SlideShare a Scribd company logo
1 of 142
Download to read offline
Colloquium
on
Plagiarism: A Study
Lead byLead by
Alovi Zhimomi
&
Team Members
Sagar Gajbe Dipanwita Das Gurrala Srinivas
Shiva Shankar Mahato Kanu Chakraborty Vandana
Documentation Research and Training Center(DRTC)
Indian Statistical Institute,
Bangalore Center.
2015-2017
Contents
Speaker Topic
Alovi Zhimomi Introduction to Plagiarism.
Sagar Gajbe Types of Plagiarism with examples.
Dipanwita Das Cases of Plagiarism.
Srinivas Gurrala Plagiarism detection tools (Commercial
Software).
Shiva Shankar Mahato Plagiarism detection tools (Open Source &
Free Software).
Kanu Chakraborty Plagiarism and the role of librarians.
Vandana Summary and conclusion
What is Plagiarism?
● There is no standard or agreed upon definition of plagiarism
● According to Merriam-Webster online dictionary plagiarism is an “act
of using another person's words or ideas without giving credit to that
person”.[1]
● Joy and Luck (1999) define plagiarism as “unacknowledged copying
of documents or programs that can occur in many contexts: in
industry a company may seek competitive advantage; in academia
academics may seek to publish their research in advance of their
colleagues”.[2]
Source: [1] http://www.merriam-webster.com/
[2] Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming Assignments". IEEE Transactions on
Education, 42(2). pp. 129-133. ISSN 0018-9359.
Origin
● The word plagiarism is derived from the latin word “plagiare”, which
means to kidnap or abduct.
● Roman poet Martial (40 AD to somewhere between 102 and 104 AD)
First used the latin word “plagiarus” to describe a seemingly unnamed
literary thief in his poems. [3][4]
source: [3] www.plagiarism.com
[4] wikipedia.org
Origin
● "Plagiary", a derivative of "plagiarus" was introduced into English in
1601 by dramatist Ben Jonson to describe someone guilty of literary
theft.
● The derived form plagiarism was introduced into English around
1620.[3][4]
Academia
In academic contexts plagiarism tends to be interpreted as the
misappropriation of the intellectual property of one individual by another.
[5]
According to Bela Gipp, academic plagiarism encompasses:"The use of
ideas, concepts, words, or structures without appropriately
acknowledging the source to benefit in a setting where originality is
expected."[6]
Source :
[5] Celia Thompson. Discourses on plagiarism:To discipline and punish or to teach and learn?
[6] Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting Disguised and Cross-language
Plagiarism using Citation Pattern Analysis
Elements characteristic of plagiarism.
According to T. Fishman[7], plagiarism occurs when someone:
● Uses words, ideas, or work products
● Attributable to another identifiable person or source
● Without attributing the work to the source from which it was
obtained
● In a situation in which there is a legitimate expectation of original
authorship
● In order to obtain some benefit, credit, or gain which need not be
monetary.
Source: [7] Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not good enough: toward a
standard definition of plagiarism that transcends theft, fraud, and copyright"
What is considered as plagiarism?
● Taking quotations or passages directly without citation.
● Taking ideas without giving credit
● Changing words but copying the sentence structure of a source
without giving credit
● Failing to put a quotation in quotation marks
● Giving incorrect information about the source of information.
● Copying so many words or ideas that it makes up the majority of
work, whether credit is given or not.
● Taking work from previous work without reference to that work.[3][8][9]
Source: [3] www.plagiarismtoday.com
[8] http://www.plagiarism.org
[9] Council of Writing Program Administrators. http://wpacouncil.org
Statistics of plagiarism
Source:[10] Colegio Bolivar (educational community) report.
[8] http://www.plagiarism.org
[11] http://www.checkforplagiarism.ne
[12] http://www.checkforplagiarism.nett
Why people plagiarise?
● Lack of Writing Skills.
● Misconception/ ignorance of plagiarism.
● Lack of strict academic discipline.
● Lack of research methods skills.
● Lack of referencing/citation skills.
● Time factor.
● Easily availability of reading materials/text on the internet.
● Lack of knowledge or subject matter.
● Lack of patience.
● Cut-and-Paste culture in research and academic community.
● Sheer lethargy.[10][11][12][13][14][15]
Source: [13] Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University Students’ Perspectives
[14] http://www.buzzle.com/articles/different-types-of-plagiarism.html
[15] Plagiarism Detection Service: Its Benefits and Challenges for Academicians and Researchers
Types of Plagiarism with Examples
Sagar Gajbe
Types of plagiarism
➢ Unintentional Plagiarism
➢ Intentional Plagiarism
MLA handbook for writers of research papers. (7th ed.). The Modern Language
Association of America. New York: 2009. Print.
Types of plagiarism
➢ Plagiarism of Words
➢ Plagiarism of Structure
➢ Plagiarism of Ideas
➢ Plagiarism of Authorship
➢ Plagiarism of Self
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
Some important aspects:
● Citation
● Quotation
● Summarizing
● Paraphrasing
Citations
● Original Source
Corporate mud-slinging tends to be
concentrated in a handful of highly
competitive sectors: utilities, telecoms
(especially the broadband market), and
airlines. These sectors are united by being
highly price-competitive and inclined toward
ads that rely heavily on 'knocking copy' -
content that brags about the brand's
superiority over a rival on the basis of
specific criteria.
Source: Murphy, Claire. "The Art of
Complaining." Marketing 27 Sept. 2006: 18.
● Correct Use
One way corporations try to get ahead
of the competition is by complaining
about their rivals’ advertisements.
Highly competitive sectors, such as
utilities, telecoms, and airlines, have
the highest incidence of this kind of
"corporate mud-slinging" (Murphy 18).
Murphy, Claire. “The Art of
Complaining." Marketing 27 Sept.
2006: 18. Web. 24 Oct. 2012.
source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
Quotation
● Original Text
Cases where the alleged abusers are affluent
create specific obstacles for their victims,
experts say. The batterer — typically a man,
though not always — is often someone
well-known in the community. He has the
financial means to hire pricey attorneys and
private investigators. And his lawyers are
well-versed in the intricacies of the judicial
system and can easily win continuances and
drag cases on for years.
Source: Treadway, Joan. “Violence Hits
Rich Women Hard Too.” Times-Picayune
19 Aug. 2002: 1.
● Incorrect use
Affluent women who are victims of
domestic violence face particular difficulties
when seeking legal recourse against their
attackers. The batterer can afford to hire
expensive lawyers who are well-versed in
the intricacies of the judicial system.
● Correct use
As Treadway (2002) points out, the batterer
can afford to hire expensive lawyers who are
“well-versed in the intricacies of the judicial
system.”
Treadway, J. (2002, August 19). Violence
hits rich women hard too. Times-Picayune,
p. 1.
source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
Summary
● Condensed version of authors keypoints.
● Can extend upto a few sentences or even longer
based on the complexity of the authors idea to
be conveyed.
● When summarizing, you must cite the source.
Source : http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page350378
Summarizing
● Original Text
In order to communicate effectively
with other people, one must have a
reasonably accurate idea of what they
do and do not know that is pertinent to
the communication. Treating people as
though they have knowledge that they
do not have can result in
miscommunication and perhaps
embarrassment. On the other hand, a
fundamental rule of conversation, at
least according to a Gricean view, is
that one generally does not convey to
others information that one can assume
they already have.
● Correct use
Nickerson (1999) argues that clear
communication hinges upon what
an audience does and does not
know. It is crucial to assume the
audience has neither too much nor
too little knowledge of the subject,
or the communication may be
inhibited by either confusion or
offense (p. 737).
Source : http://www.lib.usm.edu/legacy/plag/paraphrasing.php
Paraphrasing
● Original: Ask not what your country can do for you. But ask
what you can do for your country.
● Incorrect Paraphrase: Don't ask what your nation can give
you; instead, consider what you are willing to do for your
country.
● Correct Paraphrase: John Kennedy's introduction stresses the
importance of citizens becoming civically engaged in their
country's affairs.
source : http://slideplayer.com/slide/4677704/
Plagiarism of Words
● Direct plagiarism is the word-for-word transcription of a section of
someone else’s work without attribution.
● Clone: submitting another's work, word-for-word, as one's own.
● CTRL-C: Contains significant portions of text from a single source
without alterations.
● Photocopy, where large parts of the content are copied from a given
text, without making any changes.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
Example for Word-for-word
Plagiarism
Source : https://www.indiana.edu/~istd/examples.html
Plagiarism of Structure
● Mosaic Plagiarism. Copying phrases from a source without using
citation.
● Partial Plagiarism: finds synonyms for the author’s language while
keeping to the same general structure and meaning of the original.
● Minimalistic Plagiarism: changes the sentence construction, use
synonymous vocabulary and changes the order.
● Sometimes called “patch writing”.
● Find – Replace or Poor Disguise Changing key words and phrases but
retaining the essential content of the source
● Remix: Paraphrases from multiple sources, made to fit together
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
Mosaic
Plagiarism:Example
● Originial Source
● Contrast the condition into which all
these friendly Indians are suddenly
plunged now, with their condition only
two years previous: martial law now in
force on all their reservations;
themselves in danger of starvation, and
constantly exposed to the influence of
emissaries from their friends and
relations, urging them to join in
fighting this treacherous government
that had kept faith with nobody--
neither with friend nor with foe.
● Incorrect
● Only two years later, all these friendly
Sioux were suddenly plunged into new
conditions, including starvation,
martial law on all their reservations,
and constant urging by their friends
and relations to join in warfare against
the treacherous government that had
kept faith with neither friend nor foe.
source : http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html
Plagiarism of Self
● As Roig (2006) suggests, self-plagiarism occurs “when authors reuse
their own previously written work or data in a ‘new’ written product
without letting the reader know that this material has appeared
elsewhere” (pg. 16). Roig identifies a few types of self-plagiarism:
● Republishing the same paper that is published elsewhere without
notifying the reader nor publisher of the journal.
● Publishing a significant study as smaller studies to increase the number
of publications rather than publishing one large study.
● Reusing portions of a previously written (published or unpublished text.)
Ithenticate terminology: Duplication, Repetitive Research
http://www.ithenticate.com/resources/infographics/types-of-plagiarism-research
Plagiarism of Ideas
Authors often write about original ideas they have had or original
discoveries they have made. Repeating original ideas without revealing
the source is idea plagiarism.
● Partial Plagiarism: Rampant use of paraphrasing, represents the same idea
in a different form.
● Minimalistic Plagiarism: Copying ideas, opinions, thoughts and concepts
of another author, in such a way that his work does not seem like it has
been plagiarized.
● Mashup or Potluck Paper: Mixes copied material from multiple sources.
● Hybrid: Combines perfectly cited sources with copied passages without
citation.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
Example of Idea
Plagiarism:
Original Source:
● Excerpted from: Team Moon: How 400,000 People Landed Apollo 11 on the Moon
by Catherine Thimmesh. New York: Houghton Mifflin Co., 2006, pg. 5
● When those millions of people tuned in hoping to witness the moonwalk, one thing they
wouldn’t see (or at best might catch a glimpse of) were the nonastronauts, those beyond
the glare of the limelight. The regular folks whose efforts made an impossible mission
possible in the first place. All the people behind the scenes whose ideas and expertise,
imagination and inventiveness, dedication and focus, labor and skill, combined in one
great endeavor—on the grandest of all scales—and conspired to put man on the moon.
Yes, three heroic men went to the moon; but it was a team of four hundred thousand
people that put them there. They were the flight directors, controllers, planners, and
engineers; the rocket designers and builders and technicians; the managers, supervisors,
quality control and safety inspectors; the programmers, electricians, welders,
seamstresses, gluers, painters, doctors, geologists, scientists, trainers, and navigators.
Apollo 11 is their story too.
source : http://nhs.gilesk12.org/library/pdf/idea.pdf
Idea Plagiarism (Contd..)
This is Idea Plagiarism
When most people think of
Apollo 11, the first time the
United States sent a man to the
moon, most think of the three
astronauts on the mission. But,
in fact, there were 400,000
people who helped man walk on
the moon---scientists, builders,
engineers, doctors etc.
When most people think of the
Apollo 11, the first time the United
States sent a man on the moon, most
think of the three astronauts on the
mission. In her book, Team Moon:
How 400,00 People Landed Apollo
11 on the Moon, Catherine
Thimmesh explains how many
people were actually involved in
making the mission a success (p. 5).
This is not
Plagiarism of Authorship
● Full plagiarism or 'complete plagiarism': refers to copying somebody
else's original content, word by word, and presenting it as one's own.
● Ghost Writer, are the persons who writes or authors books or papers
for another person and are officially credited to this another person.
Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
turnitin. White paper the plagiarism specturm.
Ghostwriter example.
● "Goosebumps" Books :popular
children's horror book series
(Ghostwriter: Various writers)
● "Goosebumps" series that is
authored by R.L Stine is actually
written by various authors. After the
first few were released, they became
so high in demand that the author
came up with the premises and
general outlines of the books before
passing them off to Ghost writers.
Source : http://www.mandatory.com/2013/06/17/10-works-you-didnt-know-were-ghostwritten/4
Different Cases of Plagiarism
Dipanwita Das
MS LIS,2nd
Semester
DRTC,ISI
Legal aspects:
• An author has the right to sue a plagiarist.[1]
• Some plagiarism may also be deemed a criminal
offense, possibly leading to a prison sentence.[1]
• Penalties vary depending on jurisdiction, the
charges brought, and are determined on a case
by case basis.[2]
• Students who commit plagiarism may be subject
to grade or disciplinary penalties, which vary by
institution.[2]
[1] http://www.ithenticate.com/resources/6-consequences-of-plagiarism
[2] http://definitions.uslegal.com/p/plagiarism/
31
CASE STUDIES ON:

Plagiarism By A Student

Plagiarism By Student Programmers

Plagiarism By A Professor

Plagiarism By A Journalist

Plagiarism By Singers
32
Case Study:
Plagiarism By a Student
Anthony Lamberis
33
Anthony Lamberis
• An attorney in Illinois
• Enrolled in classes in an LL.M. Program in Law
at Northwestern University during 1970-71
• In 1978,he submitted a 93-page thesis, of
which 47 pages were “substantially
verbatim” from two sources that he did not
cite.
• Punishment: Expelled from the University[3]
[3] http://www.rbs2.com/plag.pdf
34
Case Study:
➢
Plagiarism By Student Programmers
✔ MIT Incident
35
MIT Incident(1990)
• Course:”Introduction to Computers and Problem
Solving”
• Students were instructed that they can work
together in a group but were not allowed to
collaborate in writing programs
• It was found that large number of students were
involved in stealing programs and duplicating
problem sets
• Punishment: Several Students were suspended
for one semester [4]
[4] http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html
36
Case Study
• Plagiarism By A Professor
Mustapha Marrouchi
37
Mustapha Marrouchi
• An English professor at the University of
Nevada, Las Vegas since 2008
• The UNLV investigation led by Lori Olafson,
found that 23 of 26 works by Marrouchi
showed similarities to other works that were
not cited.[7]
• What happened?
 He was fired on 7th December 2014! [8]
[7] http://www.reviewjournal.com/news/education/unlv-fires-professor-accused-serial-plagiarism
[8] http://retractionwatch.com/2014/12/04/unlv-english-professor-fired-plagiarizing-updike-said-zizek/
38
Case Study
• Plagiarism By a Journalist
 Jayson Blair
39
Jayson Blair
• In 2003 Jayson Blair was a rising star in
journalism and a reporter for the New York
Times
• It was noticed by an editor at the San Antonio
Express-News that there are similarities
between a column by Blair and an earlier work
by one of their reporters Macarena Hernandez.
40
Jayson Blair (ctd.)
• The Times launched an investigation into Blair
and discovered that at least 36 of his 73
articles contained instances of plagiarism,
fabrication or other unethical behavior.
• What happened?
 Blair resigned![5]
[5] https://www.plagiarismtoday.com/2012/08/21/5-famous-plagiarists-where-are-they-now/
41
Case Study:
Plagiarism By a Singers
 Robin Thicke and Pharrell Williams
42
Robin Thicke and Pharrell Williams
• The American Singers were found guilty of
copying a Marvin Gaye’s song for their chart-
topping hit “Blurred Lines”, 2013.
• Punishment: As Gaye died on 1984, they were
told to pay Marvin Gaye’s children $7.3 million
for infringing on the copyright of Gaye's 1977
song “Got to Give It Up.”[6]
[6] http://www.ibtimes.com/marvin-gaye-vs-robin-thicke-6-cases-music-plagiarism-lawsuits-after-blurred-lines-got-1845182
43
Source:
http://findplagiarismonline.com/wp-content/uploads/2016/02/consequences-of-plag
iarism.jpg
44
Plagiarism Detection Tools
(Commercial Software)
By
Srinivas
Plagiarism Detection Tools
(Commercial Softwares)
Outline:
1.iThenticate
2.Turnitin
3.PlagTracker
4.URKUND
5.VeriGuide
6.The Plagiarism Checker
iThenticate
Introduction:
● iThenticate is produced by iParadigms, a company founded by
graduate student instructors at UC Berkeley launched in 2004.
● To ensure the originality of written manuscript for post graduate
students and academic staff/researchers before submitting it
for publication.
Source:http://www.ithenticate.com
Salient Feature of
iThenticate
● iThenticate helps editors, authors and researchers prevent
misconduct by comparing manuscripts against its database.
● iThenticate checks Web pages, other content, scholarly
journals, ProQuest (The iThenticate database includes
300,000 theses and dissertations from ProQuest)
● iThenticate support MS Word, Word XML, WordPerfect,
PostScript, PDF, HTML, RTF, HWP, plain text and
OpenOffice (ODT).
Source:http://www.ithenticate.com
Contd.....
● After you submit your document once, you may resubmit it
a maximum of five times.
● iThenticate does not store, share or resell uploaded files.
● iThenticate gives you your own personal account so that
you can check for plagiarism privately
● The CrossCheck service offers publishers a way to
compare documents against the largest comparison
database of scientific, technical and medical content in the
world.
Source:http://www.ithenticate.com
Limitation of iThenticate
● Cannot exceed 400 pages.
● Files cannot exceed 40MBs.
● Files cannot exceed 2MB of raw text.
● A single file can be up to 25,000 words, which accommodates the
average length of a research paper
● iThenticate offers document to document comparison.
● iThenticate interface currently supports the following languages:
English, Korean, and Japanese.
Source:http://www.ithenticate.com
What are the system
requirements?
● Microsoft® Windows® Vista Service pack 1, Windows® 7+,
Mac OS X v10.4.11+
● 3GB of RAM or more
● 1024x768 display or higher
● Broadband internet connection
● Firefox 15+, Chrome 23+, Safari 5+, Internet Explorer 9, 10,
11
● Internet browser set to allow all cookies from ithenticate.com
● Javascript enabled
Source:http://www.ithenticate.com
Turnitin
Introduction:
● Turnitin is an Internet-based plagiarism-prevention service
created by iParadigms, LLC, first launched in 1997.
● For instructors to check students' work in a classroom setting.
● Turnitin checks web pages, other content, scholarly journals,
student paper database.
Source:https://wiki.nus.edu.sg
Features of Turnitin
● Prevents Plagiarism
● Engages students (high SI engages the students to make
concerted efforts to improve the report)
●
Provides better and faster feedback to students
● Peer review (Teachers can let their student anonymously critique
and evalute each other papers)
Source:www.turnitin.org
Contd.......
● Identifies the different words which have been added,
deleted,or substituted
● Does citation verfications
● Instuctors as well as students can upload papers
● Turntin support MS Word, Word XML, WordPerfect,
PostScript, PDF, HTML, RTF, HWP, plain text and MS
PowerPoint.
Source:www.turnitin.org
Limitation of Turnitin
●
Turnitin only support 100 pages or less, 20 MB or less.
● Turnitin only instructors to check students' work in a
classroom setting.
● Turnitin only compares with 45+ billion web pages, 337+
million student papers and 130+ million articles from
academic books and publications.
Source:www.turnitin.org
Contd......
● Can not identify plagiarism from anon online source
● Has problems with mathematical formulae (latex files)
● Distorts the format of the original documents tables,
graphs and images don't appear.
● Does not differentiate between quoted materials and
orginal writing at times
Source:www.turnitin.org
PlagTracker
Introducation:
● Plag Tracker was launched in 2011 by Devellar
● PlagTracker is a web-based tool that scans content for
plagiarism.
● PlagTracker finds any content that has been plagiarized, with a
list of all the sources, from where the text is copied.
● Students can use PlagTracker to check their papers for
plagiarism before they turn them in and receive suggestions on
information to change or advice on what needs to be cited.
Source:www.plagtracker.org
Salient Features
● Student:
Detect plagiarism,fix grammar mistakes,and even proofread
your paper before turning it in
● Teachers:
Find problems with your students papers
● Publishers:
Verify that submitted articles and manuscripts are completely
original before publishing them
Source:www.plagtracker.org
Contd.....
● Site owners:
Check if your site content is unique
● Simply upload a paper, let PlagTracker scan it for
plagiarism and review the plagiarism report.
● The checker compares the content of the paper to the
content of over 14 billion webpages and 5 million academic
papers to see if any content has been plagiarized.
● PlagTracker only takes a couple of minutes to check a
paper
Source:www.plagtracker.org
Limitation of plagtracker
● plagtracker only compares the content of the paper to the
content of over 14 billion webpages and 5 million
academic papers to see if any content has been
plagiarized.
● Side by side comparison Not avialable in the PlagTracker
● The online scanner did not identify the website which
contained material that had been plagiarised.
Source:www.plagtracker.org
VeriGuide
Introduction:
● VeriGuide is developed by The Chinese University of Hong
Kong which serves the academic community for similarity
detection
● Promote and uphold academic honesty, integrity, and
quality
● Support similarity text detection in English, Traditional
Chinese, and Simplified Chinese
Source:wikipedia.com
Salient Features
● Promote and uphold academic honesty to create a fair
learning environment among students
● Access is available anytime and anywhere
● Covers a large number of popular document formats
● Detailed statistics of similarity and readability are available
for analysis
● Quick and easy comparison of suspected plagiarized
content to the original content
http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
Limitations
● Only support similarity text detection in English, Traditional
Chinese, and Simplified Chinese
● At a time we can search 2000 words only
● VeriGuide is only available to Subscribers who have
registered with the University and paid the subscription fee
● VeriGuide serves to support and maintain assignment
database for students and educators.
http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
URKUND
● In 2000 Urkund was started by the idea of teachers and
gradually grown with partnership of leading information
providers like DIVA (Digital Scientific Archive), Iustus,
Nationalencyklopedin and ProQuest.
● Urkund is owned and developed by PrioInfo AB
● URKUND compares submitted documents with material
from three central sources: the Internet, publisher material,
and student material.
http://static.urkund.com/manuals/URKUND_Admin_Guide.pd
Salient Features
● URKUND does not require any software installation
● No use of complex interfaces and no login to any website
● It is important to differentiate between URKUND's e-mail
based system and other tools,where by the teacher needs to
log in to a website and upload the students' documents for
checking.
● URKUND supports the 12 most common word processing
formats:
DOC. DOCX. SXW. PPT. PPTX. PDF. TXT. RTF. Html. Htm.
WPS. ODT
http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
Limitations
● URKUND working with help of web resource
● Has problems with mathematical formulae
● URKUND does not currently support the iWorks format
.pages
● Teachers has to depend on Urkund to create account or
appoint an administrator
● Every document treated as a separate document
(“4,00,000 characters” is one document if 4,00,001
character there it is considered two documents)
http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
Plagiarism Detection Tools
(Open Source & Free Software).
Shiva Shankar Mahato
Plagiarism Detection Tools
(Open Source & Free Software )
Outline:
1.Plagium
2.Plagscan
3.Viper Anti-Plagiarism Scanner
4.Copyscape
5.CitePlag
Plagium :
● Plagium software is developed by a New York
based company named Septet Systems Inc.
● Plagium software is free up to 5000 text
characters, beyond 5000 one has to purchase the
software.
Features:
● One can upload the file in pdf, word or text format
in the paid version.
● Report will be generated on the reuse of the text.
● Two editions are available individual as well as
institutional account.
● A unique alert feature is provided which alerts the
user regarding content copying or unauthorized
web sites access.
Specialization :
● Quick Search- Displays free result with
plagiarism as soon as the user’s copy-paste
the text, article, journal etc.
● Deep Search- It provides additional tools and
in-depth searching available only on
purchase.
Limitations :
● User can ONLY copy-paste up to 5000 text
characters in the box given for a day.
● Report cannot be downloaded or shared in
the free version.
PlagScan :
PlagScan a free plagiarism detection tool that focuses
on language patterns in plagiarism detection.
Specialization of PlagScan :
● PlagScan uses complex algorithms for checking
and analyzing uploaded document, based on up-
to-date linguistic research.
● Unique signature extracted from the document’s
structure is then compared with PlagScan
database and millions of online documents.
● PlagScan is able to detect most of plagiarism types
either direct copy and paste or word switching.
Features of PlagScan :
Database Checking:
● PlagScan has its own database that include millions of documents
like (paper, articles and assignments), and articles over World
Wide Web. So it offers database checking whether locally or other
database over the internet.
Internet checking:
● PlagScan is an online checker so it provides internet checking to
all submitted documents.
Publications Checking:
● PlagScan is mainly used in academic field so it provides checking
most types of submitted publication.
Synonym and Sentence Structure Checking:
● PlagScan does not support synonym and sentence structure checking
but provides Integration via application programming interface in the
existing content management system or earning management system
possible.
Supported Languages:
● PlagScan supports all the language that uses the international UTF-8
encoding and all language with Latin or Arabic characters can be
checked for plagiarism.
Viper Anti-Plagiarism Scanner
● Viper is the plagiarism checker . It scans
over 10 billion resources, has an easy-to-
use interface and highlights areas of
plagiarism - totally free.
● It works on windows platform only.
Features :
● It checks essay against 10 billion sources.
● Scan against essays on personal computer
also.
● Scan against essays published on the Internet
● Easy side-by-side highlighted comparison.
● Free, unlike most other scanners.
How it works :
SOURCE:ZahraShafiee1001 http://www.slideshare.net/ZahraShafiee1001/viper-the-anti-pagiarism-scanner
Limitations :
● Registering takes time.
● Not always gives correct results.
● Need high speed internet.
Copyscape
● Copyscape was launched in 2004 by Indigo Stream
Technologies, Ltd.,co-founded by Gideon Greenspan
● It is the leading solution on the web for detecting online
plagiarism.
● It lets easily identify sites that have copied own content
without permission, as well as those who are quoting from
the site.
~Copyscape.com
Contd.....
● Copyscape uses Google and Yahoo! as search providers, under agreed
terms.
● Copyscape performs post-processing of the search results received from
these providers.
● It can be used for corporate website, online publication, blog, marketing
materials, or any other online content.
● Copyscape is used by content owners to detect cases of "content theft",
in which content is copied without permission from one site to another.
● It is also used by content publishers to detect cases of content fraud, in
which old content is repackaged and sold as new original content.
~Copyscape.com
How to use Copyscape?
● Simply enter the URL and Copyscape will instantly scan
the entire Web to check for duplicate content of the page.
● Copyscape shows the top results for the search, and then
we can click on a result to see a word-by-word comparison
with the content on our site.
● In this comparison, colored highlighting is used to show
blocks of text that match the text on our site.
~Copyscape.com
CitePlag
● CitePlag is a web-based tool to assist users in
efficiently examining academic documents for
suspicious text and citation similarities, which
may point to potential plagiarism.
● The algorithms used by CitePlag are based on
the Citation-based Plagiarism Detection
concept, a novel approach developed by the
Information Science Group at the University of
Konstanz.
Specialization of CitePlag:
● Existing plagiarism detection software only
examines literal text similarity, and thus typically
fails to detect disguised plagiarism forms,
including paraphrases, translations, or idea
plagiarism.
● CbPD addresses this shortcoming by additionally
analyzing the citation placement in the full-text of
documents to form a language-independent
semantic “fingerprint” of document similarity.
Sources :http://www.isg.uni-konstanz.de/projects/citeplag/
CitePlag:
● Identifies plagiarism by analyzing citation
pattern matches between documents to
detect both local and global document
similarities at the semantic level.
● The underlying idea of the system is to
evaluate the citations of academic
documents as language independent
markers to detect plagiarism.
Features of CitePlag :
● CitePlag provides a customizable side-by-side visualization 1 of text
and citation similarities to detect potential plagiarism.
● The suspicious document appears on the left and the potential source
document is displayed on the right.
● The browser schematically compares the two documents using the
CbPD algorithm selected 4 and draws connecting lines between
matching citations.
● Document sections highlighted in darker red represent stronger
citation- based document similarities.
Citeplag : screenshot
http://www.sciplore.org/2013/citeplag-got-a-makeover-2/
Source :http://www.sciplore.org/2013/citeplag-got-a-makeover-2/
Limitation of CitePlag :
● Works finely with documents having citations
and lots of them but faces problem when have
a handful of citations.
● It also won’t work well, in cases where citation
overlap is expected, such as cases where
there are a limited number of sources.
● Finally, it also can’t help much in cases of
“verbatim” plagiarism.
Souces :https://www.plagiarismtoday.com/2011/08/08/using-citations-to-detect-
plagiarism/
Plagiarism and the role of
librarians.
Kanu Chakraborty
How can Librarians help?
➢ Librarians can play roles as facilitators of research,
instructors, and defenders of intellectual freedom, so it
falls under our auspices to assist in student education
on academic integrity.
➢ Conduct training, workshops, short term courses,
seminar.
➢ Provide disciplined-based instruction.
Source: www.georgialibraries.org/lib
Cont...
● Offer faculty and students a tutorial on how to prevent
or avoid plagiarism.
● Offer faculty assistance in planning and designing
plagiarism-proof assignments.
● Guide students of appropriate note-taking and
citations.
● Training of using web based support tools for
preventing and detecting plagiarism.
Source: www.georgialibraries.org/lib
Our responsibility
Sec. 2, IFLA code of ethics for librarians and other
information workers, 2012
● Librarians and other information workers offer services to
increase reading skills. They promote information literacy
including the ability to identify, locate, evaluate, organize
and create, use and communicate information. And they
promote the ethical use of information thereby helping to
eliminate plagiarism and other forms of misuse of
information.
Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
Our responsibility
PRC BFL Code of Ethics for Librarians, 2006
● 1.2 Librarians shall promote literacy and education of the
public by making the resources and services of the library
known and accessible to its users.
● 1.3 Librarians shall uphold and promote the right to
information as well as abide by the provisions of the
intellectual property law.
Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
A Study
● Study conducted by Long Island University, on how to bring
awareness on plagiarism by the stewardship of librarians.
● C. W. Post Campus B. Davis Schwartz Memorial Library for
assistance and leadership in grappling with issues related to
student plagiarism.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Activities of the library
● Customized seminars to faculty of each semester
● Prevention and detection of plagiarism
● Plagiarism Awareness Workshops
● They give classrooms freshman orientation program,
● Incorporating the Library Instruction program
● They conduct an online interactive lesson.
Awareness includes
● Different types of Plagiarism, tools & softwares, Tips to avoid.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Purpose
● The pre-test was designed to ascertain incoming students’
basic understanding of plagiarism.
● The post-test was intended to indicate the usefulness of
the Plagiarism Awareness session conducted by the
librarians.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Table 1:Which of the following English
classes do you attend?
Name of the Event Number in Sample Percentage of
Total
Reading, Writing, and
Interpretation
143143 4444
Unsure 124124 3838
English 1 Composition 5959 1818
Total 326326 100100
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Figure 3: Does copying from a book without
crediting the source constitute plagiarism?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Figure 4
Do you know how to cite Internet sources?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Figure 5: Are you aware of the
seriousness of plagiarism?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Suggestion
● What to Do in High School?
● What to Do in College?
● What to Do in Research Organization?
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
Finding
● This research indicates that early intervention might help
to alleviate plagiarism
● Having the academic librarian work with the faculty to offer
tips and techniques in designing writing exercises using
current informational sources can contribute to the
reduction of plagiarism.
● It also signifies increasing change of students awareness
about plagiarism.
● It will help to promote ethical writing and academic
honesty.
Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
The Expectation
● Librarian is the champion of advocating
and proliferating information literacy and
fluency.
Therefore, a librarian should and will not
plagiarize.
Source://Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
Source: https://investigation.com/2014/04/30/beware-copyright-thieves/
Summary and Conclusion
Vandana
Summary
● Plagiarism is a serious breach of academic integrity.
● Types of plagiarism and example.
● Some cases.
● Tools
● Librarianship role
Issues and Challenges
1. General
● Lack of understanding the importance of citations and
references.
● Lack of awareness and motivation.
● Skill-level problem.
● Linguistic problem to successfully “integrate sources within
their writing.”
● Detecting cheater is an important issues but the greatest
challenge is to prevent it from doing so.
SOURCE: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
Issues and Challenges
● Competiveness
a. Time pressure
b. Hassles
● Lack of adequate awareness about licences associated with
copyright.
2. Tool specific
● Plagiarism on idea level.
● Lots of book are not yet digialized.
Source:Prof. B. Dutta(idea)
http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
Shared Language
● Conventional designations:
e.g., physician’s assistant, Librarian, etc.
● Information about well-known figures:
(such as birth and death dates of well-known figures)
Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html
https://writing.wisc.edu/Handbook/QPA_plagiarism.html
Shared Language
● Technical terms and phrases of a discipline (Field-specific):
e.g., facts, theories, or methods, reduplication, cognitive domain,
material culture, sexual harassment.
(NOTE: But one must be sure that this information (term or the
phrase) is widely known within that field and is shared by your
readers)
Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html
https://writing.wisc.edu/Handbook/QPA_plagiarism.html
Strategies to Avoid Plagiarism
● To promote the student to generate necessary skills required for
critical analysis and innovative thinking.
● By teaching to quote the sources properly.
● By paraphrasing the different sources properly.
● To acknowledge the contributors.
● Way to use the different free and commercial plagiarism detection
software.
Source:http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
Strategies to Avoid Plagiarism
● “Read the instructions for authors provided by the journal.”(Hoseninpor, page no. 9)
● Emphasis should be on the total involvement of the students and
generating interest in them.
● To become familiar with licensing associated with the copyright law.
● If doubt about whether or not the concept or fact is common knowledge,
cite it or refer it.
Source: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html
http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
Strategies to Avoid Plagiarism
● “Training the trainers.”(Student Plagiarism in an Online World, google book)
● To plan the work one is going to perform.
● Taking note of all the sources one has refered.
● Present author idea should be in focus.
Source:http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html
http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054
http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html
Other Scenarios to Avoid
● Misrepresenting a source should be avoided as it can
create confusion between the source idea and ones own
idea(present creator).
● Ignoring sources found late in the research process.
Source: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355346
● http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
● http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
Reference:
• http://www.merriam-webster.com/
• Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming
Assignments". IEEE Transactions on Education, 42(2). pp. 129-133.
ISSN 0018-9359.
• www.plagiarismtoday.com
• wikipedia.org
• Celia Thompson. Discourses on plagiarism:To discipline and punish or to
teach and learn?
• Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting
Disguised and Cross-language Plagiarism using Citation Pattern Analysis.
• Council of Writing Program Administrators. http://wpacouncil.org
• Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not
good enough: toward a standard definition of plagiarism that transcends
theft, fraud, and copyright"
• Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University
Students’ Perspectives.International Research Conference 2013
• http://www.buzzle.com/articles/different-types-of-plagiarism.html
• B.P. Singh, Mange Ram and Arun Kumar Satsangi. Plagiarism Detection
Service: Its Benefits and Challenges for Academicians and Researchers
• https://infogr.am/The-Ins-and-Outs-of-Plagiarism
• Ronald B. Standler. (2012).Plagiarism in Colleges in USA.legal aspects
of plagiarism, academic policy.
• Open Education Database. www.oedb.org.
● MLA handbook for writers of research papers. (7 th ed.). The Modern Language
Association of America. New York: 2009. Print.
● Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site.
● http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php
● turnitin. White paper the plagiarism spectrum.
● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
● http://isites.harvard.edu/icb/icb.do?
● keyword=k70847&pageid=icb.page350378
● http://www.lib.usm.edu/legacy/plag/paraphrasing.php
● http://slideplayer.com/slide/4677704/
● https://www.indiana.edu/~istd/examples.html
● http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html
● http://www.ithenticate.com/resources/infographics/typesofplagiarism-research
● http://nhs.gilesk12.org/library/pdf/idea.pdf
● http://www.mandatory.com/2013/06/17/10worksyoudidntknow-wereghostwritten/4
● http://www.ithenticate.com/resources/6-consequences-of-plagiarism
● http://definitions.uslegal.com/p/plagiarism/
● http://www.rbs2.com/plag.pdf
● http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html
● www.plagiarismtoday.com/2012/08/21/5-famous-plagiarist-where-are-they-
now
● http://www.ibtimes.com/marvin-gaye-vs-robin-thicke-6-cases-music-
plagiarism-lawsuits-after-blurred-lines-got-1845182
● http://www.reviewjournal.com/news/education/unlv-fires-professor-accused-
serial-plagiarism
● http://retractionwatch.com/2014/12/04/unlv-english-professor-fired-
plagiarizing-updike-said-zizek/
• https://wiki.nus.edu.sg
• www.turnitin.org
• www.plagtracker.org
• http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
• http://static.urkund.com/manuals/URKUND_Admin_Guide.pd
• http://www.isg.uni-konstanz.de/projects/citeplag/
• http://www.sciplore.org/2013/citeplag-got-a-makeover-2/
• http://www.slideshare.net/ZahraShafiee1001/viper-the-anti-pagiarism-scann
er
• Copyscape.com
• www.georgialibraries.org/lib Librarian's Role in Fostering a Plagiarism-free
Environment by Christine M. Abrigo
• Amrita Madray, “Developing Students’Awareness of Plagiarism:
Crisis and Opportuni-ties,”Library Philosophy and Practice.
• https://investigation.com/2014/04/30/beware-copyright-thieves/
• Prof. B. Dutta(ideas)
• http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
• https://writing.wisc.edu/Handbook/QPA_paraphrase.html
• http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
• http://isites.harvard.edu/icb/icb.dokeyword=k70847&pageid=icb.pag
e342054
• http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpo
r-A-10-614-4-39015cb.pdf
• http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
• http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae
2653baaf4170-12.html
• http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hos
einpor-A-10-614-4-39015cb.pdf
• http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html
• http://isites.harvard.edu/icb/icb.do?
keyword=k70847&pageid=icb.page355346

More Related Content

What's hot (20)

Plagiarism
PlagiarismPlagiarism
Plagiarism
 
What Is Plagiarism?
What Is Plagiarism?What Is Plagiarism?
What Is Plagiarism?
 
Scientific misconduct
Scientific misconductScientific misconduct
Scientific misconduct
 
Plagiarism & Ethics
Plagiarism & EthicsPlagiarism & Ethics
Plagiarism & Ethics
 
Research Methodology Part I
Research Methodology Part IResearch Methodology Part I
Research Methodology Part I
 
Publication ethics
Publication ethics Publication ethics
Publication ethics
 
Research Grant
Research GrantResearch Grant
Research Grant
 
Plagiarism ppt
Plagiarism pptPlagiarism ppt
Plagiarism ppt
 
Research methodology unit-1
Research methodology unit-1Research methodology unit-1
Research methodology unit-1
 
Types of Plagiarism
Types of PlagiarismTypes of Plagiarism
Types of Plagiarism
 
plagiarism detection tools and techniques
plagiarism detection tools and techniquesplagiarism detection tools and techniques
plagiarism detection tools and techniques
 
scientific misconduct
scientific misconductscientific misconduct
scientific misconduct
 
Research,documentation and Analysis
Research,documentation and Analysis Research,documentation and Analysis
Research,documentation and Analysis
 
REDUNDANT PUBLICATION IN RESEARCH
REDUNDANT PUBLICATION IN RESEARCHREDUNDANT PUBLICATION IN RESEARCH
REDUNDANT PUBLICATION IN RESEARCH
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Conflict of interest
Conflict of interestConflict of interest
Conflict of interest
 
Authorship Issues
Authorship IssuesAuthorship Issues
Authorship Issues
 
Avoid salami slicing and duplicate publication
Avoid salami slicing and duplicate publicationAvoid salami slicing and duplicate publication
Avoid salami slicing and duplicate publication
 
Sherpa Romeo
Sherpa RomeoSherpa Romeo
Sherpa Romeo
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Viewers also liked

Plagiarism Data Driven Instruction
Plagiarism Data Driven InstructionPlagiarism Data Driven Instruction
Plagiarism Data Driven InstructionMTorrise
 
Citation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid PlagiarismCitation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid Plagiarismemdowney
 
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINPLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINDr.Kamran Ishfaq
 
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE Dr. Naveen BP
 
Plagiarism=Copyright Infringement
Plagiarism=Copyright InfringementPlagiarism=Copyright Infringement
Plagiarism=Copyright InfringementTaylor
 
A method for generating electricity by fast moving by binay
A method for generating electricity by fast moving by binayA method for generating electricity by fast moving by binay
A method for generating electricity by fast moving by binayBinay Kumar Tripathy
 
How to use Urkund on Blackboard
How to use Urkund on BlackboardHow to use Urkund on Blackboard
How to use Urkund on BlackboardGuillaume LAURIE
 
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...Thomas Lancaster
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationSteve Nelson
 

Viewers also liked (9)

Plagiarism Data Driven Instruction
Plagiarism Data Driven InstructionPlagiarism Data Driven Instruction
Plagiarism Data Driven Instruction
 
Citation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid PlagiarismCitation 101: Teaching Students to Avoid Plagiarism
Citation 101: Teaching Students to Avoid Plagiarism
 
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINPLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
 
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE
CHARACTERISTICS OF THE LEACHATE FROM MSW LANDFILL,BANGALORE
 
Plagiarism=Copyright Infringement
Plagiarism=Copyright InfringementPlagiarism=Copyright Infringement
Plagiarism=Copyright Infringement
 
A method for generating electricity by fast moving by binay
A method for generating electricity by fast moving by binayA method for generating electricity by fast moving by binay
A method for generating electricity by fast moving by binay
 
How to use Urkund on Blackboard
How to use Urkund on BlackboardHow to use Urkund on Blackboard
How to use Urkund on Blackboard
 
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...
Exploring The Culture Of Plagiarism Invading Higher Education - Keynote Prese...
 
Plagiarism PowerPoint Presentation
Plagiarism PowerPoint PresentationPlagiarism PowerPoint Presentation
Plagiarism PowerPoint Presentation
 

Similar to Plagiarism

The Power of Originality: Navigating the Ethics of Plagiarism
The Power of Originality: Navigating  the Ethics of PlagiarismThe Power of Originality: Navigating  the Ethics of Plagiarism
The Power of Originality: Navigating the Ethics of PlagiarismDhruvita1
 
by keren B. oguis
by keren B. oguisby keren B. oguis
by keren B. oguiskeren oguis
 
Plagiarism ok to use this
Plagiarism ok to use thisPlagiarism ok to use this
Plagiarism ok to use thisEric Strayer
 
“It’s not plagiarism if it’s on the internet!”
“It’s not plagiarism if it’s on the internet!”“It’s not plagiarism if it’s on the internet!”
“It’s not plagiarism if it’s on the internet!”Lisa Loffredi
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismDr. Utpal Das
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismDr. Utpal Das
 
Plagiarism; How to Know and How to Avoid it? In Research Methodology
Plagiarism; How to Know and How to Avoid it? In Research MethodologyPlagiarism; How to Know and How to Avoid it? In Research Methodology
Plagiarism; How to Know and How to Avoid it? In Research MethodologyNehalbaGohil
 
Plagiarism: A Guide for Students by Dr. William Allan Kritsonis
Plagiarism: A Guide for Students by Dr. William Allan KritsonisPlagiarism: A Guide for Students by Dr. William Allan Kritsonis
Plagiarism: A Guide for Students by Dr. William Allan KritsonisWilliam Kritsonis
 
Plagiarism: A Guide for Students by William Allan Kritsonis, PhD
Plagiarism: A Guide for Students by William Allan Kritsonis, PhDPlagiarism: A Guide for Students by William Allan Kritsonis, PhD
Plagiarism: A Guide for Students by William Allan Kritsonis, PhDWilliam Kritsonis
 

Similar to Plagiarism (13)

The Power of Originality: Navigating the Ethics of Plagiarism
The Power of Originality: Navigating  the Ethics of PlagiarismThe Power of Originality: Navigating  the Ethics of Plagiarism
The Power of Originality: Navigating the Ethics of Plagiarism
 
by keren B. oguis
by keren B. oguisby keren B. oguis
by keren B. oguis
 
Plagiarism ok to use this
Plagiarism ok to use thisPlagiarism ok to use this
Plagiarism ok to use this
 
Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. A...
Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. A...Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. A...
Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. A...
 
“It’s not plagiarism if it’s on the internet!”
“It’s not plagiarism if it’s on the internet!”“It’s not plagiarism if it’s on the internet!”
“It’s not plagiarism if it’s on the internet!”
 
Plagiarism Essays
Plagiarism EssaysPlagiarism Essays
Plagiarism Essays
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarism
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarism
 
Plagiarism; How to Know and How to Avoid it? In Research Methodology
Plagiarism; How to Know and How to Avoid it? In Research MethodologyPlagiarism; How to Know and How to Avoid it? In Research Methodology
Plagiarism; How to Know and How to Avoid it? In Research Methodology
 
Plagiarism: A Guide for Students by Dr. William Allan Kritsonis
Plagiarism: A Guide for Students by Dr. William Allan KritsonisPlagiarism: A Guide for Students by Dr. William Allan Kritsonis
Plagiarism: A Guide for Students by Dr. William Allan Kritsonis
 
Plagiarism: A Guide for Students by William Allan Kritsonis, PhD
Plagiarism: A Guide for Students by William Allan Kritsonis, PhDPlagiarism: A Guide for Students by William Allan Kritsonis, PhD
Plagiarism: A Guide for Students by William Allan Kritsonis, PhD
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Essays On Plagiarism
Essays On PlagiarismEssays On Plagiarism
Essays On Plagiarism
 

Recently uploaded

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

Plagiarism

  • 1. Colloquium on Plagiarism: A Study Lead byLead by Alovi Zhimomi & Team Members Sagar Gajbe Dipanwita Das Gurrala Srinivas Shiva Shankar Mahato Kanu Chakraborty Vandana Documentation Research and Training Center(DRTC) Indian Statistical Institute, Bangalore Center. 2015-2017
  • 2. Contents Speaker Topic Alovi Zhimomi Introduction to Plagiarism. Sagar Gajbe Types of Plagiarism with examples. Dipanwita Das Cases of Plagiarism. Srinivas Gurrala Plagiarism detection tools (Commercial Software). Shiva Shankar Mahato Plagiarism detection tools (Open Source & Free Software). Kanu Chakraborty Plagiarism and the role of librarians. Vandana Summary and conclusion
  • 3. What is Plagiarism? ● There is no standard or agreed upon definition of plagiarism ● According to Merriam-Webster online dictionary plagiarism is an “act of using another person's words or ideas without giving credit to that person”.[1] ● Joy and Luck (1999) define plagiarism as “unacknowledged copying of documents or programs that can occur in many contexts: in industry a company may seek competitive advantage; in academia academics may seek to publish their research in advance of their colleagues”.[2] Source: [1] http://www.merriam-webster.com/ [2] Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming Assignments". IEEE Transactions on Education, 42(2). pp. 129-133. ISSN 0018-9359.
  • 4. Origin ● The word plagiarism is derived from the latin word “plagiare”, which means to kidnap or abduct. ● Roman poet Martial (40 AD to somewhere between 102 and 104 AD) First used the latin word “plagiarus” to describe a seemingly unnamed literary thief in his poems. [3][4] source: [3] www.plagiarism.com [4] wikipedia.org
  • 5. Origin ● "Plagiary", a derivative of "plagiarus" was introduced into English in 1601 by dramatist Ben Jonson to describe someone guilty of literary theft. ● The derived form plagiarism was introduced into English around 1620.[3][4]
  • 6. Academia In academic contexts plagiarism tends to be interpreted as the misappropriation of the intellectual property of one individual by another. [5] According to Bela Gipp, academic plagiarism encompasses:"The use of ideas, concepts, words, or structures without appropriately acknowledging the source to benefit in a setting where originality is expected."[6] Source : [5] Celia Thompson. Discourses on plagiarism:To discipline and punish or to teach and learn? [6] Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting Disguised and Cross-language Plagiarism using Citation Pattern Analysis
  • 7. Elements characteristic of plagiarism. According to T. Fishman[7], plagiarism occurs when someone: ● Uses words, ideas, or work products ● Attributable to another identifiable person or source ● Without attributing the work to the source from which it was obtained ● In a situation in which there is a legitimate expectation of original authorship ● In order to obtain some benefit, credit, or gain which need not be monetary. Source: [7] Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not good enough: toward a standard definition of plagiarism that transcends theft, fraud, and copyright"
  • 8. What is considered as plagiarism? ● Taking quotations or passages directly without citation. ● Taking ideas without giving credit ● Changing words but copying the sentence structure of a source without giving credit ● Failing to put a quotation in quotation marks ● Giving incorrect information about the source of information. ● Copying so many words or ideas that it makes up the majority of work, whether credit is given or not. ● Taking work from previous work without reference to that work.[3][8][9] Source: [3] www.plagiarismtoday.com [8] http://www.plagiarism.org [9] Council of Writing Program Administrators. http://wpacouncil.org
  • 9. Statistics of plagiarism Source:[10] Colegio Bolivar (educational community) report. [8] http://www.plagiarism.org [11] http://www.checkforplagiarism.ne [12] http://www.checkforplagiarism.nett
  • 10. Why people plagiarise? ● Lack of Writing Skills. ● Misconception/ ignorance of plagiarism. ● Lack of strict academic discipline. ● Lack of research methods skills. ● Lack of referencing/citation skills. ● Time factor. ● Easily availability of reading materials/text on the internet. ● Lack of knowledge or subject matter. ● Lack of patience. ● Cut-and-Paste culture in research and academic community. ● Sheer lethargy.[10][11][12][13][14][15] Source: [13] Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University Students’ Perspectives [14] http://www.buzzle.com/articles/different-types-of-plagiarism.html [15] Plagiarism Detection Service: Its Benefits and Challenges for Academicians and Researchers
  • 11. Types of Plagiarism with Examples Sagar Gajbe
  • 12. Types of plagiarism ➢ Unintentional Plagiarism ➢ Intentional Plagiarism MLA handbook for writers of research papers. (7th ed.). The Modern Language Association of America. New York: 2009. Print.
  • 13. Types of plagiarism ➢ Plagiarism of Words ➢ Plagiarism of Structure ➢ Plagiarism of Ideas ➢ Plagiarism of Authorship ➢ Plagiarism of Self Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php turnitin. White paper the plagiarism specturm.
  • 14. Some important aspects: ● Citation ● Quotation ● Summarizing ● Paraphrasing
  • 15. Citations ● Original Source Corporate mud-slinging tends to be concentrated in a handful of highly competitive sectors: utilities, telecoms (especially the broadband market), and airlines. These sectors are united by being highly price-competitive and inclined toward ads that rely heavily on 'knocking copy' - content that brags about the brand's superiority over a rival on the basis of specific criteria. Source: Murphy, Claire. "The Art of Complaining." Marketing 27 Sept. 2006: 18. ● Correct Use One way corporations try to get ahead of the competition is by complaining about their rivals’ advertisements. Highly competitive sectors, such as utilities, telecoms, and airlines, have the highest incidence of this kind of "corporate mud-slinging" (Murphy 18). Murphy, Claire. “The Art of Complaining." Marketing 27 Sept. 2006: 18. Web. 24 Oct. 2012. source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
  • 16. Quotation ● Original Text Cases where the alleged abusers are affluent create specific obstacles for their victims, experts say. The batterer — typically a man, though not always — is often someone well-known in the community. He has the financial means to hire pricey attorneys and private investigators. And his lawyers are well-versed in the intricacies of the judicial system and can easily win continuances and drag cases on for years. Source: Treadway, Joan. “Violence Hits Rich Women Hard Too.” Times-Picayune 19 Aug. 2002: 1. ● Incorrect use Affluent women who are victims of domestic violence face particular difficulties when seeking legal recourse against their attackers. The batterer can afford to hire expensive lawyers who are well-versed in the intricacies of the judicial system. ● Correct use As Treadway (2002) points out, the batterer can afford to hire expensive lawyers who are “well-versed in the intricacies of the judicial system.” Treadway, J. (2002, August 19). Violence hits rich women hard too. Times-Picayune, p. 1. source : https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html
  • 17. Summary ● Condensed version of authors keypoints. ● Can extend upto a few sentences or even longer based on the complexity of the authors idea to be conveyed. ● When summarizing, you must cite the source. Source : http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page350378
  • 18. Summarizing ● Original Text In order to communicate effectively with other people, one must have a reasonably accurate idea of what they do and do not know that is pertinent to the communication. Treating people as though they have knowledge that they do not have can result in miscommunication and perhaps embarrassment. On the other hand, a fundamental rule of conversation, at least according to a Gricean view, is that one generally does not convey to others information that one can assume they already have. ● Correct use Nickerson (1999) argues that clear communication hinges upon what an audience does and does not know. It is crucial to assume the audience has neither too much nor too little knowledge of the subject, or the communication may be inhibited by either confusion or offense (p. 737). Source : http://www.lib.usm.edu/legacy/plag/paraphrasing.php
  • 19. Paraphrasing ● Original: Ask not what your country can do for you. But ask what you can do for your country. ● Incorrect Paraphrase: Don't ask what your nation can give you; instead, consider what you are willing to do for your country. ● Correct Paraphrase: John Kennedy's introduction stresses the importance of citizens becoming civically engaged in their country's affairs. source : http://slideplayer.com/slide/4677704/
  • 20. Plagiarism of Words ● Direct plagiarism is the word-for-word transcription of a section of someone else’s work without attribution. ● Clone: submitting another's work, word-for-word, as one's own. ● CTRL-C: Contains significant portions of text from a single source without alterations. ● Photocopy, where large parts of the content are copied from a given text, without making any changes. Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php turnitin. White paper the plagiarism specturm.
  • 21. Example for Word-for-word Plagiarism Source : https://www.indiana.edu/~istd/examples.html
  • 22. Plagiarism of Structure ● Mosaic Plagiarism. Copying phrases from a source without using citation. ● Partial Plagiarism: finds synonyms for the author’s language while keeping to the same general structure and meaning of the original. ● Minimalistic Plagiarism: changes the sentence construction, use synonymous vocabulary and changes the order. ● Sometimes called “patch writing”. ● Find – Replace or Poor Disguise Changing key words and phrases but retaining the essential content of the source ● Remix: Paraphrases from multiple sources, made to fit together Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php turnitin. White paper the plagiarism specturm.
  • 23. Mosaic Plagiarism:Example ● Originial Source ● Contrast the condition into which all these friendly Indians are suddenly plunged now, with their condition only two years previous: martial law now in force on all their reservations; themselves in danger of starvation, and constantly exposed to the influence of emissaries from their friends and relations, urging them to join in fighting this treacherous government that had kept faith with nobody-- neither with friend nor with foe. ● Incorrect ● Only two years later, all these friendly Sioux were suddenly plunged into new conditions, including starvation, martial law on all their reservations, and constant urging by their friends and relations to join in warfare against the treacherous government that had kept faith with neither friend nor foe. source : http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html
  • 24. Plagiarism of Self ● As Roig (2006) suggests, self-plagiarism occurs “when authors reuse their own previously written work or data in a ‘new’ written product without letting the reader know that this material has appeared elsewhere” (pg. 16). Roig identifies a few types of self-plagiarism: ● Republishing the same paper that is published elsewhere without notifying the reader nor publisher of the journal. ● Publishing a significant study as smaller studies to increase the number of publications rather than publishing one large study. ● Reusing portions of a previously written (published or unpublished text.) Ithenticate terminology: Duplication, Repetitive Research http://www.ithenticate.com/resources/infographics/types-of-plagiarism-research
  • 25. Plagiarism of Ideas Authors often write about original ideas they have had or original discoveries they have made. Repeating original ideas without revealing the source is idea plagiarism. ● Partial Plagiarism: Rampant use of paraphrasing, represents the same idea in a different form. ● Minimalistic Plagiarism: Copying ideas, opinions, thoughts and concepts of another author, in such a way that his work does not seem like it has been plagiarized. ● Mashup or Potluck Paper: Mixes copied material from multiple sources. ● Hybrid: Combines perfectly cited sources with copied passages without citation. Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php turnitin. White paper the plagiarism specturm.
  • 26. Example of Idea Plagiarism: Original Source: ● Excerpted from: Team Moon: How 400,000 People Landed Apollo 11 on the Moon by Catherine Thimmesh. New York: Houghton Mifflin Co., 2006, pg. 5 ● When those millions of people tuned in hoping to witness the moonwalk, one thing they wouldn’t see (or at best might catch a glimpse of) were the nonastronauts, those beyond the glare of the limelight. The regular folks whose efforts made an impossible mission possible in the first place. All the people behind the scenes whose ideas and expertise, imagination and inventiveness, dedication and focus, labor and skill, combined in one great endeavor—on the grandest of all scales—and conspired to put man on the moon. Yes, three heroic men went to the moon; but it was a team of four hundred thousand people that put them there. They were the flight directors, controllers, planners, and engineers; the rocket designers and builders and technicians; the managers, supervisors, quality control and safety inspectors; the programmers, electricians, welders, seamstresses, gluers, painters, doctors, geologists, scientists, trainers, and navigators. Apollo 11 is their story too. source : http://nhs.gilesk12.org/library/pdf/idea.pdf
  • 27. Idea Plagiarism (Contd..) This is Idea Plagiarism When most people think of Apollo 11, the first time the United States sent a man to the moon, most think of the three astronauts on the mission. But, in fact, there were 400,000 people who helped man walk on the moon---scientists, builders, engineers, doctors etc. When most people think of the Apollo 11, the first time the United States sent a man on the moon, most think of the three astronauts on the mission. In her book, Team Moon: How 400,00 People Landed Apollo 11 on the Moon, Catherine Thimmesh explains how many people were actually involved in making the mission a success (p. 5). This is not
  • 28. Plagiarism of Authorship ● Full plagiarism or 'complete plagiarism': refers to copying somebody else's original content, word by word, and presenting it as one's own. ● Ghost Writer, are the persons who writes or authors books or papers for another person and are officially credited to this another person. Sources : Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php turnitin. White paper the plagiarism specturm.
  • 29. Ghostwriter example. ● "Goosebumps" Books :popular children's horror book series (Ghostwriter: Various writers) ● "Goosebumps" series that is authored by R.L Stine is actually written by various authors. After the first few were released, they became so high in demand that the author came up with the premises and general outlines of the books before passing them off to Ghost writers. Source : http://www.mandatory.com/2013/06/17/10-works-you-didnt-know-were-ghostwritten/4
  • 30. Different Cases of Plagiarism Dipanwita Das MS LIS,2nd Semester DRTC,ISI
  • 31. Legal aspects: • An author has the right to sue a plagiarist.[1] • Some plagiarism may also be deemed a criminal offense, possibly leading to a prison sentence.[1] • Penalties vary depending on jurisdiction, the charges brought, and are determined on a case by case basis.[2] • Students who commit plagiarism may be subject to grade or disciplinary penalties, which vary by institution.[2] [1] http://www.ithenticate.com/resources/6-consequences-of-plagiarism [2] http://definitions.uslegal.com/p/plagiarism/ 31
  • 32. CASE STUDIES ON:  Plagiarism By A Student  Plagiarism By Student Programmers  Plagiarism By A Professor  Plagiarism By A Journalist  Plagiarism By Singers 32
  • 33. Case Study: Plagiarism By a Student Anthony Lamberis 33
  • 34. Anthony Lamberis • An attorney in Illinois • Enrolled in classes in an LL.M. Program in Law at Northwestern University during 1970-71 • In 1978,he submitted a 93-page thesis, of which 47 pages were “substantially verbatim” from two sources that he did not cite. • Punishment: Expelled from the University[3] [3] http://www.rbs2.com/plag.pdf 34
  • 35. Case Study: ➢ Plagiarism By Student Programmers ✔ MIT Incident 35
  • 36. MIT Incident(1990) • Course:”Introduction to Computers and Problem Solving” • Students were instructed that they can work together in a group but were not allowed to collaborate in writing programs • It was found that large number of students were involved in stealing programs and duplicating problem sets • Punishment: Several Students were suspended for one semester [4] [4] http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html 36
  • 37. Case Study • Plagiarism By A Professor Mustapha Marrouchi 37
  • 38. Mustapha Marrouchi • An English professor at the University of Nevada, Las Vegas since 2008 • The UNLV investigation led by Lori Olafson, found that 23 of 26 works by Marrouchi showed similarities to other works that were not cited.[7] • What happened?  He was fired on 7th December 2014! [8] [7] http://www.reviewjournal.com/news/education/unlv-fires-professor-accused-serial-plagiarism [8] http://retractionwatch.com/2014/12/04/unlv-english-professor-fired-plagiarizing-updike-said-zizek/ 38
  • 39. Case Study • Plagiarism By a Journalist  Jayson Blair 39
  • 40. Jayson Blair • In 2003 Jayson Blair was a rising star in journalism and a reporter for the New York Times • It was noticed by an editor at the San Antonio Express-News that there are similarities between a column by Blair and an earlier work by one of their reporters Macarena Hernandez. 40
  • 41. Jayson Blair (ctd.) • The Times launched an investigation into Blair and discovered that at least 36 of his 73 articles contained instances of plagiarism, fabrication or other unethical behavior. • What happened?  Blair resigned![5] [5] https://www.plagiarismtoday.com/2012/08/21/5-famous-plagiarists-where-are-they-now/ 41
  • 42. Case Study: Plagiarism By a Singers  Robin Thicke and Pharrell Williams 42
  • 43. Robin Thicke and Pharrell Williams • The American Singers were found guilty of copying a Marvin Gaye’s song for their chart- topping hit “Blurred Lines”, 2013. • Punishment: As Gaye died on 1984, they were told to pay Marvin Gaye’s children $7.3 million for infringing on the copyright of Gaye's 1977 song “Got to Give It Up.”[6] [6] http://www.ibtimes.com/marvin-gaye-vs-robin-thicke-6-cases-music-plagiarism-lawsuits-after-blurred-lines-got-1845182 43
  • 45. Plagiarism Detection Tools (Commercial Software) By Srinivas
  • 46. Plagiarism Detection Tools (Commercial Softwares) Outline: 1.iThenticate 2.Turnitin 3.PlagTracker 4.URKUND 5.VeriGuide 6.The Plagiarism Checker
  • 47. iThenticate Introduction: ● iThenticate is produced by iParadigms, a company founded by graduate student instructors at UC Berkeley launched in 2004. ● To ensure the originality of written manuscript for post graduate students and academic staff/researchers before submitting it for publication. Source:http://www.ithenticate.com
  • 48. Salient Feature of iThenticate ● iThenticate helps editors, authors and researchers prevent misconduct by comparing manuscripts against its database. ● iThenticate checks Web pages, other content, scholarly journals, ProQuest (The iThenticate database includes 300,000 theses and dissertations from ProQuest) ● iThenticate support MS Word, Word XML, WordPerfect, PostScript, PDF, HTML, RTF, HWP, plain text and OpenOffice (ODT). Source:http://www.ithenticate.com
  • 49. Contd..... ● After you submit your document once, you may resubmit it a maximum of five times. ● iThenticate does not store, share or resell uploaded files. ● iThenticate gives you your own personal account so that you can check for plagiarism privately ● The CrossCheck service offers publishers a way to compare documents against the largest comparison database of scientific, technical and medical content in the world. Source:http://www.ithenticate.com
  • 50. Limitation of iThenticate ● Cannot exceed 400 pages. ● Files cannot exceed 40MBs. ● Files cannot exceed 2MB of raw text. ● A single file can be up to 25,000 words, which accommodates the average length of a research paper ● iThenticate offers document to document comparison. ● iThenticate interface currently supports the following languages: English, Korean, and Japanese. Source:http://www.ithenticate.com
  • 51. What are the system requirements? ● Microsoft® Windows® Vista Service pack 1, Windows® 7+, Mac OS X v10.4.11+ ● 3GB of RAM or more ● 1024x768 display or higher ● Broadband internet connection ● Firefox 15+, Chrome 23+, Safari 5+, Internet Explorer 9, 10, 11 ● Internet browser set to allow all cookies from ithenticate.com ● Javascript enabled Source:http://www.ithenticate.com
  • 52.
  • 53. Turnitin Introduction: ● Turnitin is an Internet-based plagiarism-prevention service created by iParadigms, LLC, first launched in 1997. ● For instructors to check students' work in a classroom setting. ● Turnitin checks web pages, other content, scholarly journals, student paper database. Source:https://wiki.nus.edu.sg
  • 54. Features of Turnitin ● Prevents Plagiarism ● Engages students (high SI engages the students to make concerted efforts to improve the report) ● Provides better and faster feedback to students ● Peer review (Teachers can let their student anonymously critique and evalute each other papers) Source:www.turnitin.org
  • 55. Contd....... ● Identifies the different words which have been added, deleted,or substituted ● Does citation verfications ● Instuctors as well as students can upload papers ● Turntin support MS Word, Word XML, WordPerfect, PostScript, PDF, HTML, RTF, HWP, plain text and MS PowerPoint. Source:www.turnitin.org
  • 56. Limitation of Turnitin ● Turnitin only support 100 pages or less, 20 MB or less. ● Turnitin only instructors to check students' work in a classroom setting. ● Turnitin only compares with 45+ billion web pages, 337+ million student papers and 130+ million articles from academic books and publications. Source:www.turnitin.org
  • 57. Contd...... ● Can not identify plagiarism from anon online source ● Has problems with mathematical formulae (latex files) ● Distorts the format of the original documents tables, graphs and images don't appear. ● Does not differentiate between quoted materials and orginal writing at times Source:www.turnitin.org
  • 58.
  • 59. PlagTracker Introducation: ● Plag Tracker was launched in 2011 by Devellar ● PlagTracker is a web-based tool that scans content for plagiarism. ● PlagTracker finds any content that has been plagiarized, with a list of all the sources, from where the text is copied. ● Students can use PlagTracker to check their papers for plagiarism before they turn them in and receive suggestions on information to change or advice on what needs to be cited. Source:www.plagtracker.org
  • 60. Salient Features ● Student: Detect plagiarism,fix grammar mistakes,and even proofread your paper before turning it in ● Teachers: Find problems with your students papers ● Publishers: Verify that submitted articles and manuscripts are completely original before publishing them Source:www.plagtracker.org
  • 61. Contd..... ● Site owners: Check if your site content is unique ● Simply upload a paper, let PlagTracker scan it for plagiarism and review the plagiarism report. ● The checker compares the content of the paper to the content of over 14 billion webpages and 5 million academic papers to see if any content has been plagiarized. ● PlagTracker only takes a couple of minutes to check a paper Source:www.plagtracker.org
  • 62. Limitation of plagtracker ● plagtracker only compares the content of the paper to the content of over 14 billion webpages and 5 million academic papers to see if any content has been plagiarized. ● Side by side comparison Not avialable in the PlagTracker ● The online scanner did not identify the website which contained material that had been plagiarised. Source:www.plagtracker.org
  • 63.
  • 64. VeriGuide Introduction: ● VeriGuide is developed by The Chinese University of Hong Kong which serves the academic community for similarity detection ● Promote and uphold academic honesty, integrity, and quality ● Support similarity text detection in English, Traditional Chinese, and Simplified Chinese Source:wikipedia.com
  • 65. Salient Features ● Promote and uphold academic honesty to create a fair learning environment among students ● Access is available anytime and anywhere ● Covers a large number of popular document formats ● Detailed statistics of similarity and readability are available for analysis ● Quick and easy comparison of suspected plagiarized content to the original content http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
  • 66. Limitations ● Only support similarity text detection in English, Traditional Chinese, and Simplified Chinese ● At a time we can search 2000 words only ● VeriGuide is only available to Subscribers who have registered with the University and paid the subscription fee ● VeriGuide serves to support and maintain assignment database for students and educators. http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp
  • 67.
  • 68. URKUND ● In 2000 Urkund was started by the idea of teachers and gradually grown with partnership of leading information providers like DIVA (Digital Scientific Archive), Iustus, Nationalencyklopedin and ProQuest. ● Urkund is owned and developed by PrioInfo AB ● URKUND compares submitted documents with material from three central sources: the Internet, publisher material, and student material. http://static.urkund.com/manuals/URKUND_Admin_Guide.pd
  • 69. Salient Features ● URKUND does not require any software installation ● No use of complex interfaces and no login to any website ● It is important to differentiate between URKUND's e-mail based system and other tools,where by the teacher needs to log in to a website and upload the students' documents for checking. ● URKUND supports the 12 most common word processing formats: DOC. DOCX. SXW. PPT. PPTX. PDF. TXT. RTF. Html. Htm. WPS. ODT http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
  • 70. Limitations ● URKUND working with help of web resource ● Has problems with mathematical formulae ● URKUND does not currently support the iWorks format .pages ● Teachers has to depend on Urkund to create account or appoint an administrator ● Every document treated as a separate document (“4,00,000 characters” is one document if 4,00,001 character there it is considered two documents) http://static.urkund.com/manuals/URKUND_Admin_Guide.pdf
  • 71. Plagiarism Detection Tools (Open Source & Free Software). Shiva Shankar Mahato
  • 72. Plagiarism Detection Tools (Open Source & Free Software ) Outline: 1.Plagium 2.Plagscan 3.Viper Anti-Plagiarism Scanner 4.Copyscape 5.CitePlag
  • 73. Plagium : ● Plagium software is developed by a New York based company named Septet Systems Inc. ● Plagium software is free up to 5000 text characters, beyond 5000 one has to purchase the software.
  • 74. Features: ● One can upload the file in pdf, word or text format in the paid version. ● Report will be generated on the reuse of the text. ● Two editions are available individual as well as institutional account. ● A unique alert feature is provided which alerts the user regarding content copying or unauthorized web sites access.
  • 75. Specialization : ● Quick Search- Displays free result with plagiarism as soon as the user’s copy-paste the text, article, journal etc. ● Deep Search- It provides additional tools and in-depth searching available only on purchase.
  • 76. Limitations : ● User can ONLY copy-paste up to 5000 text characters in the box given for a day. ● Report cannot be downloaded or shared in the free version.
  • 77.
  • 78. PlagScan : PlagScan a free plagiarism detection tool that focuses on language patterns in plagiarism detection.
  • 79. Specialization of PlagScan : ● PlagScan uses complex algorithms for checking and analyzing uploaded document, based on up- to-date linguistic research. ● Unique signature extracted from the document’s structure is then compared with PlagScan database and millions of online documents. ● PlagScan is able to detect most of plagiarism types either direct copy and paste or word switching.
  • 80. Features of PlagScan : Database Checking: ● PlagScan has its own database that include millions of documents like (paper, articles and assignments), and articles over World Wide Web. So it offers database checking whether locally or other database over the internet. Internet checking: ● PlagScan is an online checker so it provides internet checking to all submitted documents. Publications Checking: ● PlagScan is mainly used in academic field so it provides checking most types of submitted publication.
  • 81. Synonym and Sentence Structure Checking: ● PlagScan does not support synonym and sentence structure checking but provides Integration via application programming interface in the existing content management system or earning management system possible. Supported Languages: ● PlagScan supports all the language that uses the international UTF-8 encoding and all language with Latin or Arabic characters can be checked for plagiarism.
  • 82. Viper Anti-Plagiarism Scanner ● Viper is the plagiarism checker . It scans over 10 billion resources, has an easy-to- use interface and highlights areas of plagiarism - totally free. ● It works on windows platform only.
  • 83. Features : ● It checks essay against 10 billion sources. ● Scan against essays on personal computer also. ● Scan against essays published on the Internet ● Easy side-by-side highlighted comparison. ● Free, unlike most other scanners.
  • 84. How it works : SOURCE:ZahraShafiee1001 http://www.slideshare.net/ZahraShafiee1001/viper-the-anti-pagiarism-scanner
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94. Limitations : ● Registering takes time. ● Not always gives correct results. ● Need high speed internet.
  • 95. Copyscape ● Copyscape was launched in 2004 by Indigo Stream Technologies, Ltd.,co-founded by Gideon Greenspan ● It is the leading solution on the web for detecting online plagiarism. ● It lets easily identify sites that have copied own content without permission, as well as those who are quoting from the site. ~Copyscape.com
  • 96. Contd..... ● Copyscape uses Google and Yahoo! as search providers, under agreed terms. ● Copyscape performs post-processing of the search results received from these providers. ● It can be used for corporate website, online publication, blog, marketing materials, or any other online content. ● Copyscape is used by content owners to detect cases of "content theft", in which content is copied without permission from one site to another. ● It is also used by content publishers to detect cases of content fraud, in which old content is repackaged and sold as new original content. ~Copyscape.com
  • 97. How to use Copyscape? ● Simply enter the URL and Copyscape will instantly scan the entire Web to check for duplicate content of the page. ● Copyscape shows the top results for the search, and then we can click on a result to see a word-by-word comparison with the content on our site. ● In this comparison, colored highlighting is used to show blocks of text that match the text on our site. ~Copyscape.com
  • 98.
  • 99. CitePlag ● CitePlag is a web-based tool to assist users in efficiently examining academic documents for suspicious text and citation similarities, which may point to potential plagiarism. ● The algorithms used by CitePlag are based on the Citation-based Plagiarism Detection concept, a novel approach developed by the Information Science Group at the University of Konstanz.
  • 100. Specialization of CitePlag: ● Existing plagiarism detection software only examines literal text similarity, and thus typically fails to detect disguised plagiarism forms, including paraphrases, translations, or idea plagiarism. ● CbPD addresses this shortcoming by additionally analyzing the citation placement in the full-text of documents to form a language-independent semantic “fingerprint” of document similarity. Sources :http://www.isg.uni-konstanz.de/projects/citeplag/
  • 101. CitePlag: ● Identifies plagiarism by analyzing citation pattern matches between documents to detect both local and global document similarities at the semantic level. ● The underlying idea of the system is to evaluate the citations of academic documents as language independent markers to detect plagiarism.
  • 102. Features of CitePlag : ● CitePlag provides a customizable side-by-side visualization 1 of text and citation similarities to detect potential plagiarism. ● The suspicious document appears on the left and the potential source document is displayed on the right. ● The browser schematically compares the two documents using the CbPD algorithm selected 4 and draws connecting lines between matching citations. ● Document sections highlighted in darker red represent stronger citation- based document similarities.
  • 105. Limitation of CitePlag : ● Works finely with documents having citations and lots of them but faces problem when have a handful of citations. ● It also won’t work well, in cases where citation overlap is expected, such as cases where there are a limited number of sources. ● Finally, it also can’t help much in cases of “verbatim” plagiarism. Souces :https://www.plagiarismtoday.com/2011/08/08/using-citations-to-detect- plagiarism/
  • 106. Plagiarism and the role of librarians. Kanu Chakraborty
  • 107. How can Librarians help? ➢ Librarians can play roles as facilitators of research, instructors, and defenders of intellectual freedom, so it falls under our auspices to assist in student education on academic integrity. ➢ Conduct training, workshops, short term courses, seminar. ➢ Provide disciplined-based instruction. Source: www.georgialibraries.org/lib
  • 108. Cont... ● Offer faculty and students a tutorial on how to prevent or avoid plagiarism. ● Offer faculty assistance in planning and designing plagiarism-proof assignments. ● Guide students of appropriate note-taking and citations. ● Training of using web based support tools for preventing and detecting plagiarism. Source: www.georgialibraries.org/lib
  • 109. Our responsibility Sec. 2, IFLA code of ethics for librarians and other information workers, 2012 ● Librarians and other information workers offer services to increase reading skills. They promote information literacy including the ability to identify, locate, evaluate, organize and create, use and communicate information. And they promote the ethical use of information thereby helping to eliminate plagiarism and other forms of misuse of information. Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
  • 110. Our responsibility PRC BFL Code of Ethics for Librarians, 2006 ● 1.2 Librarians shall promote literacy and education of the public by making the resources and services of the library known and accessible to its users. ● 1.3 Librarians shall uphold and promote the right to information as well as abide by the provisions of the intellectual property law. Source: Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
  • 111. A Study ● Study conducted by Long Island University, on how to bring awareness on plagiarism by the stewardship of librarians. ● C. W. Post Campus B. Davis Schwartz Memorial Library for assistance and leadership in grappling with issues related to student plagiarism. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 112. Activities of the library ● Customized seminars to faculty of each semester ● Prevention and detection of plagiarism ● Plagiarism Awareness Workshops ● They give classrooms freshman orientation program, ● Incorporating the Library Instruction program ● They conduct an online interactive lesson. Awareness includes ● Different types of Plagiarism, tools & softwares, Tips to avoid. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 113. Purpose ● The pre-test was designed to ascertain incoming students’ basic understanding of plagiarism. ● The post-test was intended to indicate the usefulness of the Plagiarism Awareness session conducted by the librarians. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 114. Table 1:Which of the following English classes do you attend? Name of the Event Number in Sample Percentage of Total Reading, Writing, and Interpretation 143143 4444 Unsure 124124 3838 English 1 Composition 5959 1818 Total 326326 100100 Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 115. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 116. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 117. Figure 3: Does copying from a book without crediting the source constitute plagiarism? Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 118. Figure 4 Do you know how to cite Internet sources? Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 119. Figure 5: Are you aware of the seriousness of plagiarism? Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 120. Suggestion ● What to Do in High School? ● What to Do in College? ● What to Do in Research Organization? Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 121. Finding ● This research indicates that early intervention might help to alleviate plagiarism ● Having the academic librarian work with the faculty to offer tips and techniques in designing writing exercises using current informational sources can contribute to the reduction of plagiarism. ● It also signifies increasing change of students awareness about plagiarism. ● It will help to promote ethical writing and academic honesty. Source: Amrita Madray, “Developing Students’ Awareness of Plagiarism: Crisis and Opportuni-ties,” Library Philosophy and Practice
  • 122. The Expectation ● Librarian is the champion of advocating and proliferating information literacy and fluency. Therefore, a librarian should and will not plagiarize. Source://Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
  • 125. Summary ● Plagiarism is a serious breach of academic integrity. ● Types of plagiarism and example. ● Some cases. ● Tools ● Librarianship role
  • 126. Issues and Challenges 1. General ● Lack of understanding the importance of citations and references. ● Lack of awareness and motivation. ● Skill-level problem. ● Linguistic problem to successfully “integrate sources within their writing.” ● Detecting cheater is an important issues but the greatest challenge is to prevent it from doing so. SOURCE: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
  • 127. Issues and Challenges ● Competiveness a. Time pressure b. Hassles ● Lack of adequate awareness about licences associated with copyright. 2. Tool specific ● Plagiarism on idea level. ● Lots of book are not yet digialized. Source:Prof. B. Dutta(idea) http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf
  • 128. Shared Language ● Conventional designations: e.g., physician’s assistant, Librarian, etc. ● Information about well-known figures: (such as birth and death dates of well-known figures) Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html https://writing.wisc.edu/Handbook/QPA_plagiarism.html
  • 129. Shared Language ● Technical terms and phrases of a discipline (Field-specific): e.g., facts, theories, or methods, reduplication, cognitive domain, material culture, sexual harassment. (NOTE: But one must be sure that this information (term or the phrase) is widely known within that field and is shared by your readers) Source:https://writing.wisc.edu/Handbook/QPA_paraphrase.html https://writing.wisc.edu/Handbook/QPA_plagiarism.html
  • 130. Strategies to Avoid Plagiarism ● To promote the student to generate necessary skills required for critical analysis and innovative thinking. ● By teaching to quote the sources properly. ● By paraphrasing the different sources properly. ● To acknowledge the contributors. ● Way to use the different free and commercial plagiarism detection software. Source:http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054 http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
  • 131. Strategies to Avoid Plagiarism ● “Read the instructions for authors provided by the journal.”(Hoseninpor, page no. 9) ● Emphasis should be on the total involvement of the students and generating interest in them. ● To become familiar with licensing associated with the copyright law. ● If doubt about whether or not the concept or fact is common knowledge, cite it or refer it. Source: http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054 http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpor-A-10-614-4-39015cb.pdf
  • 132. Strategies to Avoid Plagiarism ● “Training the trainers.”(Student Plagiarism in an Online World, google book) ● To plan the work one is going to perform. ● Taking note of all the sources one has refered. ● Present author idea should be in focus. Source:http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae2653baaf4170-12.html http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342054 http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html
  • 133. Other Scenarios to Avoid ● Misrepresenting a source should be avoided as it can create confusion between the source idea and ones own idea(present creator). ● Ignoring sources found late in the research process. Source: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page355346
  • 136. Reference: • http://www.merriam-webster.com/ • Joy, M.S. and Luck, M. (1999). "Plagiarism in Programming Assignments". IEEE Transactions on Education, 42(2). pp. 129-133. ISSN 0018-9359. • www.plagiarismtoday.com • wikipedia.org • Celia Thompson. Discourses on plagiarism:To discipline and punish or to teach and learn? • Gipp, Bela (2014). Citation-based Plagiarism Detection: Detecting Disguised and Cross-language Plagiarism using Citation Pattern Analysis. • Council of Writing Program Administrators. http://wpacouncil.org
  • 137. • Fishman, Teddi (Sep 28–30, 2009). "We know it when we see it is not good enough: toward a standard definition of plagiarism that transcends theft, fraud, and copyright" • Audrey Poh Choo Cheak.(2013). Internet Plagiarism: University Students’ Perspectives.International Research Conference 2013 • http://www.buzzle.com/articles/different-types-of-plagiarism.html • B.P. Singh, Mange Ram and Arun Kumar Satsangi. Plagiarism Detection Service: Its Benefits and Challenges for Academicians and Researchers • https://infogr.am/The-Ins-and-Outs-of-Plagiarism • Ronald B. Standler. (2012).Plagiarism in Colleges in USA.legal aspects of plagiarism, academic policy. • Open Education Database. www.oedb.org.
  • 138. ● MLA handbook for writers of research papers. (7 th ed.). The Modern Language Association of America. New York: 2009. Print. ● Colby, Bates, and Bowdoin (CBB) Plagiarism Resource Site. ● http://www.frenchanditalian.pitt.edu/undergrad/about/plagiarism.php ● turnitin. White paper the plagiarism spectrum. ● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html ● https://www.libraries.psu.edu/psul/lls/students/plagiarism_examples.html ● http://isites.harvard.edu/icb/icb.do? ● keyword=k70847&pageid=icb.page350378 ● http://www.lib.usm.edu/legacy/plag/paraphrasing.php ● http://slideplayer.com/slide/4677704/ ● https://www.indiana.edu/~istd/examples.html ● http://qcpages.qc.cuny.edu/~redwards/Plagiarism/12.html ● http://www.ithenticate.com/resources/infographics/typesofplagiarism-research ● http://nhs.gilesk12.org/library/pdf/idea.pdf ● http://www.mandatory.com/2013/06/17/10worksyoudidntknow-wereghostwritten/4
  • 139. ● http://www.ithenticate.com/resources/6-consequences-of-plagiarism ● http://definitions.uslegal.com/p/plagiarism/ ● http://www.rbs2.com/plag.pdf ● http://www.cs.utsa.edu/~wagner/pubs/plagiarism0.html ● www.plagiarismtoday.com/2012/08/21/5-famous-plagiarist-where-are-they- now ● http://www.ibtimes.com/marvin-gaye-vs-robin-thicke-6-cases-music- plagiarism-lawsuits-after-blurred-lines-got-1845182 ● http://www.reviewjournal.com/news/education/unlv-fires-professor-accused- serial-plagiarism ● http://retractionwatch.com/2014/12/04/unlv-english-professor-fired- plagiarizing-updike-said-zizek/
  • 140. • https://wiki.nus.edu.sg • www.turnitin.org • www.plagtracker.org • http://veriguide1.cse.cuhk.edu.hk/portal/plagiarism_detection/index.jsp • http://static.urkund.com/manuals/URKUND_Admin_Guide.pd • http://www.isg.uni-konstanz.de/projects/citeplag/ • http://www.sciplore.org/2013/citeplag-got-a-makeover-2/ • http://www.slideshare.net/ZahraShafiee1001/viper-the-anti-pagiarism-scann er • Copyscape.com • www.georgialibraries.org/lib Librarian's Role in Fostering a Plagiarism-free Environment by Christine M. Abrigo
  • 141. • Amrita Madray, “Developing Students’Awareness of Plagiarism: Crisis and Opportuni-ties,”Library Philosophy and Practice. • https://investigation.com/2014/04/30/beware-copyright-thieves/ • Prof. B. Dutta(ideas) • http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf • https://writing.wisc.edu/Handbook/QPA_paraphrase.html • http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf • http://isites.harvard.edu/icb/icb.dokeyword=k70847&pageid=icb.pag e342054 • http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hoseinpo r-A-10-614-4-39015cb.pdf
  • 142. • http://library.nitrkl.ac.in/events/elpes2/day2/5/prameeta.pdf • http://www.mateoaboy.com/f6/blog_files/e740002542ebfcf81fae 2653baaf4170-12.html • http://www.militarymedj.ir/files/site1/user_files_01eb20/eng/hos einpor-A-10-614-4-39015cb.pdf • http://www.flagler.edu/library/polaris/mod6/06-tips-plag.html • http://isites.harvard.edu/icb/icb.do? keyword=k70847&pageid=icb.page355346