Plagiarism.pptx ics

516 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
516
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Plagiarism.pptx ics

  1. 1.  Submitted by: Arshiya Zahid  Roll # 19  Submitted to: Ma'am Kiran Shahzad
  2. 2.  The act of presenting another’s work or ideas as your own.  Using another’s exact words without proper citation. PLAGIARISM DEFINED:  The word “plagiarism” comes from the Latin plagiarus meaning “kidnapper”
  3. 3. The first copyright law was passed in 1709 protecting the rights of publisher against book piracy. Plagiarism is very ancient art. HISTORY OF PLAGIARISM  3 great men who built their careers on plagiarism 1: Stephen Ambrose: invented pop history. 2: T.s .Eliot: wrote poems. 3: Dr.Martin Luther king Jr: advance the human race.
  4. 4. Intentional:  Copying a friend’s work  Cutting and pasting blocks of text from electronic sources without documenting  Web publishing without permissions of creators Unintentional:  Paraphrasing poorly  Citing poorly  Quoting poorly  Failure to use your own “voice” THE TWO CATEGORIES OF PLAGIARISM
  5. 5. FIVE COMMON TYPES OF PLAGIARISM
  6. 6. History: The earlier plagiarism detectors used to detect plagiarism. Detection: “Plagiarism detection is the process of locating instances of plagiarism within a work or document.” 1. Manual : • Requires great effort or excellent memory • Impractical 2: Software assisted : • Allows vast collection to be compared to each other • Making successful detection.
  7. 7.  Global similarity assessment approaches: Use the characteristics taken from larger parts of documents to compute similarity  Local similarity assessment approaches: Only examine pre-selected texts segment as input
  8. 8.  Currently the most widely applied approach to plagiarism detection  This method forms a set of multiple substrings called minutiae.  Minutiae matching with those suspicious documents to suggest plagiarism  Used in internet
  9. 9.  Used in computer science  Remains expensive  Suspicious documents are compared for verbatim text (reference collection from all documents)  External plagiarism detection
  10. 10.  Bag of words analysis vector to the domain of plagiarism detection.  Documents are represented as one or multiple vectors, e.g. for different document parts.  which are used for pair wise similarity computations.
  11. 11.  Relies on citation analysis.  Only approach that does not rely on textual similarity.  examines the citation and reference information in texts to identify similar patterns  this approach is suitable for scientific texts, or other academic documents  Citation analysis to detect plagiarism is a relatively young concept.
  12. 12.  Intrinsic plagiarism detection  Stylometry analyze an author’s unique writing style  By comparing stylometric models for different text segments, passages that are stylistically different from others, hence potentially plagiarized, can be detected.
  13. 13.  indicate that their performance depends on the type of plagiarism present  Except for citation pattern analysis, all detection approaches rely on textual similarity
  14. 14.  Institutional software  Ithenticate  JISC plagiarism advisory service  Moos  Small SEO  eTBLAST  Individual software • Copy catch gold • Glatt • Plagscan • copyscape • Wcopyfind
  15. 15. 1. Understand what is plagiarism 2. Be familiar in the area that you are talking about 3. Restate the subject to yourself a couple of times 4. Reference your quotes and sources 5. When in doubt give credit
  16. 16.  Destroy professional reputation  Destroy student Reputation:  Monetary repercussion:

×