SlideShare uma empresa Scribd logo
1 de 19
 Submitted by: Arshiya Zahid
 Roll # 19
 Submitted to: Ma'am Kiran Shahzad
 The act of presenting another’s work or ideas
as your own.
 Using another’s exact words without proper
citation.
PLAGIARISM DEFINED:
 The word “plagiarism” comes from
the Latin plagiarus meaning
“kidnapper”
The first copyright law was passed in 1709 protecting
the rights of publisher against book piracy.
Plagiarism is very ancient art.
HISTORY OF PLAGIARISM
 3 great men who built their careers on plagiarism
1: Stephen Ambrose:
invented pop history.
2: T.s .Eliot:
wrote poems.
3: Dr.Martin Luther king Jr:
advance the human race.
Intentional:
 Copying a friend’s work
 Cutting and pasting blocks of
text from electronic sources
without documenting
 Web publishing without
permissions of creators
Unintentional:
 Paraphrasing poorly
 Citing poorly
 Quoting poorly
 Failure to use your own “voice”
THE TWO CATEGORIES OF
PLAGIARISM
FIVE COMMON TYPES OF PLAGIARISM
History:
The earlier plagiarism detectors used to
detect plagiarism.
Detection:
“Plagiarism detection is the process of locating instances of plagiarism within a
work or document.”
1. Manual :
• Requires great effort or excellent memory
• Impractical
2: Software assisted :
• Allows vast collection to be compared to each other
• Making successful detection.
 Global similarity assessment approaches:
Use the characteristics taken from larger parts of documents to compute
similarity
 Local similarity assessment approaches:
Only examine pre-selected texts segment as input
 Currently the most widely applied approach to
plagiarism detection
 This method forms a set of multiple substrings
called minutiae.
 Minutiae matching with those suspicious
documents to suggest plagiarism
 Used in internet
 Used in computer science
 Remains expensive
 Suspicious documents are compared for verbatim text
(reference collection from all documents)
 External plagiarism detection
 Bag of words analysis vector to the domain of
plagiarism detection.
 Documents are represented as one or multiple
vectors, e.g. for different document parts.
 which are used for pair wise similarity computations.
 Relies on citation analysis.
 Only approach that does not rely on textual similarity.
 examines the citation and reference information in texts
to identify similar patterns
 this approach is suitable for scientific texts, or other
academic documents
 Citation analysis to detect plagiarism is a relatively
young concept.
 Intrinsic plagiarism detection
 Stylometry analyze an author’s unique writing style
 By comparing stylometric models for different text segments, passages that
are stylistically different from others, hence potentially plagiarized, can be
detected.
 indicate that their performance depends on the type of plagiarism present
 Except for citation pattern analysis, all detection approaches rely on textual
similarity
 Institutional software
 Ithenticate
 JISC plagiarism advisory service
 Moos
 Small SEO
 eTBLAST
 Individual software
• Copy catch gold
• Glatt
• Plagscan
• copyscape
• Wcopyfind
1. Understand what is plagiarism
2. Be familiar in the area that you are talking about
3. Restate the subject to yourself a couple of times
4. Reference your quotes and sources
5. When in doubt give credit
 Destroy professional reputation
 Destroy student Reputation:
 Monetary repercussion:
Plagiarism.pptx ics
Plagiarism.pptx ics

Mais conteúdo relacionado

Mais procurados

Dpp404plagiarism
Dpp404plagiarismDpp404plagiarism
Dpp404plagiarism
Muhd Sayuty
 
Module4 lesson2 part1 powerpoint
Module4 lesson2 part1 powerpointModule4 lesson2 part1 powerpoint
Module4 lesson2 part1 powerpoint
alexisneeson
 
Plagiarism and its detection
Plagiarism and its detectionPlagiarism and its detection
Plagiarism and its detection
ankit_saluja
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010
esyin
 

Mais procurados (20)

Plagiarism
PlagiarismPlagiarism
Plagiarism
 
What is plagiarism
What is plagiarismWhat is plagiarism
What is plagiarism
 
Plagiarism ppt
Plagiarism pptPlagiarism ppt
Plagiarism ppt
 
Dpp404plagiarism
Dpp404plagiarismDpp404plagiarism
Dpp404plagiarism
 
Module4 lesson2 part1 powerpoint
Module4 lesson2 part1 powerpointModule4 lesson2 part1 powerpoint
Module4 lesson2 part1 powerpoint
 
Plagiarism and its detection
Plagiarism and its detectionPlagiarism and its detection
Plagiarism and its detection
 
Rhetorical Recycling: When Can You Use Your Ideas and Writing for More than O...
Rhetorical Recycling: When Can You Use Your Ideas and Writing for More than O...Rhetorical Recycling: When Can You Use Your Ideas and Writing for More than O...
Rhetorical Recycling: When Can You Use Your Ideas and Writing for More than O...
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentationPlagiarism in the classroom pp presentation
Plagiarism in the classroom pp presentation
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010
 
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerPlagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
 
Academic integrity and preventing plagiarism
Academic integrity and preventing plagiarismAcademic integrity and preventing plagiarism
Academic integrity and preventing plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic WritingEthical and Unethical Methods of Plagiarism Prevention in Academic Writing
Ethical and Unethical Methods of Plagiarism Prevention in Academic Writing
 
Plagiarism ppt 1 (2)
Plagiarism ppt 1 (2)Plagiarism ppt 1 (2)
Plagiarism ppt 1 (2)
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
What is Plagiarism
What is PlagiarismWhat is Plagiarism
What is Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 

Destaque

DHINAKARAN NEW PROFILE
DHINAKARAN NEW PROFILEDHINAKARAN NEW PROFILE
DHINAKARAN NEW PROFILE
Dhinakaran M
 
DHINAKARAN Profile
DHINAKARAN ProfileDHINAKARAN Profile
DHINAKARAN Profile
Dhinakaran M
 
Endnote presentation
Endnote presentationEndnote presentation
Endnote presentation
maryamfarooqi
 
Microsoft power point
Microsoft power pointMicrosoft power point
Microsoft power point
maryamfarooqi
 
Glosario (español) (1)
Glosario (español) (1)Glosario (español) (1)
Glosario (español) (1)
yury232
 

Destaque (14)

Rencontre Départementale du Tourisme - Manche
Rencontre Départementale du Tourisme  - MancheRencontre Départementale du Tourisme  - Manche
Rencontre Départementale du Tourisme - Manche
 
Parálise cerebral
Parálise cerebralParálise cerebral
Parálise cerebral
 
Finding Companies That will Serve The Largest Concentration of Consumer Base ...
Finding Companies That will Serve The Largest Concentration of Consumer Base ...Finding Companies That will Serve The Largest Concentration of Consumer Base ...
Finding Companies That will Serve The Largest Concentration of Consumer Base ...
 
The mask of red (?) death.
The mask of red (?) death.The mask of red (?) death.
The mask of red (?) death.
 
DHINAKARAN NEW PROFILE
DHINAKARAN NEW PROFILEDHINAKARAN NEW PROFILE
DHINAKARAN NEW PROFILE
 
Search engines
Search enginesSearch engines
Search engines
 
DHINAKARAN Profile
DHINAKARAN ProfileDHINAKARAN Profile
DHINAKARAN Profile
 
STR 3
STR 3STR 3
STR 3
 
Change management
Change management Change management
Change management
 
Endnote presentation
Endnote presentationEndnote presentation
Endnote presentation
 
Microsoft power point
Microsoft power pointMicrosoft power point
Microsoft power point
 
Equipment Financing & Leasing Budget
Equipment Financing & Leasing BudgetEquipment Financing & Leasing Budget
Equipment Financing & Leasing Budget
 
Glosario (español) (1)
Glosario (español) (1)Glosario (español) (1)
Glosario (español) (1)
 
Get The Competitive Edge With These Suggestions On Article Syndication
Get The Competitive Edge With These Suggestions On Article SyndicationGet The Competitive Edge With These Suggestions On Article Syndication
Get The Competitive Edge With These Suggestions On Article Syndication
 

Semelhante a Plagiarism.pptx ics

Avoiding Plagiarism 1
Avoiding Plagiarism 1Avoiding Plagiarism 1
Avoiding Plagiarism 1
houxy
 
plagiarism-hacking-software_piracy
plagiarism-hacking-software_piracyplagiarism-hacking-software_piracy
plagiarism-hacking-software_piracy
Abhishek Shukla
 
Plagiarism Power Point
Plagiarism Power PointPlagiarism Power Point
Plagiarism Power Point
goodfriday
 

Semelhante a Plagiarism.pptx ics (20)

Avoiding Plagiarism 1
Avoiding Plagiarism 1Avoiding Plagiarism 1
Avoiding Plagiarism 1
 
RM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docxRM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docx
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
A Brief Review Of Plagiarism In Medical Scientific Research Papers
A Brief Review Of Plagiarism In Medical Scientific Research PapersA Brief Review Of Plagiarism In Medical Scientific Research Papers
A Brief Review Of Plagiarism In Medical Scientific Research Papers
 
Forms of Plagiarism .pptx
Forms of Plagiarism .pptxForms of Plagiarism .pptx
Forms of Plagiarism .pptx
 
PLAGIARISM.pptx
PLAGIARISM.pptxPLAGIARISM.pptx
PLAGIARISM.pptx
 
Defining Plagiarism : Types and Solutions to avoid it in Research Writing
Defining Plagiarism : Types and Solutions to avoid it in Research WritingDefining Plagiarism : Types and Solutions to avoid it in Research Writing
Defining Plagiarism : Types and Solutions to avoid it in Research Writing
 
Plagiarism unizulu
Plagiarism unizulu Plagiarism unizulu
Plagiarism unizulu
 
plagiarism-hacking-software_piracy
plagiarism-hacking-software_piracyplagiarism-hacking-software_piracy
plagiarism-hacking-software_piracy
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiarist
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
How to Avoid Plagiarism: Tips and Techniques
How to Avoid Plagiarism: Tips and TechniquesHow to Avoid Plagiarism: Tips and Techniques
How to Avoid Plagiarism: Tips and Techniques
 
Plagarismbykamlesh.pptx
Plagarismbykamlesh.pptxPlagarismbykamlesh.pptx
Plagarismbykamlesh.pptx
 
PLAGIARISM.pptx
PLAGIARISM.pptxPLAGIARISM.pptx
PLAGIARISM.pptx
 
Plagiarism Power Point
Plagiarism Power PointPlagiarism Power Point
Plagiarism Power Point
 
Plagiarism in HEI and how to avoid it
Plagiarism in HEI and how to avoid it Plagiarism in HEI and how to avoid it
Plagiarism in HEI and how to avoid it
 
Sources-Not-Cited.pptx
Sources-Not-Cited.pptxSources-Not-Cited.pptx
Sources-Not-Cited.pptx
 
Plagiarism and Academic Integrity
Plagiarism and Academic Integrity Plagiarism and Academic Integrity
Plagiarism and Academic Integrity
 

Mais de maryamfarooqi

Mais de maryamfarooqi (10)

Presentation greece final 2
Presentation greece final 2Presentation greece final 2
Presentation greece final 2
 
Salman shahid (2)
Salman shahid (2)Salman shahid (2)
Salman shahid (2)
 
Research methodolgy
Research methodolgyResearch methodolgy
Research methodolgy
 
Neolithic times
Neolithic timesNeolithic times
Neolithic times
 
Women of paleolethic times
Women of paleolethic timesWomen of paleolethic times
Women of paleolethic times
 
Sk group presaentation
Sk group presaentationSk group presaentation
Sk group presaentation
 
Presentation google scholar
Presentation google scholarPresentation google scholar
Presentation google scholar
 
Arab society
Arab societyArab society
Arab society
 
Arab society
Arab societyArab society
Arab society
 
Benazir era
Benazir eraBenazir era
Benazir era
 

Último

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Plagiarism.pptx ics

  • 1.  Submitted by: Arshiya Zahid  Roll # 19  Submitted to: Ma'am Kiran Shahzad
  • 2.  The act of presenting another’s work or ideas as your own.  Using another’s exact words without proper citation. PLAGIARISM DEFINED:  The word “plagiarism” comes from the Latin plagiarus meaning “kidnapper”
  • 3. The first copyright law was passed in 1709 protecting the rights of publisher against book piracy. Plagiarism is very ancient art. HISTORY OF PLAGIARISM  3 great men who built their careers on plagiarism 1: Stephen Ambrose: invented pop history. 2: T.s .Eliot: wrote poems. 3: Dr.Martin Luther king Jr: advance the human race.
  • 4. Intentional:  Copying a friend’s work  Cutting and pasting blocks of text from electronic sources without documenting  Web publishing without permissions of creators Unintentional:  Paraphrasing poorly  Citing poorly  Quoting poorly  Failure to use your own “voice” THE TWO CATEGORIES OF PLAGIARISM
  • 5. FIVE COMMON TYPES OF PLAGIARISM
  • 6. History: The earlier plagiarism detectors used to detect plagiarism. Detection: “Plagiarism detection is the process of locating instances of plagiarism within a work or document.” 1. Manual : • Requires great effort or excellent memory • Impractical 2: Software assisted : • Allows vast collection to be compared to each other • Making successful detection.
  • 7.
  • 8.  Global similarity assessment approaches: Use the characteristics taken from larger parts of documents to compute similarity  Local similarity assessment approaches: Only examine pre-selected texts segment as input
  • 9.  Currently the most widely applied approach to plagiarism detection  This method forms a set of multiple substrings called minutiae.  Minutiae matching with those suspicious documents to suggest plagiarism  Used in internet
  • 10.  Used in computer science  Remains expensive  Suspicious documents are compared for verbatim text (reference collection from all documents)  External plagiarism detection
  • 11.  Bag of words analysis vector to the domain of plagiarism detection.  Documents are represented as one or multiple vectors, e.g. for different document parts.  which are used for pair wise similarity computations.
  • 12.  Relies on citation analysis.  Only approach that does not rely on textual similarity.  examines the citation and reference information in texts to identify similar patterns  this approach is suitable for scientific texts, or other academic documents  Citation analysis to detect plagiarism is a relatively young concept.
  • 13.  Intrinsic plagiarism detection  Stylometry analyze an author’s unique writing style  By comparing stylometric models for different text segments, passages that are stylistically different from others, hence potentially plagiarized, can be detected.
  • 14.  indicate that their performance depends on the type of plagiarism present  Except for citation pattern analysis, all detection approaches rely on textual similarity
  • 15.  Institutional software  Ithenticate  JISC plagiarism advisory service  Moos  Small SEO  eTBLAST  Individual software • Copy catch gold • Glatt • Plagscan • copyscape • Wcopyfind
  • 16. 1. Understand what is plagiarism 2. Be familiar in the area that you are talking about 3. Restate the subject to yourself a couple of times 4. Reference your quotes and sources 5. When in doubt give credit
  • 17.  Destroy professional reputation  Destroy student Reputation:  Monetary repercussion: