SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Journal of University Teaching &
                 Learning Practice
       Volume 6, Issue 1                      2009                          Article 6




 A model for determining student plagiarism:
 Electronic detection and academic judgement

                 Tracey Bretag∗                    Saadia Mahmud†




   ∗
       University of South Australia, tracey.bretag@unisa.edu.au
   †
       University of South Australia, saadia.mahmud@unisa.edu.au

Copyright c 2009 by the authors. The Journal of University Teaching & Learning Practice is
published by the University of Wollongong. URL - http://ro.uow.edu.au/jutlp
A model for determining student plagiarism:
Electronic detection and academic judgement∗
                            Tracey Bretag and Saadia Mahmud



                                             Abstract

    This paper provides insights based on the authors’ own practice as university instructors, re-
searchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism
while still acknowledging the practical importance of doing so, the authors find the common ele-
ment between the various types of plagiarism to be the lack of appropriate attribution to the original
source. The use of electronic text-matching software to detect different types of plagiarism is ex-
plored, and a model presented for identifying potential plagiarism in students’ work. The authors
conclude that despite its shortcomings, electronic detection in combination with manual analysis,
nuanced academic judgement and clear processes provide the means to determine if plagiarism
has occurred.




∗
    Saadia Mahmud, previously known as Saadia Carapiet.
Journal of University Teaching and Learning Practice




A model for determining student plagiarism:
             Electronic detection and academic
                                       judgement.
                Tracey Bretag and Saadia Mahmud1
             School of Management, University of South Australia

        tracey.bretag@unisa.edu.au; saadia.mahmud@unisa.edu.au


                                           Abstract
This paper provides insights based on the authors’ own practice as university instructors,
researchers and arbitrators of student plagiarism. Recognising the difficulty in defining
plagiarism while still acknowledging the practical importance of doing so, the authors find the
common element between the various types of plagiarism to be the lack of appropriate
attribution to the original source. The use of electronic text-matching software to detect different
types of plagiarism is explored, and a model presented for identifying potential plagiarism in
students’ work. The authors conclude that despite its shortcomings, electronic detection in
combination with manual analysis, nuanced academic judgement and clear processes provide
the means to determine if plagiarism has occurred.




1
    Saadia Mahmud, previously known as Saadia Carapiet.
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                                                                 Formatted
                                                                  Tracey Bretag and Saadia Mahmud




Introduction
The public perception that plagiarism is on the rise has resulted in a proliferation of discussion and
research on student plagiarism (Angelil-Carter, 2000; Bretag, 2005, 2007; Carroll, 2003a; Devlin,
2003; McCabe, Butterfield & Trevino, 2006; Zobel & Hamilton, 2002). Internationally recognised author
and practitioner, Jude Carroll, has publicly stated that plagiarism exists in all educational institutions,
and those that do not admit to the problem are not being honest (Carroll, 2003b; see also Piety, 2002).
What seems to be emerging from commentary and research is the understanding that student
plagiarism is here to stay.
As Carroll has noted, “definitions matter and agreeing on a good one is harder than you think” (2003a,
p. 12). However, despite the difficulties of defining plagiarism, there is a significant body of literature
providing detailed advice on how to respond to student plagiarism, in terms of preventative, punitive
and educative measures. Researchers have provided practical recommendations at the institutional
level, and strategies at the individual educator level to deal with plagiarism, and many of these
suggestions overlap. One of the strategies to detect and deter student plagiarism has been the
development of electronic software tools. When these tools first became available many educators
believed that they would provide an easily implemented solution, which would cut down on the hours
of tedious manual detection. However, within a short period of time, it became clear that electronic
detection software “is not a magic bullet” (Carroll, 2003a) and that it is just one tool among many to be
used within an educative framework. Using our own research and practice as a basis, we argue that
despite its shortcomings, electronic detection in combination with manual analysis, nuanced academic
judgement and clear processes provide the means to determine if plagiarism has occurred. This paper
extends this understanding and provides a simple model to assist in the identification of student
plagiarism. We suggest that the most appropriate use of such a model is within an educative
framework that encourages students to take responsibility for their own learning while working hand in
hand with instructors during the drafting stages of their work.
In the initial sections of this paper, the authors review a wide variety of definitions and types of
‘plagiarisms’ identified in the literature. While acknowledging the complex nature of plagiarism, we
conclude that the common element in the various ‘plagiarisms’ is the lack of appropriate attribution to
the original source. The paper then explores the various responses to student plagiarism
recommended in the literature, the use of electronic tools to detect plagiarism, and the way that such
tools can be used within an educative framework to enhance student learning.

Defining plagiarism
We agree with Carroll’s (2003a) observation that agreeing to a definition of plagiarism is difficult, but
nonetheless necessary if students are to avoid breaching academic integrity. One of the impediments
to providing a conclusive definition of plagiarism is the complexity of factors influencing its occurrence,
which then creates an understandable reluctance on the part of educators and researchers to provide
a simple, once-and-for-all definition. Bretag (2005) refers to plagiarism as an issue potentially relating
to various factors, including linguistic competence, academic literacy, culture, racism, academic
integrity, media scandal and institutional governance. Further complicating the issue is the fact that
plagiarism is often conflated with cheating and academic misconduct generally.


Derived from the Latin word meaning ‘kidnap’ or ‘plunder’, the concept of plagiarism has criminal
connotations (Angélil-Carter, 2000, p. 16). For this reason, Angélil-Carter suggests that the whole
concept of plagiarism needs to undergo “substantial transformation” (2000, p. 17), as there are
“varying levels of plagiarism, and varying reasons for plagiarism, most of which are not ‘cheating’ or
intentionally fraudulent” (p. 116). According to James, McInnes and Devlin (2002), “plagiarism varies
in both intent and extent, ranging from deliberate fraud, to negligent or accidental failure to
acknowledge sources of paraphrased material and misunderstandings about the conventions of
authorship” (p. 5). Harris (2001) maintains that it is difficult to provide a single definition of plagiarism
Journal of University Teaching and Learning Practice     Vol 6.1, 2009                                      50
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                       Tracey Bretag and Saadia Mahmud



and provides seven sample definitions taking into account variations in the “the use of data, the
permissibility of collaboration, requirements for citation, and even what constitutes common
knowledge” (Harris, 2004).
The Council of Writing Program Administrators, based in the United States, refers to plagiarism as “a
multifaceted and ethically complex problem”. However, as an aid to educators, administrators and
students, they provide a pragmatic definition as follows: “…plagiarism occurs when a writer
deliberately uses someone else’s language, ideas, or other original (not common-knowledge) material
without acknowledging its source” (Defining and avoiding plagiarism: The WPA Statement on Best
Practices, 2008). Most university websites, while also acknowledging the complexity of the issue,
attempt to provide a practical definition of plagiarism along similar lines (for example, the University of
South Australia (Plagiarism – teaching strategies, 2008), Oxford Brookes University (Plagiarism,
2008b), Clemson University (Plagiarism, 2008a)).

Types of plagiarism
Given the lack of consensus regarding a single definition of plagiarism, it is not surprising that a wide
variety of (often overlapping) plagiarism types have been identified. Table 1 provides an overview of
some of the types of plagiarism mentioned by authors working in the broad field of academic literacy
and integrity, with the common element identified being the lack of appropriate attribution to the
original source.

Table 1: Types of plagiarism

Author                                   Type of plagiarism
Martin (1994)                            Word-for-word
                                         Paraphrasing
                                         Secondary sources
                                         Form of a source (structure of an argument)
                                         Ideas
                                         Authorship
Howard (1995)                            Cheating (borrowing, purchasing or otherwise obtaining another’s
                                         work)
                                         Non-attribution of sources
                                         ‘Patch-writing’
Klausman (1999)                          Direct
                                         Paraphrasing
                                         ‘Patchwork’
Evans (2000)                             Quotation
                                         Paraphrasing
                                         Auto-plagiarism (failure to cite oneself)
                                         Self plagiarism (submitting the same document several times)
                                         Cryptomnesia (where hidden memory plays a key role in lack of
                                         citation).
Harris (2001)                            Downloading free papers from the Internet
                                         Buying a paper from a commercial paper mill
                                         Copying an article from the Internet or online database
                                         Translating foreign article into English/another language
                                         Copying a paper from another student
                                         Cutting and pasting from several sources
                                         Quoting less than all the words copied
                                         Changing some words but copying whole phrases
                                         Paraphrasing without attribution
                                         Summarising without attribution
                                         Faking citations


Journal of University Teaching and Learning Practice          Vol 6.1, 2009                                 51
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                         Tracey Bretag and Saadia Mahmud




Cabe (2003)                              Direct
                                         Truncation
                                         Excision
                                         Insertions
                                         Inversions
                                         Substitutions
                                         Change of grammatical structure
                                         Undocumented factual information
                                         Inappropriate use of quotation marks
                                         Inappropriate use of paraphrasing
McCabe (2005)                            Unauthorised collaboration
                                         Paraphrasing
                                         Cut and paste (copying chunks of text)
                                         Falsifying bibliography
Roig (2006)                              Ideas
                                         Copying text
                                         Summarising
                                         Paraphrasing
                                         Collaboration
                                         Self-plagiarism
Bretag & Carapiet (2007);                Self-plagiarism (failure to cite one’s previously published work)
Scanlon (2007)
Errami, et al. (2007)                    Dual or duplicate publications
Wright & Armstrong (2007)                Faulty citation practices

Despite the wide variety in the types of plagiarism identified in Table 1, it is important not to equate
plagiarism with all forms of cheating and academic misconduct; nor is all plagiarism necessarily word-
for-word copying. What unites the different types of plagiarism is a lack of appropriate attribution to the
original source.

Responses to plagiarism
Extensive and explicit information relating to student plagiarism and academic misconduct in
assessment has a prominent place on university websites; see for example, the University of Adelaide
(Academic integrity policy principles, 2008), Murdoch University (Dishonesty in assessment, 2008)
and the University of Western Australia (Academic dishonesty, 2009). Rather than intimating that
plagiarism can be prevented, Carroll (2003a) maintains that institutions need to commit to the three
Ds: deterring, detecting and dealing with it fairly. Carroll (2003a, p. 19) provides a useful framework for
determining penalties for plagiarism, with four criteria, given in descending order of priority: extent of
the plagiarism, the student’s year level, the student’s knowledge of the institution’s academic
conventions and regulations, and the rules of the specific discipline.
The Centre for the Study of Higher Education (James, McInnes & Devlin, 2002, p. 39) presents three
aspects of plagiarism that first need to be considered by academics and administrators pursuing
potential academic misconduct. The first is the student’s “intent to cheat”, with “deliberately presenting
the work of others as one’s own” placed at the extreme, punishable end of a continuum. The second
aspect is “the extent of plagiarism” with “downloaded essay handed in as own paraphrasing” again
representing the extreme end of the continuum. The third consideration is the “possible responses to
plagiarism” that involve the first two aspects, and take either the form of educative or punitive
strategies (James, McInnes & Devlin, 2002, p. 39). Devlin (2002) further provides a set of ‘36
strategies to minimise plagiarism’ on The Centre for the Study of Higher Education (CSHE) website,
which includes advice regarding assessment development, timing and feedback, academic skills
education, student honesty, academic vigilance, student collaboration, detection of plagiarism and
penalties.
Journal of University Teaching and Learning Practice            Vol 6.1, 2009                                52
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                 Tracey Bretag and Saadia Mahmud




Using electronic text-matching software to
detect plagiarism
Manual detection of plagiarism can be difficult and time consuming and many commentators maintain
that the lengthy process of detecting plagiarism is one of the reasons some academics are reluctant to
pursue potential cases (Carroll, 2003a; Devlin, 2003; Duggan, 2003; McCabe, 2005; Zobel &
Hamilton, 2002). Martin (1994) cites Bjaaland and Lederman (1973), who recommend that
teachers/markers read essays four times as part of the process of detecting plagiarism. At a more
practical level, Harris (2004) offers teachers a number of strategies for detection of plagiarism in
research papers such as mixed citation styles, lack of references or quotations, unusual formatting,
being off topic, signs of datedness, anachronisms, anomalies of diction and style and clear indicators
of plagiarism which he calls “blunders of the clueless … since it includes obvious indicators of
copying”. Importantly, these strategies for detecting plagiarism are merely the starting point and
require further investigation to find the original source.


A current review of electronic plagiarism detection (Scaife, 2007) compared eleven products on the
market and classified these into four categories depending on the area of plagiarism addressed. The
four categories were:
1. Only perform checks against Internet based material, typically using one of the major Internet
  search engines
2. Check for similarity within a batch of documents
3. Educational suite of products offering complete student submission/plagiarism detection solutions
4. Non standard products (Scaife, 2007, p. 24)


The Scaife report found that almost half the products (five of the eleven) checked text against Internet
based material only, while only two of the products (Turnitin and Urkund) offered an educational suite
of products that checked against a range of sources, including the Internet, previously submitted
papers, and journals. According to the Scaife report, Turnitin was the top scoring product with 10
million users in over 80 countries. Second was Urkund, established in autumn 2000, and used by
several hundred schools and departments in Europe.
The existing electronic plagiarism detection services focus on ‘text-matching’ of the paper under
review with other material found on the Internet, previous papers submitted and journals. A limitation
of the services is that a vast amount of material which could be plagiarised is paper-based, such a
published books, paper journals and conference papers. The exclusion of non-electronic material
clearly limits the ability of the software to comprehensively detect plagiarism. Of the wide variety of
plagiarisms identified in Table 1, the text-matching facility in electronic plagiarism detection software is
only suited to detect ‘word-for-word’ or ‘direct’ plagiarism and then only in electronic form. The more
subtle forms of plagiarism, plus all types of plagiarism from paper-based sources, are not able to be
detected at present.
Educators and researchers working in the field of academic integrity agree that electronic detection is
not the solution to eliminating plagiarism. As early as 2001, Carroll and Appleton argued that
“electronic detection can only be an adjunct to the normal exercise of academic judgement” (2001, p.
25). Purdy (2005) insists that “As with any technology, plagiarism detection technology requires
human application and interpretation” (p. 286). Barrett and Malcolm (2006, p. 41) concur thatthe
software indicates possible plagiarism rather than providing complete certainty.




Journal of University Teaching and Learning Practice    Vol 6.1, 2009                                      53
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                Tracey Bretag and Saadia Mahmud




Determining student plagiarism using
electronic detection
In our own practice and research, we have found that Turnitin ‘Originality Reports’ provide an excellent
starting point, but what ultimately leads to determinations of plagiarism is considerable manual
analysis and subjective judgement. The overall similarity index provided by Turnitin (the cumulative
percentage of all the different sources which have been matched to the text under investigation) can
potentially be deceptive and a high percentage of text-match is not necessarily an indicator of any
form of plagiarism. For example, in one case from our own research (Bretag & Carapiet, 2007), there
was an overall similarity index of 49%, but this text match was comprised of 39 separate items, the
first six of which accounted for a 16% text-match, and the rest of the 33 items were just 1% matches
each. The highest match was only 4%. In this case, after manual analysis, it was determined that no
plagiarism had occurred. In another example, the overall similarity index was 56%, but a manual
check of the sources showed that the author had appropriately cited sources in every instance, and
therefore no plagiarism was determined to have occurred.
In addition to deceptively high text-matches, ‘anomalies’ can occur; for example, when a student has
previously submitted their own work to Turnitin to safeguard against inadvertent plagiarism. In this
case, when the same assignment is input by the instructor to Turnitin, a text-match of 100% is
immediately shown and must be checked and disregarded by the instructor. Careful analysis based on
pre-determined criteria is also important. For example, the instructor needs to determine which
elements of a paper can reasonably be replicated without a charge of plagiarism (e.g. cover sheet,
anti-plagiarism statement, topic, reference list). As Bretag (2008a) has argued previously, assessing
potential plagiarism also requires nuanced academic judgement based on a range of subjective
criteria, including but limited to the context (both academic and personal) within which the text has
been written. See Figure 1 which provides a diagrammatic illustration of the manual process we use in
conjunction with an electronic detection software program (in this case, Turnitin), to detect potential
plagiarism in students’ submissions for assessment.




Journal of University Teaching and Learning Practice   Vol 6.1, 2009                                   54
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                                Tracey Bretag and Saadia Mahmud




                                       Input document to
                                       Turnitin




                                                                                                           Not sufficient original
                                        Turnitin Originality Report                                        material
                                                                                                           Redraft paper




                                                Anomalies?                                 Overall
                                              (eg cover sheet;                             Similarity
                                                  previous                                 Index 50%
                                               submission to                                                     Yes
                                                                           No              or more
                                                  Turnitin)


                                                            Yes                                       No



                                              Excl anomalies.                         Probably no plagiarism
                                                Overall Sim.
                                              Index less than                         Check referencing
                                                   10%?                  Yes


                                                           No



                                                10% or more                           Probably no plagiarism
                                                match to one
                                                  source?                             Check referencing
                                                                           No



                                                          Yes


                                                Appropriate                           No plagiarism
                                                citation/s?

                                                                         Yes



                                                         No



                                                     Meets                            No plagiarism
                                                  subjective
                                                  judgement
                                                    criteria?            Yes



                                                           No


                                          Plagiarism Detected


           Figure 1: Determining student plagiarism using Turnitin


Journal of University Teaching and Learning Practice                  Vol 6.1, 2009                                                  55
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                 Tracey Bretag and Saadia Mahmud



It is not only instructors and markers who need to understand the process of detecting plagiarism
using electronic tools such as Turnitin. Importantly, the process described in Figure 1 needs to be
shared and discussed with students prior to the submission of assignments, in the same way that
marking criteria is explained and provided as a learning opportunity. As indicated by Figure 1, where
the Overall Similarity Index is 50% or greater, we recommend to students that there is insufficient
original material irrespective of references to sources, and that the paper needs to be redrafted so that
large sections of cut and paste quotations are summarised or paraphrased, plus given appropriate
citations. Presuming that the student has now submitted a paper with at least 50% of their own original
work, the next stage of analysis uses criteria from our own research (Bretag & Carapiet, 2007), which
applies the 10% copying guideline provided by the Copyright Act. We further advise students that
quotations of up 10% are acceptable, as long as they are appropriately cited.
The plagiarism identification process detailed in Figure 1 cannot stand alone and needs to be
integrated within an educative process (Carroll, 2003a; Devlin, 2003; Zobel & Hamilton, 2002). In
addition to receiving clear, consistent and ongoing instruction relating to academic conventions, from
note-taking to developing an academic argument using sources, students should be encouraged to
use the capabilities of electronic detection software to improve their work before submitting it for
evaluation.
In the course ‘Managing Communication in Business’ at the University of South Australia, coordinated
by Bretag, students are required to use Turnitin as a means of checking their own drafts prior to
submission. The following information is provided in the Course Information Booklet:
        In this course, students are required to submit their assignment on two separate
        occasions to Turnitin prior to submitting the assignment for marking. The first
        submission will be a draft and the second submission will be your final revised
        assignment (the same one that you submit for marking and feedback). The
        purpose of submitting your work to Turnitin is to allow you to redraft your work,
        and prevent inadvertent plagiarism.
        Tips for using Turnitin
        Turnitin will create an ‘Originality Report’, which will show you an overall
        ‘Similarity Index’. This is the percentage of your essay that matches other
        electronic sources available on the Internet, databases and other students’
        submissions. If the overall text-match is less than 10% from any one source, you
        do not need to revise the essay, but you should still check that each text-match is
        shown appropriately with “quotation marks” and with the full reference (both in-
        text and in the reference list).
        If the overall text-match is greater than 10% from any one source, you will need to
        go through the essay carefully, and reduce the text-match by paraphrasing and
        summarising. Remember to still provide the in-text reference wherever you have
        used ideas from another source. All direct quotations must be shown clearly in
        “quotation marks” with the full reference.
        The overall Similarity Index might be as high as 30-40%, but this is not
        necessarily a problem if each of the individual text-matches are less than 10%,
        and are appropriately referenced. The important thing is for you to use the
        Originality Report from your draft submission to carefully check that you have
        referenced all sources throughout your essay. If your essay has a very high
        overall Similarity Index (e.g. over 50%), this is probably an indication that you
        have not used your paraphrasing and summarising skills adequately. You will
        need to carefully recraft the essay so that you have not simply ‘cut and paste’
        from sources without using your own words (Bretag, 2008a).




Journal of University Teaching and Learning Practice    Vol 6.1, 2009                                   56
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                 Tracey Bretag and Saadia Mahmud



As the excerpt above indicates, electronic detection has the capacity to be part of the educative
process, rather than a punitive response to plagiarism. Recent research has indicated that when
electronic detection software is used in this way, students and instructors can work collaboratively
towards improving academic literacies and learning outcomes. Keuskamp and Sliuzas (2007) maintain
that text-matching software can provide educative opportunities, but suggest that students’ academic
literacies may need further development to fully benefit from the quantitative reports generated, a
position with which we concur. Despite some of her own reservations, McKeever (2006, p. 163) also
concludes that electronic detection software can be a “beneficial educational tool”, enabling tutors and
students to work collaboratively on the development of academic skills. Culwin (2006) demonstrated
an imaginative use of detection software within one course as part of an overall plagiarism prevention
strategy, and Morse (2006) has argued for: “…a proactive response to plagiarism, such as class
discussions and assignments examining the many complexities and implications of plagiarism
combined with students adopting Turnitin.com as a writing tool [which] allows instructors to engage
students in responsible academic writing” (Morse in Donnelly, Ingalis, Morse, Castner & Stockdell-
Giesler, 2006).
Students have also reported favourably on the use of Turnitin as an educative tool. Based on a survey
of 152 students who had used Turnitin to draft assignments prior to final submission, Cheah and
Bretag (2008b) found that 71.4% of students agreed that Turnitin helped them to identify sections of
text that had been copied directly from sources; 74.2% stated that the program had helped them to
identify areas that required editing to avoid plagiarism; and 70.5% believed that using Turnitin in this
way had made them more aware of academic integrity. In the course in which the surveyed students
were enrolled, one-on-one tutorial assistance was provided to every student to interpret the Originality
Reports generated by Turnitin. Students were then encouraged to use the Reports to assist them in
redrafting their papers prior to final submission. Where students were still concerned about the high
text match indicated in the Overall Similarity Index, further consultation with their tutor was provided,
without any suggestion that a high text-match equated to deliberate plagiarism or possible penalty.

Conclusion
In agreement with other theorists, we maintain that the very concept of ‘plagiarism’ is complex and
therefore difficult to define. Having reviewed a wide variety of ‘plagiarisms’ identified in the literature,
we conclude that the common element is the lack of appropriate attribution to the original source. An
increased interest in plagiarism in recent years has led educators to find the most appropriate ways to
deter, detect and deal with plagiarism (Carroll, 2003a). Electronic detection software potentially
contributes to each of those three areas, although as the literature makes clear, it is not a ‘magic
bullet’ (Carroll, 2003a), not least because it is only suited for identifying ‘word-for-word’ or ‘direct’
plagiarism and then only in electronic form. There are many other, more subtle forms of plagiarism
which are not available for analysis by electronic detection software.


Using our own research and practice as a basis, we conclude that despite its shortcomings, electronic
detection in combination with manual analysis, nuanced academic judgement and clear processes
provide the means to determine if plagiarism has occurred. This paper has provided a simple model
for identifying student plagiarism, and suggested that the most appropriate use of such a model is in
collaboration with students, prior to the final submission of assignments. If used within an educative
framework that encourages students to take responsibility for their own learning, while working hand in
hand with instructors during the drafting stages, we believe that electronic detection software provides
one means of ensuring academic integrity in students’ written assignments.




Journal of University Teaching and Learning Practice    Vol 6.1, 2009                                      57
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                Tracey Bretag and Saadia Mahmud




References
Academic integrity policy principles (2008). University of Adelaide. Retrieved 8 May 2008 from:
http://www.adelaide.edu.au/policies/?230
Academic dishonesty (2009). University of Western Australia. Retrieved 22 July 2009, from:
http://www.arts.uwa.edu.au/studentnet/policies/dishonesty
Angelil-Carter, S. (2000). Stolen Language? Plagiarism in Writing. Essex: Pearson Education Limited.
Barrett, R. & Malcolm, J. (2006). Embedding Plagiarism Education in the Assessment Process.
International Journal for Educational Integrity, 1-9.
Blancett, S.S., Flanagan, A. & Young, R.K. (1995). Duplicate publication in the nursing literature.
Journal of Nursing Scholarship, 27(1), 51-56.
Bloemenkamp, D.G., Walvoort, H.C., Hart, W. & Overbeke, A. J. (1999). Duplicate publication of
articles in the Dutch Journal of Medicine in 1996. Ned Tijdschr Geneeskd, 143(43), 2150-2153.
Bretag, T. (2005). Implementing plagiarism policy in the internationalised university, Part 3 in
Developing internationalism in the internationalised university: A practitioner research project, Doctor
of Education thesis, Division of Education, Arts and Social Sciences, University of South Australia.
Bretag, T. (2007). The Emperor's new clothes: Yes, there is a link between English language
competence and academic standards, People and Place, Vol 15 (1), pp. 13-21.
Bretag, T. (2008a) Managing Communication in Business Course Information Booklet, Division of
Business, University of South Australia, Adelaide.
Bretag, T. (2008b) Responding to plagiarism: The need to engage with students’ ‘real lives’, ATN
Assessment Conference: Engaging students in assessment refereed proceedings, University of South
Australia, 20-21 November. 2008

Bretag, T. & Carapiet, S. (2007), A preliminary study to determine the extent of self-plagiarism in
Australian academic research, Plagiary: Cross-Disciplinary Studies in Plagiarism, Fabrication and
Falsification. Vol 2(5), 1-15. http://www.plagiary.org/
Broome, M.E. (2004). Self-plagiarism: Oxymoron, fair use, or scientific misconduct? Nursing Outlook,
52(6), 273-274.
Cabe, P. (2003). Examples of plagiarism – a taxonomy, in ‘About plagiarism’ (from TIPSters, Teaching
in Psychological Science) [Electronic Version]. Retrieved 29 January 2008 from
http://psych.skidmore.edu/plagiarism.htm.
Carroll, J. (2003a). Six things I did not know four years ago about dealing with plagiarism. Invited
Keynote Address, Asia-Pacific Conference on Educational Integrity: Plagiarism and Other Perplexities,
University of South Australia, Adelaide.
Carroll, J. (2003b). Unpublished comments from the keynote address. Asia-Pacific Conference on
Educational Integrity: Plagiarism and Other Perplexities. University of South Australia, Adelaide.
Carroll, J. & Appleton, J. (2001). Plagiarism: A Good Practice Guide. Retrieved 6 February 2008, from
http://www.leeds.ac.uk/candit/plagiarism/brookes.pdf.
Cheah, S.W. & Bretag, T. (2008). Making technology work for academic integrity in Malaysia. 3rd
International Plagiarism Conference Refereed Proceedings, Newcastle-on-Tyne, U.K. 23-25 June
2008.
Culwin, F. (2006). An active introduction to academic misconduct and the measured demographics of
misconduct, in Assessment & Evaluation in Higher Education, Vol 31(2), 167-182.
Defining and avoiding plagiarism: The WPA Statement on Best Practices (Publication (2008).
Retrieved 29 January, from Council of Writing Program Administrators www.wpacouncil.org

Journal of University Teaching and Learning Practice   Vol 6.1, 2009                                       58
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                 Tracey Bretag and Saadia Mahmud



Devlin, M. (2002). Minimising plagiarism. Retrieved 18 August, 2004, from
http://www.cshe.unimelb.edu.au/assessinglearning/03/plagMain.html
Devlin, M. (2003, 21-22 November). Policy, preparation, prevention and punishment - One faculty's
holistic approach to minimising plagiarism. Paper presented at the Educational Integrity: Plagiarism
and Other Perplexities Conference, Adelaide.
Dishonesty in assessment (2008). Murdoch University. Retrieved 8 May 2008 from
http://www.murdoch.edu.au/admin/policies/assessmentlinks.html#18
Duggan, F. (2003). The Plagiarism Advisory Service: A one-stop shop. Paper presented at the
Educational integrity: Plagiarism and other perplexities Conference.
Errami, M., Hicks, J.M., Fisher, W., Trusty, D., Wren, J.D., Long, T.C. et al. (2007). Deja vu - A Study
of Duplicate Citations in Medline. Bioinformatics Advance Access, 1-8.
Evans, J.T. (2000). The new plagiarism in higher education: From selection to reflection [Electronic
Version]. TELRI Project. Retrieved 5 June 2003 from
www.warwick.ac.uk/ETS/interactions/vol4no2/evans.html
Harris, R. (2004). Anti-Plagiarism Strategies for Research Papers [Electronic Version]. VirtualSalt, 17
November. Retrieved 14 January 2008 from http://www.virtualsalt.com/antiplag.htm
Harris, R.A. (2001). The plagiarism handbook: Strategies for preventing, detecting, and dealing with
plagiarism. California: Eyrczak Publishing.
Howard, R.M. (1995). Plagiarisms, authorships, and the academic death penalty. College English,
57(7), 788-806.
James, R., McInnes, C. & Devlin, M. (2002). Assessing learning in Australian universities [Electronic
Version]. Retrieved 18 August, 2004 from http://www.cshe.unimelb.edu.au/assessinglearning
Keuskamp, D. & Sliuzas, R. (2007). Plagiarism prevention or detection? The contribution of text-
matching software to education about academic integrity. Journal of Academic Language & Learning,
Vol 1(1), A91-A99.
Klausman, J. (1999). Teaching about Plagiarism in the Age of the Internet. Teaching English in the
Two-year College, 27(December), 209-212.
Martin, B. (1994). Plagiarism: a misplaced emphasis. Journal of Information Ethics, 3(2), 36-47.
McCabe, D. (2005). Cheating among college and university students: A North American perspective.
International Journal for Educational Integrity, 1(1).
McCabe, D., Butterfield, K.D. & Trevino, L.K. (2006). Academic dishonesty in graduate business
programs: Prevalence, causes and proposed action. Academy of Management Learning & Education,
5(3), pp. 294-305.
McKeever, L. (2006). Online plagiarism detection services – Saviour or scourge? In Assessment &
Evaluation in Higher Education, Vol 31(2), 155-165.
Donnelly, M., Ingalis, R., Morse, T.A., Castner, J. & Stockdell-Giesler, A.M. (2006). (Mis)trusting
technology that polices integrity: A critical assessment of Turnitin.com. Inventio, Vol 1(8). Retrieved
online 4 February 2008 from:http://www.doit.gmu.edu/inventio/issues/Fall_2006/Donnelly_10.html
Piety, M. (2002). A culture of plagiarism? [Electronic Version]. Retrieved 20 August, 2004 from
http://www.drexel.edu/doj/archives/2002/essay/plagiarism.html
Plagiarism (2008a). Clemson University. Retrieved 29 January 2008, from
http://www.grad.clemson.edu/plagiarism.php
Plagiarism (2008b). Oxford Brookes University. Retrieved 29 January 2008, from
http://www.brookes.ac.uk/library/skill/plagiarism.html
Plagiarism – teaching strategies (2008). University of South Australia. Retrieved 29 January 2008.
from http://www.unisanet.unisa.edu.au/learningconnection/staff/practice/plagiarism-strategies.asp

Journal of University Teaching and Learning Practice    Vol 6.1, 2009                                      59
A model for determining stud en t plagiarism: Electronic detection and academic
                                                                              judgement
                                                                Tracey Bretag and Saadia Mahmud



Purdy, J.P. (2005). Calling off the hounds: Technology and the visibility of plagiarism. Pedagogy:
Critical Approaches to Teaching Literature, Language, Composition, and Culture, 5(2), 275-295.
Roig, M. (2006). Avoiding plagiarism, self-plagiarism, and other questionable writing practices: A guide
to ethical writing. Retrieved 29 January 2008, from
http://facpub.stjohns.edu/~roigm/plagiarism/Index.html.
Samuelson, P. (1994). Self-plagiarism or fair use? Communications of the ACM, 37(8), 21-25.
Scanlon, P.M. (2007). Song from myself: An anatomy of self-plagiarism. Plagiary: Cross-Disciplinary
Studies in Plagiarism, Fabrication and Falsification, 2 (1), 1-10.
Scaife, B. (2007). IT Consultancy Plagiarism Detection Software Report for JISC Advisory Service.
Manchester: NCC Group plc.
Wright, M. & Armstrong, J.S. (2007). The Ombudsman: Verification of Citations: Fawlty Towers of
Knowledge. Interfaces, 00(0), 1-15.
Zobel, J. & Hamilton, M. (2002). Managing student plagiarism in large academic departments.
Australian Universities' Review, 45(2), 23-30.




Journal of University Teaching and Learning Practice   Vol 6.1, 2009                                       60

Mais conteúdo relacionado

Mais procurados

Swoogle: Showcasing the Significance of Semantic Search
Swoogle: Showcasing the Significance of Semantic SearchSwoogle: Showcasing the Significance of Semantic Search
Swoogle: Showcasing the Significance of Semantic SearchIDES Editor
 
Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringIOSR Journals
 
Ontology Mapping
Ontology MappingOntology Mapping
Ontology Mappingsamhati27
 
Are Data Models Superfluous Nov2003
Are Data Models Superfluous Nov2003Are Data Models Superfluous Nov2003
Are Data Models Superfluous Nov2003Andries_vanRenssen
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic WebBarry Smith
 
Probabilistic Topic Models
Probabilistic Topic ModelsProbabilistic Topic Models
Probabilistic Topic ModelsSteve Follmer
 

Mais procurados (6)

Swoogle: Showcasing the Significance of Semantic Search
Swoogle: Showcasing the Significance of Semantic SearchSwoogle: Showcasing the Significance of Semantic Search
Swoogle: Showcasing the Significance of Semantic Search
 
Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document Clustering
 
Ontology Mapping
Ontology MappingOntology Mapping
Ontology Mapping
 
Are Data Models Superfluous Nov2003
Are Data Models Superfluous Nov2003Are Data Models Superfluous Nov2003
Are Data Models Superfluous Nov2003
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic Web
 
Probabilistic Topic Models
Probabilistic Topic ModelsProbabilistic Topic Models
Probabilistic Topic Models
 

Destaque

Reference Management for Social Science Research: An Introduction to Zotero
Reference Management for Social Science Research: An Introduction to ZoteroReference Management for Social Science Research: An Introduction to Zotero
Reference Management for Social Science Research: An Introduction to ZoteroVenkitachalam Sriram
 
05 chap 4 research methodology and design(1)
05 chap 4 research methodology and design(1)05 chap 4 research methodology and design(1)
05 chap 4 research methodology and design(1)ELIMENG
 
Plagiarism and technology in the classroom
Plagiarism and technology in the classroomPlagiarism and technology in the classroom
Plagiarism and technology in the classroomKatie Feldman
 
Internet plagiarism among college student
Internet plagiarism among college studentInternet plagiarism among college student
Internet plagiarism among college studentNor Azmi Sabri
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBPMarwan H. Noman
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignmentMaiJoy
 
A Practice Teaching Portfolio
A Practice Teaching PortfolioA Practice Teaching Portfolio
A Practice Teaching PortfolioEmilyn Ragasa
 
Reflective Practice Presentation
Reflective Practice PresentationReflective Practice Presentation
Reflective Practice PresentationJennifer Fenton
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in researchR.Harish Kumar
 
Role of computers in research
Role of computers in researchRole of computers in research
Role of computers in researchSaravana Kumar
 
Research methodology mcom part II sem IV assignment
Research methodology mcom part II sem IV assignmentResearch methodology mcom part II sem IV assignment
Research methodology mcom part II sem IV assignmentRutuja Chudnaik
 
A project on research and methodology of maggi
A project on research and methodology of maggiA project on research and methodology of maggi
A project on research and methodology of maggiProjects Kart
 
A narrative report on teaching experiences
A narrative report on teaching experiencesA narrative report on teaching experiences
A narrative report on teaching experiencesYuna Lesca
 
Research methodology for project work for undergraduate students
Research  methodology  for project work for undergraduate  studentsResearch  methodology  for project work for undergraduate  students
Research methodology for project work for undergraduate studentsDr. Sanjay Sawant Dessai
 
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoOn the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoSheenbie Palado
 
Field Study and Pre - Service Teaching Portfolio
Field Study and Pre - Service Teaching PortfolioField Study and Pre - Service Teaching Portfolio
Field Study and Pre - Service Teaching Portfolioaleli ariola
 

Destaque (20)

Reference Management for Social Science Research: An Introduction to Zotero
Reference Management for Social Science Research: An Introduction to ZoteroReference Management for Social Science Research: An Introduction to Zotero
Reference Management for Social Science Research: An Introduction to Zotero
 
05 chap 4 research methodology and design(1)
05 chap 4 research methodology and design(1)05 chap 4 research methodology and design(1)
05 chap 4 research methodology and design(1)
 
Plagiarism and technology in the classroom
Plagiarism and technology in the classroomPlagiarism and technology in the classroom
Plagiarism and technology in the classroom
 
Internet plagiarism among college student
Internet plagiarism among college studentInternet plagiarism among college student
Internet plagiarism among college student
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
A Practice Teaching Portfolio
A Practice Teaching PortfolioA Practice Teaching Portfolio
A Practice Teaching Portfolio
 
Reflective Practice Presentation
Reflective Practice PresentationReflective Practice Presentation
Reflective Practice Presentation
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in research
 
Role of computers in research
Role of computers in researchRole of computers in research
Role of computers in research
 
Research methodology mcom part II sem IV assignment
Research methodology mcom part II sem IV assignmentResearch methodology mcom part II sem IV assignment
Research methodology mcom part II sem IV assignment
 
Introduction to Research Ethics
Introduction to Research EthicsIntroduction to Research Ethics
Introduction to Research Ethics
 
A project on research and methodology of maggi
A project on research and methodology of maggiA project on research and methodology of maggi
A project on research and methodology of maggi
 
Field study portfolio
Field study portfolioField study portfolio
Field study portfolio
 
A narrative report on teaching experiences
A narrative report on teaching experiencesA narrative report on teaching experiences
A narrative report on teaching experiences
 
Research methodology for project work for undergraduate students
Research  methodology  for project work for undergraduate  studentsResearch  methodology  for project work for undergraduate  students
Research methodology for project work for undergraduate students
 
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie PaladoOn the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
On the-job-trainee (NARRATiVE REPORT) Sheenbie Palado
 
Field Study and Pre - Service Teaching Portfolio
Field Study and Pre - Service Teaching PortfolioField Study and Pre - Service Teaching Portfolio
Field Study and Pre - Service Teaching Portfolio
 
Reflective Teaching
Reflective TeachingReflective Teaching
Reflective Teaching
 
Research methodology notes
Research methodology notesResearch methodology notes
Research methodology notes
 

Semelhante a A model for determining student plagiarism

Assessing Academic Integrity Using SafeAssign Plagiarism Detection Software
Assessing Academic Integrity Using SafeAssign Plagiarism Detection SoftwareAssessing Academic Integrity Using SafeAssign Plagiarism Detection Software
Assessing Academic Integrity Using SafeAssign Plagiarism Detection SoftwareAlicia Buske
 
An Overview Of Theories Explaining Plagiaristic Behavior Of Students
An Overview Of Theories Explaining Plagiaristic Behavior Of StudentsAn Overview Of Theories Explaining Plagiaristic Behavior Of Students
An Overview Of Theories Explaining Plagiaristic Behavior Of StudentsBecky Gilbert
 
MERLOT Journal of Online Learning and Teaching .docx
MERLOT Journal of Online Learning and Teaching                .docxMERLOT Journal of Online Learning and Teaching                .docx
MERLOT Journal of Online Learning and Teaching .docxARIV4
 
Plagiarism prevention and detection
Plagiarism prevention and detectionPlagiarism prevention and detection
Plagiarism prevention and detectionFrederik Questier
 
A Briefing On Plagiarism
A Briefing On PlagiarismA Briefing On Plagiarism
A Briefing On PlagiarismAaron Anyaakuu
 
Academic Dishonesty A Preliminary Researchers View
Academic Dishonesty  A Preliminary Researchers ViewAcademic Dishonesty  A Preliminary Researchers View
Academic Dishonesty A Preliminary Researchers ViewLeslie Schulte
 
University Students Perceptions of PlagiarismAuthor(s).docx
 University Students Perceptions of PlagiarismAuthor(s).docx University Students Perceptions of PlagiarismAuthor(s).docx
University Students Perceptions of PlagiarismAuthor(s).docxaryan532920
 
Attitudes Of Second Year Computer Science Undergraduates Toward Plagiarism
Attitudes Of Second Year Computer Science Undergraduates Toward PlagiarismAttitudes Of Second Year Computer Science Undergraduates Toward Plagiarism
Attitudes Of Second Year Computer Science Undergraduates Toward PlagiarismSean Flores
 
Turnitin white paper_plagiarismspectrum
Turnitin white paper_plagiarismspectrumTurnitin white paper_plagiarismspectrum
Turnitin white paper_plagiarismspectrummurill
 
Algorithmic Bias In Education
Algorithmic Bias In EducationAlgorithmic Bias In Education
Algorithmic Bias In EducationAudrey Britton
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmarijtsrd
 
Academic Plagiarism
Academic PlagiarismAcademic Plagiarism
Academic PlagiarismEssayTask
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismDr. Utpal Das
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismDr. Utpal Das
 
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...Courtney Esco
 
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...Can Machine Generated Text Be Detected? European Conference on Ethics and Int...
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...Thomas Lancaster
 
Analysing The Efl Undergraduate Students Plagiarism In Writing Academic Papers
Analysing The Efl Undergraduate Students  Plagiarism In Writing Academic PapersAnalysing The Efl Undergraduate Students  Plagiarism In Writing Academic Papers
Analysing The Efl Undergraduate Students Plagiarism In Writing Academic PapersRachel Doty
 
Academic Integrity in the Digital Age
Academic Integrity  in the Digital AgeAcademic Integrity  in the Digital Age
Academic Integrity in the Digital AgeJheel Barad
 

Semelhante a A model for determining student plagiarism (20)

Assessing Academic Integrity Using SafeAssign Plagiarism Detection Software
Assessing Academic Integrity Using SafeAssign Plagiarism Detection SoftwareAssessing Academic Integrity Using SafeAssign Plagiarism Detection Software
Assessing Academic Integrity Using SafeAssign Plagiarism Detection Software
 
An Overview Of Theories Explaining Plagiaristic Behavior Of Students
An Overview Of Theories Explaining Plagiaristic Behavior Of StudentsAn Overview Of Theories Explaining Plagiaristic Behavior Of Students
An Overview Of Theories Explaining Plagiaristic Behavior Of Students
 
MERLOT Journal of Online Learning and Teaching .docx
MERLOT Journal of Online Learning and Teaching                .docxMERLOT Journal of Online Learning and Teaching                .docx
MERLOT Journal of Online Learning and Teaching .docx
 
Plagiarism prevention and detection
Plagiarism prevention and detectionPlagiarism prevention and detection
Plagiarism prevention and detection
 
A Briefing On Plagiarism
A Briefing On PlagiarismA Briefing On Plagiarism
A Briefing On Plagiarism
 
Academic Dishonesty A Preliminary Researchers View
Academic Dishonesty  A Preliminary Researchers ViewAcademic Dishonesty  A Preliminary Researchers View
Academic Dishonesty A Preliminary Researchers View
 
University Students Perceptions of PlagiarismAuthor(s).docx
 University Students Perceptions of PlagiarismAuthor(s).docx University Students Perceptions of PlagiarismAuthor(s).docx
University Students Perceptions of PlagiarismAuthor(s).docx
 
Attitudes Of Second Year Computer Science Undergraduates Toward Plagiarism
Attitudes Of Second Year Computer Science Undergraduates Toward PlagiarismAttitudes Of Second Year Computer Science Undergraduates Toward Plagiarism
Attitudes Of Second Year Computer Science Undergraduates Toward Plagiarism
 
Turnitin white paper_plagiarismspectrum
Turnitin white paper_plagiarismspectrumTurnitin white paper_plagiarismspectrum
Turnitin white paper_plagiarismspectrum
 
Algorithmic Bias In Education
Algorithmic Bias In EducationAlgorithmic Bias In Education
Algorithmic Bias In Education
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmar
 
Academic Plagiarism
Academic PlagiarismAcademic Plagiarism
Academic Plagiarism
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarism
 
Confronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarismConfronting ethical issues in research for avoiding plagiarism
Confronting ethical issues in research for avoiding plagiarism
 
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
 
143410588 plagiat
143410588 plagiat143410588 plagiat
143410588 plagiat
 
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...Can Machine Generated Text Be Detected? European Conference on Ethics and Int...
Can Machine Generated Text Be Detected? European Conference on Ethics and Int...
 
ESSAY.docx
ESSAY.docxESSAY.docx
ESSAY.docx
 
Analysing The Efl Undergraduate Students Plagiarism In Writing Academic Papers
Analysing The Efl Undergraduate Students  Plagiarism In Writing Academic PapersAnalysing The Efl Undergraduate Students  Plagiarism In Writing Academic Papers
Analysing The Efl Undergraduate Students Plagiarism In Writing Academic Papers
 
Academic Integrity in the Digital Age
Academic Integrity  in the Digital AgeAcademic Integrity  in the Digital Age
Academic Integrity in the Digital Age
 

Último

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

A model for determining student plagiarism

  • 1. Journal of University Teaching & Learning Practice Volume 6, Issue 1 2009 Article 6 A model for determining student plagiarism: Electronic detection and academic judgement Tracey Bretag∗ Saadia Mahmud† ∗ University of South Australia, tracey.bretag@unisa.edu.au † University of South Australia, saadia.mahmud@unisa.edu.au Copyright c 2009 by the authors. The Journal of University Teaching & Learning Practice is published by the University of Wollongong. URL - http://ro.uow.edu.au/jutlp
  • 2. A model for determining student plagiarism: Electronic detection and academic judgement∗ Tracey Bretag and Saadia Mahmud Abstract This paper provides insights based on the authors’ own practice as university instructors, re- searchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common ele- ment between the various types of plagiarism to be the lack of appropriate attribution to the original source. The use of electronic text-matching software to detect different types of plagiarism is ex- plored, and a model presented for identifying potential plagiarism in students’ work. The authors conclude that despite its shortcomings, electronic detection in combination with manual analysis, nuanced academic judgement and clear processes provide the means to determine if plagiarism has occurred. ∗ Saadia Mahmud, previously known as Saadia Carapiet.
  • 3. Journal of University Teaching and Learning Practice A model for determining student plagiarism: Electronic detection and academic judgement. Tracey Bretag and Saadia Mahmud1 School of Management, University of South Australia tracey.bretag@unisa.edu.au; saadia.mahmud@unisa.edu.au Abstract This paper provides insights based on the authors’ own practice as university instructors, researchers and arbitrators of student plagiarism. Recognising the difficulty in defining plagiarism while still acknowledging the practical importance of doing so, the authors find the common element between the various types of plagiarism to be the lack of appropriate attribution to the original source. The use of electronic text-matching software to detect different types of plagiarism is explored, and a model presented for identifying potential plagiarism in students’ work. The authors conclude that despite its shortcomings, electronic detection in combination with manual analysis, nuanced academic judgement and clear processes provide the means to determine if plagiarism has occurred. 1 Saadia Mahmud, previously known as Saadia Carapiet.
  • 4. A model for determining stud en t plagiarism: Electronic detection and academic judgement Formatted Tracey Bretag and Saadia Mahmud Introduction The public perception that plagiarism is on the rise has resulted in a proliferation of discussion and research on student plagiarism (Angelil-Carter, 2000; Bretag, 2005, 2007; Carroll, 2003a; Devlin, 2003; McCabe, Butterfield & Trevino, 2006; Zobel & Hamilton, 2002). Internationally recognised author and practitioner, Jude Carroll, has publicly stated that plagiarism exists in all educational institutions, and those that do not admit to the problem are not being honest (Carroll, 2003b; see also Piety, 2002). What seems to be emerging from commentary and research is the understanding that student plagiarism is here to stay. As Carroll has noted, “definitions matter and agreeing on a good one is harder than you think” (2003a, p. 12). However, despite the difficulties of defining plagiarism, there is a significant body of literature providing detailed advice on how to respond to student plagiarism, in terms of preventative, punitive and educative measures. Researchers have provided practical recommendations at the institutional level, and strategies at the individual educator level to deal with plagiarism, and many of these suggestions overlap. One of the strategies to detect and deter student plagiarism has been the development of electronic software tools. When these tools first became available many educators believed that they would provide an easily implemented solution, which would cut down on the hours of tedious manual detection. However, within a short period of time, it became clear that electronic detection software “is not a magic bullet” (Carroll, 2003a) and that it is just one tool among many to be used within an educative framework. Using our own research and practice as a basis, we argue that despite its shortcomings, electronic detection in combination with manual analysis, nuanced academic judgement and clear processes provide the means to determine if plagiarism has occurred. This paper extends this understanding and provides a simple model to assist in the identification of student plagiarism. We suggest that the most appropriate use of such a model is within an educative framework that encourages students to take responsibility for their own learning while working hand in hand with instructors during the drafting stages of their work. In the initial sections of this paper, the authors review a wide variety of definitions and types of ‘plagiarisms’ identified in the literature. While acknowledging the complex nature of plagiarism, we conclude that the common element in the various ‘plagiarisms’ is the lack of appropriate attribution to the original source. The paper then explores the various responses to student plagiarism recommended in the literature, the use of electronic tools to detect plagiarism, and the way that such tools can be used within an educative framework to enhance student learning. Defining plagiarism We agree with Carroll’s (2003a) observation that agreeing to a definition of plagiarism is difficult, but nonetheless necessary if students are to avoid breaching academic integrity. One of the impediments to providing a conclusive definition of plagiarism is the complexity of factors influencing its occurrence, which then creates an understandable reluctance on the part of educators and researchers to provide a simple, once-and-for-all definition. Bretag (2005) refers to plagiarism as an issue potentially relating to various factors, including linguistic competence, academic literacy, culture, racism, academic integrity, media scandal and institutional governance. Further complicating the issue is the fact that plagiarism is often conflated with cheating and academic misconduct generally. Derived from the Latin word meaning ‘kidnap’ or ‘plunder’, the concept of plagiarism has criminal connotations (Angélil-Carter, 2000, p. 16). For this reason, Angélil-Carter suggests that the whole concept of plagiarism needs to undergo “substantial transformation” (2000, p. 17), as there are “varying levels of plagiarism, and varying reasons for plagiarism, most of which are not ‘cheating’ or intentionally fraudulent” (p. 116). According to James, McInnes and Devlin (2002), “plagiarism varies in both intent and extent, ranging from deliberate fraud, to negligent or accidental failure to acknowledge sources of paraphrased material and misunderstandings about the conventions of authorship” (p. 5). Harris (2001) maintains that it is difficult to provide a single definition of plagiarism Journal of University Teaching and Learning Practice Vol 6.1, 2009 50
  • 5. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud and provides seven sample definitions taking into account variations in the “the use of data, the permissibility of collaboration, requirements for citation, and even what constitutes common knowledge” (Harris, 2004). The Council of Writing Program Administrators, based in the United States, refers to plagiarism as “a multifaceted and ethically complex problem”. However, as an aid to educators, administrators and students, they provide a pragmatic definition as follows: “…plagiarism occurs when a writer deliberately uses someone else’s language, ideas, or other original (not common-knowledge) material without acknowledging its source” (Defining and avoiding plagiarism: The WPA Statement on Best Practices, 2008). Most university websites, while also acknowledging the complexity of the issue, attempt to provide a practical definition of plagiarism along similar lines (for example, the University of South Australia (Plagiarism – teaching strategies, 2008), Oxford Brookes University (Plagiarism, 2008b), Clemson University (Plagiarism, 2008a)). Types of plagiarism Given the lack of consensus regarding a single definition of plagiarism, it is not surprising that a wide variety of (often overlapping) plagiarism types have been identified. Table 1 provides an overview of some of the types of plagiarism mentioned by authors working in the broad field of academic literacy and integrity, with the common element identified being the lack of appropriate attribution to the original source. Table 1: Types of plagiarism Author Type of plagiarism Martin (1994) Word-for-word Paraphrasing Secondary sources Form of a source (structure of an argument) Ideas Authorship Howard (1995) Cheating (borrowing, purchasing or otherwise obtaining another’s work) Non-attribution of sources ‘Patch-writing’ Klausman (1999) Direct Paraphrasing ‘Patchwork’ Evans (2000) Quotation Paraphrasing Auto-plagiarism (failure to cite oneself) Self plagiarism (submitting the same document several times) Cryptomnesia (where hidden memory plays a key role in lack of citation). Harris (2001) Downloading free papers from the Internet Buying a paper from a commercial paper mill Copying an article from the Internet or online database Translating foreign article into English/another language Copying a paper from another student Cutting and pasting from several sources Quoting less than all the words copied Changing some words but copying whole phrases Paraphrasing without attribution Summarising without attribution Faking citations Journal of University Teaching and Learning Practice Vol 6.1, 2009 51
  • 6. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Cabe (2003) Direct Truncation Excision Insertions Inversions Substitutions Change of grammatical structure Undocumented factual information Inappropriate use of quotation marks Inappropriate use of paraphrasing McCabe (2005) Unauthorised collaboration Paraphrasing Cut and paste (copying chunks of text) Falsifying bibliography Roig (2006) Ideas Copying text Summarising Paraphrasing Collaboration Self-plagiarism Bretag & Carapiet (2007); Self-plagiarism (failure to cite one’s previously published work) Scanlon (2007) Errami, et al. (2007) Dual or duplicate publications Wright & Armstrong (2007) Faulty citation practices Despite the wide variety in the types of plagiarism identified in Table 1, it is important not to equate plagiarism with all forms of cheating and academic misconduct; nor is all plagiarism necessarily word- for-word copying. What unites the different types of plagiarism is a lack of appropriate attribution to the original source. Responses to plagiarism Extensive and explicit information relating to student plagiarism and academic misconduct in assessment has a prominent place on university websites; see for example, the University of Adelaide (Academic integrity policy principles, 2008), Murdoch University (Dishonesty in assessment, 2008) and the University of Western Australia (Academic dishonesty, 2009). Rather than intimating that plagiarism can be prevented, Carroll (2003a) maintains that institutions need to commit to the three Ds: deterring, detecting and dealing with it fairly. Carroll (2003a, p. 19) provides a useful framework for determining penalties for plagiarism, with four criteria, given in descending order of priority: extent of the plagiarism, the student’s year level, the student’s knowledge of the institution’s academic conventions and regulations, and the rules of the specific discipline. The Centre for the Study of Higher Education (James, McInnes & Devlin, 2002, p. 39) presents three aspects of plagiarism that first need to be considered by academics and administrators pursuing potential academic misconduct. The first is the student’s “intent to cheat”, with “deliberately presenting the work of others as one’s own” placed at the extreme, punishable end of a continuum. The second aspect is “the extent of plagiarism” with “downloaded essay handed in as own paraphrasing” again representing the extreme end of the continuum. The third consideration is the “possible responses to plagiarism” that involve the first two aspects, and take either the form of educative or punitive strategies (James, McInnes & Devlin, 2002, p. 39). Devlin (2002) further provides a set of ‘36 strategies to minimise plagiarism’ on The Centre for the Study of Higher Education (CSHE) website, which includes advice regarding assessment development, timing and feedback, academic skills education, student honesty, academic vigilance, student collaboration, detection of plagiarism and penalties. Journal of University Teaching and Learning Practice Vol 6.1, 2009 52
  • 7. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Using electronic text-matching software to detect plagiarism Manual detection of plagiarism can be difficult and time consuming and many commentators maintain that the lengthy process of detecting plagiarism is one of the reasons some academics are reluctant to pursue potential cases (Carroll, 2003a; Devlin, 2003; Duggan, 2003; McCabe, 2005; Zobel & Hamilton, 2002). Martin (1994) cites Bjaaland and Lederman (1973), who recommend that teachers/markers read essays four times as part of the process of detecting plagiarism. At a more practical level, Harris (2004) offers teachers a number of strategies for detection of plagiarism in research papers such as mixed citation styles, lack of references or quotations, unusual formatting, being off topic, signs of datedness, anachronisms, anomalies of diction and style and clear indicators of plagiarism which he calls “blunders of the clueless … since it includes obvious indicators of copying”. Importantly, these strategies for detecting plagiarism are merely the starting point and require further investigation to find the original source. A current review of electronic plagiarism detection (Scaife, 2007) compared eleven products on the market and classified these into four categories depending on the area of plagiarism addressed. The four categories were: 1. Only perform checks against Internet based material, typically using one of the major Internet search engines 2. Check for similarity within a batch of documents 3. Educational suite of products offering complete student submission/plagiarism detection solutions 4. Non standard products (Scaife, 2007, p. 24) The Scaife report found that almost half the products (five of the eleven) checked text against Internet based material only, while only two of the products (Turnitin and Urkund) offered an educational suite of products that checked against a range of sources, including the Internet, previously submitted papers, and journals. According to the Scaife report, Turnitin was the top scoring product with 10 million users in over 80 countries. Second was Urkund, established in autumn 2000, and used by several hundred schools and departments in Europe. The existing electronic plagiarism detection services focus on ‘text-matching’ of the paper under review with other material found on the Internet, previous papers submitted and journals. A limitation of the services is that a vast amount of material which could be plagiarised is paper-based, such a published books, paper journals and conference papers. The exclusion of non-electronic material clearly limits the ability of the software to comprehensively detect plagiarism. Of the wide variety of plagiarisms identified in Table 1, the text-matching facility in electronic plagiarism detection software is only suited to detect ‘word-for-word’ or ‘direct’ plagiarism and then only in electronic form. The more subtle forms of plagiarism, plus all types of plagiarism from paper-based sources, are not able to be detected at present. Educators and researchers working in the field of academic integrity agree that electronic detection is not the solution to eliminating plagiarism. As early as 2001, Carroll and Appleton argued that “electronic detection can only be an adjunct to the normal exercise of academic judgement” (2001, p. 25). Purdy (2005) insists that “As with any technology, plagiarism detection technology requires human application and interpretation” (p. 286). Barrett and Malcolm (2006, p. 41) concur thatthe software indicates possible plagiarism rather than providing complete certainty. Journal of University Teaching and Learning Practice Vol 6.1, 2009 53
  • 8. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Determining student plagiarism using electronic detection In our own practice and research, we have found that Turnitin ‘Originality Reports’ provide an excellent starting point, but what ultimately leads to determinations of plagiarism is considerable manual analysis and subjective judgement. The overall similarity index provided by Turnitin (the cumulative percentage of all the different sources which have been matched to the text under investigation) can potentially be deceptive and a high percentage of text-match is not necessarily an indicator of any form of plagiarism. For example, in one case from our own research (Bretag & Carapiet, 2007), there was an overall similarity index of 49%, but this text match was comprised of 39 separate items, the first six of which accounted for a 16% text-match, and the rest of the 33 items were just 1% matches each. The highest match was only 4%. In this case, after manual analysis, it was determined that no plagiarism had occurred. In another example, the overall similarity index was 56%, but a manual check of the sources showed that the author had appropriately cited sources in every instance, and therefore no plagiarism was determined to have occurred. In addition to deceptively high text-matches, ‘anomalies’ can occur; for example, when a student has previously submitted their own work to Turnitin to safeguard against inadvertent plagiarism. In this case, when the same assignment is input by the instructor to Turnitin, a text-match of 100% is immediately shown and must be checked and disregarded by the instructor. Careful analysis based on pre-determined criteria is also important. For example, the instructor needs to determine which elements of a paper can reasonably be replicated without a charge of plagiarism (e.g. cover sheet, anti-plagiarism statement, topic, reference list). As Bretag (2008a) has argued previously, assessing potential plagiarism also requires nuanced academic judgement based on a range of subjective criteria, including but limited to the context (both academic and personal) within which the text has been written. See Figure 1 which provides a diagrammatic illustration of the manual process we use in conjunction with an electronic detection software program (in this case, Turnitin), to detect potential plagiarism in students’ submissions for assessment. Journal of University Teaching and Learning Practice Vol 6.1, 2009 54
  • 9. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Input document to Turnitin Not sufficient original Turnitin Originality Report material Redraft paper Anomalies? Overall (eg cover sheet; Similarity previous Index 50% submission to Yes No or more Turnitin) Yes No Excl anomalies. Probably no plagiarism Overall Sim. Index less than Check referencing 10%? Yes No 10% or more Probably no plagiarism match to one source? Check referencing No Yes Appropriate No plagiarism citation/s? Yes No Meets No plagiarism subjective judgement criteria? Yes No Plagiarism Detected Figure 1: Determining student plagiarism using Turnitin Journal of University Teaching and Learning Practice Vol 6.1, 2009 55
  • 10. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud It is not only instructors and markers who need to understand the process of detecting plagiarism using electronic tools such as Turnitin. Importantly, the process described in Figure 1 needs to be shared and discussed with students prior to the submission of assignments, in the same way that marking criteria is explained and provided as a learning opportunity. As indicated by Figure 1, where the Overall Similarity Index is 50% or greater, we recommend to students that there is insufficient original material irrespective of references to sources, and that the paper needs to be redrafted so that large sections of cut and paste quotations are summarised or paraphrased, plus given appropriate citations. Presuming that the student has now submitted a paper with at least 50% of their own original work, the next stage of analysis uses criteria from our own research (Bretag & Carapiet, 2007), which applies the 10% copying guideline provided by the Copyright Act. We further advise students that quotations of up 10% are acceptable, as long as they are appropriately cited. The plagiarism identification process detailed in Figure 1 cannot stand alone and needs to be integrated within an educative process (Carroll, 2003a; Devlin, 2003; Zobel & Hamilton, 2002). In addition to receiving clear, consistent and ongoing instruction relating to academic conventions, from note-taking to developing an academic argument using sources, students should be encouraged to use the capabilities of electronic detection software to improve their work before submitting it for evaluation. In the course ‘Managing Communication in Business’ at the University of South Australia, coordinated by Bretag, students are required to use Turnitin as a means of checking their own drafts prior to submission. The following information is provided in the Course Information Booklet: In this course, students are required to submit their assignment on two separate occasions to Turnitin prior to submitting the assignment for marking. The first submission will be a draft and the second submission will be your final revised assignment (the same one that you submit for marking and feedback). The purpose of submitting your work to Turnitin is to allow you to redraft your work, and prevent inadvertent plagiarism. Tips for using Turnitin Turnitin will create an ‘Originality Report’, which will show you an overall ‘Similarity Index’. This is the percentage of your essay that matches other electronic sources available on the Internet, databases and other students’ submissions. If the overall text-match is less than 10% from any one source, you do not need to revise the essay, but you should still check that each text-match is shown appropriately with “quotation marks” and with the full reference (both in- text and in the reference list). If the overall text-match is greater than 10% from any one source, you will need to go through the essay carefully, and reduce the text-match by paraphrasing and summarising. Remember to still provide the in-text reference wherever you have used ideas from another source. All direct quotations must be shown clearly in “quotation marks” with the full reference. The overall Similarity Index might be as high as 30-40%, but this is not necessarily a problem if each of the individual text-matches are less than 10%, and are appropriately referenced. The important thing is for you to use the Originality Report from your draft submission to carefully check that you have referenced all sources throughout your essay. If your essay has a very high overall Similarity Index (e.g. over 50%), this is probably an indication that you have not used your paraphrasing and summarising skills adequately. You will need to carefully recraft the essay so that you have not simply ‘cut and paste’ from sources without using your own words (Bretag, 2008a). Journal of University Teaching and Learning Practice Vol 6.1, 2009 56
  • 11. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud As the excerpt above indicates, electronic detection has the capacity to be part of the educative process, rather than a punitive response to plagiarism. Recent research has indicated that when electronic detection software is used in this way, students and instructors can work collaboratively towards improving academic literacies and learning outcomes. Keuskamp and Sliuzas (2007) maintain that text-matching software can provide educative opportunities, but suggest that students’ academic literacies may need further development to fully benefit from the quantitative reports generated, a position with which we concur. Despite some of her own reservations, McKeever (2006, p. 163) also concludes that electronic detection software can be a “beneficial educational tool”, enabling tutors and students to work collaboratively on the development of academic skills. Culwin (2006) demonstrated an imaginative use of detection software within one course as part of an overall plagiarism prevention strategy, and Morse (2006) has argued for: “…a proactive response to plagiarism, such as class discussions and assignments examining the many complexities and implications of plagiarism combined with students adopting Turnitin.com as a writing tool [which] allows instructors to engage students in responsible academic writing” (Morse in Donnelly, Ingalis, Morse, Castner & Stockdell- Giesler, 2006). Students have also reported favourably on the use of Turnitin as an educative tool. Based on a survey of 152 students who had used Turnitin to draft assignments prior to final submission, Cheah and Bretag (2008b) found that 71.4% of students agreed that Turnitin helped them to identify sections of text that had been copied directly from sources; 74.2% stated that the program had helped them to identify areas that required editing to avoid plagiarism; and 70.5% believed that using Turnitin in this way had made them more aware of academic integrity. In the course in which the surveyed students were enrolled, one-on-one tutorial assistance was provided to every student to interpret the Originality Reports generated by Turnitin. Students were then encouraged to use the Reports to assist them in redrafting their papers prior to final submission. Where students were still concerned about the high text match indicated in the Overall Similarity Index, further consultation with their tutor was provided, without any suggestion that a high text-match equated to deliberate plagiarism or possible penalty. Conclusion In agreement with other theorists, we maintain that the very concept of ‘plagiarism’ is complex and therefore difficult to define. Having reviewed a wide variety of ‘plagiarisms’ identified in the literature, we conclude that the common element is the lack of appropriate attribution to the original source. An increased interest in plagiarism in recent years has led educators to find the most appropriate ways to deter, detect and deal with plagiarism (Carroll, 2003a). Electronic detection software potentially contributes to each of those three areas, although as the literature makes clear, it is not a ‘magic bullet’ (Carroll, 2003a), not least because it is only suited for identifying ‘word-for-word’ or ‘direct’ plagiarism and then only in electronic form. There are many other, more subtle forms of plagiarism which are not available for analysis by electronic detection software. Using our own research and practice as a basis, we conclude that despite its shortcomings, electronic detection in combination with manual analysis, nuanced academic judgement and clear processes provide the means to determine if plagiarism has occurred. This paper has provided a simple model for identifying student plagiarism, and suggested that the most appropriate use of such a model is in collaboration with students, prior to the final submission of assignments. If used within an educative framework that encourages students to take responsibility for their own learning, while working hand in hand with instructors during the drafting stages, we believe that electronic detection software provides one means of ensuring academic integrity in students’ written assignments. Journal of University Teaching and Learning Practice Vol 6.1, 2009 57
  • 12. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud References Academic integrity policy principles (2008). University of Adelaide. Retrieved 8 May 2008 from: http://www.adelaide.edu.au/policies/?230 Academic dishonesty (2009). University of Western Australia. Retrieved 22 July 2009, from: http://www.arts.uwa.edu.au/studentnet/policies/dishonesty Angelil-Carter, S. (2000). Stolen Language? Plagiarism in Writing. Essex: Pearson Education Limited. Barrett, R. & Malcolm, J. (2006). Embedding Plagiarism Education in the Assessment Process. International Journal for Educational Integrity, 1-9. Blancett, S.S., Flanagan, A. & Young, R.K. (1995). Duplicate publication in the nursing literature. Journal of Nursing Scholarship, 27(1), 51-56. Bloemenkamp, D.G., Walvoort, H.C., Hart, W. & Overbeke, A. J. (1999). Duplicate publication of articles in the Dutch Journal of Medicine in 1996. Ned Tijdschr Geneeskd, 143(43), 2150-2153. Bretag, T. (2005). Implementing plagiarism policy in the internationalised university, Part 3 in Developing internationalism in the internationalised university: A practitioner research project, Doctor of Education thesis, Division of Education, Arts and Social Sciences, University of South Australia. Bretag, T. (2007). The Emperor's new clothes: Yes, there is a link between English language competence and academic standards, People and Place, Vol 15 (1), pp. 13-21. Bretag, T. (2008a) Managing Communication in Business Course Information Booklet, Division of Business, University of South Australia, Adelaide. Bretag, T. (2008b) Responding to plagiarism: The need to engage with students’ ‘real lives’, ATN Assessment Conference: Engaging students in assessment refereed proceedings, University of South Australia, 20-21 November. 2008 Bretag, T. & Carapiet, S. (2007), A preliminary study to determine the extent of self-plagiarism in Australian academic research, Plagiary: Cross-Disciplinary Studies in Plagiarism, Fabrication and Falsification. Vol 2(5), 1-15. http://www.plagiary.org/ Broome, M.E. (2004). Self-plagiarism: Oxymoron, fair use, or scientific misconduct? Nursing Outlook, 52(6), 273-274. Cabe, P. (2003). Examples of plagiarism – a taxonomy, in ‘About plagiarism’ (from TIPSters, Teaching in Psychological Science) [Electronic Version]. Retrieved 29 January 2008 from http://psych.skidmore.edu/plagiarism.htm. Carroll, J. (2003a). Six things I did not know four years ago about dealing with plagiarism. Invited Keynote Address, Asia-Pacific Conference on Educational Integrity: Plagiarism and Other Perplexities, University of South Australia, Adelaide. Carroll, J. (2003b). Unpublished comments from the keynote address. Asia-Pacific Conference on Educational Integrity: Plagiarism and Other Perplexities. University of South Australia, Adelaide. Carroll, J. & Appleton, J. (2001). Plagiarism: A Good Practice Guide. Retrieved 6 February 2008, from http://www.leeds.ac.uk/candit/plagiarism/brookes.pdf. Cheah, S.W. & Bretag, T. (2008). Making technology work for academic integrity in Malaysia. 3rd International Plagiarism Conference Refereed Proceedings, Newcastle-on-Tyne, U.K. 23-25 June 2008. Culwin, F. (2006). An active introduction to academic misconduct and the measured demographics of misconduct, in Assessment & Evaluation in Higher Education, Vol 31(2), 167-182. Defining and avoiding plagiarism: The WPA Statement on Best Practices (Publication (2008). Retrieved 29 January, from Council of Writing Program Administrators www.wpacouncil.org Journal of University Teaching and Learning Practice Vol 6.1, 2009 58
  • 13. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Devlin, M. (2002). Minimising plagiarism. Retrieved 18 August, 2004, from http://www.cshe.unimelb.edu.au/assessinglearning/03/plagMain.html Devlin, M. (2003, 21-22 November). Policy, preparation, prevention and punishment - One faculty's holistic approach to minimising plagiarism. Paper presented at the Educational Integrity: Plagiarism and Other Perplexities Conference, Adelaide. Dishonesty in assessment (2008). Murdoch University. Retrieved 8 May 2008 from http://www.murdoch.edu.au/admin/policies/assessmentlinks.html#18 Duggan, F. (2003). The Plagiarism Advisory Service: A one-stop shop. Paper presented at the Educational integrity: Plagiarism and other perplexities Conference. Errami, M., Hicks, J.M., Fisher, W., Trusty, D., Wren, J.D., Long, T.C. et al. (2007). Deja vu - A Study of Duplicate Citations in Medline. Bioinformatics Advance Access, 1-8. Evans, J.T. (2000). The new plagiarism in higher education: From selection to reflection [Electronic Version]. TELRI Project. Retrieved 5 June 2003 from www.warwick.ac.uk/ETS/interactions/vol4no2/evans.html Harris, R. (2004). Anti-Plagiarism Strategies for Research Papers [Electronic Version]. VirtualSalt, 17 November. Retrieved 14 January 2008 from http://www.virtualsalt.com/antiplag.htm Harris, R.A. (2001). The plagiarism handbook: Strategies for preventing, detecting, and dealing with plagiarism. California: Eyrczak Publishing. Howard, R.M. (1995). Plagiarisms, authorships, and the academic death penalty. College English, 57(7), 788-806. James, R., McInnes, C. & Devlin, M. (2002). Assessing learning in Australian universities [Electronic Version]. Retrieved 18 August, 2004 from http://www.cshe.unimelb.edu.au/assessinglearning Keuskamp, D. & Sliuzas, R. (2007). Plagiarism prevention or detection? The contribution of text- matching software to education about academic integrity. Journal of Academic Language & Learning, Vol 1(1), A91-A99. Klausman, J. (1999). Teaching about Plagiarism in the Age of the Internet. Teaching English in the Two-year College, 27(December), 209-212. Martin, B. (1994). Plagiarism: a misplaced emphasis. Journal of Information Ethics, 3(2), 36-47. McCabe, D. (2005). Cheating among college and university students: A North American perspective. International Journal for Educational Integrity, 1(1). McCabe, D., Butterfield, K.D. & Trevino, L.K. (2006). Academic dishonesty in graduate business programs: Prevalence, causes and proposed action. Academy of Management Learning & Education, 5(3), pp. 294-305. McKeever, L. (2006). Online plagiarism detection services – Saviour or scourge? In Assessment & Evaluation in Higher Education, Vol 31(2), 155-165. Donnelly, M., Ingalis, R., Morse, T.A., Castner, J. & Stockdell-Giesler, A.M. (2006). (Mis)trusting technology that polices integrity: A critical assessment of Turnitin.com. Inventio, Vol 1(8). Retrieved online 4 February 2008 from:http://www.doit.gmu.edu/inventio/issues/Fall_2006/Donnelly_10.html Piety, M. (2002). A culture of plagiarism? [Electronic Version]. Retrieved 20 August, 2004 from http://www.drexel.edu/doj/archives/2002/essay/plagiarism.html Plagiarism (2008a). Clemson University. Retrieved 29 January 2008, from http://www.grad.clemson.edu/plagiarism.php Plagiarism (2008b). Oxford Brookes University. Retrieved 29 January 2008, from http://www.brookes.ac.uk/library/skill/plagiarism.html Plagiarism – teaching strategies (2008). University of South Australia. Retrieved 29 January 2008. from http://www.unisanet.unisa.edu.au/learningconnection/staff/practice/plagiarism-strategies.asp Journal of University Teaching and Learning Practice Vol 6.1, 2009 59
  • 14. A model for determining stud en t plagiarism: Electronic detection and academic judgement Tracey Bretag and Saadia Mahmud Purdy, J.P. (2005). Calling off the hounds: Technology and the visibility of plagiarism. Pedagogy: Critical Approaches to Teaching Literature, Language, Composition, and Culture, 5(2), 275-295. Roig, M. (2006). Avoiding plagiarism, self-plagiarism, and other questionable writing practices: A guide to ethical writing. Retrieved 29 January 2008, from http://facpub.stjohns.edu/~roigm/plagiarism/Index.html. Samuelson, P. (1994). Self-plagiarism or fair use? Communications of the ACM, 37(8), 21-25. Scanlon, P.M. (2007). Song from myself: An anatomy of self-plagiarism. Plagiary: Cross-Disciplinary Studies in Plagiarism, Fabrication and Falsification, 2 (1), 1-10. Scaife, B. (2007). IT Consultancy Plagiarism Detection Software Report for JISC Advisory Service. Manchester: NCC Group plc. Wright, M. & Armstrong, J.S. (2007). The Ombudsman: Verification of Citations: Fawlty Towers of Knowledge. Interfaces, 00(0), 1-15. Zobel, J. & Hamilton, M. (2002). Managing student plagiarism in large academic departments. Australian Universities' Review, 45(2), 23-30. Journal of University Teaching and Learning Practice Vol 6.1, 2009 60