Plagiarism and how to avoid it - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Plagiarism and how to avoid it

Description:

... is plagiarism? Strategies to avoid plagiarism. Academic ... Strategies for avoiding plagiarism. Attend the RESA sessions for necessary details & practice ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 13
Provided by: edmun7
Category:

less

Transcript and Presenter's Notes

Title: Plagiarism and how to avoid it


1
Plagiarism and how to avoid it
  • Academic integrity and writing
  • What is plagiarism?
  • Strategies to avoid plagiarism

2
Academic integrity writing
  • Australian Code for the responsible conduct of
  • research (Australian Government 2007) reports
    that
  • Responsible research will demonstrate
  • appropriate acknowledgement about the role of
    others in the research
  • responsible communication of research results
    (p. 1.3)
  • Section 4 Publications and dissemination of
    research findings, states that the researcher is
    responsible to cite research publications
    accurately. (p. 4.6)
  • Australian Government 2007, Australian Code for
    the responsible conduct of research, viewed 7
    March 2008, lthttp//www.nhmrc.gov.au/publications/
    synopses/r39syn.htmgt.

3
4.6 Cite the work of other authors fully and
accurately
  • Researchers must ensure that they cite other
    relevant work appropriately and accurately when
    disseminating research findings. Use of the work
    of other authors without acknowledgement is
    unethical. (p. 4.2)
  • i.e. You MUST reference if you are- quoting
    directly
  • - paraphrasing i.e. take the idea and write it in
    your own words
  • - summarising an idea.

4
An example (dela Cerna 2007, p. 3)
  • Quoting
  • Child rearing practices in the home and care
    giving practices in non-parental care settings
    are central to this study. Child care workers
    have to take cognizance of culture-specific
    parental belief systems which influence not only
    parental care giving behaviour but developmental
    processes as well (New 1994, p. 70).

5
An example (dela Cerna 2007, p. 3)
  • Paraphrasing
  • Child rearing practices in the home and care
    giving practices in non-parental care settings
    are central to this study. Child care workers
    have to take cognizance of culture-specific
    parental belief systems which influence not only
    parental care giving behaviour but developmental
    processes as well (New 1994, p. 70). Cultural
    norms have an influential input in the
    communication patterns, in the structuring of
    childrens play activities, in the childrens
    role at home, and in their ways of establishing
    peer relationships (Super Harkness 1997, p. 8
    Phillips 1995, p. 2 New 1994, p. 71 Cocking
    1994, p. 394)

6
An example (dela Cerna 2007, p. 3)
  • Summarising
  • Child rearing practices in the home and care
    giving practices in non-parental care settings
    are central to this study. Child care workers
    have to take cognizance of culture-specific
    parental belief systems which influence not only
    parental care giving behaviour but developmental
    processes as well (New 1994, p. 70). Cultural
    norms have an influential input in the
    communication patterns, in the structuring of
    childrens play activities, in the childrens
    role at home, and in their ways of establishing
    peer relationships (Super Harkness 1997, p. 8
    Phillips 1995, p. 2 New 1994, p. 71 Cocking
    1994, p. 394)
  • Doherty (1996) explained that positive outcomes
    of substitute care is associated with caregivers
    who understand childrens developmental needs and
    provide activities that support and enhance
    skills development.

7
What is plagiarism?
  • Plagiarism is a specific form and serious act of
    academic misconduct. Plagiarism includes
  • direct copying without clearly indicating the
    origin
  • using very close paraphrasing without due
    acknowledgment (e.g. word order in sentence is
    the same)
  • use of another person's ideas, work or research
    data without acknowledgment
  • submitting work that has been written by
    someone else (UniSA 2008)
  • UniSA 2008, Appendix 5 Academic integrity in
    research in Academic regulations for Higher
    Degrees by Research, viewed 11 March,
  • lthttp//www.unisa.edu.au/policies/policies/resrch/
    res10-regs.asp.gt.

8
Using Turnitin-an example (anonymous, used with
permission)
  • Destination-Sequenced Distance-Vector (DSDV) 62
    and Global State Routing (GSR) 63 are two
    typical proactive routing protocols. Reactive
    routing protocols have been developed to decrease
    the control overhead and reserve the bandwidth.
    In reactive routing protocols, routing
    information is obtained only when needed.

9
Using Turnitin (2)
  • Destination-Sequenced Distance-Vector (DSDV) 62
    and Global State Routing (GSR) 63 are two
    typical proactive routing protocols. Reactive
    routing protocols have been developed to decrease
    the control overhead and reserve the bandwidth.
    In reactive routing protocols, routing
    information is obtained only when needed. In the
    reactive routing, there are
  • 45 two main phases, Route Discovery and Route
    Maintenance. When a source node needs to transmit
    packets to a destination to which it does not
    have a valid route, it broadcasts a Route Request
    (RREQ) to

10
Using Turnitin (3)
  • Destination-Sequenced Distance-Vector (two
    typical proactive routing protocols. Reactive
    DSDV) 62 and Global State Routing (GSR) 63
    are routing protocols have been developed to
    decrease the control overhead and reserve the
    bandwidth. In reactive routing protocols, routing
    information is obtained only when needed. In the
    reactive routing, there are
  • 45 two main phases, Route Discovery and Route
    Maintenance. When a source node needs to transmit
    packets to a destination to which it does not
    have a valid route, it broadcasts a Route Request
    (RREQ) to
  • discover a route. After receiving the RREQ, the
  • 7 destination or any node that knows a route
    towards the destination will send back a Route
    Reply (RREP) to the source node. Route
  • Maintenance is responsible for detecting broken
    routes, deleting and updating routes. Reactive
    routing protocols are only activated on demand,
    so the routing overhead can be decreased
    significantly.

11
Using Turnitin (4) Patchwork writing X
  • After a successful registration, the foreign
    agent records the mobile nodes home address in
    its Visitor List, and the home agent records the
  • Mobile nodes care-of-address in its Binding
    List. The home agent
  • examines the IP Destination Address of all
    arriving datagrams and checks the Binding List.
  • If the destination node is away from its home
    network, the
  • home agent tunnels the datagrams
  • (IP-in-IP encapsulations 22) to the
  • nodes currently registered care-of address. The
  • care-of address is in the foreign network, where
    the foreign agent will first receive the
  • IP-in-IP packet. The
  • Foreign agent decapsulates the tunneled packet,
    and forwards it to the mobile node. Thus, the
  • 46 mobile node can be always identified via its
    home address, no matter where its point of
    attachment to the
  • Internet is. The
  • mobile node must periodically re-register with
    its home agent

12
Strategies for avoiding plagiarism
  • Attend the RESA sessions for necessary details
    practice
  • Become familiar with the Codes and policies
    online
  • Academic Integrity in Higher Degrees by
    research
  • http//www.unisanet.unisa.edu.au/academicintegrity
    /research/default.asp
  • Learning and Teaching Unit/Doing a Research
    Degree/ Research writing/referencing and
    research ethics
  • http//www.unisa.edu.au/ltu/students/research/writ
    ing/referencing.asp
  • LTU/Studying at UniSA/Academic Integrity
  • http//www.unisa.edu.au/ltu/students/study/integri
    ty.asp
  • 3 Try out text comparison software Turnitin
  • http//www.unisa.edu.au/unisanethelp/turnitin/defa
    ult.asp
Write a Comment
User Comments (0)
About PowerShow.com