Library and Information Services for All490
Plagiarism tools and Academic Integrity : An over view
Jayashri Jagadish Assistant Librarian, Mysore University Library, Mysore, Email:
[email protected]
Venkatesha Assistant Librarian, Mysore University Library, Email:
[email protected]
ABSTRACT
[This paper deals with Plagiarism tools and academic integrity and identify the similarity of contents by using various plagiarism software packages. Due to enormous online contents , to identify the originality of the research, there are number of tools available on the web. This paper explains various plagiarism detection tools generally used by the researchers and also it explains the norms and procedure for uploading the text to software ] Key words: Plagiarism, Academic Research; Plagiarism, Academic Integrity Introduction: Plagiarism, one of the main problems of academic life, is a simple subject to describe, but hard to avoid. Generally, plagiarism means copying of somebody’s ideas and work and putting into assignments, in other words, stealing of words and sentences of others without pointing to the original source or author. The expression of original ideas is considered intellectual property and is protected by copyright laws, just like original inventions. Almost all forms of expression fall under copyright protection as long as they are recorded in some way.
Types of Plagiarism: Intentional Plagiarism: when writers or researchers knowingly passing off someone else’s words or ideas as their own. Unintentional Plagiarism: when writers or researchers use the words or ideas of others but fail to quote or give credit. because they don’t know how students must check with teacher or librarian. Paraphrasing poorly: changing a few words without changing the sentence structure of the original, or changing the sentence structure but not the words. Reasons for plagiarism Reasons are many. In the past, ideas originated from the brain. However, of late, it comes from Google! The prominent reasons for plagiarism are : 1. Lack of research skills. 2. Lack of command over the language. 3. Temptation to publish soon for career advancement. 4. Desire to get recognition soon. 5. Lack of time for understanding basic concepts and generation of new ideas. Consequences of Plagiarism: Destroyed Students Reputation Destroyed professional Reputation
Library and Information Services for All491
Destroyed Academic Reputation and brand names Withdrawal of Degrees and retraction of journal publications Plagiarism detection is the process of locating instances of plagiarism within a work or document. The widespread use of computers and the advent of the Internet has made it easier to plagiarize the work of others. Most cases of plagiarism are found in academia, where documents are typically essays or reports. However, plagiarism can be found in virtually any field, including scientific papers, art designs, and source code. Detection of plagiarism can be either manual or software‐assisted. Manual detection requires substantial effort and excellent memory, and is impractical in cases where too many documents must be compared, or original documents are not available for comparison. Software‐assisted detection allows vast collections of documents to be compared to each other, making successful detection much more likely. Available plagiarism Tools for detection of Similarity of Contents: 1. iThanticate , California, USA. 2. Turnitin, California, USA 3. WriteCheck, California, USA 4. Viper, England 5. PlagAware, Ulm, Germany 6. PlagScan, Germany 7. Urkund, Sweeden 8. Docoloc, Germany 9. Plagiarism Checker X, New York, USA 10. Plag Tracker, Ukranian 11. Nitya D’ Arch, Kottayam /Cochin, Kerala General Norms for uploading the text onto Anti plagiarism Software: The research submissions, while brought for scanning, usually the entire theses has to be in single word or PDF file. preliminary pages like declaration, certificate, acknowledgement, table of contents, list of charts, graphs and tables. Further, the appendices, comprising of glossary, questionnaires, indexes have to be removed while up‐loading for scanning. Finally, the similarity report is generated after excluding the following content from the research submissions. 1. Software facilitates exclusion of text that are rendered within quotes. 2. When the text or paragraphs carry references in the theses, the cited text gets excluded. 3. Make provision for exclusion of phrases and key‐words used in the title of the theses. These phrases often appear in the text of the theses here and there frequently. Hence, this has to be exercised in the folder option given for exclusion.
Library and Information Services for All492
4. There is common option to exclude abstract, methods and materials (methodology)and bibliography. 5. Provision is made for exclusion of small matches comprising of up to 10 (standard) or more words that appear in the text of the theses. 6. In the software, provision is made to exclude small sources comprising of up to 10 or more words. 7. A standard format has to be followed for rendering references/bibliography. Only in such cases, the paragraphs taken from various sources get excluded. 8. Uniformity and consistency should be there while rendering bibliographic references. The references and bibliography should not be copy and pasted because, neither the references and bibliography get excluded nor the cited text get excluded. Therefore, the text or the references should not be copied and pasted from Google. Screenshot of scanning with ithenticate software :
Library and Information Services for All493
Conclusion: Before publishing any research papers or research work it is the duty of researcher to get confirmation of originality of the content . It is necessary to check scholarly communications with anti‐plagiarism tools. Plagiarism software identify the similarity of data is already in data base like cross check , Internet source, Student papers , Digital repositories, it displays the content already in data base. It helps to avoid duplications of wok and also it encourage the self writing, or rewrite the text with own ideas or make improvement of existing research. Reference : 1. Butler, Declan (2010), Journals step up Plagiarism policing: Cut‐and‐paste culture tacked by cross check software. Nature 466, 167(2010). 2. Ellen, J.Weber and Others (2002), Author perception of peer review: Impact of Review Quality and Acceptance on Satisfaction. JAMA.2002; 287(21): 2790‐ 2793. 3. Seglen, P O (1997), Citations and journal impact factors: questionable indicators of research quality. Allergy. 52: 1050‐1056. 4. Benson Honig & Akanksha Bedi (2012):The fox in the hen house: A critical examination of plagiarism among members of the academy of management. Academy of Management Learning and Education, 11(1), 101‐123.
Library and Information Services for All494
5. iThenticate: Plagiarism Detection Software. Retrieved from http://www.ithenticate.com. 6. www.centralia.edu/academics/writingcenter/ 7. http://owl.waol.org/ 8. https://en.wikipedia.org/wiki/Plagiarism_detection 9. https://en.wikipedia.org/wiki/Wikipedia