SlideShare a Scribd company logo
1 of 5
Critical Thinking Process
by Shawnesty Mays
Submission dat e : 10- Sep- 2018 01:00AM (UT C- 04 00)
Submission ID: 9993857 11
File name : Critical_T hinking_Pro cess_SM.do cx (15.65K)
Word count : 296
Charact e r count : 187 5
0%
SIMILARIT Y INDEX
0%
INT ERNET SOURCES
0%
PUBLICAT IONS
0%
ST UDENT PAPERS
Exclude quo tes On
Exclude biblio graphy On
Exclude matches < 2%
Critical Thinking Process
ORIGINALITY REPORT
PRIMARY SOURCES
Critical Thinking Processby Shawnesty MaysCritical Thinking
ProcessORIGINALITY REPORTPRIMARY SOURCES
Academic integrity is defined as honesty and responsibility in
scholarship. Integrity is loosely defined as an adherence to
moral and ethical principles; soundness of moral character and
honesty. Together, integrity and academic integrity translates
into one’s current and future profession. A student, at any level
in scholarship, may experience periods where the feelings of
being overwhelmed and stressed are present. Moreover, at the
doctorate level, where academic demands are greater for
students due to the level of scholarly research and critical
thinking involved. While in pursuit of scholarship, it is a
fundamental expectation of all students to submit original work
and to properly cite or give credit to other’s work.
Anyone who has been stealing must steal no longer, but must
work, doing something useful with their own hands, that they
may have something to share with those in need (Ephesians
4:28, New International Version).
While in the Doctorate of Strategic Leadership (DSL) program,
to achieve and maintain academic integrity it is important for
me to keep my career goals in mind: 1) to become a well-
respected, contributing member of the academic community 2)
to lend my expertise as a consultant in strategic leadership to
better organizations. Through keeping my career goals in the
forefront, I am able to remind myself that the challenging
academic assignments and tests in the DSL program will assist
me in gaining knowledge of course content and my grades will
show how well the goal of knowledge is fully achieved.
In addition to keeping my personal goals in mind, the awareness
of Liberty University’s academic integrity and honor codes will
assist with my achievement and maintenance of academic
integrity while navigating through the DSL program.
Universities and colleges pen the requisite of academic integrity
and honor codes into syllabus but rarely engage the student in
instruction regarding academic misconduct and how it can be
avoided. There appears to be an assumption among public and
private schools, colleges and universities that students should
have an understanding the meaning of academic integrity but
few professors explicitly address what plagiarism means and
provide explicit examples of plagiarism (Evering & Moorman,
2012).
In this digital age, the avenues by which students access written
material and information are limitless. No longer are the days of
only performing research in a library setting and looking up
information in a card catalog. For example, today’s students
now have the ability to purchase course notes via the internet
from other students, buy written essays and dissertations, pass
an online course by someone else completing and submitting
assignments. Scanlon and Neumann (2002) surveyed 698
students at nine colleges. 8% of surveyed students reported that
they frequently copied text without citing the source, 3% copied
a paper and never cited a source and 2% of surveyed college
students purchased a paper online.
When it pertains to academic misconduct, faculty, students and
administrators all point the finger at one another. The real issue
is not the frequency of plagiarism or academic misconduct.
Moreover, the real issue why students risk their academic and
professional career by compromising their academic integrity by
plagiarism. An easy answer to why students plagiarize is that
they are lazy and do not work to put in the effort to complete
the assignment. After close analysis of research on academic
misconduct revealed several reasons that contributed to
plagiarism, including underdeveloped sense of integrity, lack of
maturity, one’s perception of online ethical practices,
inexperience writing in a particular genre, lack of interest in
topic and pressure to earn and maintain a high grade (McCabe,
2005).
The same reasons found to explain why students plagiarize or
experience academic misconduct can be transferred into a
vocational setting. If it is my goal is to become a well-respected
contributing member of the academic community as well as,
strategically lead organizations I must maintain integrity.
Therefore as a leader, I should remain abreast of and implement
best practices in discouraging plagiarism approaches. Research
shows that the following strategies are effective best practices
in discouraging plagiarism:
Education- Individuals need to be provided with real-world
examples of plagiarism and the consequences of such actions.
Engagement in a discussion of integrity and honor policies are
shown to be effective.
Self-Management – Teach individuals how to pace their work
and balance life outside of work.
3. Engage Interests – Allow individuals to focus on topics
that interest them. Allow individuals to use varied platforms to
share their work such as, but not limited to, video, blogs, social
media (Fischer & Zigmond, M.J., 2011).
Reference
Evering, L.C. & Moorman, G. (2012). Rethinking plagiarism in
the digital age. Journal of
Adolescent & Adult Literacy, 56(1), 35-44.
Fischer, B.A. & Zigmond, M.J. (2011). Education approaches
for discouraging
plagiarism. Urologic Oncology: Seminars and Original
Investigations, 29, 100-
103.
McCabe, D. (2005) It takes a village. Academic integrity.
Liberty Education, 91(3), 26-
31.
Scanlon, P. & Neumann, D. (2002). Internet plagiarism among
college students. Journal
of College Student Development, 43(3), 374-385.

More Related Content

Similar to Critical Thinking Processby Shawnesty MaysSubmission dat.docx

Academic Dishonesty How Students Do The Learning Assessment And Project
Academic Dishonesty  How Students Do The Learning Assessment And ProjectAcademic Dishonesty  How Students Do The Learning Assessment And Project
Academic Dishonesty How Students Do The Learning Assessment And ProjectMonica Waters
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisGabriela Grosseck
 
Academic honesty in the digital age march 2014
Academic honesty in the digital age march 2014 Academic honesty in the digital age march 2014
Academic honesty in the digital age march 2014 mick purcell
 
Information Literacy Instruction: Ideas for Teaching College Students Essenti...
Information Literacy Instruction: Ideas for Teaching College Students Essenti...Information Literacy Instruction: Ideas for Teaching College Students Essenti...
Information Literacy Instruction: Ideas for Teaching College Students Essenti...meganbheuer
 
Developing 21st Century graduates: thinking critically through Information Li...
Developing 21st Century graduates: thinking critically through Information Li...Developing 21st Century graduates: thinking critically through Information Li...
Developing 21st Century graduates: thinking critically through Information Li...nmjb
 
Project Individual Reflection Paper And Project Group
Project Individual Reflection Paper And Project GroupProject Individual Reflection Paper And Project Group
Project Individual Reflection Paper And Project GroupKate Loge
 
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013Sonia Saddiqui
 
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...Currents in Information Literacy: Standards, Lessons, and Learners Standards,...
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...guest92c850
 
Currents in Information Literacy: Standards, Lessons, and Learners
Currents in Information Literacy: Standards, Lessons, and LearnersCurrents in Information Literacy: Standards, Lessons, and Learners
Currents in Information Literacy: Standards, Lessons, and LearnersWestern Illinois University
 
Running head STUDENT TRANSFER .docx
Running head STUDENT TRANSFER                                  .docxRunning head STUDENT TRANSFER                                  .docx
Running head STUDENT TRANSFER .docxtoltonkendal
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmarijtsrd
 

Similar to Critical Thinking Processby Shawnesty MaysSubmission dat.docx (13)

Academic Dishonesty How Students Do The Learning Assessment And Project
Academic Dishonesty  How Students Do The Learning Assessment And ProjectAcademic Dishonesty  How Students Do The Learning Assessment And Project
Academic Dishonesty How Students Do The Learning Assessment And Project
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysis
 
Academic honesty in the digital age march 2014
Academic honesty in the digital age march 2014 Academic honesty in the digital age march 2014
Academic honesty in the digital age march 2014
 
Information Literacy Instruction: Ideas for Teaching College Students Essenti...
Information Literacy Instruction: Ideas for Teaching College Students Essenti...Information Literacy Instruction: Ideas for Teaching College Students Essenti...
Information Literacy Instruction: Ideas for Teaching College Students Essenti...
 
Developing 21st Century graduates: thinking critically through Information Li...
Developing 21st Century graduates: thinking critically through Information Li...Developing 21st Century graduates: thinking critically through Information Li...
Developing 21st Century graduates: thinking critically through Information Li...
 
Academic Research Essay
Academic Research EssayAcademic Research Essay
Academic Research Essay
 
Project Individual Reflection Paper And Project Group
Project Individual Reflection Paper And Project GroupProject Individual Reflection Paper And Project Group
Project Individual Reflection Paper And Project Group
 
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
PhD research proposal presentation Sonia Saddiqui 28 Nov 2013
 
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...Currents in Information Literacy: Standards, Lessons, and Learners Standards,...
Currents in Information Literacy: Standards, Lessons, and Learners Standards,...
 
Currents in Information Literacy: Standards, Lessons, and Learners
Currents in Information Literacy: Standards, Lessons, and LearnersCurrents in Information Literacy: Standards, Lessons, and Learners
Currents in Information Literacy: Standards, Lessons, and Learners
 
ETHICS IN E-LEARNING. Elif TOPRAK & others
ETHICS IN E-LEARNING. Elif TOPRAK  & othersETHICS IN E-LEARNING. Elif TOPRAK  & others
ETHICS IN E-LEARNING. Elif TOPRAK & others
 
Running head STUDENT TRANSFER .docx
Running head STUDENT TRANSFER                                  .docxRunning head STUDENT TRANSFER                                  .docx
Running head STUDENT TRANSFER .docx
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmar
 

More from mydrynan

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxmydrynan
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxmydrynan
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docxmydrynan
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxmydrynan
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxmydrynan
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docxmydrynan
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxmydrynan
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxmydrynan
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxmydrynan
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxmydrynan
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxmydrynan
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxmydrynan
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docxmydrynan
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxmydrynan
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxmydrynan
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docxmydrynan
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxmydrynan
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docxmydrynan
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxmydrynan
 

More from mydrynan (20)

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docx
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Critical Thinking Processby Shawnesty MaysSubmission dat.docx

  • 1. Critical Thinking Process by Shawnesty Mays Submission dat e : 10- Sep- 2018 01:00AM (UT C- 04 00) Submission ID: 9993857 11 File name : Critical_T hinking_Pro cess_SM.do cx (15.65K) Word count : 296 Charact e r count : 187 5 0% SIMILARIT Y INDEX 0% INT ERNET SOURCES 0% PUBLICAT IONS 0% ST UDENT PAPERS Exclude quo tes On Exclude biblio graphy On
  • 2. Exclude matches < 2% Critical Thinking Process ORIGINALITY REPORT PRIMARY SOURCES Critical Thinking Processby Shawnesty MaysCritical Thinking ProcessORIGINALITY REPORTPRIMARY SOURCES Academic integrity is defined as honesty and responsibility in scholarship. Integrity is loosely defined as an adherence to moral and ethical principles; soundness of moral character and honesty. Together, integrity and academic integrity translates into one’s current and future profession. A student, at any level in scholarship, may experience periods where the feelings of being overwhelmed and stressed are present. Moreover, at the doctorate level, where academic demands are greater for students due to the level of scholarly research and critical thinking involved. While in pursuit of scholarship, it is a fundamental expectation of all students to submit original work and to properly cite or give credit to other’s work. Anyone who has been stealing must steal no longer, but must work, doing something useful with their own hands, that they may have something to share with those in need (Ephesians 4:28, New International Version). While in the Doctorate of Strategic Leadership (DSL) program, to achieve and maintain academic integrity it is important for me to keep my career goals in mind: 1) to become a well- respected, contributing member of the academic community 2) to lend my expertise as a consultant in strategic leadership to better organizations. Through keeping my career goals in the forefront, I am able to remind myself that the challenging academic assignments and tests in the DSL program will assist
  • 3. me in gaining knowledge of course content and my grades will show how well the goal of knowledge is fully achieved. In addition to keeping my personal goals in mind, the awareness of Liberty University’s academic integrity and honor codes will assist with my achievement and maintenance of academic integrity while navigating through the DSL program. Universities and colleges pen the requisite of academic integrity and honor codes into syllabus but rarely engage the student in instruction regarding academic misconduct and how it can be avoided. There appears to be an assumption among public and private schools, colleges and universities that students should have an understanding the meaning of academic integrity but few professors explicitly address what plagiarism means and provide explicit examples of plagiarism (Evering & Moorman, 2012). In this digital age, the avenues by which students access written material and information are limitless. No longer are the days of only performing research in a library setting and looking up information in a card catalog. For example, today’s students now have the ability to purchase course notes via the internet from other students, buy written essays and dissertations, pass an online course by someone else completing and submitting assignments. Scanlon and Neumann (2002) surveyed 698 students at nine colleges. 8% of surveyed students reported that they frequently copied text without citing the source, 3% copied a paper and never cited a source and 2% of surveyed college students purchased a paper online. When it pertains to academic misconduct, faculty, students and administrators all point the finger at one another. The real issue is not the frequency of plagiarism or academic misconduct. Moreover, the real issue why students risk their academic and professional career by compromising their academic integrity by plagiarism. An easy answer to why students plagiarize is that
  • 4. they are lazy and do not work to put in the effort to complete the assignment. After close analysis of research on academic misconduct revealed several reasons that contributed to plagiarism, including underdeveloped sense of integrity, lack of maturity, one’s perception of online ethical practices, inexperience writing in a particular genre, lack of interest in topic and pressure to earn and maintain a high grade (McCabe, 2005). The same reasons found to explain why students plagiarize or experience academic misconduct can be transferred into a vocational setting. If it is my goal is to become a well-respected contributing member of the academic community as well as, strategically lead organizations I must maintain integrity. Therefore as a leader, I should remain abreast of and implement best practices in discouraging plagiarism approaches. Research shows that the following strategies are effective best practices in discouraging plagiarism: Education- Individuals need to be provided with real-world examples of plagiarism and the consequences of such actions. Engagement in a discussion of integrity and honor policies are shown to be effective. Self-Management – Teach individuals how to pace their work and balance life outside of work. 3. Engage Interests – Allow individuals to focus on topics that interest them. Allow individuals to use varied platforms to share their work such as, but not limited to, video, blogs, social media (Fischer & Zigmond, M.J., 2011). Reference Evering, L.C. & Moorman, G. (2012). Rethinking plagiarism in the digital age. Journal of
  • 5. Adolescent & Adult Literacy, 56(1), 35-44. Fischer, B.A. & Zigmond, M.J. (2011). Education approaches for discouraging plagiarism. Urologic Oncology: Seminars and Original Investigations, 29, 100- 103. McCabe, D. (2005) It takes a village. Academic integrity. Liberty Education, 91(3), 26- 31. Scanlon, P. & Neumann, D. (2002). Internet plagiarism among college students. Journal of College Student Development, 43(3), 374-385.