Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing

Bakhtiyari, Kaveh and Salehi, Hadi and Embi, Mohamed Amin and Shakiba, Masoud and Zavvari, Azam and Shahbazi-Moghadam, Masoomeh and Ale Ebrahim, Nader and Mohammadjafari, Marjan Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing. International Education Studies, 2014, vol. 7, n. 7, pp. 52-62. [Journal article (Paginated)]

[img]
Preview
Text
Ethical and Unethical Methods of Plagiarism.pdf - Published version
Available under License Creative Commons Attribution.

Download (440kB) | Preview

English abstract

This paper discusses plagiarism origins, and the ethical solutions to prevent it. It also reviews some unethical approaches, which may be used to decrease the plagiarism rate in academic writings. We propose eight ethical techniques to avoid unconscious and accidental plagiarism in manuscripts without using online systems such as Turnitin and/or iThenticate for cross checking and plagiarism detection. The efficiency of the proposed techniques is evaluated on five different texts using students individually. After application of the techniques on the texts, they were checked by Turnitin to produce the plagiarism and similarity report. At the end, the “effective factor” of each method has been compared with each other; and the best result went to a hybrid combination of all techniques to avoid plagiarism. The hybrid of ethical methods decreased the plagiarism rate reported by Turnitin from nearly 100 to the average of 8.4 on 5 manuscripts.

Item type: Journal article (Paginated)
Keywords: Plagiarism, Plagiarism Prevention, Academic Cheating, Ethical Approaches, Unethical Approaches
Subjects: A. Theoretical and general aspects of libraries and information.
B. Information use and sociology of information
B. Information use and sociology of information > BA. Use and impact of information.
B. Information use and sociology of information > BB. Bibliometric methods
B. Information use and sociology of information > BG. Information dissemination and diffusion.
Depositing user: Dr. Nader Ale Ebrahim
Date deposited: 03 Jul 2014 19:55
Last modified: 02 Oct 2014 12:31
URI: http://hdl.handle.net/10760/23333

References

Anderson, J. (2013). Breaking the BTK Killer's Cipher. Cryptologia, 37(3), 204-209. http://dx.doi.org/10.1080/01611194.2013.797047

Carrol, J. (2002). A handbook for detecting plagiarism in higher education. London: Oxford: The Oxford Centre for Staff and Learning Development, Oxford Brookes University.

Dictionary.com. (2013). Plagiarism. Retrieved January 8, 2013, from http://dictionary.reference.com/browse/Plagiarism

Ebbinghaus, H. (1913). Memory: A contribution to experimental psychology: Teachers college, Columbia university.

Encyclopedia-Britannica. (2013). Plagiarism. Retrieved January 8, 2013, from http://dictionary.reference.com/browse/Plagiarism

Gillam, L., Marinuzzi, J., & Ioannou, P. (2010). TurnItOff: defeating plagiarism detection systems. Paper presented at the 11th Higher Education Academy-ICS Annual Conference, University of Durham, UK.

Google. (2011). Google Translator. Retrieved April 20, 2011, from http://translate.google.com/

Hawley, C. S. (1984). The thieves of academe: Plagiarism in the university system. Improving college and university teaching, 32(1), 35-39. http://dx.doi.org/10.1080/00193089.1984.10533838.

Hockenos, P. (2013). High-Profile Plagiarism Prompts Soul-Searching in German Universities. Chronicle of Higher Education.

IEEE. (2011). Cross Check User Guide. Retrieved April 20, 2011, from http://www.ieee.org/documents/CrossCheck_User_Guide.pdf

ISO. (2008). Document management -- Portable document format Part 1: PDF 1.7 (Vol. ISO 32000-1:2008): International Organiztion for Standardization.

iThenticate.com. (2011, 08/04/2011). CrossCheck. Retrieved April 20, 2011, from http://www.crossref.org/crosscheck/index.html

Mehta, S., Meyer, D., & Murgai, P. (2013). Identifying and ranking networked biographies and referral paths corresponding to selected qualifications: US Patent 20,130,018,871.

Patel, A., Bakhtiyari, K., & Taghavi, M. (2011). Evaluation of Cheating Detection Methods in Academic Writings. Library Hi Tech, 29(4), 623-640. http://dx.doi.org/10.1108/07378831111189732.

Schein, M., & Paladugu, R. (2001). Redundant surgical publications: tip of the iceberg? Surgery, 129(6), 655-661. http://dx.doi.org/10.1067/msy.2001.114549.

SysTranSoft.com. (2011). SYSTRAN–Online Translation Software. Retrieved April 20, 2011, from http://www.systransoft.com/


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item