Notion of plagiarism in scholarship, facets of plagiarism, legalities concerning plagiarism, some cases, tools and techniques for detecting plagiarism, educating which calls for librarians' role, issues, means and ways to avoid plagiarism.
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
Plagiarism
1. Colloquium
on
Plagiarism: A Study
Lead byLead by
Alovi Zhimomi
&
Team Members
Sagar Gajbe Dipanwita Das Gurrala Srinivas
Shiva Shankar Mahato Kanu Chakraborty Vandana
Documentation Research and Training Center(DRTC)
Indian Statistical Institute,
Bangalore Center.
2015-2017
2. Contents
Speaker Topic
Alovi Zhimomi Introduction to Plagiarism.
Sagar Gajbe Types of Plagiarism with examples.
Dipanwita Das Cases of Plagiarism.
Srinivas Gurrala Plagiarism detection tools (Commercial
Software).
Shiva Shankar Mahato Plagiarism detection tools (Open Source &
Free Software).
Kanu Chakraborty Plagiarism and the role of librarians.
Vandana Summary and conclusion
3. What is Plagiarism?
● There is no standard or agreed upon definition of plagiarism
● According to Merriam-Webster online dictionary plagiarism is an “act
of using another person's words or ideas without giving credit to that
person”.[1]
● Joy and Luck (1999) define plagiarism as “unacknowledged copying
of documents or programs that can occur in many contexts: in
industry a company may seek competitive advantage; in academia
academics may seek to publish their research in advance of their
colleagues”.[2]
Source: [1] http://www.merriam-webster.com/
[2] Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming Assignments". IEEE Transactions on
Education, 42(2). pp. 129-133. ISSN 0018-9359.
4. Origin
● The word plagiarism is derived from the latin word “plagiare”, which
means to kidnap or abduct.
● Roman poet Martial (40 AD to somewhere between 102 and 104 AD)
First used the latin word “plagiarus” to describe a seemingly unnamed
literary thief in his poems. [3][4]
source: [3] www.plagiarism.com
[4] wikipedia.org
5. Origin
● "Plagiary", a derivative of "plagiarus" was introduced into English in
1601 by dramatist Ben Jonson to describe someone guilty of literary
theft.
● The derived form plagiarism was introduced into English around
1620.[3][4]
6. Academia
In academic contexts plagiarism tends to be interpreted as the
misappropriation of the intellectual property of one individual by another.
[5]
According to Bela Gipp, academic plagiarism encompasses:"The use of
ideas, concepts, words, or structures without appropriately
acknowledging the source to benefit in a setting where originality is
expected."[6]
Source :
[5] Celia Thompson. Discourses on plagiarism:To discipline and punish or to teach and learn?
[6] Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting Disguised and Cross-language
Plagiarism using Citation Pattern Analysis
7. Elements characteristic of plagiarism.
According to T. Fishman[7], plagiarism occurs when someone:
● Uses words, ideas, or work products
● Attributable to another identifiable person or source
● Without attributing the work to the source from which it was
obtained
● In a situation in which there is a legitimate expectation of original
authorship
● In order to obtain some benefit, credit, or gain which need not be
monetary.
Source: [7] Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not good enough: toward a
standard definition of plagiarism that transcends theft, fraud, and copyright"
8. What is considered as plagiarism?
● Taking quotations or passages directly without citation.
● Taking ideas without giving credit
● Changing words but copying the sentence structure of a source
without giving credit
● Failing to put a quotation in quotation marks
● Giving incorrect information about the source of information.
● Copying so many words or ideas that it makes up the majority of
work, whether credit is given or not.
● Taking work from previous work without reference to that work.[3][8][9]
Source: [3] www.plagiarismtoday.com
[8] http://www.plagiarism.org
[9] Council of Writing Program Administrators. http://wpacouncil.org
10. Why people plagiarise?
● Lack of Writing Skills.
● Misconception/ ignorance of plagiarism.
● Lack of strict academic discipline.
● Lack of research methods skills.
● Lack of referencing/citation skills.
● Time factor.
● Easily availability of reading materials/text on the internet.
● Lack of knowledge or subject matter.
● Lack of patience.
● Cut-and-Paste culture in research and academic community.
● Sheer lethargy.[10][11][12][13][14][15]
Source: [13] Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University Students’ Perspectives
[14] http://www.buzzle.com/articles/different-types-of-plagiarism.html
[15] Plagiarism Detection Service: Its Benefits and Challenges for Academicians and Researchers
12. Types of plagiarism
➢ Unintentional Plagiarism
➢ Intentional Plagiarism
MLA handbook for writers of research papers. (7th ed.). The Modern Language
Association of America. New York: 2009. Print.
13. Types of plagiarism
➢ Plagiarism of Words
➢ Plagiarism of Structure
➢ Plagiarism of Ideas
➢ Plagiarism of Authorship
➢ Plagiarism of Self
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
15. Citations
● Original Source
Corporate mud-slinging tends to be
concentrated in a handful of highly
competitive sectors: utilities, telecoms
(especially the broadband market), and
airlines. These sectors are united by being
highly price-competitive and inclined toward
ads that rely heavily on 'knocking copy' -
content that brags about the brand's
superiority over a rival on the basis of
specific criteria.
Source: Murphy, Claire. "The Art of
Complaining." Marketing 27 Sept. 2006: 18.
● Correct Use
One way corporations try to get ahead
of the competition is by complaining
about their rivals’ advertisements.
Highly competitive sectors, such as
utilities, telecoms, and airlines, have
the highest incidence of this kind of
"corporate mud-slinging" (Murphy 18).
Murphy, Claire. “The Art of
Complaining." Marketing 27 Sept.
2006: 18. Web. 24 Oct. 2012.
source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
16. Quotation
● Original Text
Cases where the alleged abusers are affluent
create specific obstacles for their victims,
experts say. The batterer — typically a man,
though not always — is often someone
well-known in the community. He has the
financial means to hire pricey attorneys and
private investigators. And his lawyers are
well-versed in the intricacies of the judicial
system and can easily win continuances and
drag cases on for years.
Source: Treadway, Joan. “Violence Hits
Rich Women Hard Too.” Times-Picayune
19 Aug. 2002: 1.
● Incorrect use
Affluent women who are victims of
domestic violence face particular difficulties
when seeking legal recourse against their
attackers. The batterer can afford to hire
expensive lawyers who are well-versed in
the intricacies of the judicial system.
● Correct use
As Treadway (2002) points out, the batterer
can afford to hire expensive lawyers who are
“well-versed in the intricacies of the judicial
system.”
Treadway, J. (2002, August 19). Violence
hits rich women hard too. Times-Picayune,
p. 1.
source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
17. Summary
● Condensed version of authors keypoints.
● Can extend upto a few sentences or even longer
based on the complexity of the authors idea to
be conveyed.
● When summarizing, you must cite the source.
Source : http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page350378
18. Summarizing
● Original Text
In order to communicate effectively
with other people, one must have a
reasonably accurate idea of what they
do and do not know that is pertinent to
the communication. Treating people as
though they have knowledge that they
do not have can result in
miscommunication and perhaps
embarrassment. On the other hand, a
fundamental rule of conversation, at
least according to a Gricean view, is
that one generally does not convey to
others information that one can assume
they already have.
● Correct use
Nickerson (1999) argues that clear
communication hinges upon what
an audience does and does not
know. It is crucial to assume the
audience has neither too much nor
too little knowledge of the subject,
or the communication may be
inhibited by either confusion or
offense (p. 737).
Source : http://www.lib.usm.edu/legacy/plag/paraphrasing.php
19. Paraphrasing
● Original: Ask not what your country can do for you. But ask
what you can do for your country.
● Incorrect Paraphrase: Don't ask what your nation can give
you; instead, consider what you are willing to do for your
country.
● Correct Paraphrase: John Kennedy's introduction stresses the
importance of citizens becoming civically engaged in their
country's affairs.
source : http://slideplayer.com/slide/4677704/
20. Plagiarism of Words
● Direct plagiarism is the word-for-word transcription of a section of
someone else’s work without attribution.
● Clone: submitting another's work, word-for-word, as one's own.
● CTRL-C: Contains significant portions of text from a single source
without alterations.
● Photocopy, where large parts of the content are copied from a given
text, without making any changes.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
22. Plagiarism of Structure
● Mosaic Plagiarism. Copying phrases from a source without using
citation.
● Partial Plagiarism: finds synonyms for the author’s language while
keeping to the same general structure and meaning of the original.
● Minimalistic Plagiarism: changes the sentence construction, use
synonymous vocabulary and changes the order.
● Sometimes called “patch writing”.
● Find – Replace or Poor Disguise Changing key words and phrases but
retaining the essential content of the source
● Remix: Paraphrases from multiple sources, made to fit together
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
23. Mosaic
Plagiarism:Example
● Originial Source
● Contrast the condition into which all
these friendly Indians are suddenly
plunged now, with their condition only
two years previous: martial law now in
force on all their reservations;
themselves in danger of starvation, and
constantly exposed to the influence of
emissaries from their friends and
relations, urging them to join in
fighting this treacherous government
that had kept faith with nobody--
neither with friend nor with foe.
● Incorrect
● Only two years later, all these friendly
Sioux were suddenly plunged into new
conditions, including starvation,
martial law on all their reservations,
and constant urging by their friends
and relations to join in warfare against
the treacherous government that had
kept faith with neither friend nor foe.
source : http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html
24. Plagiarism of Self
● As Roig (2006) suggests, self-plagiarism occurs “when authors reuse
their own previously written work or data in a ‘new’ written product
without letting the reader know that this material has appeared
elsewhere” (pg. 16). Roig identifies a few types of self-plagiarism:
● Republishing the same paper that is published elsewhere without
notifying the reader nor publisher of the journal.
● Publishing a significant study as smaller studies to increase the number
of publications rather than publishing one large study.
● Reusing portions of a previously written (published or unpublished text.)
Ithenticate terminology: Duplication, Repetitive Research
http://www.ithenticate.com/resources/infographics/types-of-plagiarism-research
25. Plagiarism of Ideas
Authors often write about original ideas they have had or original
discoveries they have made. Repeating original ideas without revealing
the source is idea plagiarism.
● Partial Plagiarism: Rampant use of paraphrasing, represents the same idea
in a different form.
● Minimalistic Plagiarism: Copying ideas, opinions, thoughts and concepts
of another author, in such a way that his work does not seem like it has
been plagiarized.
● Mashup or Potluck Paper: Mixes copied material from multiple sources.
● Hybrid: Combines perfectly cited sources with copied passages without
citation.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
26. Example of Idea
Plagiarism:
Original Source:
● Excerpted from: Team Moon: How 400,000 People Landed Apollo 11 on the Moon
by Catherine Thimmesh. New York: Houghton Mifflin Co., 2006, pg. 5
● When those millions of people tuned in hoping to witness the moonwalk, one thing they
wouldn’t see (or at best might catch a glimpse of) were the nonastronauts, those beyond
the glare of the limelight. The regular folks whose efforts made an impossible mission
possible in the first place. All the people behind the scenes whose ideas and expertise,
imagination and inventiveness, dedication and focus, labor and skill, combined in one
great endeavor—on the grandest of all scales—and conspired to put man on the moon.
Yes, three heroic men went to the moon; but it was a team of four hundred thousand
people that put them there. They were the flight directors, controllers, planners, and
engineers; the rocket designers and builders and technicians; the managers, supervisors,
quality control and safety inspectors; the programmers, electricians, welders,
seamstresses, gluers, painters, doctors, geologists, scientists, trainers, and navigators.
Apollo 11 is their story too.
source : http://nhs.gilesk12.org/library/pdf/idea.pdf
27. Idea Plagiarism (Contd..)
This is Idea Plagiarism
When most people think of
Apollo 11, the first time the
United States sent a man to the
moon, most think of the three
astronauts on the mission. But,
in fact, there were 400,000
people who helped man walk on
the moon---scientists, builders,
engineers, doctors etc.
When most people think of the
Apollo 11, the first time the United
States sent a man on the moon, most
think of the three astronauts on the
mission. In her book, Team Moon:
How 400,00 People Landed Apollo
11 on the Moon, Catherine
Thimmesh explains how many
people were actually involved in
making the mission a success (p. 5).
This is not
28. Plagiarism of Authorship
● Full plagiarism or 'complete plagiarism': refers to copying somebody
else's original content, word by word, and presenting it as one's own.
● Ghost Writer, are the persons who writes or authors books or papers
for another person and are officially credited to this another person.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
29. Ghostwriter example.
● "Goosebumps" Books :popular
children's horror book series
(Ghostwriter: Various writers)
● "Goosebumps" series that is
authored by R.L Stine is actually
written by various authors. After the
first few were released, they became
so high in demand that the author
came up with the premises and
general outlines of the books before
passing them off to Ghost writers.
Source : http://www.mandatory.com/2013/06/17/10-works-you-didnt-know-were-ghostwritten/4
30. Different Cases of Plagiarism
Dipanwita Das
MS LIS,2nd
Semester
DRTC,ISI
31. Legal aspects:
• An author has the right to sue a plagiarist.[1]
• Some plagiarism may also be deemed a criminal
offense, possibly leading to a prison sentence.[1]
• Penalties vary depending on jurisdiction, the
charges brought, and are determined on a case
by case basis.[2]
• Students who commit plagiarism may be subject
to grade or disciplinary penalties, which vary by
institution.[2]
[1] http://www.ithenticate.com/resources/6-consequences-of-plagiarism
[2] http://definitions.uslegal.com/p/plagiarism/
31
32. CASE STUDIES ON:
Plagiarism By A Student
Plagiarism By Student Programmers
Plagiarism By A Professor
Plagiarism By A Journalist
Plagiarism By Singers
32
34. Anthony Lamberis
• An attorney in Illinois
• Enrolled in classes in an LL.M. Program in Law
at Northwestern University during 1970-71
• In 1978,he submitted a 93-page thesis, of
which 47 pages were “substantially
verbatim” from two sources that he did not
cite.
• Punishment: Expelled from the University[3]
[3] http://www.rbs2.com/plag.pdf
34
36. MIT Incident(1990)
• Course:”Introduction to Computers and Problem
Solving”
• Students were instructed that they can work
together in a group but were not allowed to
collaborate in writing programs
• It was found that large number of students were
involved in stealing programs and duplicating
problem sets
• Punishment: Several Students were suspended
for one semester [4]
[4] http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html
36
38. Mustapha Marrouchi
• An English professor at the University of
Nevada, Las Vegas since 2008
• The UNLV investigation led by Lori Olafson,
found that 23 of 26 works by Marrouchi
showed similarities to other works that were
not cited.[7]
• What happened?
He was fired on 7th December 2014! [8]
[7] http://www.reviewjournal.com/news/education/unlv-fires-professor-accused-serial-plagiarism
[8] http://retractionwatch.com/2014/12/04/unlv-english-professor-fired-plagiarizing-updike-said-zizek/
38
40. Jayson Blair
• In 2003 Jayson Blair was a rising star in
journalism and a reporter for the New York
Times
• It was noticed by an editor at the San Antonio
Express-News that there are similarities
between a column by Blair and an earlier work
by one of their reporters Macarena Hernandez.
40
41. Jayson Blair (ctd.)
• The Times launched an investigation into Blair
and discovered that at least 36 of his 73
articles contained instances of plagiarism,
fabrication or other unethical behavior.
• What happened?
Blair resigned![5]
[5] https://www.plagiarismtoday.com/2012/08/21/5-famous-plagiarists-where-are-they-now/
41
43. Robin Thicke and Pharrell Williams
• The American Singers were found guilty of
copying a Marvin Gaye’s song for their chart-
topping hit “Blurred Lines”, 2013.
• Punishment: As Gaye died on 1984, they were
told to pay Marvin Gaye’s children $7.3 million
for infringing on the copyright of Gaye's 1977
song “Got to Give It Up.”[6]
[6] http://www.ibtimes.com/marvin-gaye-vs-robin-thicke-6-cases-music-plagiarism-lawsuits-after-blurred-lines-got-1845182
43
47. iThenticate
Introduction:
● iThenticate is produced by iParadigms, a company founded by
graduate student instructors at UC Berkeley launched in 2004.
● To ensure the originality of written manuscript for post graduate
students and academic staff/researchers before submitting it
for publication.
Source:http://www.ithenticate.com
48. Salient Feature of
iThenticate
● iThenticate helps editors, authors and researchers prevent
misconduct by comparing manuscripts against its database.
● iThenticate checks Web pages, other content, scholarly
journals, ProQuest (The iThenticate database includes
300,000 theses and dissertations from ProQuest)
● iThenticate support MS Word, Word XML, WordPerfect,
PostScript, PDF, HTML, RTF, HWP, plain text and
OpenOffice (ODT).
Source:http://www.ithenticate.com
49. Contd.....
● After you submit your document once, you may resubmit it
a maximum of five times.
● iThenticate does not store, share or resell uploaded files.
● iThenticate gives you your own personal account so that
you can check for plagiarism privately
● The CrossCheck service offers publishers a way to
compare documents against the largest comparison
database of scientific, technical and medical content in the
world.
Source:http://www.ithenticate.com
50. Limitation of iThenticate
● Cannot exceed 400 pages.
● Files cannot exceed 40MBs.
● Files cannot exceed 2MB of raw text.
● A single file can be up to 25,000 words, which accommodates the
average length of a research paper
● iThenticate offers document to document comparison.
● iThenticate interface currently supports the following languages:
English, Korean, and Japanese.
Source:http://www.ithenticate.com
51. What are the system
requirements?
● Microsoft® Windows® Vista Service pack 1, Windows® 7+,
Mac OS X v10.4.11+
● 3GB of RAM or more
● 1024x768 display or higher
● Broadband internet connection
● Firefox 15+, Chrome 23+, Safari 5+, Internet Explorer 9, 10,
11
● Internet browser set to allow all cookies from ithenticate.com
● Javascript enabled
Source:http://www.ithenticate.com
52.
53. Turnitin
Introduction:
● Turnitin is an Internet-based plagiarism-prevention service
created by iParadigms, LLC, first launched in 1997.
● For instructors to check students' work in a classroom setting.
● Turnitin checks web pages, other content, scholarly journals,
student paper database.
Source:https://wiki.nus.edu.sg
54. Features of Turnitin
● Prevents Plagiarism
● Engages students (high SI engages the students to make
concerted efforts to improve the report)
●
Provides better and faster feedback to students
● Peer review (Teachers can let their student anonymously critique
and evalute each other papers)
Source:www.turnitin.org
55. Contd.......
● Identifies the different words which have been added,
deleted,or substituted
● Does citation verfications
● Instuctors as well as students can upload papers
● Turntin support MS Word, Word XML, WordPerfect,
PostScript, PDF, HTML, RTF, HWP, plain text and MS
PowerPoint.
Source:www.turnitin.org
56. Limitation of Turnitin
●
Turnitin only support 100 pages or less, 20 MB or less.
● Turnitin only instructors to check students' work in a
classroom setting.
● Turnitin only compares with 45+ billion web pages, 337+
million student papers and 130+ million articles from
academic books and publications.
Source:www.turnitin.org
57. Contd......
● Can not identify plagiarism from anon online source
● Has problems with mathematical formulae (latex files)
● Distorts the format of the original documents tables,
graphs and images don't appear.
● Does not differentiate between quoted materials and
orginal writing at times
Source:www.turnitin.org
58.
59. PlagTracker
Introducation:
● Plag Tracker was launched in 2011 by Devellar
● PlagTracker is a web-based tool that scans content for
plagiarism.
● PlagTracker finds any content that has been plagiarized, with a
list of all the sources, from where the text is copied.
● Students can use PlagTracker to check their papers for
plagiarism before they turn them in and receive suggestions on
information to change or advice on what needs to be cited.
Source:www.plagtracker.org
60. Salient Features
● Student:
Detect plagiarism,fix grammar mistakes,and even proofread
your paper before turning it in
● Teachers:
Find problems with your students papers
● Publishers:
Verify that submitted articles and manuscripts are completely
original before publishing them
Source:www.plagtracker.org
61. Contd.....
● Site owners:
Check if your site content is unique
● Simply upload a paper, let PlagTracker scan it for
plagiarism and review the plagiarism report.
● The checker compares the content of the paper to the
content of over 14 billion webpages and 5 million academic
papers to see if any content has been plagiarized.
● PlagTracker only takes a couple of minutes to check a
paper
Source:www.plagtracker.org
62. Limitation of plagtracker
● plagtracker only compares the content of the paper to the
content of over 14 billion webpages and 5 million
academic papers to see if any content has been
plagiarized.
● Side by side comparison Not avialable in the PlagTracker
● The online scanner did not identify the website which
contained material that had been plagiarised.
Source:www.plagtracker.org
63.
64. VeriGuide
Introduction:
● VeriGuide is developed by The Chinese University of Hong
Kong which serves the academic community for similarity
detection
● Promote and uphold academic honesty, integrity, and
quality
● Support similarity text detection in English, Traditional
Chinese, and Simplified Chinese
Source:wikipedia.com
65. Salient Features
● Promote and uphold academic honesty to create a fair
learning environment among students
● Access is available anytime and anywhere
● Covers a large number of popular document formats
● Detailed statistics of similarity and readability are available
for analysis
● Quick and easy comparison of suspected plagiarized
content to the original content
http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
66. Limitations
● Only support similarity text detection in English, Traditional
Chinese, and Simplified Chinese
● At a time we can search 2000 words only
● VeriGuide is only available to Subscribers who have
registered with the University and paid the subscription fee
● VeriGuide serves to support and maintain assignment
database for students and educators.
http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
67.
68. URKUND
● In 2000 Urkund was started by the idea of teachers and
gradually grown with partnership of leading information
providers like DIVA (Digital Scientific Archive), Iustus,
Nationalencyklopedin and ProQuest.
● Urkund is owned and developed by PrioInfo AB
● URKUND compares submitted documents with material
from three central sources: the Internet, publisher material,
and student material.
http://static.urkund.com/manuals/URKUND_Admin_Guide.pd
69. Salient Features
● URKUND does not require any software installation
● No use of complex interfaces and no login to any website
● It is important to differentiate between URKUND's e-mail
based system and other tools,where by the teacher needs to
log in to a website and upload the students' documents for
checking.
● URKUND supports the 12 most common word processing
formats:
DOC. DOCX. SXW. PPT. PPTX. PDF. TXT. RTF. Html. Htm.
WPS. ODT
http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
70. Limitations
● URKUND working with help of web resource
● Has problems with mathematical formulae
● URKUND does not currently support the iWorks format
.pages
● Teachers has to depend on Urkund to create account or
appoint an administrator
● Every document treated as a separate document
(“4,00,000 characters” is one document if 4,00,001
character there it is considered two documents)
http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
73. Plagium :
● Plagium software is developed by a New York
based company named Septet Systems Inc.
● Plagium software is free up to 5000 text
characters, beyond 5000 one has to purchase the
software.
74. Features:
● One can upload the file in pdf, word or text format
in the paid version.
● Report will be generated on the reuse of the text.
● Two editions are available individual as well as
institutional account.
● A unique alert feature is provided which alerts the
user regarding content copying or unauthorized
web sites access.
75. Specialization :
● Quick Search- Displays free result with
plagiarism as soon as the user’s copy-paste
the text, article, journal etc.
● Deep Search- It provides additional tools and
in-depth searching available only on
purchase.
76. Limitations :
● User can ONLY copy-paste up to 5000 text
characters in the box given for a day.
● Report cannot be downloaded or shared in
the free version.
77.
78. PlagScan :
PlagScan a free plagiarism detection tool that focuses
on language patterns in plagiarism detection.
79. Specialization of PlagScan :
● PlagScan uses complex algorithms for checking
and analyzing uploaded document, based on up-
to-date linguistic research.
● Unique signature extracted from the document’s
structure is then compared with PlagScan
database and millions of online documents.
● PlagScan is able to detect most of plagiarism types
either direct copy and paste or word switching.
80. Features of PlagScan :
Database Checking:
● PlagScan has its own database that include millions of documents
like (paper, articles and assignments), and articles over World
Wide Web. So it offers database checking whether locally or other
database over the internet.
Internet checking:
● PlagScan is an online checker so it provides internet checking to
all submitted documents.
Publications Checking:
● PlagScan is mainly used in academic field so it provides checking
most types of submitted publication.
81. Synonym and Sentence Structure Checking:
● PlagScan does not support synonym and sentence structure checking
but provides Integration via application programming interface in the
existing content management system or earning management system
possible.
Supported Languages:
● PlagScan supports all the language that uses the international UTF-8
encoding and all language with Latin or Arabic characters can be
checked for plagiarism.
82. Viper Anti-Plagiarism Scanner
● Viper is the plagiarism checker . It scans
over 10 billion resources, has an easy-to-
use interface and highlights areas of
plagiarism - totally free.
● It works on windows platform only.
83. Features :
● It checks essay against 10 billion sources.
● Scan against essays on personal computer
also.
● Scan against essays published on the Internet
● Easy side-by-side highlighted comparison.
● Free, unlike most other scanners.
84. How it works :
SOURCE:ZahraShafiee1001 http://www.slideshare.net/ZahraShafiee1001/viper-the-anti-pagiarism-scanner
95. Copyscape
● Copyscape was launched in 2004 by Indigo Stream
Technologies, Ltd.,co-founded by Gideon Greenspan
● It is the leading solution on the web for detecting online
plagiarism.
● It lets easily identify sites that have copied own content
without permission, as well as those who are quoting from
the site.
~Copyscape.com
96. Contd.....
● Copyscape uses Google and Yahoo! as search providers, under agreed
terms.
● Copyscape performs post-processing of the search results received from
these providers.
● It can be used for corporate website, online publication, blog, marketing
materials, or any other online content.
● Copyscape is used by content owners to detect cases of "content theft",
in which content is copied without permission from one site to another.
● It is also used by content publishers to detect cases of content fraud, in
which old content is repackaged and sold as new original content.
~Copyscape.com
97. How to use Copyscape?
● Simply enter the URL and Copyscape will instantly scan
the entire Web to check for duplicate content of the page.
● Copyscape shows the top results for the search, and then
we can click on a result to see a word-by-word comparison
with the content on our site.
● In this comparison, colored highlighting is used to show
blocks of text that match the text on our site.
~Copyscape.com
98.
99. CitePlag
● CitePlag is a web-based tool to assist users in
efficiently examining academic documents for
suspicious text and citation similarities, which
may point to potential plagiarism.
● The algorithms used by CitePlag are based on
the Citation-based Plagiarism Detection
concept, a novel approach developed by the
Information Science Group at the University of
Konstanz.
100. Specialization of CitePlag:
● Existing plagiarism detection software only
examines literal text similarity, and thus typically
fails to detect disguised plagiarism forms,
including paraphrases, translations, or idea
plagiarism.
● CbPD addresses this shortcoming by additionally
analyzing the citation placement in the full-text of
documents to form a language-independent
semantic “fingerprint” of document similarity.
Sources :http://www.isg.uni-konstanz.de/projects/citeplag/
101. CitePlag:
● Identifies plagiarism by analyzing citation
pattern matches between documents to
detect both local and global document
similarities at the semantic level.
● The underlying idea of the system is to
evaluate the citations of academic
documents as language independent
markers to detect plagiarism.
102. Features of CitePlag :
● CitePlag provides a customizable side-by-side visualization 1 of text
and citation similarities to detect potential plagiarism.
● The suspicious document appears on the left and the potential source
document is displayed on the right.
● The browser schematically compares the two documents using the
CbPD algorithm selected 4 and draws connecting lines between
matching citations.
● Document sections highlighted in darker red represent stronger
citation- based document similarities.
105. Limitation of CitePlag :
● Works finely with documents having citations
and lots of them but faces problem when have
a handful of citations.
● It also won’t work well, in cases where citation
overlap is expected, such as cases where
there are a limited number of sources.
● Finally, it also can’t help much in cases of
“verbatim” plagiarism.
Souces :https://www.plagiarismtoday.com/2011/08/08/using-citations-to-detect-
plagiarism/
107. How can Librarians help?
➢ Librarians can play roles as facilitators of research,
instructors, and defenders of intellectual freedom, so it
falls under our auspices to assist in student education
on academic integrity.
➢ Conduct training, workshops, short term courses,
seminar.
➢ Provide disciplined-based instruction.
Source: www.georgialibraries.org/lib
108. Cont...
● Offer faculty and students a tutorial on how to prevent
or avoid plagiarism.
● Offer faculty assistance in planning and designing
plagiarism-proof assignments.
● Guide students of appropriate note-taking and
citations.
● Training of using web based support tools for
preventing and detecting plagiarism.
Source: www.georgialibraries.org/lib
109. Our responsibility
Sec. 2, IFLA code of ethics for librarians and other
information workers, 2012
● Librarians and other information workers offer services to
increase reading skills. They promote information literacy
including the ability to identify, locate, evaluate, organize
and create, use and communicate information. And they
promote the ethical use of information thereby helping to
eliminate plagiarism and other forms of misuse of
information.
Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
110. Our responsibility
PRC BFL Code of Ethics for Librarians, 2006
● 1.2 Librarians shall promote literacy and education of the
public by making the resources and services of the library
known and accessible to its users.
● 1.3 Librarians shall uphold and promote the right to
information as well as abide by the provisions of the
intellectual property law.
Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
111. A Study
● Study conducted by Long Island University, on how to bring
awareness on plagiarism by the stewardship of librarians.
● C. W. Post Campus B. Davis Schwartz Memorial Library for
assistance and leadership in grappling with issues related to
student plagiarism.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
112. Activities of the library
● Customized seminars to faculty of each semester
● Prevention and detection of plagiarism
● Plagiarism Awareness Workshops
● They give classrooms freshman orientation program,
● Incorporating the Library Instruction program
● They conduct an online interactive lesson.
Awareness includes
● Different types of Plagiarism, tools & softwares, Tips to avoid.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
113. Purpose
● The pre-test was designed to ascertain incoming students’
basic understanding of plagiarism.
● The post-test was intended to indicate the usefulness of
the Plagiarism Awareness session conducted by the
librarians.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
114. Table 1:Which of the following English
classes do you attend?
Name of the Event Number in Sample Percentage of
Total
Reading, Writing, and
Interpretation
143143 4444
Unsure 124124 3838
English 1 Composition 5959 1818
Total 326326 100100
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
115. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
116. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
117. Figure 3: Does copying from a book without
crediting the source constitute plagiarism?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
118. Figure 4
Do you know how to cite Internet sources?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
119. Figure 5: Are you aware of the
seriousness of plagiarism?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
120. Suggestion
● What to Do in High School?
● What to Do in College?
● What to Do in Research Organization?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
121. Finding
● This research indicates that early intervention might help
to alleviate plagiarism
● Having the academic librarian work with the faculty to offer
tips and techniques in designing writing exercises using
current informational sources can contribute to the
reduction of plagiarism.
● It also signifies increasing change of students awareness
about plagiarism.
● It will help to promote ethical writing and academic
honesty.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
122. The Expectation
● Librarian is the champion of advocating
and proliferating information literacy and
fluency.
Therefore, a librarian should and will not
plagiarize.
Source://Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
125. Summary
● Plagiarism is a serious breach of academic integrity.
● Types of plagiarism and example.
● Some cases.
● Tools
● Librarianship role
126. Issues and Challenges
1. General
● Lack of understanding the importance of citations and
references.
● Lack of awareness and motivation.
● Skill-level problem.
● Linguistic problem to successfully “integrate sources within
their writing.”
● Detecting cheater is an important issues but the greatest
challenge is to prevent it from doing so.
SOURCE: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
127. Issues and Challenges
● Competiveness
a. Time pressure
b. Hassles
● Lack of adequate awareness about licences associated with
copyright.
2. Tool specific
● Plagiarism on idea level.
● Lots of book are not yet digialized.
Source:Prof. B. Dutta(idea)
http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
128. Shared Language
● Conventional designations:
e.g., physician’s assistant, Librarian, etc.
● Information about well-known figures:
(such as birth and death dates of well-known figures)
Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html
https://writing.wisc.edu/Handbook/QPA_plagiarism.html
129. Shared Language
● Technical terms and phrases of a discipline (Field-specific):
e.g., facts, theories, or methods, reduplication, cognitive domain,
material culture, sexual harassment.
(NOTE: But one must be sure that this information (term or the
phrase) is widely known within that field and is shared by your
readers)
Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html
https://writing.wisc.edu/Handbook/QPA_plagiarism.html
130. Strategies to Avoid Plagiarism
● To promote the student to generate necessary skills required for
critical analysis and innovative thinking.
● By teaching to quote the sources properly.
● By paraphrasing the different sources properly.
● To acknowledge the contributors.
● Way to use the different free and commercial plagiarism detection
software.
Source:http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
131. Strategies to Avoid Plagiarism
● “Read the instructions for authors provided by the journal.”(Hoseninpor, page no. 9)
● Emphasis should be on the total involvement of the students and
generating interest in them.
● To become familiar with licensing associated with the copyright law.
● If doubt about whether or not the concept or fact is common knowledge,
cite it or refer it.
Source: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html
http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
132. Strategies to Avoid Plagiarism
● “Training the trainers.”(Student Plagiarism in an Online World, google book)
● To plan the work one is going to perform.
● Taking note of all the sources one has refered.
● Present author idea should be in focus.
Source:http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html
133. Other Scenarios to Avoid
● Misrepresenting a source should be avoided as it can
create confusion between the source idea and ones own
idea(present creator).
● Ignoring sources found late in the research process.
Source: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355346
136. Reference:
• http://www.merriam-webster.com/
• Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming
Assignments". IEEE Transactions on Education, 42(2). pp. 129-133.
ISSN 0018-9359.
• www.plagiarismtoday.com
• wikipedia.org
• Celia Thompson. Discourses on plagiarism:To discipline and punish or to
teach and learn?
• Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting
Disguised and Cross-language Plagiarism using Citation Pattern Analysis.
• Council of Writing Program Administrators. http://wpacouncil.org
137. • Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not
good enough: toward a standard definition of plagiarism that transcends
theft, fraud, and copyright"
• Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University
Students’ Perspectives.International Research Conference 2013
• http://www.buzzle.com/articles/different-types-of-plagiarism.html
• B.P. Singh, Mange Ram and Arun Kumar Satsangi. Plagiarism Detection
Service: Its Benefits and Challenges for Academicians and Researchers
• https://infogr.am/The-Ins-and-Outs-of-Plagiarism
• Ronald B. Standler. (2012).Plagiarism in Colleges in USA.legal aspects
of plagiarism, academic policy.
• Open Education Database. www.oedb.org.
138. ● MLA handbook for writers of research papers. (7 th ed.). The Modern Language
Association of America. New York: 2009. Print.
● Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
● http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
● turnitin. White paper the plagiarism spectrum.
● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
● http://isites.harvard.edu/icb/icb.do?
● keyword=k70847&pageid=icb.page350378
● http://www.lib.usm.edu/legacy/plag/paraphrasing.php
● http://slideplayer.com/slide/4677704/
● https://www.indiana.edu/~istd/examples.html
● http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html
● http://www.ithenticate.com/resources/infographics/typesofplagiarism-research
● http://nhs.gilesk12.org/library/pdf/idea.pdf
● http://www.mandatory.com/2013/06/17/10worksyoudidntknow-wereghostwritten/4