. Through the involvement of students in an…

  2. Substantive Editing as a Form of Plagiarism among Postgraduate Students in Australia

    Science.gov (United States)

    Lines, Lisa

    2016-01-01

    In university plagiarism policies, and in the research into plagiarism, one form of collusion remains virtually unacknowledged: substantive editing performed by editors. While almost all Australian universities allow postgraduate students to have their thesis professionally edited, "substantive" editing is prohibited. This article…

  3. Avoid the Plague: Tips and Tricks for Preventing and Detecting Plagiarism

    Science.gov (United States)

    Bolkan, J. V.

    2006-01-01

    Plagiarism is an ugly word. Copying someone else's work and attempting to claim credit for one's self is an act that involves a number of ethical failings--theft, laziness, coveting, and lying among others. Many educators blame the Internet for what they perceive as the rise of plagiarism. Although the Internet certainly enables more efficient…

  4. Society for Academic Emergency Medicine Statement on Plagiarism.

    Science.gov (United States)

    Asher, Shellie L; Iserson, Kenneth V; Merck, Lisa H

    2017-10-01

    The integrity of the research enterprise is of the utmost importance for the advancement of safe and effective medical practice for patients and for maintaining the public trust in health care. Academic societies and editors of journals are key participants in guarding scientific integrity. Avoiding and preventing plagiarism helps to preserve the scientific integrity of professional presentations and publications. The Society for Academic Emergency Medicine (SAEM) Ethics Committee discusses current issues in scientific publishing integrity and provides a guideline to avoid plagiarism in SAEM presentations and publications. © 2017 by the Society for Academic Emergency Medicine.

  5. Perspective: publication ethics and the emerging scientific workforce: understanding "plagiarism" in a global context.

    Science.gov (United States)

    Cameron, Carrie; Zhao, Hui; McHugh, Michelle K

    2012-01-01

    English has long been the dominant language of scientific publication, and it is rapidly approaching near-complete hegemony. The majority of the scientists publishing in English-language journals are not native English speakers, however. This imbalance has important implications for training concerning ethics and enforcement of publication standards, particularly with respect to plagiarism. The authors suggest that lack of understanding of what constitutes plagiarism and the use of a linguistic support strategy known as "patchwriting" can lead to inadvertent misuse of source material by nonnative speakers writing in English as well as to unfounded accusations of intentional scientific misconduct on the part of these authors. They propose that a rational and well-informed dialogue about this issue is needed among editors, educators, administrators, and both native-English-speaking and nonnative-English-speaking writers. They offer recommendations for creating environments in which such dialogue and training can occur.

  6. CYBER-DIGITAL PLAGIARISM: AN AWARENESS APPROACH*

    African Journals Online (AJOL)

    Lehobye

    Plagiarism, as opposed to cyber-ethics, is the practice of claiming or implying original authorship, in whole or in part, by incorporating ... the "Borrowing, purchasing, or otherwise obtaining work composed by someone else and submitting it ...

  7. An Intervention Designed to Reduce Plagiarism in a Research Methods Classroom

    Science.gov (United States)

    Obeid, Rita; Hill, Darryl B.

    2017-01-01

    Research has shown that plagiarism is on the increase in higher education. Some state that this is due to poor knowledge rather than intentional cheating. Other researchers explain that plagiarism is on the rise due to increased competitiveness in college and easy access to work that has already been completed. In this study, we show how a 2-hr…

  8. Iranian academia: evolution after revolution and plagiarism as a disorder.

    Science.gov (United States)

    Ghazinoory, Sepehr; Ghazinoori, Soroush; Azadegan-Mehr, Mandana

    2011-06-01

    Recently, a few of scientific journals raise serious questions about scientific ethics and moral judgment of some of the Iranian government's senior executives in their papers. Plagiarism, under any circumstances is not justified, and we do not intend to justify it in this note. However, we find it useful in understanding why otherwise respected, responsible individuals may engage in plagiarism by terse review of the history Iranian academia.

  9. Implementation of Winnowing Algorithm Based K-Gram to Identify Plagiarism on File Text-Based Document

    Directory of Open Access Journals (Sweden)

    Nurdiansyah Yanuar

    2018-01-01

    Full Text Available Plagiarism occurs when the students have tasks and pursued by the deadline. Plagiarism is considered as the fastest way to accomplish the tasks. This reason makes the author tried to build a plagiarism detection system with Winnowing algorithm as document similarity search algorithm. The documents that being tested are Indonesian journals with extension .doc, .docx, and/or .txt. Similarity calculation process through two stages, the first is the process of making a document fingerprint using Winnowing algorithm and the second is using Jaccard coefficient similarity. In order to develop this system, the author used iterative waterfall model approach. The main objective of this project is to determine the level of plagiarism. It is expected to prevent plagiarism either intentionally or unintentionally before our journal published by displaying the percentage of similarity in the journals that we make.

  10. Deconstructing Attitudes towards Plagiarism of Japanese Undergraduates in EFL Academic Writing Classes

    Science.gov (United States)

    Teeter, Jennifer

    2015-01-01

    In this study, a qualitative analysis of 276 first-year Japanese university science major responses to plagiarism to deconstruct prevailing generalizations regarding the incidence of plagiarism by Japanese university students. These students were enrolled in a compulsory yearlong English academic writing course. While utilizing a contextualized…

  11. On the Combination of Multi-Layer Source Coding and Network Coding for Wireless Networks

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Fitzek, Frank; Pedersen, Morten Videbæk

    2013-01-01

    quality is developed. A linear coding structure designed to gracefully encapsulate layered source coding provides both low complexity of the utilised linear coding while enabling robust erasure correction in the form of fountain coding capabilities. The proposed linear coding structure advocates efficient...

  12. Attitudes toward plagiarism among pharmacy and medical biochemistry students – cross-sectional survey study

    OpenAIRE

    Pupovac, Vanja; Bilic-Zulle, Lidija; Mavrinac, Martina; Petrovecki, Mladen

    2010-01-01

    Introduction: Plagiarism is one of the most frequent and serious forms of misconduct in academic environment. The cross-sectional survey study was done with aim to explore the attitudes toward plagiarism. Materials and methods: First year students of Faculty of Pharmacy and Medical Biochemistry, University of Zagreb, Croatia (N = 146) were anonymously tested using Attitude toward Plagiarism (ATP) questionnaire. The questionnaire is composed of 29 statements on a 5 point Likert scale, (1 - ...

  13. Knowledge Graphs as Context Models: Improving the Detection of Cross-Language Plagiarism with Paraphrasing

    OpenAIRE

    Franco-Salvador, Marc; Gupta, Parth; Rosso, Paolo

    2013-01-01

    Cross-language plagiarism detection attempts to identify and extract automatically plagiarism among documents in different languages. Plagiarized fragments can be translated verbatim copies or may alter their structure to hide the copying, which is known as paraphrasing and is more difficult to detect. In order to improve the paraphrasing detection, we use a knowledge graph-based approach to obtain and compare context models of document fragments in different languages. Experimental results i...

  14. Image authentication using distributed source coding.

    Science.gov (United States)

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  15. Skills Training to Avoid Inadvertent Plagiarism: Results from a Randomised Control Study

    Science.gov (United States)

    Newton, Fiona J.; Wright, Jill D.; Newton, Joshua D.

    2014-01-01

    Plagiarism continues to be a concern within academic institutions. The current study utilised a randomised control trial of 137 new entry tertiary students to assess the efficacy of a scalable short training session on paraphrasing, patch writing and plagiarism. The results indicate that the training significantly enhanced students' overall…

  16. Of Flattery and Thievery: Reconsidering Plagiarism in a Time of Virtual Information

    Science.gov (United States)

    Thomas, P. L.

    2007-01-01

    P. L. Thomas provides a framework for discussing plagiarism and calls on us to avoid overly simplified policies. After considering various perspectives on intent and the purposes of documentation, Thomas advocates developing standard definitions and guidelines for plagiarism in the department or the classroom. We should also offer professional…

  17. The Astrophysics Source Code Library by the numbers

    Science.gov (United States)

    Allen, Alice; Teuben, Peter; Berriman, G. Bruce; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert; Ryan, PW; Schmidt, Judy; Shamir, Lior; Shortridge, Keith; Wallin, John; Warmels, Rein

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net) was founded in 1999 by Robert Nemiroff and John Wallin. ASCL editors seek both new and old peer-reviewed papers that describe methods or experiments that involve the development or use of source code, and add entries for the found codes to the library. Software authors can submit their codes to the ASCL as well. This ensures a comprehensive listing covering a significant number of the astrophysics source codes used in peer-reviewed studies. The ASCL is indexed by both NASA’s Astrophysics Data System (ADS) and Web of Science, making software used in research more discoverable. This presentation covers the growth in the ASCL’s number of entries, the number of citations to its entries, and in which journals those citations appear. It also discusses what changes have been made to the ASCL recently, and what its plans are for the future.

  18. Data processing with microcode designed with source coding

    Science.gov (United States)

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  19. Strategies for Using Plagiarism Software in the Screening of Incoming Journal Manuscripts: Recommendations Based on a Recent Literature Survey.

    Science.gov (United States)

    Lykkesfeldt, Jens

    2016-08-01

    In recent years, several online tools have appeared capable of identifying potential plagiarism in science. While such tools may help to maintain or even increase the originality and ethical quality of the scientific literature, no apparent consensus exists among editors on the degree of plagiarism or self-plagiarism necessary to reject or retract manuscripts. In this study, two entire volumes of published original papers and reviews from Basic & Clinical Pharmacology & Toxicology were retrospectively scanned for similarity in anonymized form using iThenticate software to explore measures to predictively identify true plagiarism and self-plagiarism and to potentially provide guidelines for future screening of incoming manuscripts. Several filters were applied, all of which appeared to lower the noise from irrelevant hits. The main conclusions were that plagiarism software offers a unique opportunity to screen for plagiarism easily but also that it has to be employed with caution as automated or uncritical use is far too unreliable to allow a fair basis for judging the degree of plagiarism in a manuscript. This remains the job of senior editors. Whereas a few cases of self-plagiarism that would not likely have been accepted with today's guidelines were indeed identified, no cases of fraud or serious plagiarism were found. Potential guidelines are discussed. © 2016 Nordic Association for the Publication of BCPT (former Nordic Pharmacological Society).

  20. Dealing with Plagiarism in the Academic Community: Emotional Engagement and Moral Distress

    Science.gov (United States)

    Vehviläinen, Sanna; Löfström, Erika; Nevgi, Anne

    2018-01-01

    This article deals with the demands that plagiarism places on academic communities, and with the resources staff possess in dealing with these demands. It is suggested that plagiarism ought to be placed in the context of network of intertwining communities (scholarly, pedagogical and administrative), to which participants are engaged to a…

  1. A Safe Place: The Role of Librarians and Writing Centers in Addressing Citation Practices and Plagiarism

    Science.gov (United States)

    Buranen, Lise

    2009-01-01

    In American colleges and universities, plagiarism is a hot topic: teachers wail and moan about the rise in student plagiarism (though often without evidence to demonstrate this supposed rise); they complain that the Web has "caused" plagiarism; and at the same time, many believe that technology is the key to "solving" the problem of student…

  2. Chinese International Students' and Faculty Members' Views of Plagiarism in Higher Education

    Science.gov (United States)

    Grigg, Alan

    2016-01-01

    As the enrollment of Chinese international students (CIS) increased at a private institution in the Midwest, so did suspected cases of plagiarism. This study addressed the problem of how faculty members grappled with CIS' interpretation and application of Western-based views of plagiarism. The purpose of the study was to identify similarities and…

  3. Is It Happening? How to Avoid the Deleterious Effects of Plagiarism and Cheating in Your Courses

    Science.gov (United States)

    Hall, Susan E.

    2011-01-01

    Plagiarism can be "plaguing" if it is not discussed, understood, and enforced by the professor right at the beginning of the course and throughout the semester. Students usually don't "have" to cheat or plagiarize; they do so mainly because "they can." Professors who turn a deaf ear or a blind eye to students who plagiarize create deleterious…

  4. Is It Cheating or Learning the Craft of Writing? Using Turnitin to Help Students Avoid Plagiarism

    Science.gov (United States)

    Graham-Matheson, Lynne; Starr, Simon

    2013-01-01

    Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy…

  5. Plagiarism: Can It Be Stopped?

    Science.gov (United States)

    Christensen, G. Jay

    2011-01-01

    Plagiarism can be controlled, not stopped. The more appropriate question to ask is: What can be done to encourage students to "cheat" correctly by doing the assignment the way it was intended? Cheating by college students continues to reach epidemic proportions on selected campuses, as witnessed by the recent episode at Central Florida University,…

  6. Student plagiarism and professional practice.

    Science.gov (United States)

    Kenny, Deborah

    2007-01-01

    With the ever-increasing availability and accessibility of the Internet, students are able to access a multitude of resources in support of their studies. However, this has also led to an increase in their ability to cheat through plagiarising text and claiming it as their own. Increased pressures of balancing work and study have contributed to this rise. Not only confined to the student population, some academics are also guilty of engaging in this practice providing a less than favourable role model for their students. Of increasing concern is the links of this practice to professionalism or indeed in this case unprofessionalism. Both pre- and post-registration nursing students who plagiarise risk bringing the reputation of the profession into disrepute. There are a number of methods that may be used to detect plagiarism but often the penalties are menial and inconsistently applied. Overall it is essential that academic institutions foster a culture of honesty and integrity amongst its academic community. A culture that clearly emphasises that plagiarism in any form is unacceptable.

  7. Present state of the SOURCES computer code

    International Nuclear Information System (INIS)

    Shores, Erik F.

    2002-01-01

    In various stages of development for over two decades, the SOURCES computer code continues to calculate neutron production rates and spectra from four types of problems: homogeneous media, two-region interfaces, three-region interfaces and that of a monoenergetic alpha particle beam incident on a slab of target material. Graduate work at the University of Missouri - Rolla, in addition to user feedback from a tutorial course, provided the impetus for a variety of code improvements. Recently upgraded to version 4B, initial modifications to SOURCES focused on updates to the 'tape5' decay data library. Shortly thereafter, efforts focused on development of a graphical user interface for the code. This paper documents the Los Alamos SOURCES Tape1 Creator and Library Link (LASTCALL) and describes additional library modifications in more detail. Minor improvements and planned enhancements are discussed.

  8. Schroedinger’s Code: A Preliminary Study on Research Source Code Availability and Link Persistence in Astrophysics

    Science.gov (United States)

    Allen, Alice; Teuben, Peter J.; Ryan, P. Wesley

    2018-05-01

    We examined software usage in a sample set of astrophysics research articles published in 2015 and searched for the source codes for the software mentioned in these research papers. We categorized the software to indicate whether the source code is available for download and whether there are restrictions to accessing it, and if the source code is not available, whether some other form of the software, such as a binary, is. We also extracted hyperlinks from one journal’s 2015 research articles, as links in articles can serve as an acknowledgment of software use and lead to the data used in the research, and tested them to determine which of these URLs are still accessible. For our sample of 715 software instances in the 166 articles we examined, we were able to categorize 418 records as according to whether source code was available and found that 285 unique codes were used, 58% of which offered the source code for download. Of the 2558 hyperlinks extracted from 1669 research articles, at best, 90% of them were available over our testing period.

  9. Plagiarism under a Magnifying-Glass

    Science.gov (United States)

    Starovoytova, Diana

    2017-01-01

    This paper embodies the findings from a small part, of a larger study on plagiarism, at the School of Engineering (SOE). The study is a cross-sectional survey, conducted in an institutional setting. 15 senior academic members of staff (N = 15), from SOE were invited to complete a questionnaire. The questioner was pre-tested, to ensure its validity…

  10. Plagiarism: What's the Big Deal?

    Science.gov (United States)

    Hansen, Brittney; Stith, Danica; Tesdell, Lee S.

    2011-01-01

    In academic culture, plagiarism is considered to be a form of cheating and therefore unethical. Understandably, instructors try to eliminate this kind of unethical behavior from their courses. But what if they designed their assignments and exams in such a way that students would find no reason to cheat? The authors think that it is possible, at…

  11. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  12. Plagiarism: using a collaborative approach in an online allied health professions course.

    Science.gov (United States)

    Pence, Patricia L

    2012-01-01

    The purpose of the study was to evaluate the effectiveness of interventions to increase the awareness and understanding of plagiarism among undergraduate students enrolled in an online allied health professions course in a community college in the Midwestern United States. The results suggested that the interventions were effective in educating students about how to avoid plagiarism.

  13. Iterative List Decoding of Concatenated Source-Channel Codes

    Directory of Open Access Journals (Sweden)

    Hedayat Ahmadreza

    2005-01-01

    Full Text Available Whenever variable-length entropy codes are used in the presence of a noisy channel, any channel errors will propagate and cause significant harm. Despite using channel codes, some residual errors always remain, whose effect will get magnified by error propagation. Mitigating this undesirable effect is of great practical interest. One approach is to use the residual redundancy of variable length codes for joint source-channel decoding. In this paper, we improve the performance of residual redundancy source-channel decoding via an iterative list decoder made possible by a nonbinary outer CRC code. We show that the list decoding of VLC's is beneficial for entropy codes that contain redundancy. Such codes are used in state-of-the-art video coders, for example. The proposed list decoder improves the overall performance significantly in AWGN and fully interleaved Rayleigh fading channels.

  14. Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances in "Digital Age" Plagiarism Detection and Prevention

    Science.gov (United States)

    Jones, Michael; Sheridan, Lynnaire

    2015-01-01

    Advances have been made in detecting and deterring the student plagiarism that has accompanied the uptake and development of the internet. Many authors from the late 1990s onwards grappled with plagiarism in the digital age, presenting articles that were provoking and established the foundation for strategies to address cyber plagiarism, including…

  15. Measuring Modularity in Open Source Code Bases

    Directory of Open Access Journals (Sweden)

    Roberto Milev

    2009-03-01

    Full Text Available Modularity of an open source software code base has been associated with growth of the software development community, the incentives for voluntary code contribution, and a reduction in the number of users who take code without contributing back to the community. As a theoretical construct, modularity links OSS to other domains of research, including organization theory, the economics of industry structure, and new product development. However, measuring the modularity of an OSS design has proven difficult, especially for large and complex systems. In this article, we describe some preliminary results of recent research at Carleton University that examines the evolving modularity of large-scale software systems. We describe a measurement method and a new modularity metric for comparing code bases of different size, introduce an open source toolkit that implements this method and metric, and provide an analysis of the evolution of the Apache Tomcat application server as an illustrative example of the insights gained from this approach. Although these results are preliminary, they open the door to further cross-discipline research that quantitatively links the concerns of business managers, entrepreneurs, policy-makers, and open source software developers.

  16. Optimization of Coding of AR Sources for Transmission Across Channels with Loss

    DEFF Research Database (Denmark)

    Arildsen, Thomas

    Source coding concerns the representation of information in a source signal using as few bits as possible. In the case of lossy source coding, it is the encoding of a source signal using the fewest possible bits at a given distortion or, at the lowest possible distortion given a specified bit rate....... Channel coding is usually applied in combination with source coding to ensure reliable transmission of the (source coded) information at the maximal rate across a channel given the properties of this channel. In this thesis, we consider the coding of auto-regressive (AR) sources which are sources that can...... compared to the case where the encoder is unaware of channel loss. We finally provide an extensive overview of cross-layer communication issues which are important to consider due to the fact that the proposed algorithm interacts with the source coding and exploits channel-related information typically...

  17. Self-plagiarism and textual recycling: legitimate forms of research misconduct.

    Science.gov (United States)

    Bruton, Samuel V

    2014-01-01

    The concept of self-plagiarism frequently elicits skepticism and generates confusion in the research ethics literature, and the ethical status of what is often called "textual recycling" is particularly controversial. I argue that, in general, self-plagiarism is unethical because it is deceptive and dishonest. I then distinguish several forms of it and argue against various common rationalizations for textual recycling. I conclude with a discussion of two instances of textual recycling, distinguishing them in terms of their ethical seriousness but concluding that both are ethically problematic.

  18. "Not Necessarily a Bad Thing ...": A Study of Online Plagiarism amongst Undergraduate Students

    Science.gov (United States)

    Selwyn, Neil

    2008-01-01

    Whilst the copying, falsification and plagiarism of essays and assignments has long been a prevalent form of academic misconduct amongst undergraduate students, the increasing use of the internet in higher education has raised concern over enhanced levels of online plagiarism and new types of "cyber-cheating". Based on a self-report…

  19. Teaching Students about Plagiarism: What It Looks Like and How It Is Measured

    Science.gov (United States)

    Stout, Diana

    2013-01-01

    This case study examines how full-time faculty, adjunct instructors, and graduate teaching assistants teach students how to avoid plagiarism. Additionally, this case study includes a cross-section of teachers who encounter plagiarism in writing assignments across the curriculum. While many studies in the past have focused on students, this study…

  20. There Was a Crooked Man(uscript): A Not-so-Serious Look at the Serious Subject of Plagiarism

    Science.gov (United States)

    McGuire, Kevin T.

    2010-01-01

    The problem of plagiarism by political scientists has not received much attention. The incidence of plagiarism, however, may be greater than one would think. In this article, I offer a humorous look at what happened when a manuscript of mine was plagiarized. Based on my experience, I offer some suggestions on how scholars might detect and prevent…

  1. Plagiarism: What Don't They Know?

    Science.gov (United States)

    Voelker, Troy A.; Love, Leonard G.; Pentina, Iryna

    2012-01-01

    The present economic environment is beneficial for universities and schools of business that are experiencing significant enrollment increases. But just as the U.S. economy is suffering from an economic recession, universities increasingly suffer from an integrity recession. Student academic misconduct, particularly plagiarism, is at an all-time…

  2. SOFTWARE INSPECTION TECHNIQUE OF SCIENTIFIC AND ACADEMIC WORKS – PANACEA FOR THE PLAGIARISM OR A SPOT OF DIFFICULT PROCEDURE?

    Directory of Open Access Journals (Sweden)

    С. П. Ткаченко

    2017-10-01

    Full Text Available The use of software identifying text coincidences instruments provides an analysis of scientific and academic works for the evidence of plagiarism. Besides, the anti-plagiarism is not just a fight against illegal text borrowings as consequences of this phenomenon. It should be a comprehensive mechanism for dealing with both the consequences and the causes of the appearance of such a phenomenon. Such mechanism should include the implementation of the system of values that correspond to the principles of academic integrity, along with making total enquiries of all works on plagiarism. The exhaustive list of text borrowings, which is resultant, is the basis for expertsassessors decision-making in point of plagiarism presence. What is more, there should be no permissible standards of the plagiarism. All borrowings must being drawn up in accordance with the requirements. Therefore, the best result in the fight against plagiarism will achieved only by comprehensive approach – when the academic culture and the principles of academic integrity will be instilled ever since school, along with the check of all works for plagiarism.

  3. Repairing business process models as retrieved from source code

    NARCIS (Netherlands)

    Fernández-Ropero, M.; Reijers, H.A.; Pérez-Castillo, R.; Piattini, M.; Nurcan, S.; Proper, H.A.; Soffer, P.; Krogstie, J.; Schmidt, R.; Halpin, T.; Bider, I.

    2013-01-01

    The static analysis of source code has become a feasible solution to obtain underlying business process models from existing information systems. Due to the fact that not all information can be automatically derived from source code (e.g., consider manual activities), such business process models

  4. Blahut-Arimoto algorithm and code design for action-dependent source coding problems

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Simeone, Osvaldo; Popovski, Petar

    2013-01-01

    The source coding problem with action-dependent side information at the decoder has recently been introduced to model data acquisition in resource-constrained systems. In this paper, an efficient Blahut-Arimoto-type algorithm for the numerical computation of the rate-distortion-cost function...... for this problem is proposed. Moreover, a simplified two-stage code structure based on multiplexing is put forth, whereby the first stage encodes the actions and the second stage is composed of an array of classical Wyner-Ziv codes, one for each action. Leveraging this structure, specific coding/decoding...... strategies are designed based on LDGM codes and message passing. Through numerical examples, the proposed code design is shown to achieve performance close to the rate-distortion-cost function....

  5. Academy Policy on Plagiarism | Overview | Journals | Indian ...

    Indian Academy of Sciences (India)

    2017-12-21

    Dec 21, 2017 ... Plagiarism as a form of scientific misconduct has been on the rise in recent times. Defined by the US Office of Research Integrity as “the appropriation of ... institutions and their funding agencies about the editors' findings.

  6. THE CONSTRUCTION OF INDONESIAN-ENGLISH CROSS LANGUAGE PLAGIARISM DETECTION SYSTEM USING FINGERPRINTING TECHNIQUE

    Directory of Open Access Journals (Sweden)

    Zakiy Firdaus Alfikri

    2012-07-01

    Full Text Available Cross language plagiarism detection is an important task since it can protect person intellectual property right. Since English is the most popular international language, we proposed an Indonesian-English cross language plagiarism detection to handle such problem in Indonesian-English domain where the suspected plagiarism document is written in Indonesian and the source document is written in English. To minimize translation error, we build the system by translating the Indonesian document into English and then compare the translated document with the English document collection. The detection system consists of preprocess component, heuristic retrieval component, and detailed analysis component. The main technique used in retrieval process is fingerprinting which can extract lexical features from text which is suitable to be used to detect plagiarism done using literal translation method. In this paper, we also propose additional methods to be implemented in heuristic retrieval component to increase the performance of the system: phrase chunking, stop word removal, stemming, and synonym selection. We evaluated system’s performance and the effects of additional methods to system’s performance, provided several data test sets which represents a plagiarism type. From the experiments, we concluded that the system works on 83.33% of test cases. We also concluded that mainly all additional methods except the phrase chunking have good effects in enhancing the system accuracy. Deteksi plagiarisme lintas bahasa merupakan hal yang penting untuk melindungi hak kekayaan intelektual. Bahasa Inggris adalah bahasa internasional yang paling populer, karenanya peneliti mengusulkan deteksi plagiarisme lintas bahasa Indonesia-Inggris untuk menangani masalah tersebut di mana domain dokumen yang diduga plagiat ditulis dalam bahasa Indonesia dan dokumen sumber ditulis dalam bahasa Inggris. Untuk meminimalkan kesalahan terjemahan, peneliti membangun

  7. [Plagiarism. Document from the Ethics Commission of the Medical School, University of Chile].

    Science.gov (United States)

    Rosselot Jaramillo, Eduardo; Bravo Lechat, Mireya; Kottow Lang, Miguel; Valenzuela Yuraidini, Carlos; O'Ryan Gallardo, Miguel; Thambo Becker, Sergio; Horwitz Campos, Nina; Acevedo Pérez, Irene; Rueda Castro, Laura; Sotomayor, María Angélica

    2008-05-01

    Plagiarism is defined as the intellectual fraud in which an individual attempts to unduly appropriate, for his/her own benefit, the knowledge, ideas or discoveries of someone else. It is not uncommon in academic settings where research is conducted and a creative work is carried out. Due to the dismal consequences of plagiarism, cautionary measures and sanctions are required to avoid it. This paper is intended to warn and promote a discussion about plagiarism. The Faculty of Medicine of the University of Chile and its ethics committee believe that a fight against these type of actions will contribute to prevent their detrimental effects on the moral and intellectual patrimony of our society.

  8. How to Verify Plagiarism of the Paper Written in Macedonian and Translated in Foreign Language?

    Science.gov (United States)

    Spiroski, Mirko

    2016-03-15

    The aim of this study was to show how to verify plagiarism of the paper written in Macedonian and translated in foreign language. Original article "Ethics in Medical Research Involving Human Subjects", written in Macedonian, was submitted as an assay-2 for the subject Ethics and published by Ilina Stefanovska, PhD candidate from the Iustinianus Primus Faculty of Law, Ss Cyril and Methodius University of Skopje (UKIM), Skopje, Republic of Macedonia in Fabruary, 2013. Suspected article for plagiarism was published by Prof. Dr. Gordana Panova from the Faculty of Medical Sciences, University Goce Delchev, Shtip, Republic of Macedonia in English with the identical title and identical content in International scientific on-line journal "SCIENCE & TECHNOLOGIES", Publisher "Union of Scientists - Stara Zagora". Original document (written in Macedonian) was translated with Google Translator; suspected article (published in English pdf file) was converted into Word document, and compared both documents with several programs for plagiarism detection. It was found that both documents are identical in 71%, 78% and 82%, respectively, depending on the computer program used for plagiarism detection. It was obvious that original paper was entirely plagiarised by Prof. Dr. Gordana Panova, including six references from the original paper. Plagiarism of the original papers written in Macedonian and translated in other languages can be verified after computerised translation in other languages. Later on, original and translated documents can be compared with available software for plagiarism detection.

  9. Science ethics education: effects of a short lecture on plagiarism on the knowledge of young medical researchers.

    Science.gov (United States)

    Brkic, S; Bogdanovic, G; Vuckovic-Dekic, Lj; Gavrilovic, D; Kezic, I

    2012-01-01

    Plagiarism is the most common form of scientific fraud. It is agreed that the best preventive measure is education of young scientists on basic principles of responsible conduct of research and writing. The purpose of this article was to contribute to the students' knowledge and adoption of the rules of scientific writing. A 45 min lecture was delivered to 98 attendees during 3 courses on science ethics. Before and after the course the attendees fulfilled an especially designed questionnaire with 13 questions, specifically related to the definition and various types of plagiarism and self-plagiarism. Although considering themselves as insufficiently educated in science ethics, the majority of the attendees responded correctly to almost all questions even before the course, with percentages of correct responses to the specific question varying from 45.9-85.7%. After completion of the course, these percentages were significantly (pplagiarism ranged from 9.18- 42.86%. The percentage of impairment ranged from 1.02- 16.33%, the latter being related to the question on correct citing unpublished materials of other people; only for this question the percentage of impairment (16.33%) was greater than the percentage of improvement (11.22%). Even a short lecture focused on plagiarism contributed to the students' awareness that there are many forms of plagiarism, and that plagiarism is a serious violation of science ethics. This result confirms the largely accepted opinion that education is the best means in preventing plagiarism.

  10. Online Academic-Integrity Mastery Training May Improve Students' Awareness of, and Attitudes toward, Plagiarism

    Science.gov (United States)

    Curtis, Guy J.; Gouldthorp, Bethanie; Thomas, Emma F.; O'Brien, Geraldine M.; Correia, Helen M.

    2013-01-01

    Some evidence has emerged in recent years that plagiarism can be reduced through the use of online mastery tests that are designed to train introductory psychology students in awareness of academic integrity and referencing conventions. Although these studies demonstrated a reduction in incidents of plagiarism they did not directly examine whether…

  11. 363 Evaluating Students' Plagiarism in Higher Education Institutions ...

    African Journals Online (AJOL)

    Nekky Umera

    As one of the major players in knowledge economy, higher education institutions have ..... Knowledge, they say is power and knowledge is acquired by authentic learning. ... Harris, R. (2004) Anti-Plagiarism Strategies for Research Papers.

  12. Metrics-based assessments of research: incentives for 'institutional plagiarism'?

    Science.gov (United States)

    Berry, Colin

    2013-06-01

    The issue of plagiarism--claiming credit for work that is not one's own, rightly, continues to cause concern in the academic community. An analysis is presented that shows the effects that may arise from metrics-based assessments of research, when credit for an author's outputs (chiefly publications) is given to an institution that did not support the research but which subsequently employs the author. The incentives for what is termed here "institutional plagiarism" are demonstrated with reference to the UK Research Assessment Exercise in which submitting units of assessment are shown in some instances to derive around twice the credit for papers produced elsewhere by new recruits, compared to papers produced 'in-house'.

  13. Detecting Plagiarism in MS Access Assignments

    Science.gov (United States)

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  14. "Thou Shalt Not Plagiarise": From Self-Reported Views to Recognition and Avoidance of Plagiarism

    Science.gov (United States)

    Risquez, Angelica; O'Dwyer, Michele; Ledwith, Ann

    2013-01-01

    Throughout much of the literature on plagiarism in higher education, there is an implicit assumption that students who understand plagiarism, who have high ethical views and declare not to engage in plagiaristic behaviour are able to recognise it and avoid it in practice. Challenging this supposition, this paper contrasts students' self-reported…

  15. Plagiarism within Extension: Origin and Current Effects

    Science.gov (United States)

    Rollins, Dora

    2011-01-01

    Extension publication editors from around the United States are finding cases of plagiarism within manuscripts that Extension educators submit as new public education materials. When editors confront such educators with the problem, some don't understand it as such, rationalizing that reproducing published information for a new purpose qualifies…

  16. Design and Implementation of a Campus-Wide Online Plagiarism Tutorial: Role played by the Library in an emerging research institution in Saudi Arabia

    KAUST Repository

    Han, Lee-Yen

    2017-06-20

    Academic dishonesty and plagiarism are serious issues in institutes of higher education especially in this Internet age with academic literature and information readily available on the web. Some research studies point to the students’ lack of understanding of the concept of plagiarism and how to cite sources as reasons why they plagiarize (Volkov, Volkov, & Tedford, 2011). Academic librarians have an important role to play in providing instruction in the ethical use of information and helping students develop abilities to attribute and cite sources in their academic writing (Mages & Garson, 2010; Maxymuk, 2006). Recognizing this important role played by librarians, the University Library at King Abdullah University of Science and Technology (KAUST) started offering face-to-face workshops on the topic in the spring of 2015. While the workshops were positively received by the participants, informal feedback from students points to a need for an online course which would provide asynchronous just-in-time training for students. In this way, students who are not able to attend the face-to-face workshops would be able to access the tutorial in their own time and at their own pace. This paper reports on the process the University Library took to create and embed an online plagiarism tutorial in Blackboard, the Learning Management System (LMS) used by the university. Drawing on and expanding on materials covered in the face-to-face workshop, the online tutorial included original multimedia material, and a summative evaluation quiz. Improvements were made based on feedback gathered from students, library staff, and other university departments, such as the Office of Writing Services, Graduate Affairs, and ESP Instructors from the Writing Center. The online tutorial was initially planned as an optional course for students, but with the support of Academic Affairs and Graduate Affairs, it has been mandated as a compulsory course for all new in-coming students.

  17. Towards Holography via Quantum Source-Channel Codes

    Science.gov (United States)

    Pastawski, Fernando; Eisert, Jens; Wilming, Henrik

    2017-07-01

    While originally motivated by quantum computation, quantum error correction (QEC) is currently providing valuable insights into many-body quantum physics, such as topological phases of matter. Furthermore, mounting evidence originating from holography research (AdS/CFT) indicates that QEC should also be pertinent for conformal field theories. With this motivation in mind, we introduce quantum source-channel codes, which combine features of lossy compression and approximate quantum error correction, both of which are predicted in holography. Through a recent construction for approximate recovery maps, we derive guarantees on its erasure decoding performance from calculations of an entropic quantity called conditional mutual information. As an example, we consider Gibbs states of the transverse field Ising model at criticality and provide evidence that they exhibit nontrivial protection from local erasure. This gives rise to the first concrete interpretation of a bona fide conformal field theory as a quantum error correcting code. We argue that quantum source-channel codes are of independent interest beyond holography.

  18. The Ethics and Politics of Policing Plagiarism: A Qualitative Study of Faculty Views on Student Plagiarism and Turnitin®

    Science.gov (United States)

    Bruton, Samuel; Childers, Dan

    2016-01-01

    Recently, the usage of plagiarism detection software such as Turnitin® has increased dramatically among university instructors. At the same time, academic criticism of this software's employment has also increased. We interviewed 23 faculty members from various departments at a medium-sized, public university in the southeastern US to determine…

  19. Code of ethics for dental researchers.

    Science.gov (United States)

    2014-01-01

    The International Association for Dental Research, in 2009, adopted a code of ethics. The code applies to members of the association and is enforceable by sanction, with the stated requirement that members are expected to inform the association in cases where they believe misconduct has occurred. The IADR code goes beyond the Belmont and Helsinki statements by virtue of covering animal research. It also addresses issues of sponsorship of research and conflicts of interest, international collaborative research, duty of researchers to be informed about applicable norms, standards of publication (including plagiarism), and the obligation of "whistleblowing" for the sake of maintaining the integrity of the dental research enterprise as a whole. The code is organized, like the ADA code, into two sections. The IADR principles are stated, but not defined, and number 12, instead of the ADA's five. The second section consists of "best practices," which are specific statements of expected or interdicted activities. The short list of definitions is useful.

  20. Academic Staff's Perspectives upon Student Plagiarism: A Case Study at a University in Hong Kong

    Science.gov (United States)

    Li, Yongyan

    2015-01-01

    Much of the previous research concerning student plagiarism has been conducted in Anglo-American settings. The present paper reports a case study of academic staff's perspectives upon student plagiarism at a university in Hong Kong. Based on interviews with 16 instructors, the study focused on the teachers' views and pedagogical practices,…

  1. Plagiarism: Do Students Know What It Is?

    Science.gov (United States)

    Dawson, Maureen M.; Overfield, Joyce A.

    2006-01-01

    The ability of students to plagiarise coursework assessments has been a topic of much debate in recent years. The consequences of plagiarism for students may be devastating, since their failure to learn and use appropriate study skills will affect both their university experience and their subsequent career. This project set out to investigate…

  2. OSSMETER D3.4 – Language-Specific Source Code Quality Analysis

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim); H.J.S. Basten (Bas)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and prototypes of the tools that are needed for source code quality analysis in open source software projects. It builds upon the results of: • Deliverable 3.1 where infra-structure and

  3. What Prevents ESL/FL Writers from Avoiding Plagiarism? Analyses of 10 North-American College Websites.

    Science.gov (United States)

    Yamada, Kyoko

    2003-01-01

    Discusses how inexperienced English-as-a-Second/Foreign-Language (ESL/EFL) writers can be helped to avoid plagiarism. Analyzes 10 North American Web sites on plagiarism, which provide a window to understanding how this issue has been problemitized and explained in Anglophone academic contexts. Concludes ESL/EFL may need to emphasize the role of…

  4. Alta frecuencia de plagio en tesis de medicina de una universidad pública Peruana High frequency of plagiarism in medical thesis from a Peruvian public university

    Directory of Open Access Journals (Sweden)

    J. Jhan C. Saldaña-Gastulo

    2010-03-01

    Full Text Available Se realizó un estudio observacional con el objetivo de describir la presencia de plagio en tesis de medicina ejecutadas en el año 2008 en una universidad pública peruana. Se buscó plagio en las introducciones de 33 tesis usando un algoritmo de búsqueda con Google, se caracterizó el tipo de estudio y se buscó en forma electrónica si los asesores de las tesis han publicado artículos en revistas científicas. Se encontró evidencia de plagio en 27/33 de las introducciones, 37,3% (171/479 de todos los párrafos analizados tuvieron algún grado de plagio, el plagio literal fue el más frecuente (20/27 y las fuentes de plagio más comunes fueron revistas científicas (19/27. Las características de los estudios analizados fueron observacionales (32/33, transversales (30/33, descriptivos (25/33 y retrospectivos (19/33. Ninguno de los autores había publicado en una revista científica, y sólo nueve de sus asesores de ellos tenían al menos una publicación. No se encontró asociación entre las características de la tesis y la presencia de plagio. En conclusión, se encontró una alta frecuencia de plagio en las tesis analizadas. Es responsabilidad de las facultades de medicina tomar las medidas necesarias para detectar y evitar el plagio entre sus estudiantes.An observational study was conducted to describe the presence of plagiarism in medical thesis in 2008 performed at a public university in Peru. Search for plagiarism in 33 thesis introductions using a Google search algorithm, characterizes of the study type and we search in electronic form if the thesis mentor have published articles in scientific journals. We found evidence of plagiarism in 27/33 introductions, 37.3% (171/479 of all the paragraphs analyzed had some degree of plagiarism, literal plagiarism was the most frequent (20/27 and journals were the most common sources of plagiarism (19/27. The characteristics of the studies were observational (32/33, cross-sectional (30

  5. Academy Policy on Plagiarism | Overview | Journals | Indian ...

    Indian Academy of Sciences (India)

    Defined by the US Office of Research Integrity as “the appropriation of another person's ideas, processes, results or words without giving appropriate credit”, the increase in plagiarism is due not only to all too human failings, but also to the ease with which the emergence of the Internet has made such misconduct possible.

  6. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article.

    Science.gov (United States)

    Baydik, Olga D; Gasparyan, Armen Yuri

    2016-10-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers' opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors' of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software.

  7. How to Act When Research Misconduct Is Not Detected by Software but Revealed by the Author of the Plagiarized Article

    Science.gov (United States)

    2016-01-01

    The detection of plagiarism in scholarly articles is a complex process. It requires not just quantitative analysis with the similarity recording by anti-plagiarism software but also assessment of the readers’ opinion, pointing to the theft of ideas, methodologies, and graphics. In this article we describe a blatant case of plagiarism by Chinese authors, who copied a Russian article from a non-indexed and not widely visible Russian journal, and published their own report in English in an open-access journal indexed by Scopus and Web of Science and archived in PubMed Central. The details of copying in the translated English article were presented by the Russian author to the chief editor of the index journal, consultants from Scopus, anti-plagiarism experts, and the administrator of the Committee on Publication Ethics (COPE). The correspondents from Scopus and COPE pointed to the decisive role of the editors’ of the English journal who may consider further actions if plagiarism is confirmed. After all, the chief editor of the English journal retracted the article on grounds of plagiarism and published a retraction note, although no details of the complexity of the case were reported. The case points to the need for combining anti-plagiarism efforts and actively seeking opinion of non-native English-speaking authors and readers who may spot intellectual theft which is not always detected by software. PMID:27550475

  8. The Prevalence and Quality of Source Attribution in Middle and High School Science Papers

    Science.gov (United States)

    Vieyra, Michelle; Weaver, Kari

    2016-01-01

    Plagiarism is a commonly cited problem in higher education, especially in scientific writing and assignments for science courses. Students may not intentionally plagiarize, but may instead be confused about what proper source attribution entails. Much of this confusion likely stems from high school, either from lack of or inconsistent instruction…

  9. No evidence of age-related increases in unconscious plagiarism during free recall.

    Science.gov (United States)

    Perfect, Timothy John; Defeldre, Anne-Catherine; Elliman, Rachel; Dehon, Hedwige

    2011-07-01

    In three experiments younger and older participants took part in a group generation task prior to a delayed recall task. In each, participants were required to recall the items that they had generated, avoiding plagiarism errors. All studies showed the same pattern: older adults did not plagiarise their partners any more than younger adults did. However, older adults were more likely than younger adults to intrude with entirely novel items not previously generated by anyone. These findings stand in opposition to the single previous demonstration of age-related increases in plagiarism during recall.

  10. An Investigation of Plagiarism in Developmental Literacy

    Science.gov (United States)

    Hammer, Emily Grace Ehrlich; Agnello, Mary Frances; Kiser, Michelle; Osaghae, Osariemen

    2012-01-01

    The purpose of higher education is to prepare students for the workforce. In order to prepare students for the workforce, many life lessons must be learned specifically respect for others' work. One of the invaluable lessons that a student can learn regarding respect for others' work is to appreciate originality and avoid of plagiarism. To be…

  11. An efficient chaotic source coding scheme with variable-length blocks

    International Nuclear Information System (INIS)

    Lin Qiu-Zhen; Wong Kwok-Wo; Chen Jian-Yong

    2011-01-01

    An efficient chaotic source coding scheme operating on variable-length blocks is proposed. With the source message represented by a trajectory in the state space of a chaotic system, data compression is achieved when the dynamical system is adapted to the probability distribution of the source symbols. For infinite-precision computation, the theoretical compression performance of this chaotic coding approach attains that of optimal entropy coding. In finite-precision implementation, it can be realized by encoding variable-length blocks using a piecewise linear chaotic map within the precision of register length. In the decoding process, the bit shift in the register can track the synchronization of the initial value and the corresponding block. Therefore, all the variable-length blocks are decoded correctly. Simulation results show that the proposed scheme performs well with high efficiency and minor compression loss when compared with traditional entropy coding. (general)

  12. "No Fair, Copycat!": What Children's Response to Plagiarism Tells Us about Their Understanding of Ideas

    Science.gov (United States)

    Olson, Kristina R.; Shaw, Alex

    2011-01-01

    Adults believe that plagiarizing ideas is wrong, which requires an understanding that others can have ideas and that it is wrong to copy them. In order to test when this understanding emerges, we investigated when children begin to think plagiarism is wrong. In Study 1, children aged 7, 9 and 11 years old, as well as adults, disliked someone who…

  13. Coded aperture imaging of alpha source spatial distribution

    International Nuclear Information System (INIS)

    Talebitaher, Alireza; Shutler, Paul M.E.; Springham, Stuart V.; Rawat, Rajdeep S.; Lee, Paul

    2012-01-01

    The Coded Aperture Imaging (CAI) technique has been applied with CR-39 nuclear track detectors to image alpha particle source spatial distributions. The experimental setup comprised: a 226 Ra source of alpha particles, a laser-machined CAI mask, and CR-39 detectors, arranged inside a vacuum enclosure. Three different alpha particle source shapes were synthesized by using a linear translator to move the 226 Ra source within the vacuum enclosure. The coded mask pattern used is based on a Singer Cyclic Difference Set, with 400 pixels and 57 open square holes (representing ρ = 1/7 = 14.3% open fraction). After etching of the CR-39 detectors, the area, circularity, mean optical density and positions of all candidate tracks were measured by an automated scanning system. Appropriate criteria were used to select alpha particle tracks, and a decoding algorithm applied to the (x, y) data produced the de-coded image of the source. Signal to Noise Ratio (SNR) values obtained for alpha particle CAI images were found to be substantially better than those for corresponding pinhole images, although the CAI-SNR values were below the predictions of theoretical formulae. Monte Carlo simulations of CAI and pinhole imaging were performed in order to validate the theoretical SNR formulae and also our CAI decoding algorithm. There was found to be good agreement between the theoretical formulae and SNR values obtained from simulations. Possible reasons for the lower SNR obtained for the experimental CAI study are discussed.

  14. Practice Makes Perfect: Improving Students' Skills in Understanding and Avoiding Plagiarism with a Themed Methods Course

    Science.gov (United States)

    Estow, Sarah; Lawrence, Eva K.; Adams, Kathrynn A.

    2011-01-01

    To address the issue of plagiarism, students in two undergraduate Research Methods and Analysis courses conducted, analyzed, and wrote up original research on the topic of plagiarism. Students in an otherwise identical course completed the same assignments but examined a different research topic. At the start and end of the semester, all students…

  15. An Efficient SF-ISF Approach for the Slepian-Wolf Source Coding Problem

    Directory of Open Access Journals (Sweden)

    Tu Zhenyu

    2005-01-01

    Full Text Available A simple but powerful scheme exploiting the binning concept for asymmetric lossless distributed source coding is proposed. The novelty in the proposed scheme is the introduction of a syndrome former (SF in the source encoder and an inverse syndrome former (ISF in the source decoder to efficiently exploit an existing linear channel code without the need to modify the code structure or the decoding strategy. For most channel codes, the construction of SF-ISF pairs is a light task. For parallelly and serially concatenated codes and particularly parallel and serial turbo codes where this appear less obvious, an efficient way for constructing linear complexity SF-ISF pairs is demonstrated. It is shown that the proposed SF-ISF approach is simple, provenly optimal, and generally applicable to any linear channel code. Simulation using conventional and asymmetric turbo codes demonstrates a compression rate that is only 0.06 bit/symbol from the theoretical limit, which is among the best results reported so far.

  16. Faculty Perceptions of Plagiarism at Queensborough Community College

    Science.gov (United States)

    Marcus, Sara; Beck, Sheila

    2011-01-01

    The researchers surveyed English and Speech & Theater faculty members at Queensborough Community College on their perceptions of and attitudes toward plagiarism. The researchers used the Queensborough Community College Academic Integrity Policy as the basis for their analysis. Based on the responses received, it was determined that 50% of the…

  17. Instance of plagiarism in Journal of Chemical Sciences

    Indian Academy of Sciences (India)

    Administrator

    Our own investigations reveal that the author has reproduced cyclic volt- ammograms and also some paragraphs verbatim from the earlier paper. The author was provided an opportunity to explain the alleged plagiarism and to submit copies of original polarograms he had recorded and laboratory notebooks to substantiate ...

  18. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories.

  19. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2004-01-01

    The objectives of the Code of Conduct are, through the development, harmonization and implementation of national policies, laws and regulations, and through the fostering of international co-operation, to: (i) achieve and maintain a high level of safety and security of radioactive sources; (ii) prevent unauthorized access or damage to, and loss, theft or unauthorized transfer of, radioactive sources, so as to reduce the likelihood of accidental harmful exposure to such sources or the malicious use of such sources to cause harm to individuals, society or the environment; and (iii) mitigate or minimize the radiological consequences of any accident or malicious act involving a radioactive source. These objectives should be achieved through the establishment of an adequate system of regulatory control of radioactive sources, applicable from the stage of initial production to their final disposal, and a system for the restoration of such control if it has been lost. This Code relies on existing international standards relating to nuclear, radiation, radioactive waste and transport safety and to the control of radioactive sources. It is intended to complement existing international standards in these areas. The Code of Conduct serves as guidance in general issues, legislation and regulations, regulatory bodies as well as import and export of radioactive sources. A list of radioactive sources covered by the code is provided which includes activities corresponding to thresholds of categories

  20. Chinese University EFL Teachers’ Knowledge of and Stance on Plagiarism = Conocimientos y actitudes ante el plagio del profesorado de lengua inglesa en universidades chinas

    OpenAIRE

    Hu, Guangwei; Sun, Xiaoya

    2016-01-01

    Plagiarism has engendered increasing concern in academia in the past few decades. While previous studies have investigated student plagiarism from various perspectives, how plagiarism is understood and responded to by university teachers, especially those in English-as-a-foreign-language (EFL) writing contexts, has been under-researched. As academic insiders and educators of future academics, university teachers play a key role in educating students against plagiarism and upholding academic i...

  1. Detecting and (not) dealing with plagiarism in an engineering paper: beyond CrossCheck-a case study.

    Science.gov (United States)

    Zhang, Xin-xin; Huo, Zhao-lin; Zhang, Yue-hong

    2014-06-01

    In papers in areas such as engineering and the physical sciences, figures, tables and formulae are the basic elements to communicate the authors' core ideas, workings and results. As a computational text-matching tool, CrossCheck cannot work on these non-textual elements to detect plagiarism. Consequently, when comparing engineering or physical sciences papers, CrossCheck may return a low similarity index even when plagiarism has in fact taken place. A case of demonstrated plagiarism involving engineering papers with a low similarity index is discussed, and editor's experiences and suggestions are given on how to tackle this problem. The case shows a lack of understanding of plagiarism by some authors or editors, and illustrates the difficulty of getting some editors and publishers to take appropriate action. Consequently, authors, journal editors, and reviewers, as well as research institutions all are duty-bound not only to recognize the differences between ethical and unethical behavior in order to protect a healthy research environment, and also to maintain consistent ethical publishing standards.

  2. Open-Source Development of the Petascale Reactive Flow and Transport Code PFLOTRAN

    Science.gov (United States)

    Hammond, G. E.; Andre, B.; Bisht, G.; Johnson, T.; Karra, S.; Lichtner, P. C.; Mills, R. T.

    2013-12-01

    Open-source software development has become increasingly popular in recent years. Open-source encourages collaborative and transparent software development and promotes unlimited free redistribution of source code to the public. Open-source development is good for science as it reveals implementation details that are critical to scientific reproducibility, but generally excluded from journal publications. In addition, research funds that would have been spent on licensing fees can be redirected to code development that benefits more scientists. In 2006, the developers of PFLOTRAN open-sourced their code under the U.S. Department of Energy SciDAC-II program. Since that time, the code has gained popularity among code developers and users from around the world seeking to employ PFLOTRAN to simulate thermal, hydraulic, mechanical and biogeochemical processes in the Earth's surface/subsurface environment. PFLOTRAN is a massively-parallel subsurface reactive multiphase flow and transport simulator designed from the ground up to run efficiently on computing platforms ranging from the laptop to leadership-class supercomputers, all from a single code base. The code employs domain decomposition for parallelism and is founded upon the well-established and open-source parallel PETSc and HDF5 frameworks. PFLOTRAN leverages modern Fortran (i.e. Fortran 2003-2008) in its extensible object-oriented design. The use of this progressive, yet domain-friendly programming language has greatly facilitated collaboration in the code's software development. Over the past year, PFLOTRAN's top-level data structures were refactored as Fortran classes (i.e. extendible derived types) to improve the flexibility of the code, ease the addition of new process models, and enable coupling to external simulators. For instance, PFLOTRAN has been coupled to the parallel electrical resistivity tomography code E4D to enable hydrogeophysical inversion while the same code base can be used as a third

  3. OSSMETER D3.2 – Report on Source Code Activity Metrics

    NARCIS (Netherlands)

    J.J. Vinju (Jurgen); A. Shahi (Ashim)

    2014-01-01

    htmlabstractThis deliverable is part of WP3: Source Code Quality and Activity Analysis. It provides descriptions and initial prototypes of the tools that are needed for source code activity analysis. It builds upon the Deliverable 3.1 where infra-structure and a domain analysis have been

  4. Making a Difference: Library and Teaching Faculty Working Together to Develop Strategies in Dealing with Student Plagiarism

    Science.gov (United States)

    Sciammarella, Susan

    2009-01-01

    Student plagiarism is a problem affecting all colleges. Various strategies have been developed to deal with this situation. But, the collaborative efforts of subject faculty and librarians in creating a team approach towards plagiarism can produce positive results. Research shows that these relationships can provide structure to assignments…

  5. Java Source Code Analysis for API Migration to Embedded Systems

    Energy Technology Data Exchange (ETDEWEB)

    Winter, Victor [Univ. of Nebraska, Omaha, NE (United States); McCoy, James A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guerrero, Jonathan [Univ. of Nebraska, Omaha, NE (United States); Reinke, Carl Werner [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Perry, James Thomas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Embedded systems form an integral part of our technological infrastructure and oftentimes play a complex and critical role within larger systems. From the perspective of reliability, security, and safety, strong arguments can be made favoring the use of Java over C in such systems. In part, this argument is based on the assumption that suitable subsets of Java’s APIs and extension libraries are available to embedded software developers. In practice, a number of Java-based embedded processors do not support the full features of the JVM. For such processors, source code migration is a mechanism by which key abstractions offered by APIs and extension libraries can made available to embedded software developers. The analysis required for Java source code-level library migration is based on the ability to correctly resolve element references to their corresponding element declarations. A key challenge in this setting is how to perform analysis for incomplete source-code bases (e.g., subsets of libraries) from which types and packages have been omitted. This article formalizes an approach that can be used to extend code bases targeted for migration in such a manner that the threats associated the analysis of incomplete code bases are eliminated.

  6. Using National Drug Codes and drug knowledge bases to organize prescription records from multiple sources.

    Science.gov (United States)

    Simonaitis, Linas; McDonald, Clement J

    2009-10-01

    The utility of National Drug Codes (NDCs) and drug knowledge bases (DKBs) in the organization of prescription records from multiple sources was studied. The master files of most pharmacy systems include NDCs and local codes to identify the products they dispense. We obtained a large sample of prescription records from seven different sources. These records carried a national product code or a local code that could be translated into a national product code via their formulary master. We obtained mapping tables from five DKBs. We measured the degree to which the DKB mapping tables covered the national product codes carried in or associated with the sample of prescription records. Considering the total prescription volume, DKBs covered 93.0-99.8% of the product codes from three outpatient sources and 77.4-97.0% of the product codes from four inpatient sources. Among the in-patient sources, invented codes explained 36-94% of the noncoverage. Outpatient pharmacy sources rarely invented codes, which comprised only 0.11-0.21% of their total prescription volume, compared with inpatient pharmacy sources for which invented codes comprised 1.7-7.4% of their prescription volume. The distribution of prescribed products was highly skewed, with 1.4-4.4% of codes accounting for 50% of the message volume and 10.7-34.5% accounting for 90% of the message volume. DKBs cover the product codes used by outpatient sources sufficiently well to permit automatic mapping. Changes in policies and standards could increase coverage of product codes used by inpatient sources.

  7. Joint source/channel coding of scalable video over noisy channels

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, G.; Zakhor, A. [Department of Electrical Engineering and Computer Sciences University of California Berkeley, California94720 (United States)

    1997-01-01

    We propose an optimal bit allocation strategy for a joint source/channel video codec over noisy channel when the channel state is assumed to be known. Our approach is to partition source and channel coding bits in such a way that the expected distortion is minimized. The particular source coding algorithm we use is rate scalable and is based on 3D subband coding with multi-rate quantization. We show that using this strategy, transmission of video over very noisy channels still renders acceptable visual quality, and outperforms schemes that use equal error protection only. The flexibility of the algorithm also permits the bit allocation to be selected optimally when the channel state is in the form of a probability distribution instead of a deterministic state. {copyright} {ital 1997 American Institute of Physics.}

  8. Using Online Resources to Improve Writing Skills and Attitudes about Writing and Plagiarism of Criminal Justice Students

    Science.gov (United States)

    Grohe, B.; Schroeder, J.; Davis, S. R. B.

    2013-01-01

    Cheating and plagiarism are significant problems in higher education because they occur often and interfere with learning. Plagiarism creates shortcuts that bypass the time and effort required to develop the writing and analytical skills necessary to produce evidence of progress in mastering course content. The purpose of a two-semester writing…

  9. Plagiarism: Misconduct Awareness on Novice Research within the ...

    African Journals Online (AJOL)

    More often than not, there exists some form of infringement relating to the use of other authors' work. This is particularly so in instances in which novice authors make use of the information available within the cyber-digital environment. The article explains the meaning of plagiarism and describes the many manifestations ...

  10. Loss, Responsibility, Blame? Staff Discourses of Student Plagiarism

    Science.gov (United States)

    Gourlay, Lesley; Deane, Janis

    2012-01-01

    Student plagiarism and difficulties with writing have been widely investigated in the literature, but there has been less research on staff perspectives. A Joint Information Services Committee (JISC)-funded questionnaire (n = 80) and focus group study investigated the views of lecturers, librarians and study advisors at a UK post-92 university,…

  11. Awareness about Plagiarism amongst University Students in Pakistan

    Science.gov (United States)

    Ramzan, Muhammad; Munir, Muhammad Asif; Siddique, Nadeem; Asif, Muhammad

    2012-01-01

    Research is an original and systematic investigation undertaken to discover new facts and information about a phenomenon. However a variety of empirical and ethical issues are on the rise in academia, especially plagiarism is quickly becoming part of global educational and research culture. More and more students and researchers are turning to the…

  12. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Fossorier Marc

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope -ary phase shift key ( -PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded -PSK signaling (with . Then, it is extended to include coded -PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded -PSK signaling performs 3.1 to 5.2 dB better than uncoded -PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  13. Intelligent bar chart plagiarism detection in documents.

    Science.gov (United States)

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Rehman, Amjad; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  14. Intelligent Bar Chart Plagiarism Detection in Documents

    Science.gov (United States)

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Alkawaz, Mohammed Hazim; Saba, Tanzila; Al-Rodhaan, Mznah; Al-Dhelaan, Abdullah

    2014-01-01

    This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR). By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts. PMID:25309952

  15. Derivatives. Replication and (auto)plagiarism in the social sciences

    NARCIS (Netherlands)

    R. Tweehuysen (Rolandt ); J. den Haan (Joost); K. Berkhout (Karel ); P.A.G. van Bergeijk (Peter)

    2012-01-01

    textabstractThis working paper reports on the travelling exhibition “Derivatives”. This exhibition investigates the issue of originality in the context of (self) plagiarism and replication. The different views in the Arts and the scientific discourse form the point of departure for discovering how

  16. Source Coding for Wireless Distributed Microphones in Reverberant Environments

    DEFF Research Database (Denmark)

    Zahedi, Adel

    2016-01-01

    . However, it comes with the price of several challenges, including the limited power and bandwidth resources for wireless transmission of audio recordings. In such a setup, we study the problem of source coding for the compression of the audio recordings before the transmission in order to reduce the power...... consumption and/or transmission bandwidth by reduction in the transmission rates. Source coding for wireless microphones in reverberant environments has several special characteristics which make it more challenging in comparison with regular audio coding. The signals which are acquired by the microphones......Modern multimedia systems are more and more shifting toward distributed and networked structures. This includes audio systems, where networks of wireless distributed microphones are replacing the traditional microphone arrays. This allows for flexibility of placement and high spatial diversity...

  17. Staff and Student Perceptions of Plagiarism and Cheating

    Science.gov (United States)

    Wilkinson, Jenny

    2009-01-01

    Cheating, plagiarism, and other forms of academic misconduct are a significant issue in higher education. In this study, the attitudes of academic staff and students in a 3 year undergraduate nursing program to various forms of academic misconduct were assessed and compared. Forty-nine percent of staff and 39% of students thought that cheating on…

  18. EDITORIAL Plagiarism - time to strike at the epidemic

    African Journals Online (AJOL)

    admin

    Plagiarism - time to strike at the epidemic. Lukman Yusuf1, Abraham Aseffa2. We live in a globalized world where information is instantly shared across continents. The number of biomedical journals available for reference is quite enormous and there is a sudden huge surge of free open access journals in the last few years ...

  19. Lessons on Plagiarism: Issues for Teachers and Learners

    Science.gov (United States)

    Anyanwu, Regina

    2004-01-01

    While student difficulty with academic referencing is not new, it is apparent that many tertiary students are not skilled in following referencing conventions, are confused about what does and does not constitute plagiarism in the eyes of academics, and are fearful of the consequences. This paper begins by examining the cases of a number of…

  20. More Heat than Light: Plagiarism in Its Appearing

    Science.gov (United States)

    Clegg, Sue; Flint, Abbi

    2006-01-01

    This paper argues that the recent debate about plagiarism has taken on aspects of a moral panic, which reflects underlying anxieties about the state of higher education in the United Kingdom. In contrast to the moral absolutism of some commentators, we argue for the significance of posing the phenomenological question of "what is plagiarism…

  1. Developing Students' Referencing Skills: A Matter of Plagiarism, Punishment and Morality or of Learning to Write Critically?

    Science.gov (United States)

    Vardi, Iris

    2012-01-01

    Just as plagiarism is viewed poorly in the academic community, so is plagiarism viewed poorly in student writing, with a range of sanctions and penalties applying for not displaying academic integrity. Yet learning to cite effectively to progress one's argument, position or understandings is a skill that takes time to develop and hone. This paper…

  2. Asymmetric Joint Source-Channel Coding for Correlated Sources with Blind HMM Estimation at the Receiver

    Directory of Open Access Journals (Sweden)

    Ser Javier Del

    2005-01-01

    Full Text Available We consider the case of two correlated sources, and . The correlation between them has memory, and it is modelled by a hidden Markov chain. The paper studies the problem of reliable communication of the information sent by the source over an additive white Gaussian noise (AWGN channel when the output of the other source is available as side information at the receiver. We assume that the receiver has no a priori knowledge of the correlation statistics between the sources. In particular, we propose the use of a turbo code for joint source-channel coding of the source . The joint decoder uses an iterative scheme where the unknown parameters of the correlation model are estimated jointly within the decoding process. It is shown that reliable communication is possible at signal-to-noise ratios close to the theoretical limits set by the combination of Shannon and Slepian-Wolf theorems.

  3. Combined Source-Channel Coding of Images under Power and Bandwidth Constraints

    Directory of Open Access Journals (Sweden)

    Marc Fossorier

    2007-01-01

    Full Text Available This paper proposes a framework for combined source-channel coding for a power and bandwidth constrained noisy channel. The framework is applied to progressive image transmission using constant envelope M-ary phase shift key (M-PSK signaling over an additive white Gaussian noise channel. First, the framework is developed for uncoded M-PSK signaling (with M=2k. Then, it is extended to include coded M-PSK modulation using trellis coded modulation (TCM. An adaptive TCM system is also presented. Simulation results show that, depending on the constellation size, coded M-PSK signaling performs 3.1 to 5.2 dB better than uncoded M-PSK signaling. Finally, the performance of our combined source-channel coding scheme is investigated from the channel capacity point of view. Our framework is further extended to include powerful channel codes like turbo and low-density parity-check (LDPC codes. With these powerful codes, our proposed scheme performs about one dB away from the capacity-achieving SNR value of the QPSK channel.

  4. Comparison of DT neutron production codes MCUNED, ENEA-JSI source subroutine and DDT

    Energy Technology Data Exchange (ETDEWEB)

    Čufar, Aljaž, E-mail: aljaz.cufar@ijs.si [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Lengar, Igor; Kodeli, Ivan [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia); Milocco, Alberto [Culham Centre for Fusion Energy, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); Sauvan, Patrick [Departamento de Ingeniería Energética, E.T.S. Ingenieros Industriales, UNED, C/Juan del Rosal 12, 28040 Madrid (Spain); Conroy, Sean [VR Association, Uppsala University, Department of Physics and Astronomy, PO Box 516, SE-75120 Uppsala (Sweden); Snoj, Luka [Reactor Physics Department, Jožef Stefan Institute, Jamova cesta 39, SI-1000 Ljubljana (Slovenia)

    2016-11-01

    Highlights: • Results of three codes capable of simulating the accelerator based DT neutron generators were compared on a simple model where only a thin target made of mixture of titanium and tritium is present. Two typical deuteron beam energies, 100 keV and 250 keV, were used in the comparison. • Comparisons of the angular dependence of the total neutron flux and spectrum as well as the neutron spectrum of all the neutrons emitted from the target show general agreement of the results but also some noticeable differences. • A comparison of figures of merit of the calculations using different codes showed that the computational time necessary to achieve the same statistical uncertainty can vary for more than 30× when different codes for the simulation of the DT neutron generator are used. - Abstract: As the DT fusion reaction produces neutrons with energies significantly higher than in fission reactors, special fusion-relevant benchmark experiments are often performed using DT neutron generators. However, commonly used Monte Carlo particle transport codes such as MCNP or TRIPOLI cannot be directly used to analyze these experiments since they do not have the capabilities to model the production of DT neutrons. Three of the available approaches to model the DT neutron generator source are the MCUNED code, the ENEA-JSI DT source subroutine and the DDT code. The MCUNED code is an extension of the well-established and validated MCNPX Monte Carlo code. The ENEA-JSI source subroutine was originally prepared for the modelling of the FNG experiments using different versions of the MCNP code (−4, −5, −X) and was later extended to allow the modelling of both DT and DD neutron sources. The DDT code prepares the DT source definition file (SDEF card in MCNP) which can then be used in different versions of the MCNP code. In the paper the methods for the simulation of the DT neutron production used in the codes are briefly described and compared for the case of a

  5. Intelligent Bar Chart Plagiarism Detection in Documents

    Directory of Open Access Journals (Sweden)

    Mohammed Mumtaz Al-Dabbagh

    2014-01-01

    Full Text Available This paper presents a novel features mining approach from documents that could not be mined via optical character recognition (OCR. By identifying the intimate relationship between the text and graphical components, the proposed technique pulls out the Start, End, and Exact values for each bar. Furthermore, the word 2-gram and Euclidean distance methods are used to accurately detect and determine plagiarism in bar charts.

  6. Plagiarism and registered health professionals: navigating the borderlands between scholarly and professional misconduct.

    Science.gov (United States)

    Wardle, Jon

    2013-12-01

    As access to published materials becomes more readily available, the ability to plagiarise material, deliberately or unwittingly has become easier than ever. This article explores important recent decisions in Australia and the United Kingdom regarding registered health practitioners who have engaged in plagiarism, both related and unrelated to their clinical practice, and explores the ways in which regulatory authorities in these countries have viewed scholarly misconduct committed by registered health professionals. This article also examines the implications of plagiarism for the registered health professions, and makes suggestions for strategies to reduce its influence and incidence in modern clinical practice.

  7. SYSTEM «PlagiarismControl» AS THE TOOL FOR THE EXPERTISE OF THE TEXT DOCUMENTS

    Directory of Open Access Journals (Sweden)

    Yu. B. Krapivin

    2018-01-01

    Full Text Available The description and the operability analysis of the implemented instrumental software system «PlagiarismControl» has been done. The system affords to automatize solving the task of the identification of the adopted fragments in the given text document both from the local full-text user’s database and from the Internet. The system affords solving the task taking in account explicit as well as implicit adoptions with precision up to lexical units paradigms and both lexical and grammatical synonymy relations, according to the structural-functional schematic diagram of the system of the automatic recognition of reproduced fragments of the text documents. «PlagiarismControl» is able to work in different modes, to automatize the work of the expert and to speed up significantly the procedure of the analysis of the documents, with the purpose of recognition of the adoptions (plagiarism from other text documents.

  8. Joint Source-Channel Coding by Means of an Oversampled Filter Bank Code

    Directory of Open Access Journals (Sweden)

    Marinkovic Slavica

    2006-01-01

    Full Text Available Quantized frame expansions based on block transforms and oversampled filter banks (OFBs have been considered recently as joint source-channel codes (JSCCs for erasure and error-resilient signal transmission over noisy channels. In this paper, we consider a coding chain involving an OFB-based signal decomposition followed by scalar quantization and a variable-length code (VLC or a fixed-length code (FLC. This paper first examines the problem of channel error localization and correction in quantized OFB signal expansions. The error localization problem is treated as an -ary hypothesis testing problem. The likelihood values are derived from the joint pdf of the syndrome vectors under various hypotheses of impulse noise positions, and in a number of consecutive windows of the received samples. The error amplitudes are then estimated by solving the syndrome equations in the least-square sense. The message signal is reconstructed from the corrected received signal by a pseudoinverse receiver. We then improve the error localization procedure by introducing a per-symbol reliability information in the hypothesis testing procedure of the OFB syndrome decoder. The per-symbol reliability information is produced by the soft-input soft-output (SISO VLC/FLC decoders. This leads to the design of an iterative algorithm for joint decoding of an FLC and an OFB code. The performance of the algorithms developed is evaluated in a wavelet-based image coding system.

  9. Distributed Remote Vector Gaussian Source Coding for Wireless Acoustic Sensor Networks

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    In this paper, we consider the problem of remote vector Gaussian source coding for a wireless acoustic sensor network. Each node receives messages from multiple nodes in the network and decodes these messages using its own measurement of the sound field as side information. The node’s measurement...... and the estimates of the source resulting from decoding the received messages are then jointly encoded and transmitted to a neighboring node in the network. We show that for this distributed source coding scenario, one can encode a so-called conditional sufficient statistic of the sources instead of jointly...

  10. Worlds Apart? International Students, Source-Based Writing, and Faculty Development Across the Curriculum

    OpenAIRE

    Murphy, Greer Alison

    2016-01-01

    This study examined how English as a Second Language (ESL) and Writing program faculty at a professional liberal arts college partnered with faculty across the curriculum to help international students learn to write from sources and avoid unintentional plagiarism. Eight participants joined a series of action research professional development workshops. In these workshops, faculty focused on defining plagiarism in both academic and professional settings, designing culturally inclusive assignm...

  11. Letter to the editor: Predatory Publishers and Plagiarism Prevention

    NARCIS (Netherlands)

    Jansen, P.A.; Forget, P.M.

    2012-01-01

    M. Balter (“Reviewer's Déjà Vu, French science sleuthing uncover plagiarized papers,” News & Analysis, 9 March, p. 1157) describes how a scientist recently published at least nine articles that largely or entirely duplicated papers written by others and was exposed only after we found one of our

  12. Strategies to Help Legal Studies Students Avoid Plagiarism

    Science.gov (United States)

    Samuels, Linda B.; Bast, Carol M.

    2006-01-01

    Plagiarism is certainly not new to academics, but it may be on the rise with easy access to the vast quantities of information available on the Internet. Students researching on the Internet do not have to take handwritten or typewritten notes. They can simply print out or copy and save whatever they find. They are even spared the tedium of having…

  13. Test of Effective Solid Angle code for the efficiency calculation of volume source

    Energy Technology Data Exchange (ETDEWEB)

    Kang, M. Y.; Kim, J. H.; Choi, H. D. [Seoul National Univ., Seoul (Korea, Republic of); Sun, G. M. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    It is hard to determine a full energy (FE) absorption peak efficiency curve for an arbitrary volume source by experiment. That's why the simulation and semi-empirical methods have been preferred so far, and many works have progressed in various ways. Moens et al. determined the concept of effective solid angle by considering an attenuation effect of γ-rays in source, media and detector. This concept is based on a semi-empirical method. An Effective Solid Angle code (ESA code) has been developed for years by the Applied Nuclear Physics Group in Seoul National University. ESA code converts an experimental FE efficiency curve determined by using a standard point source to that for a volume source. To test the performance of ESA Code, we measured the point standard sources and voluminous certified reference material (CRM) sources of γ-ray, and compared with efficiency curves obtained in this study. 200∼1500 KeV energy region is fitted well. NIST X-ray mass attenuation coefficient data is used currently to check for the effect of linear attenuation only. We will use the interaction cross-section data obtained from XCOM code to check the each contributing factor like photoelectric effect, incoherent scattering and coherent scattering in the future. In order to minimize the calculation time and code simplification, optimization of algorithm is needed.

  14. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Directory of Open Access Journals (Sweden)

    Pierre Siohan

    2005-05-01

    Full Text Available Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC and variable-length source codes (VLC widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  15. Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey

    Science.gov (United States)

    Guillemot, Christine; Siohan, Pierre

    2005-12-01

    Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS) provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD) strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM) capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC) and variable-length source codes (VLC) widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.

  16. Cross-Language Plagiarism Detection System Using Latent Semantic Analysis and Learning Vector Quantization

    Directory of Open Access Journals (Sweden)

    Anak Agung Putri Ratna

    2017-06-01

    Full Text Available Computerized cross-language plagiarism detection has recently become essential. With the scarcity of scientific publications in Bahasa Indonesia, many Indonesian authors frequently consult publications in English in order to boost the quantity of scientific publications in Bahasa Indonesia (which is currently rising. Due to the syntax disparity between Bahasa Indonesia and English, most of the existing methods for automated cross-language plagiarism detection do not provide satisfactory results. This paper analyses the probability of developing Latent Semantic Analysis (LSA for a computerized cross-language plagiarism detector for two languages with different syntax. To improve performance, various alterations in LSA are suggested. By using a linear vector quantization (LVQ classifier in the LSA and taking into account the Frobenius norm, output has reached up to 65.98% in accuracy. The results of the experiments showed that the best accuracy achieved is 87% with a document size of 6 words, and the document definition size must be kept below 10 words in order to maintain high accuracy. Additionally, based on experimental results, this paper suggests utilizing the frequency occurrence method as opposed to the binary method for the term–document matrix construction.

  17. Discourses of Plagiarism: Moralist, Proceduralist, Developmental and Inter-Textual Approaches

    Science.gov (United States)

    Kaposi, David; Dell, Pippa

    2012-01-01

    This paper reconstructs prevalent academic discourses of student plagiarism: moralism, proceduralism, development, and writing/inter-textuality. It approaches the discourses from three aspects: intention, interpretation and the nature of the academic community. It argues that the assumptions of the moralistic approach regarding suspect intention,…

  18. Model-Based Least Squares Reconstruction of Coded Source Neutron Radiographs: Integrating the ORNL HFIR CG1D Source Model

    Energy Technology Data Exchange (ETDEWEB)

    Santos-Villalobos, Hector J [ORNL; Gregor, Jens [University of Tennessee, Knoxville (UTK); Bingham, Philip R [ORNL

    2014-01-01

    At the present, neutron sources cannot be fabricated small and powerful enough in order to achieve high resolution radiography while maintaining an adequate flux. One solution is to employ computational imaging techniques such as a Magnified Coded Source Imaging (CSI) system. A coded-mask is placed between the neutron source and the object. The system resolution is increased by reducing the size of the mask holes and the flux is increased by increasing the size of the coded-mask and/or the number of holes. One limitation of such system is that the resolution of current state-of-the-art scintillator-based detectors caps around 50um. To overcome this challenge, the coded-mask and object are magnified by making the distance from the coded-mask to the object much smaller than the distance from object to detector. In previous work, we have shown via synthetic experiments that our least squares method outperforms other methods in image quality and reconstruction precision because of the modeling of the CSI system components. However, the validation experiments were limited to simplistic neutron sources. In this work, we aim to model the flux distribution of a real neutron source and incorporate such a model in our least squares computational system. We provide a full description of the methodology used to characterize the neutron source and validate the method with synthetic experiments.

  19. Going Beyond Academic Integrity Might Broaden our Understanding of Plagiarism in Science Education: A Perspective from a Study in Brazil.

    Science.gov (United States)

    Santos, Christiane C; Santos, Patrícia S Dos; Sant'ana, Maurício C; Masuda, Hatisaburo; Barboza, Monica B; Vasconcelos, Sonia M R

    2017-05-01

    Fostering innovation and creativity is a priority in the science and education policy agenda of most countries, which have advocated that innovative minds and processes will boost scientific and economic growth. While our knowledge society has embraced this view, fostering creativity is among the major challenges faced by educators and policymakers. For example, plagiarism, which may be considered a form of imitation and repetition, is a global concern at schools and universities. However, most discussions focus on academic integrity, which, we believe, leaves some gaps in the approach to the problem. As part of an ongoing project on plagiarism, science and education policy, we show results from a survey sent to 143 high-school science teachers at one of the most highly regarded federal schools in Brazil. Among respondents (n=42), about 50% admit that students plagiarize in assignments. Additionally, many of these educators suggest that the way biology, chemistry and physics are taught at school stimulates more repetition than creativity. Our findings are consistent with the need for a broader perspective on plagiarism and with initiatives to stimulate creativity and critical thinking among students. Although we offer a perspective from Brazil, it may illuminate current discussions on plagiarism, particularly in emerging countries.

  20. Going Beyond Academic Integrity Might Broaden our Understanding of Plagiarism in Science Education: A Perspective from a Study in Brazil

    Directory of Open Access Journals (Sweden)

    CHRISTIANE C. SANTOS

    Full Text Available ABSTRACT Fostering innovation and creativity is a priority in the science and education policy agenda of most countries, which have advocated that innovative minds and processes will boost scientific and economic growth. While our knowledge society has embraced this view, fostering creativity is among the major challenges faced by educators and policymakers. For example, plagiarism, which may be considered a form of imitation and repetition, is a global concern at schools and universities. However, most discussions focus on academic integrity, which, we believe, leaves some gaps in the approach to the problem. As part of an ongoing project on plagiarism, science and education policy, we show results from a survey sent to 143 high-school science teachers at one of the most highly regarded federal schools in Brazil. Among respondents (n=42, about 50% admit that students plagiarize in assignments. Additionally, many of these educators suggest that the way biology, chemistry and physics are taught at school stimulates more repetition than creativity. Our findings are consistent with the need for a broader perspective on plagiarism and with initiatives to stimulate creativity and critical thinking among students. Although we offer a perspective from Brazil, it may illuminate current discussions on plagiarism, particularly in emerging countries.

  1. Plagiarism and ghostwriting: The rise in academic misconduct

    Directory of Open Access Journals (Sweden)

    Shawren Singh

    2016-05-01

    Full Text Available The aim of this paper is to review the current situation regarding plagiarism and ghostwriting, and to stimulate debate about how universities should respond to the rise in these forms of academic misconduct. The apparent upsurge in academic misconduct means that universities today face one of the greatest challenges to academic integrity they have had to deal with ever since the university system came into existence some 800 years ago. Plagiarism and ghostwriting are undermining the integrity of university degrees to an extent not seen before. Academia and fraud are not strangers. Universities have a long history of cheating of one sort or another, often associated with examinations, but also with research. In the past this cheating involved activities such as smuggling notes (commonly called "crib sheets" into examinations, and consulting them even under the watchful eyes of invigilators. It also involved students obtaining sight of an examination paper in advance. The fraudulent creation of research results has also been an issue. However, in the 21st century, the opportunities for cheating have exploded. This has resulted in universities becoming more concerned about ensuring the integrity of their examination processes and the degrees they award. Our paper focuses on cheating in the writing of dissertations or theses required at undergraduate or postgraduate level, with an emphasis on plagiarism and ghostwriting. We do not propose a simple solution to these problems, as preventing or stopping cheating is not just a matter of catching the wrongdoers. Cheating is endogenous to the current university education system, and needs to be addressed in terms of not only prevention and detection but also how people who are found to engage in such misconduct are treated. We suggest that creative ways of promoting learning would help to minimise cheating at universities. It is also important to ensure that the issue is discussed openly among students

  2. Assessing Domestic vs. International Student Perceptions and Attitudes of Plagiarism

    Science.gov (United States)

    Doss, Daniel Adrian; Henley, Russ; Gokaraju, Balakrishna; McElreath, David; Lackey, Hilliard; Hong, Qiuqi; Miller, Lauren

    2016-01-01

    The authors examined students' perceptions of plagiarism from a higher education teaching institution within the U.S. southeast. This study employed a five-point Likert-scale to examine differences of perceptions between domestic versus international students. Statistically significant outcomes were observed regarding the notions that plagiarism…

  3. Is it cheating or learning the craft of writing? Using Turnitin to help students avoid plagiarism

    Directory of Open Access Journals (Sweden)

    Lynne Graham-Matheson

    2013-04-01

    Full Text Available Plagiarism is a growing problem for universities, many of which are turning to software detection for help in detecting and dealing with it. This paper explores issues around plagiarism and reports on a study of the use of Turnitin in a new university. The purpose of the study was to inform the senior management team about the plagiarism policy and the use of Turnitin. The study found that staff and students largely understood the university's policy and Turnitin's place within it, and were very supportive of the use of Turnitin in originality checking. Students who had not used Turnitin were generally keen to do so. The recommendation to the senior management team, which was implemented, was that the use of Turnitin for originality checking should be made compulsory where possible – at the time of the study the use of Turnitin was at the discretion of programme directors. A further aim of the study was to contribute to the sector's body of knowledge. Prevention of plagiarism through education is a theme identified by Badge and Scott (2009 who conclude an area lacking in research is “investigation of the impact of these tools on staff teaching practices”. Although a number of recent studies have considered educational use of Turnitin they focus on individual programmes or subject areas rather than institutions as a whole and the relationship with policy.

  4. Self-Plagiarism and Unfortunate Publication: An Essay on Academic Values

    Science.gov (United States)

    Robinson, Susan R.

    2014-01-01

    Recent years have seen a steady stream of journal editorials condemning self-plagiarism and other questionable publishing practices. Whilst in the biomedical sciences, redundant publication is condemned for its potential to exaggerate the efficacy of clinical trials, the potential negative consequences of textual recycling are less obvious in the…

  5. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost.

  6. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost

  7. The Astrophysics Source Code Library: Supporting software publication and citation

    Science.gov (United States)

    Allen, Alice; Teuben, Peter

    2018-01-01

    The Astrophysics Source Code Library (ASCL, ascl.net), established in 1999, is a free online registry for source codes used in research that has appeared in, or been submitted to, peer-reviewed publications. The ASCL is indexed by the SAO/NASA Astrophysics Data System (ADS) and Web of Science and is citable by using the unique ascl ID assigned to each code. In addition to registering codes, the ASCL can house archive files for download and assign them DOIs. The ASCL advocations for software citation on par with article citation, participates in multidiscipinary events such as Force11, OpenCon, and the annual Workshop on Sustainable Software for Science, works with journal publishers, and organizes Special Sessions and Birds of a Feather meetings at national and international conferences such as Astronomical Data Analysis Software and Systems (ADASS), European Week of Astronomy and Space Science, and AAS meetings. In this presentation, I will discuss some of the challenges of gathering credit for publishing software and ideas and efforts from other disciplines that may be useful to astronomy.

  8. Distributed Source Coding Techniques for Lossless Compression of Hyperspectral Images

    Directory of Open Access Journals (Sweden)

    Barni Mauro

    2007-01-01

    Full Text Available This paper deals with the application of distributed source coding (DSC theory to remote sensing image compression. Although DSC exhibits a significant potential in many application fields, up till now the results obtained on real signals fall short of the theoretical bounds, and often impose additional system-level constraints. The objective of this paper is to assess the potential of DSC for lossless image compression carried out onboard a remote platform. We first provide a brief overview of DSC of correlated information sources. We then focus on onboard lossless image compression, and apply DSC techniques in order to reduce the complexity of the onboard encoder, at the expense of the decoder's, by exploiting the correlation of different bands of a hyperspectral dataset. Specifically, we propose two different compression schemes, one based on powerful binary error-correcting codes employed as source codes, and one based on simpler multilevel coset codes. The performance of both schemes is evaluated on a few AVIRIS scenes, and is compared with other state-of-the-art 2D and 3D coders. Both schemes turn out to achieve competitive compression performance, and one of them also has reduced complexity. Based on these results, we highlight the main issues that are still to be solved to further improve the performance of DSC-based remote sensing systems.

  9. Remodularizing Java Programs for Improved Locality of Feature Implementations in Source Code

    DEFF Research Database (Denmark)

    Olszak, Andrzej; Jørgensen, Bo Nørregaard

    2011-01-01

    Explicit traceability between features and source code is known to help programmers to understand and modify programs during maintenance tasks. However, the complex relations between features and their implementations are not evident from the source code of object-oriented Java programs....... Consequently, the implementations of individual features are difficult to locate, comprehend, and modify in isolation. In this paper, we present a novel remodularization approach that improves the representation of features in the source code of Java programs. Both forward- and reverse restructurings...... are supported through on-demand bidirectional restructuring between feature-oriented and object-oriented decompositions. The approach includes a feature location phase based of tracing program execution, a feature representation phase that reallocates classes into a new package structure based on single...

  10. Police, Design, Plan and Manage: Developing a Framework for Integrating Staff Roles and Institutional Policies into a Plagiarism Prevention Strategy

    Science.gov (United States)

    Walker, Christopher; White, Melanie

    2014-01-01

    When student plagiarism occurs, academic interest and institutional policy generally assume the fault rests with the student. This paper questions this assumption. We claim that plagiarism is a shared responsibility and a complex phenomenon that requires an ongoing calibration of the relative skills and experiences of students and staff in…

  11. Academic integrity and plagiarism: perceptions and experience of staff and students in a school of dentistry: a situational analysis of staff and student perspectives.

    Science.gov (United States)

    Ford, P J; Hughes, C

    2012-02-01

    This project has investigated student and staff perceptions and experience of plagiarism in a large Australian dental school to develop a response to an external audit report. Workshops designed to enhance participants' understanding of plagiarism and to assist with practical ways to promote academic integrity within the school were provided to all students and staff. Anonymous surveys were used to investigate perceptions and experience of plagiarism and to assess the usefulness of the workshops. Most participants felt that plagiarism was not a problem in the school, but a significant number were undecided. The majority of participants reported that the guidelines for dealing with plagiarism were inadequate and most supported the mandatory use of text-matching software in all courses. High proportions of participants indicated that the workshops were useful and that they would consider improving their practice as a result. The study provided data that enhanced understanding of aspects of plagiarism highlighted in the report at the school level and identified areas in need of attention, such as refining and raising awareness of the guidelines and incorporation of text-matching software into courses, as well as cautions to be considered (how text-matching software is used) in planning responsive action. © 2011 John Wiley & Sons A/S.

  12. Distributed coding of multiview sparse sources with joint recovery

    DEFF Research Database (Denmark)

    Luong, Huynh Van; Deligiannis, Nikos; Forchhammer, Søren

    2016-01-01

    In support of applications involving multiview sources in distributed object recognition using lightweight cameras, we propose a new method for the distributed coding of sparse sources as visual descriptor histograms extracted from multiview images. The problem is challenging due to the computati...... transform (SIFT) descriptors extracted from multiview images shows that our method leads to bit-rate saving of up to 43% compared to the state-of-the-art distributed compressed sensing method with independent encoding of the sources....

  13. Ensuring Effective Student Support in Higher Education Alleged Plagiarism Cases

    Science.gov (United States)

    Baird, Craig; Dooey, Patricia

    2014-01-01

    Plagiarism and other forms of academic misconduct are matters of great concern at all levels of study worldwide. This is especially so for students in higher education institutions, where higher degrees and publications are key focus activities. Ready access to internet based resources assist academic writing practices. However, the unintentional,…

  14. Revised IAEA Code of Conduct on the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Wheatley, J. S.

    2004-01-01

    The revised Code of Conduct on the Safety and Security of Radioactive Sources is aimed primarily at Governments, with the objective of achieving and maintaining a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations; and through the fostering of international co-operation. It focuses on sealed radioactive sources and provides guidance on legislation, regulations and the regulatory body, and import/export controls. Nuclear materials (except for sources containing 239Pu), as defined in the Convention on the Physical Protection of Nuclear Materials, are not covered by the revised Code, nor are radioactive sources within military or defence programmes. An earlier version of the Code was published by IAEA in 2001. At that time, agreement was not reached on a number of issues, notably those relating to the creation of comprehensive national registries for radioactive sources, obligations of States exporting radioactive sources, and the possibility of unilateral declarations of support. The need to further consider these and other issues was highlighted by the events of 11th September 2001. Since then, the IAEA's Secretariat has been working closely with Member States and relevant International Organizations to achieve consensus. The text of the revised Code was finalized at a meeting of technical and legal experts in August 2003, and it was submitted to IAEA's Board of Governors for approval in September 2003, with a recommendation that the IAEA General Conference adopt it and encourage its wide implementation. The IAEA General Conference, in September 2003, endorsed the revised Code and urged States to work towards following the guidance contained within it. This paper summarizes the history behind the revised Code, its content and the outcome of the discussions within the IAEA Board of Governors and General Conference. (Author) 8 refs

  15. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Anon.

    2001-01-01

    The objective of the code of conduct is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through the fostering of international co-operation. In particular, this code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost. (N.C.)

  16. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks.

    Science.gov (United States)

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-07-09

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.

  17. Distributed Remote Vector Gaussian Source Coding with Covariance Distortion Constraints

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2014-01-01

    In this paper, we consider a distributed remote source coding problem, where a sequence of observations of source vectors is available at the encoder. The problem is to specify the optimal rate for encoding the observations subject to a covariance matrix distortion constraint and in the presence...

  18. The Pollution Of Science: Plagiarism & Predatory Journal

    OpenAIRE

    Abdelkrim CHERITI

    2015-01-01

    In 2013 we denounced a case of plagiarism, a stupid copy and paste of our article published since 2012 in this journal (PhytoChem & BioSub Journal Vol. 6 N° 2, 83-87, 2012) by another “ scientists” - teaching in Tlemcen and Bechar universities, L. Ziane, H. A. Lazouni, A. Moussaoui, N. Hamidi - and published in Asian Journal of Natural & Applied Sciences, Vol. 2(1), 5-9, 2013 (www. leena-luna.co.jp). A journal with editorial board but the editor chief is anonymous. the same "au...

  19. IllinoisGRMHD: an open-source, user-friendly GRMHD code for dynamical spacetimes

    International Nuclear Information System (INIS)

    Etienne, Zachariah B; Paschalidis, Vasileios; Haas, Roland; Mösta, Philipp; Shapiro, Stuart L

    2015-01-01

    In the extreme violence of merger and mass accretion, compact objects like black holes and neutron stars are thought to launch some of the most luminous outbursts of electromagnetic and gravitational wave energy in the Universe. Modeling these systems realistically is a central problem in theoretical astrophysics, but has proven extremely challenging, requiring the development of numerical relativity codes that solve Einstein's equations for the spacetime, coupled to the equations of general relativistic (ideal) magnetohydrodynamics (GRMHD) for the magnetized fluids. Over the past decade, the Illinois numerical relativity (ILNR) group's dynamical spacetime GRMHD code has proven itself as a robust and reliable tool for theoretical modeling of such GRMHD phenomena. However, the code was written ‘by experts and for experts’ of the code, with a steep learning curve that would severely hinder community adoption if it were open-sourced. Here we present IllinoisGRMHD, which is an open-source, highly extensible rewrite of the original closed-source GRMHD code of the ILNR group. Reducing the learning curve was the primary focus of this rewrite, with the goal of facilitating community involvement in the code's use and development, as well as the minimization of human effort in generating new science. IllinoisGRMHD also saves computer time, generating roundoff-precision identical output to the original code on adaptive-mesh grids, but nearly twice as fast at scales of hundreds to thousands of cores. (paper)

  20. Domain-Specific Acceleration and Auto-Parallelization of Legacy Scientific Code in FORTRAN 77 using Source-to-Source Compilation

    OpenAIRE

    Vanderbauwhede, Wim; Davidson, Gavin

    2017-01-01

    Massively parallel accelerators such as GPGPUs, manycores and FPGAs represent a powerful and affordable tool for scientists who look to speed up simulations of complex systems. However, porting code to such devices requires a detailed understanding of heterogeneous programming tools and effective strategies for parallelization. In this paper we present a source to source compilation approach with whole-program analysis to automatically transform single-threaded FORTRAN 77 legacy code into Ope...

  1. Automating RPM Creation from a Source Code Repository

    Science.gov (United States)

    2012-02-01

    apps/usr --with- libpq=/apps/ postgres make rm -rf $RPM_BUILD_ROOT umask 0077 mkdir -p $RPM_BUILD_ROOT/usr/local/bin mkdir -p $RPM_BUILD_ROOT...from a source code repository. %pre %prep %setup %build ./autogen.sh ; ./configure --with-db=/apps/db --with-libpq=/apps/ postgres make

  2. Plagiarism Allegations Account for Most Retractions in Major Latin American/Caribbean Databases.

    Science.gov (United States)

    Almeida, Renan Moritz V R; de Albuquerque Rocha, Karina; Catelani, Fernanda; Fontes-Pereira, Aldo José; Vasconcelos, Sonia M R

    2016-10-01

    This study focuses on retraction notices from two major Latin American/Caribbean indexing databases: SciELO and LILACS. SciELO includes open scientific journals published mostly in Latin America/the Caribbean, from which 10 % are also indexed by Thomson Reuters Web of Knowledge Journal of Citation Reports (JCR). LILACS has a similar geographical coverage and includes dissertations and conference/symposia proceedings, but it is limited to publications in the health sciences. A search for retraction notices was performed in these two databases using the keywords "retracted", "retraction" "withdrawal", "withdrawn", "removed" and "redress". Documents were manually checked to identify those that actually referred to retractions, which were then analyzed and categorized according to the reasons alleged in the notices. Dates of publication/retraction and time to retraction were also recorded. Searching procedures were performed between June and December 2014. Thirty-one retraction notices were identified, fifteen of which were in JCR-indexed journals. "Plagiarism" was alleged in six retractions of this group. Among the non-JCR journals, retraction reasons were alleged in fourteen cases, twelve of which were attributed to "plagiarism". The proportion of retracted articles for the SciELO database was approximately 0.005 %. The reasons alleged in retraction notices may be used as signposts to inform discussions in Latin America on plagiarism and research integrity. At the international level, these results suggest that the correction of the literature is becoming global and is not limited to mainstream international publications.

  3. Development of in-vessel source term analysis code, tracer

    International Nuclear Information System (INIS)

    Miyagi, K.; Miyahara, S.

    1996-01-01

    Analyses of radionuclide transport in fuel failure accidents (generally referred to source terms) are considered to be important especially in the severe accident evaluation. The TRACER code has been developed to realistically predict the time dependent behavior of FPs and aerosols within the primary cooling system for wide range of fuel failure events. This paper presents the model description, results of validation study, the recent model advancement status of the code, and results of check out calculations under reactor conditions. (author)

  4. Source Coding in Networks with Covariance Distortion Constraints

    DEFF Research Database (Denmark)

    Zahedi, Adel; Østergaard, Jan; Jensen, Søren Holdt

    2016-01-01

    results to a joint source coding and denoising problem. We consider a network with a centralized topology and a given weighted sum-rate constraint, where the received signals at the center are to be fused to maximize the output SNR while enforcing no linear distortion. We show that one can design...

  5. Use of source term code package in the ELEBRA MX-850 system

    International Nuclear Information System (INIS)

    Guimaraes, A.C.F.; Goes, A.G.A.

    1988-12-01

    The implantation of source term code package in the ELEBRA-MX850 system is presented. The source term is formed when radioactive materials generated in nuclear fuel leakage toward containment and the external environment to reactor containment. The implantated version in the ELEBRA system are composed of five codes: MARCH 3, TRAPMELT 3, THCCA, VANESA and NAVA. The original example case was used. The example consists of a small loca accident in a PWR type reactor. A sensitivity study for the TRAPMELT 3 code was carried out, modifying the 'TIME STEP' to estimate the processing time of CPU for executing the original example case. (M.C.K.) [pt

  6. Intuitive intellectual property law: A nationally-representative test of the plagiarism fallacy.

    Science.gov (United States)

    Fast, Anne A; Olson, Kristina R; Mandel, Gregory N

    2017-01-01

    Studies with convenience samples have suggested that the lay public's conception of intellectual property laws, including how the laws should regulate and why they should exist, are largely incommensurate with the actual intended purpose of intellectual property laws and their history in the United States. In this paper, we test whether these findings generalize to a more diverse and representative sample. The major findings from past work were replicated in the current study. When presented with several potential reasons for IP protection, the lay public endorsed plagiarism and felt that acknowledging the original source of a creative work should make copying that work permissible-viewpoints strongly divergent from lawmakers' intent and the law itself. In addition, we replicate the finding that lay people know remarkably little about intellectual property laws more generally and report little experience as users or creators of creative works.

  7. Evaluating Open-Source Full-Text Search Engines for Matching ICD-10 Codes.

    Science.gov (United States)

    Jurcău, Daniel-Alexandru; Stoicu-Tivadar, Vasile

    2016-01-01

    This research presents the results of evaluating multiple free, open-source engines on matching ICD-10 diagnostic codes via full-text searches. The study investigates what it takes to get an accurate match when searching for a specific diagnostic code. For each code the evaluation starts by extracting the words that make up its text and continues with building full-text search queries from the combinations of these words. The queries are then run against all the ICD-10 codes until a match indicates the code in question as a match with the highest relative score. This method identifies the minimum number of words that must be provided in order for the search engines choose the desired entry. The engines analyzed include a popular Java-based full-text search engine, a lightweight engine written in JavaScript which can even execute on the user's browser, and two popular open-source relational database management systems.

  8. [Is there protection against copying? Thoughts about plagiarism].

    Science.gov (United States)

    Schubert, András; Glänzel, Wolfgang

    2015-12-13

    There are at least two reasons why more and more cases of suspected plagiarism are perceived in the scientific literature. On one hand, the ever increasing pressure for publication makes it easier for authors, reviewers and editors to infringe or overlook this serious ethical misdemeanor; on the other hand, with the development of text analysis software, detecting text similarities has become a simple task. The judgement of actual cases, however, requires well-grounded professional knowledge and prudent human decisions.

  9. [Scientific stealing (Plagiarism) in medical journals].

    Science.gov (United States)

    Enöz, Murat

    2007-01-01

    The obligation to publish academic papers in order to get academic rank has made medical doctors more ambitious to publish faster and more papers. According to the ethical and legal rules in our country and in the world, if an idea or technical methods of another person is used in a medical journal, the owner of the method or idea and its publication has to be cited. If an idea, information or a technical method of another scientist is published without citation as if it was one's own idea it's called "Plagiarism". Despite the prohibitive laws and rules, this scientific stealing has become an increasing problem for medical journals worldwide.

  10. A Reflection on Plagiarism, Patchwriting, and the Engineering Master's Thesis

    Science.gov (United States)

    Eckel, Edward J.

    2010-01-01

    Early in his career as an engineering librarian, the author saw plagiarism in completely black and white terms. However, digging into the scholarly literature, he finds ample evidence that there are other factors at work in student writing besides a lack of ethics or the intent to cheat. In this article, he briefly highlights some of these…

  11. Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks †

    Science.gov (United States)

    Kim, Daehee; Kim, Dongwan; An, Sunshin

    2016-01-01

    Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616

  12. Optimal power allocation and joint source-channel coding for wireless DS-CDMA visual sensor networks

    Science.gov (United States)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2011-01-01

    In this paper, we propose a scheme for the optimal allocation of power, source coding rate, and channel coding rate for each of the nodes of a wireless Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network. The optimization is quality-driven, i.e. the received quality of the video that is transmitted by the nodes is optimized. The scheme takes into account the fact that the sensor nodes may be imaging scenes with varying levels of motion. Nodes that image low-motion scenes will require a lower source coding rate, so they will be able to allocate a greater portion of the total available bit rate to channel coding. Stronger channel coding will mean that such nodes will be able to transmit at lower power. This will both increase battery life and reduce interference to other nodes. Two optimization criteria are considered. One that minimizes the average video distortion of the nodes and one that minimizes the maximum distortion among the nodes. The transmission powers are allowed to take continuous values, whereas the source and channel coding rates can assume only discrete values. Thus, the resulting optimization problem lies in the field of mixed-integer optimization tasks and is solved using Particle Swarm Optimization. Our experimental results show the importance of considering the characteristics of the video sequences when determining the transmission power, source coding rate and channel coding rate for the nodes of the visual sensor network.

  13. Microdosimetry computation code of internal sources - MICRODOSE 1

    International Nuclear Information System (INIS)

    Li Weibo; Zheng Wenzhong; Ye Changqing

    1995-01-01

    This paper describes a microdosimetry computation code, MICRODOSE 1, on the basis of the following described methods: (1) the method of calculating f 1 (z) for charged particle in the unit density tissues; (2) the method of calculating f(z) for a point source; (3) the method of applying the Fourier transform theory to the calculation of the compound Poisson process; (4) the method of using fast Fourier transform technique to determine f(z) and, giving some computed examples based on the code, MICRODOSE 1, including alpha particles emitted from 239 Pu in the alveolar lung tissues and from radon progeny RaA and RAC in the human respiratory tract. (author). 13 refs., 6 figs

  14. Source Code Vulnerabilities in IoT Software Systems

    Directory of Open Access Journals (Sweden)

    Saleh Mohamed Alnaeli

    2017-08-01

    Full Text Available An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen that are well-known among research communities to cause potential risks and security concerns, thereby decreasing a system’s robustness and quality. These unsafe statements are banned by many companies (e.g., Microsoft. The use of these commands should be avoided from the start when writing code and should be removed from legacy code over time as recommended by new C/C++ language standards. Each system is analyzed and the distribution of the known unsafe commands is presented. Historical trends in the usage of the unsafe commands of 7 of the systems are presented to show how the studied systems evolved over time with respect to the vulnerable code. The results show that the most prevalent unsafe command used for most systems is memcpy, followed by strlen. These results can be used to help train software developers on secure coding practices so that they can write higher quality software systems.

  15. Exploring the attitudes of medical faculty members and students in Pakistan towards plagiarism: a cross sectional survey

    Science.gov (United States)

    Rathore, Farooq Azam; Zia, Ahmad Marjan; Mavrinac, Martina; Farooq, Fareeha

    2015-01-01

    Objective. The objective of this survey was to explore the attitudes towards plagiarism of faculty members and medical students in Pakistan. Methods. The Attitudes Toward Plagiarism questionnaire (ATP) was modified and distributed among 550 medical students and 130 faculty members in 7 medical colleges of Lahore and Rawalpindi. Data was entered in the SPSS v.20 and descriptive statistics were analyzed. The questionnaire was validated by principal axis factoring analysis. Results. Response rate was 93% and 73%, respectively. Principal axis factoring analysis confirmed one factor structure of ATP in the present sample. It had an acceptable Cronbach’s alpha value of 0.73. There were 421 medical students (218 (52%) female, 46% 3rd year MBBS students, mean age of 20.93 ± 1.4 years) and 95 faculty members (54.7% female, mean age 34.5 ± 8.9 years). One fifth of the students (19.7%) trained in medical writing (19.7%), research ethics (25.2%) or were currently involved in medical writing (17.6%). Most of the faculty members were demonstrators (66) or assistant professors (20) with work experience between 1 and 10 years. Most of them had trained in medical writing (68), research ethics (64) and were currently involved in medical writing (64). Medical students and faculty members had a mean score of 43.21 (7.1) and 48.4 (5.9) respectively on ATP. Most of the respondents did not consider that they worked in a plagiarism free environment and reported that self-plagiarism should not be punishable in the same way as plagiarism. Opinion regarding leniency in punishment of younger researchers who were just learning medical writing was divided. Conclusions. The general attitudes of Pakistani medical faculty members and medical students as assessed by ATP were positive. We propose training in medical writing and research ethics as part of the under and post graduate medical curriculum. PMID:26157615

  16. The practice and attitude towards plagiarism among postgraduate trainees in Saudi Arabia

    Directory of Open Access Journals (Sweden)

    Abdullah E Kattan

    2017-01-01

    Conclusions: Despite having had courses in medical writing, research ethics and/or published a scientific manuscript before; we still found a positive lean towards plagiarism. This emphasises the importance of tackling such behaviour by increasing the level of awareness among trainees to avoid such misconduct.

  17. Source-term model for the SYVAC3-NSURE performance assessment code

    International Nuclear Information System (INIS)

    Rowat, J.H.; Rattan, D.S.; Dolinar, G.M.

    1996-11-01

    Radionuclide contaminants in wastes emplaced in disposal facilities will not remain in those facilities indefinitely. Engineered barriers will eventually degrade, allowing radioactivity to escape from the vault. The radionuclide release rate from a low-level radioactive waste (LLRW) disposal facility, the source term, is a key component in the performance assessment of the disposal system. This report describes the source-term model that has been implemented in Ver. 1.03 of the SYVAC3-NSURE (Systems Variability Analysis Code generation 3-Near Surface Repository) code. NSURE is a performance assessment code that evaluates the impact of near-surface disposal of LLRW through the groundwater pathway. The source-term model described here was developed for the Intrusion Resistant Underground Structure (IRUS) disposal facility, which is a vault that is to be located in the unsaturated overburden at AECL's Chalk River Laboratories. The processes included in the vault model are roof and waste package performance, and diffusion, advection and sorption of radionuclides in the vault backfill. The model presented here was developed for the IRUS vault; however, it is applicable to other near-surface disposal facilities. (author). 40 refs., 6 figs

  18. Plagiarism, Intertextuality and Emergent Authorship in University Students' Academic Writing

    Directory of Open Access Journals (Sweden)

    Celia Helen Thompson

    2009-08-01

    Full Text Available Issues of plagiarism, intertextuality and authorial presence in academic writing are fundamental to the teaching and learning activities of all university lecturers and their students. Knowing how to assist students, particularly those who speak English as an additional language (EAL, to develop a sense of text/knowledge ownership and authorial presence in the creation of discipline-based scholarly texts can be especially challenging. Clarifying what is encompassed by the notion of ‘common knowledge’ is also central to this process. The aim of this paper is to explore the political and intertextual nature of text/knowledge construction and emergent student authorship through the analysis of interviews and written assignments from two EAL students, together with interview data from lecturers from relevant disciplinary fields. Drawing on the work of Bakhtin, Kristeva and Penrose and Geisler, I conclude by suggesting that it is by engaging with, rather than fearing, intertextual connections, that we can create a dialogic pedagogy for academic writing that will enable students to articulate an authoritative authorial identity of their own. The importance of lecturer intervention during the drafting stages of text production is also emphasised. Keywords: plagiarism; intertextuality; emergent authorship; academic writing

  19. Plagiarism and the Culture of Multilingual Students in Higher Education Abroad

    Science.gov (United States)

    Sowden, Colin

    2005-01-01

    The cultural values of multilingual students are sometimes at variance with Western academic practice, in matters such as plagiarism. In accepting this, however, it is important to avoid stereotyping. Instead we should respect and make use of the students' own traditions of study. It is also time to acknowledge that ideas and language are…

  20. Authorship, plagiarism and conflict of interest: views and practices from low/middle-income country health researchers

    Science.gov (United States)

    Young, Taryn; Garner, Paul

    2017-01-01

    Objectives To document low/middle-income country (LMIC) health researchers’ views about authorship, redundant publication, plagiarism and conflicts of interest and how common poor practice was in their institutions. Design We developed a questionnaire based on scenarios about authorship, redundant publication, plagiarism and conflicts of interest. We asked participants whether the described practices were acceptable and whether these behaviours were common at their institutions. We conducted in-depth interviews with respondents who agreed to be interviewed. Participants We invited 607 corresponding authors of Cochrane reviews working in LMICs. From the 583 emails delivered, we obtained 199 responses (34%). We carried out in-depth interviews with 15 respondents. Results Seventy-seven per cent reported that guest authorship occurred at their institution, 60% reported text recycling. For plagiarism, 12% of respondents reported that this occurred ‘occasionally’, and 24% ‘rarely’. Forty per cent indicated that their colleagues had not declared conflicts of interest in the past. Respondents generally recognised poor practice in scenarios but reported that they occurred at their institutions. Themes identified from in-depth interviews were (1) authorship rules are simple in theory, but not consistently applied; (2) academic status and power underpin behaviours; (3) institutions and culture fuel bad practices and (4) researchers are uncertain about what conflict of interests means and how this may influence research. Conclusions LMIC researchers report that guest authorship is widely accepted and common. While respondents report that plagiarism and undeclared conflicts of interest are unacceptable in practice, they appear common. Determinants of poor practice relate to academic status and power, fuelled by institutional norms and culture. PMID:29170291

  1. Comparison of Opinion Referendum of Medical and Dental Postgraduates Towards Plagiarism in Bhopal - Central India.

    Science.gov (United States)

    Jain, Shubham; Saxena, Vrinda; Hongal, Sudheer; Jain, Manish; Torwane, Nilesh; Sharva, Vijayta

    2015-07-01

    To evaluate awareness and attitude towards plagiarism of postgraduates of health fraternity in Bhopal, Central India. Across-sectional survey. People's University, Bhopal, Madhya Pradesh, India, from January to March 2014. A total of 164 postgraduates, medical (n = 80) and dental postgraduates (n = 84) were included in the study. A standard pre-tested self-administered questionnaire assessing positive, negative and subjective norms towards plagiarism was the assessing tool. Data was captured through distribution of the instrument and collected as scheduled from the study participants. The distribution of scores based on the responses to the individual questions in each dimension between the groups were compared using Mann-Whitney U-test. Among dental and medical postgraduates the median values for the questions under positive attitude was 34.0 and 32.0, negative attitude was 21.5 and 19, subjective norms was 29.0 and 27.5 respectively. The difference in the opinion regarding positive attitude was found to be statistically significant in between the groups (p plagiarism was favored more by dental students as compared to medical students. Moreover, inadequate level of knowledge and awareness was observed in both the streams. Efforts should be undertaken to motivate health professionals to instill honest behavior in order to preserve the intellectual property right.

  2. Academic Crime and Punishment: Faculty Members' Perceptions of and Responses to Plagiarism

    Science.gov (United States)

    Robinson-Zanartu, Carol; Pena, Elizabeth D.; Cook-Morales, Valerie; Pena, Anna M.; Afshani, Rosalyn; Nguyen, Lynda

    2005-01-01

    Academic dishonesty and its consequences have become increasingly complex. Highly accessible electronic media, profound consequences for misconduct and reporting, and lack of standard practice intensify the issues. We surveyed 270 faculty members to determine whether they had been confronted with plagiarism and if they felt prepared to deal with…

  3. Academic Integrity and Student Plagiarism: Guided Instructional Strategies for Business Communication Assignments

    Science.gov (United States)

    Okoro, Ephraim A.

    2011-01-01

    Maintaining academic integrity is critical to the sustainability of a civil society and to the democratic process. Educators across the disciplines are growing increasingly disturbed by the level of plagiarism on university campuses. The author contends that developing supportive ways of empowering students to become more independent writers in…

  4. An Online Tutorial vs. Pre-Recorded Lecture for Reducing Incidents of Plagiarism

    Science.gov (United States)

    Henslee, Amber M.; Goldsmith, Jacob; Stone, Nancy J.; Krueger, Merilee

    2015-01-01

    The current study compared an online academic integrity tutorial modified from Belter & du Pre (2009) to a pre-recorded online academic integrity lecture in reducing incidents of plagiarism among undergraduate students at a science and technology university. Participants were randomized to complete either the tutorial or the pre-recorded…

  5. STUDENTS’ PERCEPTION ON THE ACT OF PLAGIARISM IN WRITING FINAL ASSIGNMENT (PERSEPSI MAHASISWA TERHADAP TINDAKAN PLAGIA-RISME DALAM PENYUSUNAN TUGAS AKHIR

    Directory of Open Access Journals (Sweden)

    Hana Silvana

    2018-02-01

    Full Text Available Abstract, This research is based on the issue of plagiArism in the academic world especially in Higher Education. The main issue studied in this study is the perception of students on the act of plagiarism in writing final assignment. This study was conducted with the aim to describe the act of plagiarism in preparing the final assignment of students. The method used in this research is descriptive analytical method. The informants are students of UPI Education Sciences Faculty . The research was conducted in 2017 at odd semester. The research results showed that there were lack of knowledge about styles of writing, limited time availability in the preparation of the final task of students, the development of information technology facilitates and opens opportunities to cheat. Moreover, many lecturers have not addressed plagiarism issue, use of anti plagiarism ap-plication is minimum, and socialization of plagiarism issue is still not sufficient. This research also found that training on final assignment writing has not been done as needed. Abstrak, Penelitian ini dilatar belakangi dengan isu plagiarisme dalan dunia akademik khususnya di Perguruan Tinggi. Permasalahan pokok yang dikaji pada penelitian ini persepsi ma-hasiswa terhadap tindak plagiarisme di dalam penyusunan tugas akhir mahasiswa. Penelitian ini dilakukan dengan tujuan untuk mendeskripsikan tentang tindak plagiarisme di dalam penyusunan tugas akhir mahasiswa. Pendekatan penelitian ini menggunakan pendekatan kualitatif dengan metode yang digunakan yaitu metode deskriptif. Informan penelitian ini adalah mahasiswa di ling-kungan Fakultas Ilmu Pendidikan UPI. Adapun hasil penelitian yang diperoleh adalah minimnya pengetahuan mengenai gaya selingkung penulisan, ketersediaan waktu yang terbatas dalam penyusunan tugas akhir mahasiswa, perkembangan teknologi informasi (khususnya internet yang memudahkan dan membuka peluang berbuat curang, sebagian dosen belum protektif pada isu pla

  6. Plagiarism: A plaque to research

    Directory of Open Access Journals (Sweden)

    S Gowri

    2014-01-01

    Full Text Available The virus of scientific dishonesty has spread across the globe and in all age groups, students as well as faculties. Copying text, figures, tables from other published material without giving due credit are rampant. This kind of act will not only defame the individual, but also puts forth a question mark on the integrity of practitioners in general. The concept of plagiarism is by no means simple or an unambiguous one, yet unless we are clear on this, we cannot begin to make any kind of progress on the practical measures that need to be taken to reduce it. In what follows, we will attempt to explore the confusions and contradictions in the way the term is currently used, and an attempt is made to relocate its meaning such that at least some information and knowledge can be imbibed.

  7. Fraudulent Practices: Academic Misrepresentations of Plagiarism in the Name of Good Pedagogy

    Science.gov (United States)

    Anson, Chris M.

    2011-01-01

    This article describes analyses of three contexts (civic, business, and military) in which understandings of intellectual property differ from those taught in the schools. In each of these contexts, it is possible to document specific examples of unattributed material that would be considered to violate most academic plagiarism policies. Yet in…

  8. Distance Education and Plagiarism Prevention at the University of South Carolina Upstate

    Science.gov (United States)

    Kirsch, Breanne A.; Bradley, Lola

    2012-01-01

    At the University of South Carolina Upstate, two librarians created a series of workshops to proactively prevent plagiarism. To reach distance education students, online workshops were developed in Blackboard including basic and advanced workshops for lower and upper-level courses. The workshops are intended to introduce students to the concepts…

  9. Strategies to promote a climate of academic integrity and minimize student cheating and plagiarism.

    Science.gov (United States)

    Scanlan, Craig L

    2006-01-01

    Student academic misconduct is a growing problem for colleges and universities, including those responsible for preparing health professionals. Although the implementation of honor codes has had a positive impact on this problem, further reduction in student cheating and plagiarism can be achieved only via a comprehensive strategy that promotes an institutional culture of academic integrity. Such a strategy must combine efforts both to deter and detect academic misconduct, along with fair but rigorous application of sanctions against such behaviors. Methods useful in preventing or deterring dishonest behaviors among students include early integrity training complemented with course-level reinforcement, faculty role-modeling, and the application of selected testing/assignment preventive strategies, including honor pledges and honesty declarations. Giving students more responsibility for oversight of academic integrity also may help address this problem and better promote the culture needed to uphold its principles. Successful enforcement requires that academic administration provide strong and visible support for upholding academic integrity standards, including the provision of a clear and fair process and the consistent application of appropriate sanctions against those whose conduct is found to violate these standards.

  10. Verification test calculations for the Source Term Code Package

    International Nuclear Information System (INIS)

    Denning, R.S.; Wooton, R.O.; Alexander, C.A.; Curtis, L.A.; Cybulskis, P.; Gieseke, J.A.; Jordan, H.; Lee, K.W.; Nicolosi, S.L.

    1986-07-01

    The purpose of this report is to demonstrate the reasonableness of the Source Term Code Package (STCP) results. Hand calculations have been performed spanning a wide variety of phenomena within the context of a single accident sequence, a loss of all ac power with late containment failure, in the Peach Bottom (BWR) plant, and compared with STCP results. The report identifies some of the limitations of the hand calculation effort. The processes involved in a core meltdown accident are complex and coupled. Hand calculations by their nature must deal with gross simplifications of these processes. Their greatest strength is as an indicator that a computer code contains an error, for example that it doesn't satisfy basic conservation laws, rather than in showing the analysis accurately represents reality. Hand calculations are an important element of verification but they do not satisfy the need for code validation. The code validation program for the STCP is a separate effort. In general the hand calculation results show that models used in the STCP codes (e.g., MARCH, TRAP-MELT, VANESA) obey basic conservation laws and produce reasonable results. The degree of agreement and significance of the comparisons differ among the models evaluated. 20 figs., 26 tabs

  11. Imaging x-ray sources at a finite distance in coded-mask instruments

    International Nuclear Information System (INIS)

    Donnarumma, Immacolata; Pacciani, Luigi; Lapshov, Igor; Evangelista, Yuri

    2008-01-01

    We present a method for the correction of beam divergence in finite distance sources imaging through coded-mask instruments. We discuss the defocusing artifacts induced by the finite distance showing two different approaches to remove such spurious effects. We applied our method to one-dimensional (1D) coded-mask systems, although it is also applicable in two-dimensional systems. We provide a detailed mathematical description of the adopted method and of the systematics introduced in the reconstructed image (e.g., the fraction of source flux collected in the reconstructed peak counts). The accuracy of this method was tested by simulating pointlike and extended sources at a finite distance with the instrumental setup of the SuperAGILE experiment, the 1D coded-mask x-ray imager onboard the AGILE (Astro-rivelatore Gamma a Immagini Leggero) mission. We obtained reconstructed images of good quality and high source location accuracy. Finally we show the results obtained by applying this method to real data collected during the calibration campaign of SuperAGILE. Our method was demonstrated to be a powerful tool to investigate the imaging response of the experiment, particularly the absorption due to the materials intercepting the line of sight of the instrument and the conversion between detector pixel and sky direction

  12. Authorship, plagiarism and conflict of interest: views and practices from low/middle-income country health researchers.

    Science.gov (United States)

    Rohwer, Anke; Young, Taryn; Wager, Elizabeth; Garner, Paul

    2017-11-22

    To document low/middle-income country (LMIC) health researchers' views about authorship, redundant publication, plagiarism and conflicts of interest and how common poor practice was in their institutions. We developed a questionnaire based on scenarios about authorship, redundant publication, plagiarism and conflicts of interest. We asked participants whether the described practices were acceptable and whether these behaviours were common at their institutions. We conducted in-depth interviews with respondents who agreed to be interviewed. We invited 607 corresponding authors of Cochrane reviews working in LMICs. From the 583 emails delivered, we obtained 199 responses (34%). We carried out in-depth interviews with 15 respondents. Seventy-seven per cent reported that guest authorship occurred at their institution, 60% reported text recycling. For plagiarism, 12% of respondents reported that this occurred 'occasionally', and 24% 'rarely'. Forty per cent indicated that their colleagues had not declared conflicts of interest in the past. Respondents generally recognised poor practice in scenarios but reported that they occurred at their institutions. Themes identified from in-depth interviews were (1) authorship rules are simple in theory, but not consistently applied; (2) academic status and power underpin behaviours; (3) institutions and culture fuel bad practices and (4) researchers are uncertain about what conflict of interests means and how this may influence research. LMIC researchers report that guest authorship is widely accepted and common. While respondents report that plagiarism and undeclared conflicts of interest are unacceptable in practice, they appear common. Determinants of poor practice relate to academic status and power, fuelled by institutional norms and culture. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. SOURCES-3A: A code for calculating (α, n), spontaneous fission, and delayed neutron sources and spectra

    International Nuclear Information System (INIS)

    Perry, R.T.; Wilson, W.B.; Charlton, W.S.

    1998-04-01

    In many systems, it is imperative to have accurate knowledge of all significant sources of neutrons due to the decay of radionuclides. These sources can include neutrons resulting from the spontaneous fission of actinides, the interaction of actinide decay α-particles in (α,n) reactions with low- or medium-Z nuclides, and/or delayed neutrons from the fission products of actinides. Numerous systems exist in which these neutron sources could be important. These include, but are not limited to, clean and spent nuclear fuel (UO 2 , ThO 2 , MOX, etc.), enrichment plant operations (UF 6 , PuF 4 , etc.), waste tank studies, waste products in borosilicate glass or glass-ceramic mixtures, and weapons-grade plutonium in storage containers. SOURCES-3A is a computer code that determines neutron production rates and spectra from (α,n) reactions, spontaneous fission, and delayed neutron emission due to the decay of radionuclides in homogeneous media (i.e., a mixture of α-emitting source material and low-Z target material) and in interface problems (i.e., a slab of α-emitting source material in contact with a slab of low-Z target material). The code is also capable of calculating the neutron production rates due to (α,n) reactions induced by a monoenergetic beam of α-particles incident on a slab of target material. Spontaneous fission spectra are calculated with evaluated half-life, spontaneous fission branching, and Watt spectrum parameters for 43 actinides. The (α,n) spectra are calculated using an assumed isotropic angular distribution in the center-of-mass system with a library of 89 nuclide decay α-particle spectra, 24 sets of measured and/or evaluated (α,n) cross sections and product nuclide level branching fractions, and functional α-particle stopping cross sections for Z < 106. The delayed neutron spectra are taken from an evaluated library of 105 precursors. The code outputs the magnitude and spectra of the resultant neutron source. It also provides an

  14. Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

    Directory of Open Access Journals (Sweden)

    Valenzise G

    2009-01-01

    Full Text Available In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

  15. Beyond the Business Model: Incentives for Organizations to Publish Software Source Code

    Science.gov (United States)

    Lindman, Juho; Juutilainen, Juha-Pekka; Rossi, Matti

    The software stack opened under Open Source Software (OSS) licenses is growing rapidly. Commercial actors have released considerable amounts of previously proprietary source code. These actions beg the question why companies choose a strategy based on giving away software assets? Research on outbound OSS approach has tried to answer this question with the concept of the “OSS business model”. When studying the reasons for code release, we have observed that the business model concept is too generic to capture the many incentives organizations have. Conversely, in this paper we investigate empirically what the companies’ incentives are by means of an exploratory case study of three organizations in different stages of their code release. Our results indicate that the companies aim to promote standardization, obtain development resources, gain cost savings, improve the quality of software, increase the trustworthiness of software, or steer OSS communities. We conclude that future research on outbound OSS could benefit from focusing on the heterogeneous incentives for code release rather than on revenue models.

  16. Examining Students' Perceptions of Plagiarism: A Cross-Cultural Study at Tertiary Level

    Science.gov (United States)

    Kayaoglu, M. Naci; Erbay, Sakire; Flitner, Cristina; Saltas, Dogan

    2016-01-01

    Plagiarism continues to dominate the academic world as one of its greatest challenges, and the existing literature suggests cross-cultural investigation of this critical issue may help all shareholders who detect, are confronted by and struggle with this issue to address it. Therefore, the present study, drawing upon a cross-cultural investigation…

  17. No one likes a copycat: a cross-cultural investigation of children's response to plagiarism.

    Science.gov (United States)

    Yang, F; Shaw, A; Garduno, E; Olson, K R

    2014-05-01

    Copying other people's ideas is evaluated negatively by American children and adults. The current study investigated the influence of culture on children's evaluations of plagiarism by comparing children from three countries--the United States, Mexico, and China--that differ in terms of their emphasis on the protection of intellectual property and ideas. Children (3- to 6-year-olds) were presented with videos involving two characters drawing pictures and were asked to evaluate the character who drew unique work or the character who copied someone else's drawing. The study showed that 5- and 6-year-olds from all three cultures evaluated copiers negatively compared with unique drawers. These results suggest that children from cultures that place different values on the protection of ideas nevertheless develop similar concerns with plagiarism by 5-year-olds. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. Generating Knowledge and Avoiding Plagiarism: Smart Information Use by High School Students

    Science.gov (United States)

    Williamson, Kirsty; McGregor, Joy

    2011-01-01

    The article reports phase 2 of a two-year study, dubbed the Smart Information Use project, the focus of which was appropriate seeking and use of information by students at various stages of their high school education, along with the avoidance of plagiarism. In four Australian high schools, teacher librarians and classroom teachers developed and…

  19. Construction of Knowledge, Attitude and Practice Questionnaire for Assessing Plagiarism

    OpenAIRE

    M Mirfakhraei; Z Cheraghi; A Doosti Irani; P Cheraghi; J Poorolajal

    2012-01-01

    Background This study was conducted to develop a questionnaire in order to evaluate knowledge, attitude and practice (KAP) of the faculty members and students toward plagiarism. Methods: A KAP study was conducted from June to October 2011 enrolling 390 volunteers anonymously (response rate 96%). The questionnaire included the following four parts: (a) general characteristics like gender, academic degree and education level; (b) nine questions regarding knowledge (Min=0, Max=9); (c) nine quest...

  20. Eu-NORSEWInD - Assessment of Viability of Open Source CFD Code for the Wind Industry

    DEFF Research Database (Denmark)

    Stickland, Matt; Scanlon, Tom; Fabre, Sylvie

    2009-01-01

    Part of the overall NORSEWInD project is the use of LiDAR remote sensing (RS) systems mounted on offshore platforms to measure wind velocity profiles at a number of locations offshore. The data acquired from the offshore RS measurements will be fed into a large and novel wind speed dataset suitab...... between the results of simulations created by the commercial code FLUENT and the open source code OpenFOAM. An assessment of the ease with which the open source code can be used is also included....

  1. Ethics in writing: Learning to stay away from plagiarism and scientific misconduct

    Science.gov (United States)

    Sharma, Bharat Bhushan; Singh, Virendra

    2011-01-01

    Fraudulent data and plagiarized text may corrupt scientific medical literature and ultimately harm patients. By prescribing erroneous treatment to an individual, only single patient is affected; but by presenting incorrect data or transcripts, the whole scientific medical universe is affected. Although both scenarios are highly undesirable, one can assume the magnitude of the effect of latter. Writers of scientific medical literature have been found to be involved in plagiarism and other publication misconducts from time to time irrespective of social, economic and geographic structure. The reason of such behavior is not usually obvious. Easy availability of personal computers has led to widespread dissemination of medical literature. As a result, young scientists are now publishing their research more frequently and efficiently. At the same time, this has increased the tendency to submit hurriedly prepared, poorly drafted and even illegitimate publications. Use of some amount of copy–paste followed by modifications during preparation of a manuscript seems to be common. Therefore, the researchers, especially postgraduate students, should be educated continuously about ethical medical writing. PMID:21712931

  2. CITATION PRACTICES AND ACADEMIC PLAGIARISM IN THE TEXTUAL ELABORATION OF UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Rubén Comas Forgas

    2011-04-01

    Full Text Available Locate, evaluate, manage and communicate information in writing academic essays have become basic skills that university students should possess. This article presents the results of a descriptive study developed by survey with a sample of 1.025 under-graduate students at the University of the Balearic Islands on the prevalence in the practice of citation and plagiarism when preparing essays. It should be highlighted from the results obtained, on the one hand, the fact that much of the students or directly do not quote resources used in the preparation of their work or do so sporadically or infrequently. Concerning the commission of plagiarism, the percentage of students who admitted carrying out this type of practice is certainly high. Based on these data, as well as those of other studies with similar characteristics, the authors propose, first, the need for increased research efforts to assess and understand the causes of the situation described and, secondly, advocate for the provision and implementation of training initiatives to improve the situation described.

  3. Health physics source document for codes of practice

    International Nuclear Information System (INIS)

    Pearson, G.W.; Meggitt, G.C.

    1989-05-01

    Personnel preparing codes of practice often require basic Health Physics information or advice relating to radiological protection problems and this document is written primarily to supply such information. Certain technical terms used in the text are explained in the extensive glossary. Due to the pace of change in the field of radiological protection it is difficult to produce an up-to-date document. This document was compiled during 1988 however, and therefore contains the principle changes brought about by the introduction of the Ionising Radiations Regulations (1985). The paper covers the nature of ionising radiation, its biological effects and the principles of control. It is hoped that the document will provide a useful source of information for both codes of practice and wider areas and stimulate readers to study radiological protection issues in greater depth. (author)

  4. Students' Source Misuse in Language Classrooms: Sharing Experiences

    Science.gov (United States)

    Fazel, Ismaeil; Kowkabi, Nasrin

    2013-01-01

    In this article we first provide a brief discussion of what is generally referred to as "student plagiarism," which we prefer to call "source misuse" or "inappropriate textual borrowing," and then provide some of the factors that may contribute to this problem in language classes. Moreover, we provide our views and…

  5. Cultivating Undergraduates' Plagiarism Avoidance Knowledge and Skills with an Online Tutorial System

    Science.gov (United States)

    Liu, Gi-Zen; Lu, Hui-Ching; Lin, Vivien; Hsu, Wei-Chen

    2018-01-01

    With the increased use of digital materials, undergraduate writers in English as a foreign language (EFL) contexts have become more susceptible to plagiarism. In this study, the researchers designed a blended English writing course with an online writing tutorial system entitled "DWright." The study examined the effectiveness of the…

  6. Teaching Note--Evaluation of an Avoiding Plagiarism Workshop for Social Work Students

    Science.gov (United States)

    Fenster, Judy

    2016-01-01

    A 1-hour workshop on how to avoid plagiarizing when writing academic papers was developed and delivered at an orientation session for BSW and MSW students at a university in the northeast United States. Six social work instructors led the workshops at the university's main campus and two extension centers. Before and after the workshop, students…

  7. Reducing the Prevalence of Plagiarism: A Model for Staff, Students and Universities

    Science.gov (United States)

    Choo, Teh Eng (Elaine); Paull, Megan

    2013-01-01

    The incidence of plagiarism, according to the literature, is increasing. But why do students plagiarise and why the increase? Is it due to laziness, opportunity, ignorance, fear or ambivalence? Or do they know that there is little chance of any significant penalty? The literature suggests that all of these apply. Given this, are universities and,…

  8. Low complexity source and channel coding for mm-wave hybrid fiber-wireless links

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Vegas Olmos, Juan José; Pang, Xiaodan

    2014-01-01

    We report on the performance of channel and source coding applied for an experimentally realized hybrid fiber-wireless W-band link. Error control coding performance is presented for a wireless propagation distance of 3 m and 20 km fiber transmission. We report on peak signal-to-noise ratio perfor...

  9. Fine-Grained Energy Modeling for the Source Code of a Mobile Application

    DEFF Research Database (Denmark)

    Li, Xueliang; Gallagher, John Patrick

    2016-01-01

    The goal of an energy model for source code is to lay a foundation for the application of energy-aware programming techniques. State of the art solutions are based on source-line energy information. In this paper, we present an approach to constructing a fine-grained energy model which is able...

  10. Engaging Sources through Reading-Writing Connections across the Disciplines

    Science.gov (United States)

    Carillo, Ellen C.

    2016-01-01

    This essay argues that what might otherwise be considered "plagiarism" in student writing is a symptom of the difficulties students encounter in their reading and writing, moments in which students' inabilities to critically assess, read, and respond to sources through the act of writing come to the surface. Expanding the context within…

  11. A plug-in to Eclipse for VHDL source codes: functionalities

    Science.gov (United States)

    Niton, B.; Poźniak, K. T.; Romaniuk, R. S.

    The paper presents an original application, written by authors, which supports writing and edition of source codes in VHDL language. It is a step towards fully automatic, augmented code writing for photonic and electronic systems, also systems based on FPGA and/or DSP processors. An implementation is described, based on VEditor. VEditor is a free license program. Thus, the work presented in this paper supplements and extends this free license. The introduction characterizes shortly available tools on the market which serve for aiding the design processes of electronic systems in VHDL. Particular attention was put on plug-ins to the Eclipse environment and Emacs program. There are presented detailed properties of the written plug-in such as: programming extension conception, and the results of the activities of formatter, re-factorizer, code hider, and other new additions to the VEditor program.

  12. Rascal: A domain specific language for source code analysis and manipulation

    NARCIS (Netherlands)

    P. Klint (Paul); T. van der Storm (Tijs); J.J. Vinju (Jurgen); A. Walenstein; S. Schuppe

    2009-01-01

    htmlabstractMany automated software engineering tools require tight integration of techniques for source code analysis and manipulation. State-of-the-art tools exist for both, but the domains have remained notoriously separate because different computational paradigms fit each domain best. This

  13. RASCAL : a domain specific language for source code analysis and manipulationa

    NARCIS (Netherlands)

    Klint, P.; Storm, van der T.; Vinju, J.J.

    2009-01-01

    Many automated software engineering tools require tight integration of techniques for source code analysis and manipulation. State-of-the-art tools exist for both, but the domains have remained notoriously separate because different computational paradigms fit each domain best. This impedance

  14. D-DSC: Decoding Delay-based Distributed Source Coding for Internet of Sensing Things.

    Science.gov (United States)

    Aktas, Metin; Kuscu, Murat; Dinc, Ergin; Akan, Ozgur B

    2018-01-01

    Spatial correlation between densely deployed sensor nodes in a wireless sensor network (WSN) can be exploited to reduce the power consumption through a proper source coding mechanism such as distributed source coding (DSC). In this paper, we propose the Decoding Delay-based Distributed Source Coding (D-DSC) to improve the energy efficiency of the classical DSC by employing the decoding delay concept which enables the use of the maximum correlated portion of sensor samples during the event estimation. In D-DSC, network is partitioned into clusters, where the clusterheads communicate their uncompressed samples carrying the side information, and the cluster members send their compressed samples. Sink performs joint decoding of the compressed and uncompressed samples and then reconstructs the event signal using the decoded sensor readings. Based on the observed degree of the correlation among sensor samples, the sink dynamically updates and broadcasts the varying compression rates back to the sensor nodes. Simulation results for the performance evaluation reveal that D-DSC can achieve reliable and energy-efficient event communication and estimation for practical signal detection/estimation applications having massive number of sensors towards the realization of Internet of Sensing Things (IoST).

  15. Documentation for grants equal to tax model: Volume 3, Source code

    International Nuclear Information System (INIS)

    Boryczka, M.K.

    1986-01-01

    The GETT model is capable of forecasting the amount of tax liability associated with all property owned and all activities undertaken by the US Department of Energy (DOE) in site characterization and repository development. The GETT program is a user-friendly, menu-driven model developed using dBASE III/trademark/, a relational data base management system. The data base for GETT consists primarily of eight separate dBASE III/trademark/ files corresponding to each of the eight taxes (real property, personal property, corporate income, franchise, sales, use, severance, and excise) levied by State and local jurisdictions on business property and activity. Additional smaller files help to control model inputs and reporting options. Volume 3 of the GETT model documentation is the source code. The code is arranged primarily by the eight tax types. Other code files include those for JURISDICTION, SIMULATION, VALIDATION, TAXES, CHANGES, REPORTS, GILOT, and GETT. The code has been verified through hand calculations

  16. RETRANS - A tool to verify the functional equivalence of automatically generated source code with its specification

    International Nuclear Information System (INIS)

    Miedl, H.

    1998-01-01

    Following the competent technical standards (e.g. IEC 880) it is necessary to verify each step in the development process of safety critical software. This holds also for the verification of automatically generated source code. To avoid human errors during this verification step and to limit the cost effort a tool should be used which is developed independently from the development of the code generator. For this purpose ISTec has developed the tool RETRANS which demonstrates the functional equivalence of automatically generated source code with its underlying specification. (author)

  17. Internet Plagiarism in Higher Education: Tendencies, Triggering Factors and Reasons among Teacher Candidates

    Science.gov (United States)

    Eret, Esra; Ok, Ahmet

    2014-01-01

    While plagiarism has been a growing problem in higher education for a long time, the use of the Internet has made this increasing problem more unmanageable. In many countries, this problem has become a matter of discussion, and higher education institutions feel obliged to review their policies on academic dishonesty. As part of these efforts, the…

  18. A Source Term Calculation for the APR1400 NSSS Auxiliary System Components Using the Modified SHIELD Code

    International Nuclear Information System (INIS)

    Park, Hong Sik; Kim, Min; Park, Seong Chan; Seo, Jong Tae; Kim, Eun Kee

    2005-01-01

    The SHIELD code has been used to calculate the source terms of NSSS Auxiliary System (comprising CVCS, SIS, and SCS) components of the OPR1000. Because the code had been developed based upon the SYSTEM80 design and the APR1400 NSSS Auxiliary System design is considerably changed from that of SYSTEM80 or OPR1000, the SHIELD code cannot be used directly for APR1400 radiation design. Thus the hand-calculation is needed for the portion of design changes using the results of the SHIELD code calculation. In this study, the SHIELD code is modified to incorporate the APR1400 design changes and the source term calculation is performed for the APR1400 NSSS Auxiliary System components

  19. Comparison of TG-43 dosimetric parameters of brachytherapy sources obtained by three different versions of MCNP codes.

    Science.gov (United States)

    Zaker, Neda; Zehtabian, Mehdi; Sina, Sedigheh; Koontz, Craig; Meigooni, Ali S

    2016-03-08

    Monte Carlo simulations are widely used for calculation of the dosimetric parameters of brachytherapy sources. MCNP4C2, MCNP5, MCNPX, EGS4, EGSnrc, PTRAN, and GEANT4 are among the most commonly used codes in this field. Each of these codes utilizes a cross-sectional library for the purpose of simulating different elements and materials with complex chemical compositions. The accuracies of the final outcomes of these simulations are very sensitive to the accuracies of the cross-sectional libraries. Several investigators have shown that inaccuracies of some of the cross section files have led to errors in 125I and 103Pd parameters. The purpose of this study is to compare the dosimetric parameters of sample brachytherapy sources, calculated with three different versions of the MCNP code - MCNP4C, MCNP5, and MCNPX. In these simulations for each source type, the source and phantom geometries, as well as the number of the photons, were kept identical, thus eliminating the possible uncertainties. The results of these investigations indicate that for low-energy sources such as 125I and 103Pd there are discrepancies in gL(r) values. Discrepancies up to 21.7% and 28% are observed between MCNP4C and other codes at a distance of 6 cm for 103Pd and 10 cm for 125I from the source, respectively. However, for higher energy sources, the discrepancies in gL(r) values are less than 1.1% for 192Ir and less than 1.2% for 137Cs between the three codes.

  20. The Tangled Web: Investigating Academics' Views of Plagiarism at the University of Cape Town

    Science.gov (United States)

    de Jager, Karin; Brown, Cheryl

    2010-01-01

    This article considers the problematic question of student plagiarism, its causes and manifestations, and how it is addressed in academic environments. A literature survey was conducted to establish how higher education institutions approach these issues, and a twofold investigation was conducted at the University of Cape Town. Data was gathered…