Search This Blog

Loading...

Thursday, 3 July 2014

Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing - E-LIS repository



Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing





Bakhtiyari, Kaveh and Salehi, Hadi and Embi, Mohamed Amin and Shakiba, Masoud and Zavvari, Azam and Shahbazi-Moghadam, Masoomeh and Ale Ebrahim, Nader and Mohammadjafari, Marjan
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing.
International Education Studies, 2014, vol. 7, n. 7, pp. 52-62.









[Journal article (Print/Paginated)]


[img]






Text

Ethical and Unethical Methods of Plagiarism.pdf
- Published version



Available under License Creative Commons Attribution.





Download (429Kb)


| Preview





English abstract

This paper
discusses plagiarism origins, and the ethical solutions to prevent it.
It also reviews some unethical approaches, which may be used to decrease
the plagiarism rate in academic writings. We propose eight ethical
techniques to avoid unconscious and accidental plagiarism in manuscripts
without using online systems such as Turnitin and/or iThenticate for
cross checking and plagiarism detection. The efficiency of the proposed
techniques is evaluated on five different texts using students
individually. After application of the techniques on the texts, they
were checked by Turnitin to produce the plagiarism and similarity
report. At the end, the “effective factor” of each method has been
compared with each other; and the best result went to a hybrid
combination of all techniques to avoid plagiarism. The hybrid of ethical
methods decreased the plagiarism rate reported by Turnitin from nearly
100 to the average of 8.4 on 5 manuscripts.
Item type:
Journal article (Print/Paginated)



Keywords: Plagiarism, Plagiarism Prevention, Academic Cheating, Ethical Approaches, Unethical Approaches
Subjects: A. Theoretical and general aspects of libraries and information.
B. Information use and sociology of information.
B. Information use and sociology of information. > BA. Use and impact of information.
B. Information use and sociology of information. > BB. Bibliometric methods.
B. Information use and sociology of information. > BG. Information dissemination and diffusion.
Depositing user:

Dr. Nader Ale Ebrahim

Date deposited: 03 Jul 2014 19:55
Last modified: 03 Jul 2014 19:55
URI: http://hdl.handle.net/10760/23333

References

"SEEK" links will first look for possible matches inside E-LIS and query Google Scholar if no results are found.
Anderson,
J. (2013). Breaking the BTK Killer's Cipher. Cryptologia, 37(3),
204-209. http://dx.doi.org/10.1080/01611194.2013.797047
Carrol,
J. (2002). A handbook for detecting plagiarism in higher education.
London: Oxford: The Oxford Centre for Staff and Learning Development,
Oxford Brookes University.
Dictionary.com. (2013). Plagiarism. Retrieved January 8, 2013, from http://dictionary.reference.com/browse/Plagiarism
Ebbinghaus, H. (1913). Memory: A contribution to experimental psychology: Teachers college, Columbia university.
Encyclopedia-Britannica. (2013). Plagiarism. Retrieved January 8, 2013, from http://dictionary.reference.com/browse/Plagiarism
Gillam,
L., Marinuzzi, J., & Ioannou, P. (2010). TurnItOff: defeating
plagiarism detection systems. Paper presented at the 11th Higher
Education Academy-ICS Annual Conference, University of Durham, UK.
Google. (2011). Google Translator. Retrieved April 20, 2011, from http://translate.google.com/
Hawley,
C. S. (1984). The thieves of academe: Plagiarism in the university
system. Improving college and university teaching, 32(1), 35-39.
http://dx.doi.org/10.1080/00193089.1984.10533838.
Hockenos, P. (2013). High-Profile Plagiarism Prompts Soul-Searching in German Universities. Chronicle of Higher Education.
IEEE. (2011). Cross Check User Guide. Retrieved April 20, 2011, from http://www.ieee.org/documents/CrossCheck_User_Guide.pdf
ISO.
(2008). Document management -- Portable document format Part 1: PDF 1.7
(Vol. ISO 32000-1:2008): International Organiztion for
Standardization.
iThenticate.com. (2011, 08/04/2011). CrossCheck. Retrieved April 20, 2011, from http://www.crossref.org/crosscheck/index.html
Mehta,
S., Meyer, D., & Murgai, P. (2013). Identifying and ranking
networked biographies and referral paths corresponding to selected
qualifications: US Patent 20,130,018,871.
Patel,
A., Bakhtiyari, K., & Taghavi, M. (2011). Evaluation of Cheating
Detection Methods in Academic Writings. Library Hi Tech, 29(4), 623-640.
http://dx.doi.org/10.1108/07378831111189732.
Schein,
M., & Paladugu, R. (2001). Redundant surgical publications: tip of
the iceberg? Surgery, 129(6), 655-661.
http://dx.doi.org/10.1067/msy.2001.114549.
SysTranSoft.com. (2011). SYSTRAN–Online Translation Software. Retrieved April 20, 2011, from http://www.systransoft.com/


Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing - E-LIS repository

No comments:

Post a Comment