This document discusses the rise of academic misconduct in universities, focusing on plagiarism and ghostwriting. It notes that while universities have always had some level of cheating, the internet has enabled new forms of misconduct like plagiarism and the outsourcing of academic work to ghostwriters on a large scale. Ghostwriting services can now quickly and anonymously produce high-quality academic work, making detection very difficult. This undermines the integrity of university degrees. The document examines the issues around plagiarism and ghostwriting in more detail and notes the challenges universities face in addressing this problem.
Part of a panel presentation at the New Jersey Writing Alliance annual conference on "Technology & Ethics." This presentation examines why students cheat, why faculty often don't "prosecute" infractions and how technology can and can not prevent occurrences.
ANALYZING THE PERCEPTION OF UNDERGRADUATE STUDENTS ON ACADEMIC DISHONESTY AND...Darian Pruitt
This document provides an introduction to an undergraduate thesis that analyzes the perception of undergraduate students on academic dishonesty and its impact on the quality of learning experience at universities in Metro Manila. It discusses the background of academic dishonesty or fraud in both business and academic settings. It also introduces the research problem regarding the linkage between academic dishonesty and quality of learning experience. The objectives and significance of the study are outlined which aim to determine how elements of fraud influence academic dishonesty and how it affects learning quality. The introduction concludes by noting the importance of ensuring academic integrity and quality education.
Academic Dishonesty Claim Analysis
The Cause And Effects Of Academic Dishonesty
The Issue Of Academic Dishonesty
Academic Plagiarism And Academic Dishonesty
Academic Dishonesty
Legal Issue Scenario : Academic Dishonesty
Academic Dishonesty Among High School Students
The Importance Of Academic Dishonesty
Examples Of Plagiarism And Academic Honesty
Should Cheating Be Academic Dishonesty? Essay
Academic Dishonesty In College
Academic Dishonesty : The Technological Era
Academic Dishonesty At Ashford University
Analysis of Academic Dishonesty Essay
Academic Dishonesty Essay
Academic Dishonesty In The United States
Academic Dishonesty: Parker University
The Pros And Cons Of Academic Dishonesty
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
38 u December 2017 / January 2018
T
he authorities believe he slipped across the United States-Mexico
border sometime during the summer of 2016, likely deep in the
night. He carried no papers. The crossing happened in the rugged
backcountry of southeastern Arizona, where the main deterrent to
trespassers is the challenging nature of the terrain—not the metal
walls, checkpoints, and aerial surveillance that dominate much of the border.
But the border crosser was des-
ert-hardy and something of an expert
at camouflage. No one knows for cer-
tain how long he’d been in the United
States before a motion-activated cam-
era caught him walking a trail in the
Dos Cabezas Mountains on the night
of November 16. When a government
agency retrieved the photo in late Feb-
ruary, the image was plastered across
Arizona newspapers, causing an imme-
diate sensation.
The border crosser was a jaguar.
Jaguars once roamed throughout
the southwestern United States, but
are now quite rare. A core population
resides in the mountains of northern
Mexico, and occasionally an adventur-
ous jaguar will venture north of the bor-
der. When one of these elusive, graceful
cats makes an appearance stateside,
Mrill Ingram is The Progressive’s online media editor.
‘The Border Is
a Beautiful Place’
For Many, Both Sides of the
Arizona-Mexico Border Are Home
B
O
R
D
ER
A
R
TS
C
O
R
R
ID
O
R
By Mrill Ingram
Artists Ana Teresa Fernández in Agua Prieta, Mexico, and Jenea Sanchez in Douglas, Arizona, worked with dozens of community members to paint sections
of the border fence sky blue, “erasing” it as a symbolic act of resistance against increasing violence and oppression of human rights along the border.
https://apnews.com/79c83219af724016b8cfa2c505018ac4/agency-reports-rare-jaguar-sighting-mountains-arizona
The Progressive u 39
usually via a motion-triggered camera,
it may get celebrity status.
“We’ve had positive identifications
of seven cats, alive and well, in the last
twenty years in the United States,” says
Diana Hadley of the Mexico-based
Northern Jaguar Project, which works
with people in both countries to pro-
tect the big cat. One of those cats be-
came known as El Jefe, after he took
up residence in 2011 in the Santa Rita
Mountains south of Tucson, Arizona.
His presence was proof that the United
States still had enough wild habitat to
support a jaguar.
The new cat was especially excit-
ing because, based on size and shape,
observers initially thought it might
be female. “A lot of people in Arizona
would be very happy to have jaguars
from Mexico breeding in Arizona,” re-
marks Hadley.
In September 2017, the Arizo-
na-based Center for Biological Di-
versity released new video of the cat,
apparently a male, caught on a mo-
tion-triggered camera ambling through
the oak scrub forest in the Chiricahua
Mountains. He’s been named Sombra,
or Shadow, by schoolkids in Tucson.
Such things will no longer ...
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
This document outlines key concepts related to recognizing and analyzing ethical problems. It discusses how to distinguish ethical questions from clinical or legal ones, and introduces the common features of ethical problems - a moral agent, a course of action, and an outcome. It uses the story of a veteran, Bill, missing therapy appointments as an example, with his therapist Kate feeling uncertain about what to do.
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
4-5 Annotations and Writing Plan - Thu Jan 30 21:11
Claire Knaus
Annotations:
Bekalu, M. A., McCloud, R. F., & Viswanath, K. (2019). Association of Social Media Use With Social Well-Being, Positive Mental Health, and Self-Rated Health: Disentangling Routine Use From Emotional Connection to Use. Health Education & Behavior, 46(2_suppl), 69S-80S. https://doi.org/10.1177/1090198119863768
It seems that this source is arguing the effect of social media on mental health. This source uses this evidence to support the argument: Provided studies focusing on why individuals use social media, types of social network platforms, and the value of social capital. A counterargument for this source is: Studies that focus more on statistical usage rather than emotion connection. Personally, I believe the source is doing a good job of supporting its arguments because it provides an abundance of study references and clearly portrays the information and intent. I think this source will be very helpful in supporting my argument because of the focus on emotional connection to social media and its effects on mental health.
Matsakis, L. (2019). How Pro-Eating Disorder Posts Evade Filters on Social Media. In Gale Opposing Viewpoints Online Collection. Farmington Hills, MI: Gale. (Reprinted from How Pro-Eating Disorder Posts Evade Filters on Social Media, Wired, 2018, June 13) Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/UAZKKH366290962/OVIC?u=nhc_main&sid=OVIC&xid=2c90b7b5
It seems that this source is arguing that social media platforms are not doing enough to eliminate harmful pro-ED posts. This source uses this evidence to support the argument: Information about specific platforms and what they have done to moderate content, links for more information, and what constitutes as harmful content. A counterargument for this source is that it is too difficult for platforms to remove the content and to even find it. In addition, it is believed there may be harmful effects on vulnerable people posting this type of content. Personally, I believe the source is doing a good job of supporting its arguments because it provides opposing viewpoints as well as raising awareness of some of the dangers of social media posts. I think this source will be very helpful in supporting my argument because it provides information on specifically what is being done to moderate this type of content on social media, and what some of the difficulties in moderating are.
Investigators at University of Leeds Describe Findings in Eating Disorders (Pro-ana versus Pro-recovery: A Content Analytic Comparison of Social Media Users' Communication about Eating Disorders on Twitter and Tumblr). (2017, September 4). Mental Health Weekly Digest, 38. Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/A502914419/OVIC?u=nhc_main&sid=OVIC&xid=5e60152f
It seems that this source is arguing that there are more positive, anti-anorexia posts on social media than harmful, pro-ED content. ...
Part of a panel presentation at the New Jersey Writing Alliance annual conference on "Technology & Ethics." This presentation examines why students cheat, why faculty often don't "prosecute" infractions and how technology can and can not prevent occurrences.
ANALYZING THE PERCEPTION OF UNDERGRADUATE STUDENTS ON ACADEMIC DISHONESTY AND...Darian Pruitt
This document provides an introduction to an undergraduate thesis that analyzes the perception of undergraduate students on academic dishonesty and its impact on the quality of learning experience at universities in Metro Manila. It discusses the background of academic dishonesty or fraud in both business and academic settings. It also introduces the research problem regarding the linkage between academic dishonesty and quality of learning experience. The objectives and significance of the study are outlined which aim to determine how elements of fraud influence academic dishonesty and how it affects learning quality. The introduction concludes by noting the importance of ensuring academic integrity and quality education.
Academic Dishonesty Claim Analysis
The Cause And Effects Of Academic Dishonesty
The Issue Of Academic Dishonesty
Academic Plagiarism And Academic Dishonesty
Academic Dishonesty
Legal Issue Scenario : Academic Dishonesty
Academic Dishonesty Among High School Students
The Importance Of Academic Dishonesty
Examples Of Plagiarism And Academic Honesty
Should Cheating Be Academic Dishonesty? Essay
Academic Dishonesty In College
Academic Dishonesty : The Technological Era
Academic Dishonesty At Ashford University
Analysis of Academic Dishonesty Essay
Academic Dishonesty Essay
Academic Dishonesty In The United States
Academic Dishonesty: Parker University
The Pros And Cons Of Academic Dishonesty
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
38 u December 2017 / January 2018
T
he authorities believe he slipped across the United States-Mexico
border sometime during the summer of 2016, likely deep in the
night. He carried no papers. The crossing happened in the rugged
backcountry of southeastern Arizona, where the main deterrent to
trespassers is the challenging nature of the terrain—not the metal
walls, checkpoints, and aerial surveillance that dominate much of the border.
But the border crosser was des-
ert-hardy and something of an expert
at camouflage. No one knows for cer-
tain how long he’d been in the United
States before a motion-activated cam-
era caught him walking a trail in the
Dos Cabezas Mountains on the night
of November 16. When a government
agency retrieved the photo in late Feb-
ruary, the image was plastered across
Arizona newspapers, causing an imme-
diate sensation.
The border crosser was a jaguar.
Jaguars once roamed throughout
the southwestern United States, but
are now quite rare. A core population
resides in the mountains of northern
Mexico, and occasionally an adventur-
ous jaguar will venture north of the bor-
der. When one of these elusive, graceful
cats makes an appearance stateside,
Mrill Ingram is The Progressive’s online media editor.
‘The Border Is
a Beautiful Place’
For Many, Both Sides of the
Arizona-Mexico Border Are Home
B
O
R
D
ER
A
R
TS
C
O
R
R
ID
O
R
By Mrill Ingram
Artists Ana Teresa Fernández in Agua Prieta, Mexico, and Jenea Sanchez in Douglas, Arizona, worked with dozens of community members to paint sections
of the border fence sky blue, “erasing” it as a symbolic act of resistance against increasing violence and oppression of human rights along the border.
https://apnews.com/79c83219af724016b8cfa2c505018ac4/agency-reports-rare-jaguar-sighting-mountains-arizona
The Progressive u 39
usually via a motion-triggered camera,
it may get celebrity status.
“We’ve had positive identifications
of seven cats, alive and well, in the last
twenty years in the United States,” says
Diana Hadley of the Mexico-based
Northern Jaguar Project, which works
with people in both countries to pro-
tect the big cat. One of those cats be-
came known as El Jefe, after he took
up residence in 2011 in the Santa Rita
Mountains south of Tucson, Arizona.
His presence was proof that the United
States still had enough wild habitat to
support a jaguar.
The new cat was especially excit-
ing because, based on size and shape,
observers initially thought it might
be female. “A lot of people in Arizona
would be very happy to have jaguars
from Mexico breeding in Arizona,” re-
marks Hadley.
In September 2017, the Arizo-
na-based Center for Biological Di-
versity released new video of the cat,
apparently a male, caught on a mo-
tion-triggered camera ambling through
the oak scrub forest in the Chiricahua
Mountains. He’s been named Sombra,
or Shadow, by schoolkids in Tucson.
Such things will no longer ...
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
This document outlines key concepts related to recognizing and analyzing ethical problems. It discusses how to distinguish ethical questions from clinical or legal ones, and introduces the common features of ethical problems - a moral agent, a course of action, and an outcome. It uses the story of a veteran, Bill, missing therapy appointments as an example, with his therapist Kate feeling uncertain about what to do.
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
4-5 Annotations and Writing Plan - Thu Jan 30 21:11
Claire Knaus
Annotations:
Bekalu, M. A., McCloud, R. F., & Viswanath, K. (2019). Association of Social Media Use With Social Well-Being, Positive Mental Health, and Self-Rated Health: Disentangling Routine Use From Emotional Connection to Use. Health Education & Behavior, 46(2_suppl), 69S-80S. https://doi.org/10.1177/1090198119863768
It seems that this source is arguing the effect of social media on mental health. This source uses this evidence to support the argument: Provided studies focusing on why individuals use social media, types of social network platforms, and the value of social capital. A counterargument for this source is: Studies that focus more on statistical usage rather than emotion connection. Personally, I believe the source is doing a good job of supporting its arguments because it provides an abundance of study references and clearly portrays the information and intent. I think this source will be very helpful in supporting my argument because of the focus on emotional connection to social media and its effects on mental health.
Matsakis, L. (2019). How Pro-Eating Disorder Posts Evade Filters on Social Media. In Gale Opposing Viewpoints Online Collection. Farmington Hills, MI: Gale. (Reprinted from How Pro-Eating Disorder Posts Evade Filters on Social Media, Wired, 2018, June 13) Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/UAZKKH366290962/OVIC?u=nhc_main&sid=OVIC&xid=2c90b7b5
It seems that this source is arguing that social media platforms are not doing enough to eliminate harmful pro-ED posts. This source uses this evidence to support the argument: Information about specific platforms and what they have done to moderate content, links for more information, and what constitutes as harmful content. A counterargument for this source is that it is too difficult for platforms to remove the content and to even find it. In addition, it is believed there may be harmful effects on vulnerable people posting this type of content. Personally, I believe the source is doing a good job of supporting its arguments because it provides opposing viewpoints as well as raising awareness of some of the dangers of social media posts. I think this source will be very helpful in supporting my argument because it provides information on specifically what is being done to moderate this type of content on social media, and what some of the difficulties in moderating are.
Investigators at University of Leeds Describe Findings in Eating Disorders (Pro-ana versus Pro-recovery: A Content Analytic Comparison of Social Media Users' Communication about Eating Disorders on Twitter and Tumblr). (2017, September 4). Mental Health Weekly Digest, 38. Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/A502914419/OVIC?u=nhc_main&sid=OVIC&xid=5e60152f
It seems that this source is arguing that there are more positive, anti-anorexia posts on social media than harmful, pro-ED content. ...
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
This document discusses codes of ethics and institutional ethics structures in healthcare organizations. It begins by outlining the key learning objectives which focus on understanding the importance of codes of ethics and how they reflect an organization's values. It then discusses the role of codes of ethics in shaping an organization's moral identity and standards of conduct. The document provides examples of codes from the American Medical Association and Trinity Health. It emphasizes that codes of ethics should apply to all healthcare workers and cover areas like cultural competence, privacy, and nondiscrimination. Institutional ethics committees and review boards also help address ethical issues.
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
3
NIMH: Opinion or Fact
The National Institute of Mental Health (NIMH) was formed in 1946 and is one of 27 institutes that form the National Institute of Health (NIH) (NIMH, 2019). The mission of the NIMH is “To transform the understanding and treatment of mental illnesses through basic and clinical research, paving the way for prevention, recovery, and cure.” (NIMH, 2019). There are many different mental illnesses discussed on the NIMH website to include Attention-Deficit/Hyperactivity Disorder (ADHD). The NIMH website about ADHD is effective at providing the public general information and meets the criteria of authority, objectivity, and currency.
The NIMH website about ADHD provides an overview of ADHD, discusses signs and symptoms, and risk factors. The NIMH continues with information about treatment and therapies. Information provided by the NIMH is intended for both children and adults. The NIMH concludes on the page with studies the public can join and more resources for the public such as booklets, brochures, research and clinical trials.
As described by Jim Kapoun authority can be identified by who or what institution/organization published the document and if the information in the document is cited correctly (Cornell, 2020). The information on the website is published by the NIMH which is the lead research institute related to mental health for the last 70 plus years (NIMH, 2019). On the page related to ADHD the NIMH references the program of Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD) and provides a hyperlink to access the resources available with the agency (NIMH,2019). This link can be found under the support groups section in the treatment and therapies. On the website to the right of the area describing inattention the NIMH has a section on research. In this block there is a link to “PubMed: Journal Articles about Attention Deficit Hyperactivity Disorder (ADHD)” which will take you to a search of the National Center for Biotechnology Information (NCBI) published by PubMed on ADHD (NIMH, 2019). Throughout the entire page the NIMH provides sources and hyperlinks to the sources as citations. Based on the reputation of the NIMH and the citations to the source material the website meets the criteria of authority.
According to Kapoun objectivity can be identified looking for areas where the author expresses his or her opinion (Cornell, 2020). Information provided on the NIMH page about ADHD does not express the opinion of the author. The author produces only factual information based on research. The NIMH makes it a point not to mention the names of medications when discussing treatments and only explains the medications fall in two categories stimulants and non-stimulants (NIMH, 2019). In this same area the NIMH provides hyperlinks to the NIMH Mental Health Medication and FDA website for information about medication. The extent at which the NIMH goes to not provide an opinion on the website meet ...
4.1
Updated April-09
Lecture Notes
Chapter 4
Enterprise Excellence
Implementation
ENTERPRISE EXCELLENCE
4.2
Updated April-09
Learning Objectives
• Management & Operations Plans
• Enterprise Excellence Projects
• Enterprise Excellence Project decision Process
• Planning the Enterprise Excellence Project
• Tollgate Reviews
• Project Notebook
4.3
Updated April-09
MANAGEMENT AND OPERATIONS PLANS
• The scope and complexity of the
implementation projects will vary from the
executive level, to the management level, to
the operational level
• Each plan, as it is developed and deployed,
will include projects to be accomplished
• Conflicts typically will occur amongst
requirements of quality, cost, and schedule
when executing a project
4.4
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• An Enterprise Excellence project will be one of three
types:
1. Technology invention or innovation
2. New product, service, or process development
3. Product, service, or process improvement
• Enterprise Excellence uses the scientific method
• The scientific method is a process of organizing
empirical facts and their interrelationships in a
manner that allows a hypothesis to be developed and
tested
4.5
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• The scientific method consists of the
following steps:
1. Observe and describe the situation
2. Formulate a hypothesis
3. Use the hypothesis to predict results
4. Perform controlled tests to confirm the hypothesis
4.6
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• Figure 4.1 shows the project decision process
4.7
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Inventing/Innovating Technology:
Technology development is accomplished using
system engineering
This system approach enables critical functional
parameters and responses to be quickly transferred
into now products, services, and processes
The process is a four-phase process (I2DOV):
Invention & Innovation – Develop – Optimize – Verify
4.8
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Development of Products, Services, and
Processes
The Enterprise Excellence approach for developing
products, services, and processes is the Design for
Lean Six Sigma strategy.
This strategy helps to incorporate customer
requirements and expectations into the product
and/or service.
Concept – Design – Optimize - Verify (CDOV) is a
specific sequential design & development process
used to execute the design strategy.
4.9
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Improving Products, Services, and Processes:
Improving products, services and processes usually
involves the effectiveness and efficiency of operations.
A product or service is said to be effective when it meets
all of its customer requirements.
Effectiveness can be simply expressed as "doing the
right things the first time ...
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
3
Type your name here
Type your three-letter and -number course code here
The date goes here
Type instructor’s name here
Your Title Goes Here
This is an electronic template for papers written in GCU style. The purpose of the template is to help you follow the basic writing expectations for beginning your coursework at GCU. Margins are set at 1 inch for top, bottom, left, and right. The first line of each paragraph is indented a half inch (0.5"). The line spacing is double throughout the paper, even on the reference page. One space after punctuation is used at the end of a sentence. The font style used in this template is Times New Roman. The font size is 12 point. When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. If you have any questions, please consult with your instructor.
Citations are used to reference material from another source. When paraphrasing material from another source (such as a book, journal, website), include the author’s last name and the publication year in parentheses.When directly quoting material word-for-word from another source, use quotation marks and include the page number after the author’s last name and year.
Using citations to give credit to others whose ideas or words you have used is an essential requirement to avoid issues of plagiarism. Just as you would never steal someone else’s car, you should not steal his or her words either. To avoid potential problems, always be sure to cite your sources. Cite by referring to the author’s last name, the year of publication in parentheses at the end of the sentence, such as (George & Mallery, 2016), and page numbers if you are using word-for-word materials. For example, “The developments of the World War II years firmly established the probability sample survey as a tool for describing population characteristics, beliefs, and attitudes” (Heeringa, West, & Berglund, 2017, p. 3).
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples (George & Mallery, 2016; Heeringa et al., 2017; Smith et al., 2018; “USA swimming,” 2018; Yu, Johnson, Deutsch, & Varga, 2018) of how to format different reference types (e.g., books, journal articles, and a website). For additional examples, see the GCU Style Guide.
References
George, D., & Mallery, P. (2016). IBM SPSS statistics 23 step by step: A simple guide and reference. New York, NY: Routledge.
Heeringa, S. G., West, B. T., & Berglund, P. A. (2017). Applied survey data analysis (2nd ed.). New York, NY: Chapman & Hall/CRC Press.
Smith, P. D., Martin, B., Chewning, B., ...
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
3
Welcome to Writing at Work! After you have completed the reading for the week, write an email to introduce yourself to your peers. The name of your thread should be what you would include in the subject of the email.
As you compose your email, keep in mind the following:
· You are addressing a group you will work with in a professional capacity for at least 15 weeks. Let us know something about you, but don't share anything you wouldn't want repeated.
· You should include what you perceive to be your relative strengths with regard to writing at work. What types of tasks would you feel most comfortable taking on?
· You should also include what aspects of writing at work make you feel least comfortable. What types of tasks would you not be as suited for?
· What do you hope to learn in the next several months?
Next, in an attachment, choose one of the following two prompts and write a letter, taking into account the purpose, audience, and appropriate style for the task.
1. Your organization has been contracted to complete a project for an important client, and you were charged with managing the project. It has unfortunately become clear that your team will not meet the deadline. Your supervisor has told you to contact the client in writing to alert them to the situation and wants to be cc'd on the message. Write a letter, which you will send via email, addressing the above.
2. After a year-long working relationship, your organization will no longer be making use of a freelancer's services due to no fault of their own. Write a letter alerting them to this fact.
Name:
HRT 4760 Assignment 01
Timeliness
First, you will choose one particular organization where you will conduct each of your 15 different observational assignments. Stick with this same organization throughout your coursework. (Do not switch around assignment locations at different organizations or locations.) The reason for continuing your observational assignments at the same organization is to give you a deeper understanding of this particular organization across the 15 different assignments. As you read on, you will get a more complete understanding as to how these 15 assignments come together.
Tip: Many students choose the organization where they are currently working. This works particularly well. If you are working there, you have much opportunity to gain access to the areas that will give you a more complete understanding of the quality of entire service package (the 15 different elements) that the organization offers to its customers.
This is one of a package of 15 different assignments that comprise the Elements of Service, which you will study this term. For this assignment, you will observe elements of service in almost any particular service establishment. A few examples of service establishments would include, but not be limited to these: Hotel, resort, private club, restaurant, airline, cruise line, grocery store, doctor’s office, coffee house, and scores of oth ...
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
3
JWI 531 Finance II Assignment 1Template
HOW TO USE THIS TEMPLATE:
This is a template and checklist corresponding to your Assignment 1 paper: Enterprise Risk Management and Moat Strength. See below for an explanation of the color-coding in this template:
· All green text includes instructions to support your writing. You should delete all green text before submitting your final paper.
· All blue text indicates areas where you need to replace text with your own information. Replace the blue text with your own words in black.
· Headings and subheadings are written in black, bold type. Keep these in your paper.
TIPS:
· Write in the third person, using “he” or “she” or “they”, or using specific names. Do not use the second person “you”.
· The body of this paper has one-inch margins and uses a professional font (size 10-12); we recommend Arial or Times New Roman fonts.
· The Assignment template is already formatted with all needed specifications like margins, appropriate font, and double spacing.
· Before submitting your paper, use Grammarly to check for punctuation and usage errors and make the required corrections. Then read aloud to edit for tone and flow.
· You should also run your paper through SafeAssign to ensure that it meets the required standards for originality.
FINALIZING YOUR PAPER
Your submission should be a maximum of 4 pages in length. The page count doesnotinclude the Cover Page at the beginning and the References page at the end. The final paper that you submit for grading should be in black text only with all remaining green text and blue text removed. Assignment 1: Enterprise Risk Analysis and Moat Strength
Author’s Name
Jack Welch Management Institute
Professor’s Name
JWI 531
Date
Introduction
An Introduction should be succinct and to the point. Start your Introduction with a general and brief observation about the paper’s topic. Write a thesis statement, which is the “road map” for your paper - it helps your reader to navigate your work. In your thesis statement, be specific about the major areas you plan to address in your paper.
The headings below should guide your introduction, since they identify the topics to be addressed in your paper. The introduction is not a graded part of your rubric but it helps your reader to understand what your assignment will be about. We recommend that you write this part of your Introduction after you complete the other sections of your paper. It only needs to be one paragraph in length.
Analysis and Recommendations
You must answer each of the following questions in your paper. Keep your responses focused on the topic. Straying off into additional areas, even if they are interesting, will not earn additional marks, and may actually detract from the clarity of your responses.
I. Where is each company in its corporate lifecycle (startup, growth, maturity or decline)? Explain.
Before writing your response to this question, make sure you understand what characterizes ea ...
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
3
Big Data Analyst Questionnaire
Within this document are four different questions. Each question is structured in the following manner:
1) Premise
- Contains any needed background information
2) Request
- The actual question, what you are to solve
3) Notes
- A space if you feel like including notes of any kind for the given question
Please place your answer for each question in a separate file, following this naming convention:
Name_Qn.docx, where n = the question number (i.e., 1, 2 ...). So the file for the first question should be named ‘Name_Q1.docx’.
When complete, please package everything together and send email responses to the designated POCs.
Page | 1
Premise:
You have a table named “TRADES” with the following six columns:
Column Name
Data Type
Description
Date
DATE
The calendar date on which the trade took place.
Firm
VARCHAR(255)
A symbol representing the Broker/Dealer who conducted the trade.
Symbol
VARCHAR(10)
The security traded.
Side
VARCHAR(1)
Denotes whether the trade was a buy (purchase) or a sell (sale) of a security.
Quantity
BIGINT
The number of shares involved in the trade.
Price
DECIMAL(18,8)
The dollar price per share traded.
You write a query looking for all trades in the month of August 2019. The query returns the following:
DATE
FIRM
SYMBOL
SIDE
QUANTITY
PRICE
8/5/2019
ABC
123
B
200
41
8/5/2019
CDE
456
B
601
60
8/5/2019
ABC
789
S
600
70
8/5/2019
CDE
789
S
600
70
8/5/2019
FGH
456
B
200
62
8/6/2019
3CDE
456
X
300
61
8/8/2019
ABC
123
B
300
40
8/9/2019
ABC
123
S
300
30
8/9/2019
FGH
789
B
2100
71
8/10/2019
CDE
456
S
1100
63
Questions:
1) Conduct an analysis of the data set returned by your query. Write a paragraph describing your analysis. Please also note any questions or assumptions made about this data.
2) Your business user asks you to show them a table output that includes an additional column categorizing the TRADES data into volume based Tiers, with a column named ‘Tier’. Quantities between 0-250 will be considered ‘Small’, quantities greater than ‘Small’ but less than or equal to 500 will be considered ‘Medium’, quantities greater than ‘Medium’ but less than or equal to 500 will be considered ‘Large’, and quantities greater than ‘Tier 3’ will be considered ‘Very Large’ .
a. Please write the SQL query you would use to add the column to the table output.
b. Please show the exact results you expect based on your SQL query.
3) Your business user asks you to show them a table output summarizing the TRADES data (Buy and Sell) on week-by-week basis.
a. Please write the SQL query you would use to query this table.
b. Please show the exact results you expect based on your SQL query.
Notes:
1
Premise:
You need to describe in writing how to accomplish a task. Your audience has never completed this task before.
Question:
In a few paragraphs, please describe how to complete a task of your choice. You may choose a task of your own liking or one of the sample tasks below:
1) How to make a p ...
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
3
HR Strategies
Key concepts and terms
High commitment management •
High performance management •
HR strategy •
High involvement management •
Horizontal fi t •
Vertical fi t •
On completing this chapter you should be able to defi ne these key concepts.
You should also understand:
Learning outcomes
T • he purpose of HR strategy
Specifi c HR strategy areas •
How HR strategy is formulated •
How the vertical integration of •
business and HR strategies is
achieved
How HR strategies can be set out •
General HR strategy areas •
The criteria for a successful HR •
strategy
The fundamental questions on •
the development of HR strategy
How horizontal fi t (bundling) is •
achieved
How HR strategies can be •
implemented
47
48 Human Resource Management
Introduction
As described in Chapter 2, strategic HRM is a mindset that leads to strategic actions and reac-
tions, either in the form of overall or specifi c HR strategies or strategic behaviour on the part
of HR professionals. This chapter focuses on HR strategies and answers the following ques-
tions: What are HR strategies? What are the main types of overall HR strategies? What are the
main areas in which specifi c HR strategies are developed? What are the criteria for an effective
HR strategy? How should HR strategies be developed? How should HR strategies be
implemented?
What are HR strategies?
HR strategies set out what the organization intends to do about its human resource manage-
ment policies and practices and how they should be integrated with the business strategy and
each other. They are described by Dyer and Reeves (1995) as ‘internally consistent bundles of
human resource practices’. Richardson and Thompson (1999) suggest that:
A strategy, whether it is an HR strategy or any other kind of management strategy must
have two key elements: there must be strategic objectives (ie things the strategy is sup-
posed to achieve), and there must be a plan of action (ie the means by which it is pro-
posed that the objectives will be met).
The purpose of HR strategies is to articulate what an organization intends to do about its
human resource management policies and practices now and in the longer term, bearing in
mind the dictum of Fombrun et al (1984) that business and managers should perform well in
the present to succeed in the future. HR strategies aim to meet both business and human needs
in the organization.
HR strategies may set out intentions and provide a sense of purpose and direction, but they are
not just long-term plans. As Gratton (2000) commented: ‘There is no great strategy, only great
execution.’
Because all organizations are different, all HR strategies are different. There is no such thing as
a standard strategy and research into HR strategy conducted by Armstrong and Long (1994)
and Armstrong and Baron (2002) revealed many variations. Some strategies are simply very
general declarations of intent. Others go into much more detail. ...
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
3
Implementing Change
Construction workers on scaffolding.
hxdbzxy/iStock/Thinkstock
Learning Objectives
After reading this chapter, you should be able to do the following:
Summarize the nine steps in Ackerman and Anderson’s road map for change.
Analyze Cummings and Worley’s five dimensions of leading and managing change.
Describe how to align an organization with its new vision and future state.
Explain how roles/relationships and interventions are used to implement change.
Examine ways to interact with and influence stakeholders.
Change is the law of life and those who look only to the past or present are certain to miss the future.
—John F. Kennedy
Alan Mulally was selected to lead Ford in 2006 after he was bypassed as CEO at Boeing, where he had worked and was expected to become CEO. Insiders and top-level managers at Ford, some of whom had expected to become CEO, were initially suspicious and then outraged when Mulally was hired. They questioned what someone from the airplane industry would know about the car business (Kiley, 2009).
Chair William (Bill) Clay Ford, Jr.—who selected Mulally as CEO—told Ford’s officers that the company needed a fresh perspective and a shake-up, especially since it had lost $14.8 billion in 2008—the most in its 105-year history—and had burned through $21.2 billion, or 61%, of its cash (Kiley, 2009). Because Ford knew that the company’s upper echelon culture was closed, bureaucratic, and rejected outsiders and new ways of thinking, he was not surprised by his officers’ reactions. However, Ford’s managers had no idea that the company was fighting for its life. To succeed, Mulally would need Chair Ford’s full endorsement and support, and he got it.
The company’s biggest cultural challenge was to break down the silos that various executives had built. As we will discuss more in Chapter 4, silos are specific processes or departments in an organization that work independently of each other without strong communication between or among them. A lack of communication can often stifle productivity and innovation, and this was exactly what was happening at Ford.
Mulally devised a turnaround strategy and developed it into the Way Forward Plan. The plan centralized and modernized plants to handle several models at once, to be sold in several markets. The plan was designed to break up the fiefdoms of isolated cultures, in which leaders independently developed and decided where to sell cars. Mulally’s plan also kept managers in positions for longer periods of time to deepen their expertise and improve consistency of operations. The manager who ran the Mazda Motor affiliate commented, “I’m going into my fourth year in the same job. I’ve never had such consistency of purpose before” (as cited in Kiley, 2009, “Meetings About Meetings,” para. 2).
Mulally’s leadership style involved evaluating and analyzing a situation using data and facts and then earning individuals’ support with his determinatio ...
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
3
Assignment Three: Purpose of the study and Research Questions
RES 9300
Recently, Autism has become a serious health concern to parents. According to Center for Disease Control and Prevention (2018), about one in fifty nine United States children has been identified with autism spectrum disorder with one in six children developing developmental disability ranging from mild disabilities such as speech and language impairments to serious developmental disabilities, such as intellectual disabilities, cerebral palsy, and autism (CDC,2018). World Health Organization (2019) estimates that 1 in 160 children globally has autism making it one of the most prevalent diseases. Despite the disease prevalence, most population has little knowledge about the disease. Many health practitioners have proposed early care as a means to control the disease effects.
Purpose Statement
The purpose of this study is to determine whether early intervention services can help improve the development of children suffering from autism. This study also aims to explore the general public awareness and perception about autism disorder.
Research Questions
(1) How should service delivery for autistic patients be improved to promote their health? (2) What impact does early intervention services have on development of children suffering from autism? (3) How can public knowledge on autism improve support and care for autistic patients? (4) What effect will early intervention have on patient’s social skills?
References
Center for Disease Control and Prevention. (2018). Autism Spectrum Disorder (ASD). Data & Statistics. Retrieved From https://www.cdc.gov/ncbddd/autism/data.html
World Health Organization. (2019). Autism Spectrum Disorders. Fact Sheet. Retrieved From https://www.who.int/news-room/fact-sheets/detail/autism-spectrum-disorders
3
Assignment Two: Theoretical Perspective and Literature Review
RES 9300
Literature Map
Parenting an Autism Child
(Dependent Variable)
9
Mothers/Father Role
Education
Religious Beliefs
Gender/Age
Financial Resources
Maternal Relationship
Region
Public Awareness
Support
Ethnicity
Independent Variables
Secondary Source I Will Be Using In My Literature Review
Mother/Father Roles
Glynn, K. A. (2015). Predictors of parenting practices in parents of children with autism spectrum disorder.
Religious Beliefs
Huang, C. Y., Yen, H. C., Tseng, M. H., Tung, L. C., Chen, Y. D., & Chen, K. L. (2014). Impacts of autistic behaviors, emotional and behavioral problems on parenting stress in caregivers of children with autism. Journal of Autism and Developmental Disorders, 44(6), 1383-1390.
Education
Brezis, R. S., Weisner, T. S., Daley, T. C., Singhal, N., Barua, M., & Chollera, S. P. (2015). Parenting a child with autism in India: Narratives before and after a parent–child intervention program. Culture, Medicine, and Psychiatry, 39(2), 277-298.
Financial Resources
Zaidm ...
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
380067.docx
by Jamie Feryll
FILE
T IME SUBMIT T ED 22- MAR- 2019 06:38AM WORD COUNT 3608
CHARACT ER COUNT 204 57
380067 .DOCX (28.82K)
%4
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067.docx
ORIGINALITY REPORT
380067.docx
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
PAGE 16
380067.docxby Jamie Feryll380067.docxORIGINALITY REPORT380067.docxWRITECHECK REPORT
380067
by Jamie Feryll
FILE
T IME SUBMIT T ED 13- MAR- 2019 03:56PM WORD COUNT 34 63
CHARACT ER COUNT 1957 5
ARCHAEOLOGY.DOCX (31.23K)
%5
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067
ORIGINALITY REPORT
380067
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
380067by Jamie Feryll380067ORIGINALITY REPORT380067WRITECHECK REPORT
Interpretations of Iron Age Architecture Brochs in Society/Social Identity
Archaeology is a historical field which has advanced over the years based on more discoveries still being experienced by the archaeologists who seek them. According to Kelly and Thomas (2010; p.5), the concession that life existed in more ancient times than stipulated by biblical scholars and human culture allowed the archaeologists to dig deeper into genealogical data. Iron Age architecture and social/society identity relate to one another. For instance, the population, based on their identity and perception will construct buildings that directly reflect their beliefs. This essay will discuss these archaeological concepts of Iron Age architecture and society/social identity. Need a paragraph on brochs and how many and where they are across Scotland with patcialur focus on the atlantc region, this is not relevant for masters essay. Must define broch from its architecture and how long it would take to build and note famous ones and note the ones that will be referred to in this essay – this could be Perhaps incorpated into the next paragraph.
Iron Age architecture has over the years been dominated by differing archaeological concepts and debates. It was defined by settlements and settlement structures such as duns, brochs, wheelhouses, hillforts, stone-built round houses and timber. The social and societal identity which is identified through material remains indicates aspects of differentiation, regional patterns and segregation. According to Kelly and Thomas (2010; p.28), people who existed in Iron Age Scotland were isolated. This is demonstrated by the presence of a burial followed by an assembled chariot at Newbridge. Northern and western Scotland have been the source of the well-structured developments that have provided cultural, architectural and social data over time. Maes Howe, which is the largest Orkney burial cairn, located between Stromne ...
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
This document summarizes theories of teaching from several influential learning theorists. It discusses how theorists like Thorndike, Guthrie, Skinner, Hull, Tolman, and Gagné viewed the role of the teacher based on their behavioral and cognitive learning theories derived from animal and child studies. They generally saw teaching as managing external conditions to ensure specified behavioral changes in learners. The document then contrasts this with theories of teaching from adult learning theorists like Rogers, who rejected the notion that teaching is controlling learning and saw the teacher's role differently.
38 Monthly Labor Review • June 2012TelecommutingThe.docxlorainedeserre
38 Monthly Labor Review • June 2012
Telecommuting
The hard truth about telecommuting
Telecommuting has not permeated the American workplace, and
where it has become commonly used, it is not helpful in reducing
work-family conflicts; telecommuting appears, instead, to have
become instrumental in the general expansion of work hours,
facilitating workers’ needs for additional worktime beyond the
standard workweek and/or the ability of employers to increase or
intensify work demands among their salaried employees
Mary C. Noonan
and
Jennifer L. Glass
Mary C. Noonan is an Associate
Professor at the Department of
Sociology, The University of Iowa;
Jennifer L. Glass is the Barbara
Bush Regents Professor of Liberal
Arts at the Department of Sociol-
ogy and Population Research
Center, University of Texas at
Austin. Email: [email protected]
uiowa.edu or [email protected]
austin.utexas.edu.
Telecommuting, defined here as work tasks regularly performed at home, has achieved enough
traction in the American workplace to
merit intensive scrutiny, with 24 percent
of employed Americans reporting in recent
surveys that they work at least some hours
at home each week.1 The definitions of
telecommuting are quite diverse. In this ar-
ticle, we define telecommuters as employ-
ees who work regularly, but not exclusively,
at home. In our definition, at-home work
activities do not need to be technologically
mediated nor do telecommuters need a
formal arrangement with their employer to
work at home.
Telecommuting is popular with policy
makers and activists, with proponents
pointing out the multiple ways in which
telecommuting can cut commuting time
and costs,2 reduce energy consumption
and traffic congestion, and contribute to
worklife balance for those with caregiving
responsibilities.3 Changes in the structure
of jobs that enable mothers to more effec-
tively compete in the workplace, such as
telecommuting, may be needed to finally
eliminate the gender gap in earnings and
direct more earned income to children,
both important public policy goals.4
Evidence also reveals that an increasing num-
ber of jobs in the American economy could be
performed at home if employers were willing
to allow employees to do so.5 Often, employees
can perform jobs at home without supervision
in the “high-tech” sector, in the financial sector,
and many in the communication sector that are
technology dependent. The obstacles or barriers
to telecommuting seem to be more organiza-
tional, stemming from the managers’ reluctance
to give up direct supervisory control of workers
and from their fears of shirking among workers
who telecommute.6
Where the impact of telecommuting has
been empirically evaluated, it seems to boost
productivity, decrease absenteeism, and increase
retention.7 But can telecommuting live up to its
promise as an effective work-family policy that
helps employees meet their nonwork responsi-
bilities? To do so, tel ...
%38
%9
%5
SafeAssign Originality Report
Computer Security: Foundations - 201950 - CRN163 - Zavgren • Week Eight Assignment
%51Total Score: High riskSanthosh Muthyapu
Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9
Total Number of Reports
1
Highest Match
51 %
Santhosh Muthyapu week 8.docx
Average Match
51 %
Submitted on
08/20/19
10:16 AM EDT
Average Word Count
666
Highest: Santhosh Muthyapu week 8.docx
%51Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Global database (3)
Student paper Student paper Student paper
Internet (2)
writemyclassessay atlatszo
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 666
Santhosh Muthyapu week 8.docx
7 5 6
3
8 9 1
4 2
7 Student paper 5 Student paper 8 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2118e265-8842-4fba-87df-67e2234daca3&course_id=_44439_1&download=true&includeDeleted=true&print=true&force=true
Source Matches (17)
Student paper 77%
atlatszo 63%
Student paper 62%
writemyclassessay 94%
Student paper 68%
Running Head: INDUSTRIAL ESPIONAGE ALLEGED BY DAVID 1
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID DOE 2
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID Name: Santhosh Muthyapu Course: Computer Security: Foundations Date of Submission: 08/20//2019
The steps ought to have been taken in detecting Industrial Espionage Alleged by David Doe
David Doe was a network administrator for the ABC company. The ABC company ought to have taken various steps in detecting Industrial Espionage alleged by
David Doe. First, it should evaluate threat and risk data as well as log data from numerous sources, intending to acquire information about security that would
enhance instant response to security incidents. The manager should be in place to detect any warning signal. An instance is when David is unhappy since he is
passed over for promotion three times. The vital warning signs that a representative may have incorporates bringing home materials having a place with the
organization, being keen on things outside their duties, mainly that are related to the contender of the organization. However, David is alleged to have duplicated the
company’s research after quitting the company and starting his own consulting business (Ho & Hollister, J2015) To predict risks in the network traffic, and dangerous
malware, the company should install signature and behavior-based detection devices. Advanced Cyber Intrusion Detection enhance this. To enable immediate
response as soon as the alerts of faults, attacks, or misuse indications, there should be a correlation, analysis, and collection of server clients’ logs. For the
integrity of local systems, it is essential to ensure regular checks. It was necessary for intrusion finding (Jin & van Dijk, 2018). This involves an outline of possible
security liabilities in software and operating systems applications. Us ...
37Barram — Case Study Greenhill CollegeCase Study Greenh.docxlorainedeserre
37Barram — Case Study: Greenhill College
Case Study: Greenhill College
T H E C A S E S T U D Y
Provost Chad Logan ambled along the red bricked
pathway leading to Centennial Hall, the 100-year-old orig-
inal administration building of Greenhill College, estab-
lished in 1909 by a group of protestant clergy and like-
minded educators who wanted an alternative to the secular
institutions of their day. The college had remained true to
its historical roots as a faith-based, Christian, interdenomi-
national institution. Chad entered, making his way directly
to the Academic Affairs Office. Sue Grant, the department
receptionist, was on the phone and shot him a warm smile
and mouthed, “Good morning.” The red blinking light
on his phone caught his eye as he entered his office. He
reached over and punched in his code and listened to a
pleasant voice telling him he had six new messages. The
most recent was Emerson Wilson, longtime president of
Greenhill, who wanted him to call as soon as he got in.
Ten minutes later he was seated in the president’s office
on the second floor. Chad still couldn’t decide if he liked
Wilson. At one moment he could be warm and friendly,
the next cold and unbending. The unpredictability of the
man’s nature created stress among all those around him.
“Chad, you better pay more attention to the new stu-
dent enrollment projections for this fall,” Wilson said. “I
saw Al Sanders this morning in the gym, and he tells me
next fall’s new student numbers are projected to be down
from this year. This is the first I have heard of it, and I’m
not too happy about being kept out of the loop. I really
don’t like hearing this news from the director of admis-
sions.”
Chad felt that now-familiar pang of worry in his
stomach. Unfortunately, Greenhill lacked the significant
endowment, immediate name recognition, and the ster-
ling academic reputation of its competition. Even though
Greenhill had a rich history, the glaring lack of a big
endowment and popular name recognition resulted in
continual financial pressure. Greenhill was a tuition-driven
institution. Eighty-five percent of the annual budget rev-
enue came from student tuition dollars. Chad despised this
dependence on student admissions. He believed it to be a
stranglehold on the college’s ability to move forward.
Chad wasn’t frustrated with Al because he knew
Wilson probably put him on the spot earlier that morn-
ing in the gym. Wilson’s management style didn’t confine
him to the office. He could be like a cat on the prowl. He
loved the college and believed it was appropriate to ask any
employee — at any time and place — about their job. In
A B S T R A C T : Greenhill College is an organizational decision-making case study involving the financial stabil-
ity of a fictitious small, private, religious liberal arts college with an enrollment of more than 2,000 students.
Traditional, small liberal arts colleges, long a staple of the American ...
386 Six canonical letters in which the author explicitly .docxlorainedeserre
386
Six canonical letters in which the author explicitly
identifi es himself as Paul, Apostle to the Gentiles,
contain discrepancies that cause scholars to
question their Pauline authorship. Two of the
letters—2 Thessalonians and Colossians—are
still vigorously disputed, with a large minority
championing their authenticity. But an over-
whelming scholarly majority deny that Paul wrote
the four others—Ephesians, 1 and 2 Timothy, and
Titus. The latter three are called the pastoral epis-
tles because the writer—as a pastor or shepherd—
offers guidance and advice to his fl ock, the church.
c h a p t e r 1 7
Continuing the Pauline Tradition
2 Thessalonians, Colossians, Ephesians, and the Pastoral Epistles
Stand fi rm . . . and hold fast to the traditions which you have
learned from us by word or letter. 2 Thessalonians 2:15
Keep before you an outline of the sound teaching which you heard from me. . . .
Guard the treasure [apostolic tradition] put into our charge. 2 Timothy 1:13–14
Key Topics/Themes Paul’s continuing infl uence
on the church was so great after his death that
various Pauline disciples composed letters in his
name and spirit, claiming his authority to settle
new issues besetting the Christian community.
Whereas a minority of scholars defend Pauline
authorship of 2 Thessalonians and Colossians, a
large majority are certain that he did not write
Ephesians, 1 or 2 Timothy, or Titus.
Repeating themes from Paul’s genuine
letter to the Thessalonians, 2 Thessalonians
reinterprets Paul’s original eschatology,
asserting that a number of traditional
apocalyptic “signs” must precede the eschaton .
In Colossians, a close Pauline disciple
emphasizes Jesus’ identifi cation with the cosmic
power and wisdom by and for which the
universe was created. The divine “secret” is
revealed as Christ’s Spirit dwelling in the
believer. A deutero - Pauline composition,
Ephesians contains ideas similar to those in
Colossians, revising and updating Pauline
concepts about God’s universal plan of salvation
for both Jews and Gentiles and about believers’
spiritual warfare with supernatural evil.
Writing to Timothy and Titus as symbols of
a new generation of Christians, an anonymous
disciple (known as the Pastor) warns his
readers against false teachings (heresy). He
urges them to adhere strictly to the original
apostolic traditions, supported by the Hebrew
Bible and the church.
har19138_ch17_386-402.indd Page 386 09/01/14 8:06 PM user /204/MH02032/har19138_disk1of1/0078119138/har19138_pagefiles
V
A
U
G
H
N
,
A
N
G
E
L
A
2
0
1
3
T
S
c h a p t e r 1 7 c o n t i n u i n g t h e p a u l i n e t r a d i t i o n 387
Most scholars today view several books in
the New Testament as pseudonymous, the
productions of unknown Christians who ad-
opted the Jewish literary convention of writing
under an assumed identity. Schola ...
3/8/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=c78566dc-52b5-42ad-9746-958bd6224b… 1/5
%100
SafeAssign Originality Report
Spring 2020 - Data Science & Big Data Analy (ITS-836-10) - Second Bi-… • Research Paper
%100Total Score: High riskVenkata Sindhur Gutta
Submission UUID: 1652bf77-9ec0-3297-c8c9-f2e32efcb4a5
Total Number of Reports
1
Highest Match
100 %
Submission_Text.html
Average Match
100 %
Submitted on
03/08/20
07:49 AM PDT
Average Word Count
1,288
Highest: Submission_Text.html
%100Attachment 1
Institutional database (3)
Student paper Student paper My paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,288
Submission_Text.html
3 2 1
3 Student paper 2 Student paper 1 My paper
Radical Platforms
Venkata Sindhur Gutta
University of the Cumberlands
The pedestrians in smart city centers and crowd congestion use agent-based models to simulate that facilitate communication and visualization of the models. 3D
imagining makes it easier to for people to understand smart cities. Smart city has visual reference of locations unique comprising of almost all the indispensable
infrastructures providing a superiority lifestyle to its residents. Big data is used by businesses to make strategic movements, including decisions when appropriately
analyzed (Bhavnani and Sylvan, 2017). Analysis of big data is used in studying large amounts of data where valuable information can be uncovered and extracted.
Newer technologies are being employed by big data in smart cities to increase and make use of services in the towns potentially. For example, ICT makes the
availability of data collected through its components. This type of technology is also referred to as the Internet of Things, and it does communicate between different
connected devices and does exchange data requiring either internet or wireless connections (Colombo, & Ferrari, 2015). This paper gives a brief history of how
different organizations in smart cities are using big data to prosper in terms of production and efficiency.
Smart cities are employing the use of Internet of Things strategies to extract data that requires the internet to run. Deploying big data in smart cities has also
impacted operations in organizations (Psomakelis et al. 2015). Many organizations are constructing and redefining new models so that they can initiate the use
of big data. Research shows that organizations and companies using big data and investing in it have higher chances of being more productive than those not
employing its usage. As with organizations in smart cities, there is technical ability and investment ability importance through the deployment of big data.
Organizations th+at have had strategic tools do not have to replace them but use the same means more effectively at their disposal.
Big data, for example, has interfered with production volume and fl ...
36Dissertation ProspectusComment by Astur, Ro.docxlorainedeserre
This document provides feedback on a dissertation prospectus from a committee member named Robert Astur. Astur provides constructive criticism on improving various sections of the prospectus, including clarifying the research gap, providing more scientific citations, and correcting grammatical errors. Astur notes that the introduction does not clearly define the research gap and questions how the study will help address it. Suggestions are made to strengthen the background, problem statement, and theoretical framework sections by adding more details and references from the research literature. Overall, the comments aim to help the student enhance the quality and rigor of the prospectus.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
3Moral Identity Codes of Ethics and Institutional Ethics .docxlorainedeserre
This document discusses codes of ethics and institutional ethics structures in healthcare organizations. It begins by outlining the key learning objectives which focus on understanding the importance of codes of ethics and how they reflect an organization's values. It then discusses the role of codes of ethics in shaping an organization's moral identity and standards of conduct. The document provides examples of codes from the American Medical Association and Trinity Health. It emphasizes that codes of ethics should apply to all healthcare workers and cover areas like cultural competence, privacy, and nondiscrimination. Institutional ethics committees and review boards also help address ethical issues.
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
3
NIMH: Opinion or Fact
The National Institute of Mental Health (NIMH) was formed in 1946 and is one of 27 institutes that form the National Institute of Health (NIH) (NIMH, 2019). The mission of the NIMH is “To transform the understanding and treatment of mental illnesses through basic and clinical research, paving the way for prevention, recovery, and cure.” (NIMH, 2019). There are many different mental illnesses discussed on the NIMH website to include Attention-Deficit/Hyperactivity Disorder (ADHD). The NIMH website about ADHD is effective at providing the public general information and meets the criteria of authority, objectivity, and currency.
The NIMH website about ADHD provides an overview of ADHD, discusses signs and symptoms, and risk factors. The NIMH continues with information about treatment and therapies. Information provided by the NIMH is intended for both children and adults. The NIMH concludes on the page with studies the public can join and more resources for the public such as booklets, brochures, research and clinical trials.
As described by Jim Kapoun authority can be identified by who or what institution/organization published the document and if the information in the document is cited correctly (Cornell, 2020). The information on the website is published by the NIMH which is the lead research institute related to mental health for the last 70 plus years (NIMH, 2019). On the page related to ADHD the NIMH references the program of Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD) and provides a hyperlink to access the resources available with the agency (NIMH,2019). This link can be found under the support groups section in the treatment and therapies. On the website to the right of the area describing inattention the NIMH has a section on research. In this block there is a link to “PubMed: Journal Articles about Attention Deficit Hyperactivity Disorder (ADHD)” which will take you to a search of the National Center for Biotechnology Information (NCBI) published by PubMed on ADHD (NIMH, 2019). Throughout the entire page the NIMH provides sources and hyperlinks to the sources as citations. Based on the reputation of the NIMH and the citations to the source material the website meets the criteria of authority.
According to Kapoun objectivity can be identified looking for areas where the author expresses his or her opinion (Cornell, 2020). Information provided on the NIMH page about ADHD does not express the opinion of the author. The author produces only factual information based on research. The NIMH makes it a point not to mention the names of medications when discussing treatments and only explains the medications fall in two categories stimulants and non-stimulants (NIMH, 2019). In this same area the NIMH provides hyperlinks to the NIMH Mental Health Medication and FDA website for information about medication. The extent at which the NIMH goes to not provide an opinion on the website meet ...
4.1
Updated April-09
Lecture Notes
Chapter 4
Enterprise Excellence
Implementation
ENTERPRISE EXCELLENCE
4.2
Updated April-09
Learning Objectives
• Management & Operations Plans
• Enterprise Excellence Projects
• Enterprise Excellence Project decision Process
• Planning the Enterprise Excellence Project
• Tollgate Reviews
• Project Notebook
4.3
Updated April-09
MANAGEMENT AND OPERATIONS PLANS
• The scope and complexity of the
implementation projects will vary from the
executive level, to the management level, to
the operational level
• Each plan, as it is developed and deployed,
will include projects to be accomplished
• Conflicts typically will occur amongst
requirements of quality, cost, and schedule
when executing a project
4.4
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• An Enterprise Excellence project will be one of three
types:
1. Technology invention or innovation
2. New product, service, or process development
3. Product, service, or process improvement
• Enterprise Excellence uses the scientific method
• The scientific method is a process of organizing
empirical facts and their interrelationships in a
manner that allows a hypothesis to be developed and
tested
4.5
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• The scientific method consists of the
following steps:
1. Observe and describe the situation
2. Formulate a hypothesis
3. Use the hypothesis to predict results
4. Perform controlled tests to confirm the hypothesis
4.6
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• Figure 4.1 shows the project decision process
4.7
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Inventing/Innovating Technology:
Technology development is accomplished using
system engineering
This system approach enables critical functional
parameters and responses to be quickly transferred
into now products, services, and processes
The process is a four-phase process (I2DOV):
Invention & Innovation – Develop – Optimize – Verify
4.8
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Development of Products, Services, and
Processes
The Enterprise Excellence approach for developing
products, services, and processes is the Design for
Lean Six Sigma strategy.
This strategy helps to incorporate customer
requirements and expectations into the product
and/or service.
Concept – Design – Optimize - Verify (CDOV) is a
specific sequential design & development process
used to execute the design strategy.
4.9
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Improving Products, Services, and Processes:
Improving products, services and processes usually
involves the effectiveness and efficiency of operations.
A product or service is said to be effective when it meets
all of its customer requirements.
Effectiveness can be simply expressed as "doing the
right things the first time ...
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
3
Type your name here
Type your three-letter and -number course code here
The date goes here
Type instructor’s name here
Your Title Goes Here
This is an electronic template for papers written in GCU style. The purpose of the template is to help you follow the basic writing expectations for beginning your coursework at GCU. Margins are set at 1 inch for top, bottom, left, and right. The first line of each paragraph is indented a half inch (0.5"). The line spacing is double throughout the paper, even on the reference page. One space after punctuation is used at the end of a sentence. The font style used in this template is Times New Roman. The font size is 12 point. When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. If you have any questions, please consult with your instructor.
Citations are used to reference material from another source. When paraphrasing material from another source (such as a book, journal, website), include the author’s last name and the publication year in parentheses.When directly quoting material word-for-word from another source, use quotation marks and include the page number after the author’s last name and year.
Using citations to give credit to others whose ideas or words you have used is an essential requirement to avoid issues of plagiarism. Just as you would never steal someone else’s car, you should not steal his or her words either. To avoid potential problems, always be sure to cite your sources. Cite by referring to the author’s last name, the year of publication in parentheses at the end of the sentence, such as (George & Mallery, 2016), and page numbers if you are using word-for-word materials. For example, “The developments of the World War II years firmly established the probability sample survey as a tool for describing population characteristics, beliefs, and attitudes” (Heeringa, West, & Berglund, 2017, p. 3).
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples (George & Mallery, 2016; Heeringa et al., 2017; Smith et al., 2018; “USA swimming,” 2018; Yu, Johnson, Deutsch, & Varga, 2018) of how to format different reference types (e.g., books, journal articles, and a website). For additional examples, see the GCU Style Guide.
References
George, D., & Mallery, P. (2016). IBM SPSS statistics 23 step by step: A simple guide and reference. New York, NY: Routledge.
Heeringa, S. G., West, B. T., & Berglund, P. A. (2017). Applied survey data analysis (2nd ed.). New York, NY: Chapman & Hall/CRC Press.
Smith, P. D., Martin, B., Chewning, B., ...
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
3
Welcome to Writing at Work! After you have completed the reading for the week, write an email to introduce yourself to your peers. The name of your thread should be what you would include in the subject of the email.
As you compose your email, keep in mind the following:
· You are addressing a group you will work with in a professional capacity for at least 15 weeks. Let us know something about you, but don't share anything you wouldn't want repeated.
· You should include what you perceive to be your relative strengths with regard to writing at work. What types of tasks would you feel most comfortable taking on?
· You should also include what aspects of writing at work make you feel least comfortable. What types of tasks would you not be as suited for?
· What do you hope to learn in the next several months?
Next, in an attachment, choose one of the following two prompts and write a letter, taking into account the purpose, audience, and appropriate style for the task.
1. Your organization has been contracted to complete a project for an important client, and you were charged with managing the project. It has unfortunately become clear that your team will not meet the deadline. Your supervisor has told you to contact the client in writing to alert them to the situation and wants to be cc'd on the message. Write a letter, which you will send via email, addressing the above.
2. After a year-long working relationship, your organization will no longer be making use of a freelancer's services due to no fault of their own. Write a letter alerting them to this fact.
Name:
HRT 4760 Assignment 01
Timeliness
First, you will choose one particular organization where you will conduct each of your 15 different observational assignments. Stick with this same organization throughout your coursework. (Do not switch around assignment locations at different organizations or locations.) The reason for continuing your observational assignments at the same organization is to give you a deeper understanding of this particular organization across the 15 different assignments. As you read on, you will get a more complete understanding as to how these 15 assignments come together.
Tip: Many students choose the organization where they are currently working. This works particularly well. If you are working there, you have much opportunity to gain access to the areas that will give you a more complete understanding of the quality of entire service package (the 15 different elements) that the organization offers to its customers.
This is one of a package of 15 different assignments that comprise the Elements of Service, which you will study this term. For this assignment, you will observe elements of service in almost any particular service establishment. A few examples of service establishments would include, but not be limited to these: Hotel, resort, private club, restaurant, airline, cruise line, grocery store, doctor’s office, coffee house, and scores of oth ...
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
3
JWI 531 Finance II Assignment 1Template
HOW TO USE THIS TEMPLATE:
This is a template and checklist corresponding to your Assignment 1 paper: Enterprise Risk Management and Moat Strength. See below for an explanation of the color-coding in this template:
· All green text includes instructions to support your writing. You should delete all green text before submitting your final paper.
· All blue text indicates areas where you need to replace text with your own information. Replace the blue text with your own words in black.
· Headings and subheadings are written in black, bold type. Keep these in your paper.
TIPS:
· Write in the third person, using “he” or “she” or “they”, or using specific names. Do not use the second person “you”.
· The body of this paper has one-inch margins and uses a professional font (size 10-12); we recommend Arial or Times New Roman fonts.
· The Assignment template is already formatted with all needed specifications like margins, appropriate font, and double spacing.
· Before submitting your paper, use Grammarly to check for punctuation and usage errors and make the required corrections. Then read aloud to edit for tone and flow.
· You should also run your paper through SafeAssign to ensure that it meets the required standards for originality.
FINALIZING YOUR PAPER
Your submission should be a maximum of 4 pages in length. The page count doesnotinclude the Cover Page at the beginning and the References page at the end. The final paper that you submit for grading should be in black text only with all remaining green text and blue text removed. Assignment 1: Enterprise Risk Analysis and Moat Strength
Author’s Name
Jack Welch Management Institute
Professor’s Name
JWI 531
Date
Introduction
An Introduction should be succinct and to the point. Start your Introduction with a general and brief observation about the paper’s topic. Write a thesis statement, which is the “road map” for your paper - it helps your reader to navigate your work. In your thesis statement, be specific about the major areas you plan to address in your paper.
The headings below should guide your introduction, since they identify the topics to be addressed in your paper. The introduction is not a graded part of your rubric but it helps your reader to understand what your assignment will be about. We recommend that you write this part of your Introduction after you complete the other sections of your paper. It only needs to be one paragraph in length.
Analysis and Recommendations
You must answer each of the following questions in your paper. Keep your responses focused on the topic. Straying off into additional areas, even if they are interesting, will not earn additional marks, and may actually detract from the clarity of your responses.
I. Where is each company in its corporate lifecycle (startup, growth, maturity or decline)? Explain.
Before writing your response to this question, make sure you understand what characterizes ea ...
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
3
Big Data Analyst Questionnaire
Within this document are four different questions. Each question is structured in the following manner:
1) Premise
- Contains any needed background information
2) Request
- The actual question, what you are to solve
3) Notes
- A space if you feel like including notes of any kind for the given question
Please place your answer for each question in a separate file, following this naming convention:
Name_Qn.docx, where n = the question number (i.e., 1, 2 ...). So the file for the first question should be named ‘Name_Q1.docx’.
When complete, please package everything together and send email responses to the designated POCs.
Page | 1
Premise:
You have a table named “TRADES” with the following six columns:
Column Name
Data Type
Description
Date
DATE
The calendar date on which the trade took place.
Firm
VARCHAR(255)
A symbol representing the Broker/Dealer who conducted the trade.
Symbol
VARCHAR(10)
The security traded.
Side
VARCHAR(1)
Denotes whether the trade was a buy (purchase) or a sell (sale) of a security.
Quantity
BIGINT
The number of shares involved in the trade.
Price
DECIMAL(18,8)
The dollar price per share traded.
You write a query looking for all trades in the month of August 2019. The query returns the following:
DATE
FIRM
SYMBOL
SIDE
QUANTITY
PRICE
8/5/2019
ABC
123
B
200
41
8/5/2019
CDE
456
B
601
60
8/5/2019
ABC
789
S
600
70
8/5/2019
CDE
789
S
600
70
8/5/2019
FGH
456
B
200
62
8/6/2019
3CDE
456
X
300
61
8/8/2019
ABC
123
B
300
40
8/9/2019
ABC
123
S
300
30
8/9/2019
FGH
789
B
2100
71
8/10/2019
CDE
456
S
1100
63
Questions:
1) Conduct an analysis of the data set returned by your query. Write a paragraph describing your analysis. Please also note any questions or assumptions made about this data.
2) Your business user asks you to show them a table output that includes an additional column categorizing the TRADES data into volume based Tiers, with a column named ‘Tier’. Quantities between 0-250 will be considered ‘Small’, quantities greater than ‘Small’ but less than or equal to 500 will be considered ‘Medium’, quantities greater than ‘Medium’ but less than or equal to 500 will be considered ‘Large’, and quantities greater than ‘Tier 3’ will be considered ‘Very Large’ .
a. Please write the SQL query you would use to add the column to the table output.
b. Please show the exact results you expect based on your SQL query.
3) Your business user asks you to show them a table output summarizing the TRADES data (Buy and Sell) on week-by-week basis.
a. Please write the SQL query you would use to query this table.
b. Please show the exact results you expect based on your SQL query.
Notes:
1
Premise:
You need to describe in writing how to accomplish a task. Your audience has never completed this task before.
Question:
In a few paragraphs, please describe how to complete a task of your choice. You may choose a task of your own liking or one of the sample tasks below:
1) How to make a p ...
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
3
HR Strategies
Key concepts and terms
High commitment management •
High performance management •
HR strategy •
High involvement management •
Horizontal fi t •
Vertical fi t •
On completing this chapter you should be able to defi ne these key concepts.
You should also understand:
Learning outcomes
T • he purpose of HR strategy
Specifi c HR strategy areas •
How HR strategy is formulated •
How the vertical integration of •
business and HR strategies is
achieved
How HR strategies can be set out •
General HR strategy areas •
The criteria for a successful HR •
strategy
The fundamental questions on •
the development of HR strategy
How horizontal fi t (bundling) is •
achieved
How HR strategies can be •
implemented
47
48 Human Resource Management
Introduction
As described in Chapter 2, strategic HRM is a mindset that leads to strategic actions and reac-
tions, either in the form of overall or specifi c HR strategies or strategic behaviour on the part
of HR professionals. This chapter focuses on HR strategies and answers the following ques-
tions: What are HR strategies? What are the main types of overall HR strategies? What are the
main areas in which specifi c HR strategies are developed? What are the criteria for an effective
HR strategy? How should HR strategies be developed? How should HR strategies be
implemented?
What are HR strategies?
HR strategies set out what the organization intends to do about its human resource manage-
ment policies and practices and how they should be integrated with the business strategy and
each other. They are described by Dyer and Reeves (1995) as ‘internally consistent bundles of
human resource practices’. Richardson and Thompson (1999) suggest that:
A strategy, whether it is an HR strategy or any other kind of management strategy must
have two key elements: there must be strategic objectives (ie things the strategy is sup-
posed to achieve), and there must be a plan of action (ie the means by which it is pro-
posed that the objectives will be met).
The purpose of HR strategies is to articulate what an organization intends to do about its
human resource management policies and practices now and in the longer term, bearing in
mind the dictum of Fombrun et al (1984) that business and managers should perform well in
the present to succeed in the future. HR strategies aim to meet both business and human needs
in the organization.
HR strategies may set out intentions and provide a sense of purpose and direction, but they are
not just long-term plans. As Gratton (2000) commented: ‘There is no great strategy, only great
execution.’
Because all organizations are different, all HR strategies are different. There is no such thing as
a standard strategy and research into HR strategy conducted by Armstrong and Long (1994)
and Armstrong and Baron (2002) revealed many variations. Some strategies are simply very
general declarations of intent. Others go into much more detail. ...
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
3
Implementing Change
Construction workers on scaffolding.
hxdbzxy/iStock/Thinkstock
Learning Objectives
After reading this chapter, you should be able to do the following:
Summarize the nine steps in Ackerman and Anderson’s road map for change.
Analyze Cummings and Worley’s five dimensions of leading and managing change.
Describe how to align an organization with its new vision and future state.
Explain how roles/relationships and interventions are used to implement change.
Examine ways to interact with and influence stakeholders.
Change is the law of life and those who look only to the past or present are certain to miss the future.
—John F. Kennedy
Alan Mulally was selected to lead Ford in 2006 after he was bypassed as CEO at Boeing, where he had worked and was expected to become CEO. Insiders and top-level managers at Ford, some of whom had expected to become CEO, were initially suspicious and then outraged when Mulally was hired. They questioned what someone from the airplane industry would know about the car business (Kiley, 2009).
Chair William (Bill) Clay Ford, Jr.—who selected Mulally as CEO—told Ford’s officers that the company needed a fresh perspective and a shake-up, especially since it had lost $14.8 billion in 2008—the most in its 105-year history—and had burned through $21.2 billion, or 61%, of its cash (Kiley, 2009). Because Ford knew that the company’s upper echelon culture was closed, bureaucratic, and rejected outsiders and new ways of thinking, he was not surprised by his officers’ reactions. However, Ford’s managers had no idea that the company was fighting for its life. To succeed, Mulally would need Chair Ford’s full endorsement and support, and he got it.
The company’s biggest cultural challenge was to break down the silos that various executives had built. As we will discuss more in Chapter 4, silos are specific processes or departments in an organization that work independently of each other without strong communication between or among them. A lack of communication can often stifle productivity and innovation, and this was exactly what was happening at Ford.
Mulally devised a turnaround strategy and developed it into the Way Forward Plan. The plan centralized and modernized plants to handle several models at once, to be sold in several markets. The plan was designed to break up the fiefdoms of isolated cultures, in which leaders independently developed and decided where to sell cars. Mulally’s plan also kept managers in positions for longer periods of time to deepen their expertise and improve consistency of operations. The manager who ran the Mazda Motor affiliate commented, “I’m going into my fourth year in the same job. I’ve never had such consistency of purpose before” (as cited in Kiley, 2009, “Meetings About Meetings,” para. 2).
Mulally’s leadership style involved evaluating and analyzing a situation using data and facts and then earning individuals’ support with his determinatio ...
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
3
Assignment Three: Purpose of the study and Research Questions
RES 9300
Recently, Autism has become a serious health concern to parents. According to Center for Disease Control and Prevention (2018), about one in fifty nine United States children has been identified with autism spectrum disorder with one in six children developing developmental disability ranging from mild disabilities such as speech and language impairments to serious developmental disabilities, such as intellectual disabilities, cerebral palsy, and autism (CDC,2018). World Health Organization (2019) estimates that 1 in 160 children globally has autism making it one of the most prevalent diseases. Despite the disease prevalence, most population has little knowledge about the disease. Many health practitioners have proposed early care as a means to control the disease effects.
Purpose Statement
The purpose of this study is to determine whether early intervention services can help improve the development of children suffering from autism. This study also aims to explore the general public awareness and perception about autism disorder.
Research Questions
(1) How should service delivery for autistic patients be improved to promote their health? (2) What impact does early intervention services have on development of children suffering from autism? (3) How can public knowledge on autism improve support and care for autistic patients? (4) What effect will early intervention have on patient’s social skills?
References
Center for Disease Control and Prevention. (2018). Autism Spectrum Disorder (ASD). Data & Statistics. Retrieved From https://www.cdc.gov/ncbddd/autism/data.html
World Health Organization. (2019). Autism Spectrum Disorders. Fact Sheet. Retrieved From https://www.who.int/news-room/fact-sheets/detail/autism-spectrum-disorders
3
Assignment Two: Theoretical Perspective and Literature Review
RES 9300
Literature Map
Parenting an Autism Child
(Dependent Variable)
9
Mothers/Father Role
Education
Religious Beliefs
Gender/Age
Financial Resources
Maternal Relationship
Region
Public Awareness
Support
Ethnicity
Independent Variables
Secondary Source I Will Be Using In My Literature Review
Mother/Father Roles
Glynn, K. A. (2015). Predictors of parenting practices in parents of children with autism spectrum disorder.
Religious Beliefs
Huang, C. Y., Yen, H. C., Tseng, M. H., Tung, L. C., Chen, Y. D., & Chen, K. L. (2014). Impacts of autistic behaviors, emotional and behavioral problems on parenting stress in caregivers of children with autism. Journal of Autism and Developmental Disorders, 44(6), 1383-1390.
Education
Brezis, R. S., Weisner, T. S., Daley, T. C., Singhal, N., Barua, M., & Chollera, S. P. (2015). Parenting a child with autism in India: Narratives before and after a parent–child intervention program. Culture, Medicine, and Psychiatry, 39(2), 277-298.
Financial Resources
Zaidm ...
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
380067.docx
by Jamie Feryll
FILE
T IME SUBMIT T ED 22- MAR- 2019 06:38AM WORD COUNT 3608
CHARACT ER COUNT 204 57
380067 .DOCX (28.82K)
%4
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067.docx
ORIGINALITY REPORT
380067.docx
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
PAGE 16
380067.docxby Jamie Feryll380067.docxORIGINALITY REPORT380067.docxWRITECHECK REPORT
380067
by Jamie Feryll
FILE
T IME SUBMIT T ED 13- MAR- 2019 03:56PM WORD COUNT 34 63
CHARACT ER COUNT 1957 5
ARCHAEOLOGY.DOCX (31.23K)
%5
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067
ORIGINALITY REPORT
380067
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
380067by Jamie Feryll380067ORIGINALITY REPORT380067WRITECHECK REPORT
Interpretations of Iron Age Architecture Brochs in Society/Social Identity
Archaeology is a historical field which has advanced over the years based on more discoveries still being experienced by the archaeologists who seek them. According to Kelly and Thomas (2010; p.5), the concession that life existed in more ancient times than stipulated by biblical scholars and human culture allowed the archaeologists to dig deeper into genealogical data. Iron Age architecture and social/society identity relate to one another. For instance, the population, based on their identity and perception will construct buildings that directly reflect their beliefs. This essay will discuss these archaeological concepts of Iron Age architecture and society/social identity. Need a paragraph on brochs and how many and where they are across Scotland with patcialur focus on the atlantc region, this is not relevant for masters essay. Must define broch from its architecture and how long it would take to build and note famous ones and note the ones that will be referred to in this essay – this could be Perhaps incorpated into the next paragraph.
Iron Age architecture has over the years been dominated by differing archaeological concepts and debates. It was defined by settlements and settlement structures such as duns, brochs, wheelhouses, hillforts, stone-built round houses and timber. The social and societal identity which is identified through material remains indicates aspects of differentiation, regional patterns and segregation. According to Kelly and Thomas (2010; p.28), people who existed in Iron Age Scotland were isolated. This is demonstrated by the presence of a burial followed by an assembled chariot at Newbridge. Northern and western Scotland have been the source of the well-structured developments that have provided cultural, architectural and social data over time. Maes Howe, which is the largest Orkney burial cairn, located between Stromne ...
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
This document summarizes theories of teaching from several influential learning theorists. It discusses how theorists like Thorndike, Guthrie, Skinner, Hull, Tolman, and Gagné viewed the role of the teacher based on their behavioral and cognitive learning theories derived from animal and child studies. They generally saw teaching as managing external conditions to ensure specified behavioral changes in learners. The document then contrasts this with theories of teaching from adult learning theorists like Rogers, who rejected the notion that teaching is controlling learning and saw the teacher's role differently.
38 Monthly Labor Review • June 2012TelecommutingThe.docxlorainedeserre
38 Monthly Labor Review • June 2012
Telecommuting
The hard truth about telecommuting
Telecommuting has not permeated the American workplace, and
where it has become commonly used, it is not helpful in reducing
work-family conflicts; telecommuting appears, instead, to have
become instrumental in the general expansion of work hours,
facilitating workers’ needs for additional worktime beyond the
standard workweek and/or the ability of employers to increase or
intensify work demands among their salaried employees
Mary C. Noonan
and
Jennifer L. Glass
Mary C. Noonan is an Associate
Professor at the Department of
Sociology, The University of Iowa;
Jennifer L. Glass is the Barbara
Bush Regents Professor of Liberal
Arts at the Department of Sociol-
ogy and Population Research
Center, University of Texas at
Austin. Email: [email protected]
uiowa.edu or [email protected]
austin.utexas.edu.
Telecommuting, defined here as work tasks regularly performed at home, has achieved enough
traction in the American workplace to
merit intensive scrutiny, with 24 percent
of employed Americans reporting in recent
surveys that they work at least some hours
at home each week.1 The definitions of
telecommuting are quite diverse. In this ar-
ticle, we define telecommuters as employ-
ees who work regularly, but not exclusively,
at home. In our definition, at-home work
activities do not need to be technologically
mediated nor do telecommuters need a
formal arrangement with their employer to
work at home.
Telecommuting is popular with policy
makers and activists, with proponents
pointing out the multiple ways in which
telecommuting can cut commuting time
and costs,2 reduce energy consumption
and traffic congestion, and contribute to
worklife balance for those with caregiving
responsibilities.3 Changes in the structure
of jobs that enable mothers to more effec-
tively compete in the workplace, such as
telecommuting, may be needed to finally
eliminate the gender gap in earnings and
direct more earned income to children,
both important public policy goals.4
Evidence also reveals that an increasing num-
ber of jobs in the American economy could be
performed at home if employers were willing
to allow employees to do so.5 Often, employees
can perform jobs at home without supervision
in the “high-tech” sector, in the financial sector,
and many in the communication sector that are
technology dependent. The obstacles or barriers
to telecommuting seem to be more organiza-
tional, stemming from the managers’ reluctance
to give up direct supervisory control of workers
and from their fears of shirking among workers
who telecommute.6
Where the impact of telecommuting has
been empirically evaluated, it seems to boost
productivity, decrease absenteeism, and increase
retention.7 But can telecommuting live up to its
promise as an effective work-family policy that
helps employees meet their nonwork responsi-
bilities? To do so, tel ...
%38
%9
%5
SafeAssign Originality Report
Computer Security: Foundations - 201950 - CRN163 - Zavgren • Week Eight Assignment
%51Total Score: High riskSanthosh Muthyapu
Submission UUID: febbc9ef-e6b9-70f0-6bf0-fe171274dcc9
Total Number of Reports
1
Highest Match
51 %
Santhosh Muthyapu week 8.docx
Average Match
51 %
Submitted on
08/20/19
10:16 AM EDT
Average Word Count
666
Highest: Santhosh Muthyapu week 8.docx
%51Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Global database (3)
Student paper Student paper Student paper
Internet (2)
writemyclassessay atlatszo
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 666
Santhosh Muthyapu week 8.docx
7 5 6
3
8 9 1
4 2
7 Student paper 5 Student paper 8 Student paper
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=2118e265-8842-4fba-87df-67e2234daca3&course_id=_44439_1&download=true&includeDeleted=true&print=true&force=true
Source Matches (17)
Student paper 77%
atlatszo 63%
Student paper 62%
writemyclassessay 94%
Student paper 68%
Running Head: INDUSTRIAL ESPIONAGE ALLEGED BY DAVID 1
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID DOE 2
INDUSTRIAL ESPIONAGE ALLEGED BY DAVID Name: Santhosh Muthyapu Course: Computer Security: Foundations Date of Submission: 08/20//2019
The steps ought to have been taken in detecting Industrial Espionage Alleged by David Doe
David Doe was a network administrator for the ABC company. The ABC company ought to have taken various steps in detecting Industrial Espionage alleged by
David Doe. First, it should evaluate threat and risk data as well as log data from numerous sources, intending to acquire information about security that would
enhance instant response to security incidents. The manager should be in place to detect any warning signal. An instance is when David is unhappy since he is
passed over for promotion three times. The vital warning signs that a representative may have incorporates bringing home materials having a place with the
organization, being keen on things outside their duties, mainly that are related to the contender of the organization. However, David is alleged to have duplicated the
company’s research after quitting the company and starting his own consulting business (Ho & Hollister, J2015) To predict risks in the network traffic, and dangerous
malware, the company should install signature and behavior-based detection devices. Advanced Cyber Intrusion Detection enhance this. To enable immediate
response as soon as the alerts of faults, attacks, or misuse indications, there should be a correlation, analysis, and collection of server clients’ logs. For the
integrity of local systems, it is essential to ensure regular checks. It was necessary for intrusion finding (Jin & van Dijk, 2018). This involves an outline of possible
security liabilities in software and operating systems applications. Us ...
37Barram — Case Study Greenhill CollegeCase Study Greenh.docxlorainedeserre
37Barram — Case Study: Greenhill College
Case Study: Greenhill College
T H E C A S E S T U D Y
Provost Chad Logan ambled along the red bricked
pathway leading to Centennial Hall, the 100-year-old orig-
inal administration building of Greenhill College, estab-
lished in 1909 by a group of protestant clergy and like-
minded educators who wanted an alternative to the secular
institutions of their day. The college had remained true to
its historical roots as a faith-based, Christian, interdenomi-
national institution. Chad entered, making his way directly
to the Academic Affairs Office. Sue Grant, the department
receptionist, was on the phone and shot him a warm smile
and mouthed, “Good morning.” The red blinking light
on his phone caught his eye as he entered his office. He
reached over and punched in his code and listened to a
pleasant voice telling him he had six new messages. The
most recent was Emerson Wilson, longtime president of
Greenhill, who wanted him to call as soon as he got in.
Ten minutes later he was seated in the president’s office
on the second floor. Chad still couldn’t decide if he liked
Wilson. At one moment he could be warm and friendly,
the next cold and unbending. The unpredictability of the
man’s nature created stress among all those around him.
“Chad, you better pay more attention to the new stu-
dent enrollment projections for this fall,” Wilson said. “I
saw Al Sanders this morning in the gym, and he tells me
next fall’s new student numbers are projected to be down
from this year. This is the first I have heard of it, and I’m
not too happy about being kept out of the loop. I really
don’t like hearing this news from the director of admis-
sions.”
Chad felt that now-familiar pang of worry in his
stomach. Unfortunately, Greenhill lacked the significant
endowment, immediate name recognition, and the ster-
ling academic reputation of its competition. Even though
Greenhill had a rich history, the glaring lack of a big
endowment and popular name recognition resulted in
continual financial pressure. Greenhill was a tuition-driven
institution. Eighty-five percent of the annual budget rev-
enue came from student tuition dollars. Chad despised this
dependence on student admissions. He believed it to be a
stranglehold on the college’s ability to move forward.
Chad wasn’t frustrated with Al because he knew
Wilson probably put him on the spot earlier that morn-
ing in the gym. Wilson’s management style didn’t confine
him to the office. He could be like a cat on the prowl. He
loved the college and believed it was appropriate to ask any
employee — at any time and place — about their job. In
A B S T R A C T : Greenhill College is an organizational decision-making case study involving the financial stabil-
ity of a fictitious small, private, religious liberal arts college with an enrollment of more than 2,000 students.
Traditional, small liberal arts colleges, long a staple of the American ...
386 Six canonical letters in which the author explicitly .docxlorainedeserre
386
Six canonical letters in which the author explicitly
identifi es himself as Paul, Apostle to the Gentiles,
contain discrepancies that cause scholars to
question their Pauline authorship. Two of the
letters—2 Thessalonians and Colossians—are
still vigorously disputed, with a large minority
championing their authenticity. But an over-
whelming scholarly majority deny that Paul wrote
the four others—Ephesians, 1 and 2 Timothy, and
Titus. The latter three are called the pastoral epis-
tles because the writer—as a pastor or shepherd—
offers guidance and advice to his fl ock, the church.
c h a p t e r 1 7
Continuing the Pauline Tradition
2 Thessalonians, Colossians, Ephesians, and the Pastoral Epistles
Stand fi rm . . . and hold fast to the traditions which you have
learned from us by word or letter. 2 Thessalonians 2:15
Keep before you an outline of the sound teaching which you heard from me. . . .
Guard the treasure [apostolic tradition] put into our charge. 2 Timothy 1:13–14
Key Topics/Themes Paul’s continuing infl uence
on the church was so great after his death that
various Pauline disciples composed letters in his
name and spirit, claiming his authority to settle
new issues besetting the Christian community.
Whereas a minority of scholars defend Pauline
authorship of 2 Thessalonians and Colossians, a
large majority are certain that he did not write
Ephesians, 1 or 2 Timothy, or Titus.
Repeating themes from Paul’s genuine
letter to the Thessalonians, 2 Thessalonians
reinterprets Paul’s original eschatology,
asserting that a number of traditional
apocalyptic “signs” must precede the eschaton .
In Colossians, a close Pauline disciple
emphasizes Jesus’ identifi cation with the cosmic
power and wisdom by and for which the
universe was created. The divine “secret” is
revealed as Christ’s Spirit dwelling in the
believer. A deutero - Pauline composition,
Ephesians contains ideas similar to those in
Colossians, revising and updating Pauline
concepts about God’s universal plan of salvation
for both Jews and Gentiles and about believers’
spiritual warfare with supernatural evil.
Writing to Timothy and Titus as symbols of
a new generation of Christians, an anonymous
disciple (known as the Pastor) warns his
readers against false teachings (heresy). He
urges them to adhere strictly to the original
apostolic traditions, supported by the Hebrew
Bible and the church.
har19138_ch17_386-402.indd Page 386 09/01/14 8:06 PM user /204/MH02032/har19138_disk1of1/0078119138/har19138_pagefiles
V
A
U
G
H
N
,
A
N
G
E
L
A
2
0
1
3
T
S
c h a p t e r 1 7 c o n t i n u i n g t h e p a u l i n e t r a d i t i o n 387
Most scholars today view several books in
the New Testament as pseudonymous, the
productions of unknown Christians who ad-
opted the Jewish literary convention of writing
under an assumed identity. Schola ...
3/8/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=c78566dc-52b5-42ad-9746-958bd6224b… 1/5
%100
SafeAssign Originality Report
Spring 2020 - Data Science & Big Data Analy (ITS-836-10) - Second Bi-… • Research Paper
%100Total Score: High riskVenkata Sindhur Gutta
Submission UUID: 1652bf77-9ec0-3297-c8c9-f2e32efcb4a5
Total Number of Reports
1
Highest Match
100 %
Submission_Text.html
Average Match
100 %
Submitted on
03/08/20
07:49 AM PDT
Average Word Count
1,288
Highest: Submission_Text.html
%100Attachment 1
Institutional database (3)
Student paper Student paper My paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,288
Submission_Text.html
3 2 1
3 Student paper 2 Student paper 1 My paper
Radical Platforms
Venkata Sindhur Gutta
University of the Cumberlands
The pedestrians in smart city centers and crowd congestion use agent-based models to simulate that facilitate communication and visualization of the models. 3D
imagining makes it easier to for people to understand smart cities. Smart city has visual reference of locations unique comprising of almost all the indispensable
infrastructures providing a superiority lifestyle to its residents. Big data is used by businesses to make strategic movements, including decisions when appropriately
analyzed (Bhavnani and Sylvan, 2017). Analysis of big data is used in studying large amounts of data where valuable information can be uncovered and extracted.
Newer technologies are being employed by big data in smart cities to increase and make use of services in the towns potentially. For example, ICT makes the
availability of data collected through its components. This type of technology is also referred to as the Internet of Things, and it does communicate between different
connected devices and does exchange data requiring either internet or wireless connections (Colombo, & Ferrari, 2015). This paper gives a brief history of how
different organizations in smart cities are using big data to prosper in terms of production and efficiency.
Smart cities are employing the use of Internet of Things strategies to extract data that requires the internet to run. Deploying big data in smart cities has also
impacted operations in organizations (Psomakelis et al. 2015). Many organizations are constructing and redefining new models so that they can initiate the use
of big data. Research shows that organizations and companies using big data and investing in it have higher chances of being more productive than those not
employing its usage. As with organizations in smart cities, there is technical ability and investment ability importance through the deployment of big data.
Organizations th+at have had strategic tools do not have to replace them but use the same means more effectively at their disposal.
Big data, for example, has interfered with production volume and fl ...
36Dissertation ProspectusComment by Astur, Ro.docxlorainedeserre
This document provides feedback on a dissertation prospectus from a committee member named Robert Astur. Astur provides constructive criticism on improving various sections of the prospectus, including clarifying the research gap, providing more scientific citations, and correcting grammatical errors. Astur notes that the introduction does not clearly define the research gap and questions how the study will help address it. Suggestions are made to strengthen the background, problem statement, and theoretical framework sections by adding more details and references from the research literature. Overall, the comments aim to help the student enhance the quality and rigor of the prospectus.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
2. de Wet Road and Pioneer Ave,
Florida 1710, South Africa
DATES:
Received: 12 Aug. 2015
Revised: 12 Oct. 2015
Accepted: 21 Dec. 2015
KEYWORDS:
academic integrity;
contract cheating; essay mills;
university cheating
HOW TO CITE:
Singh S, Remenyi D. Plagiarism
and ghostwriting: The rise
in academic misconduct.
S Afr J Sci. 2016;112(5/6),
Art. #2015-0300, 7 pages.
http://dx.doi.org/10.17159/
sajs.2016/20150300
The aim of this paper is to review the current situation
regarding plagiarism and ghostwriting, and to stimulate
debate about how universities should respond to the rise in
these forms of academic misconduct. The
apparent upsurge in academic misconduct means that
universities today face one of the greatest challenges
to academic integrity they have had to deal with ever since the
university system came into existence some
800 years ago. Plagiarism and ghostwriting are undermining the
integrity of university degrees to an extent
not seen before. Academia and fraud are not strangers.
Universities have a long history of cheating of one
3. sort or another, often associated with examinations, but also
with research. In the past this cheating involved
activities such as smuggling notes (commonly called ‘crib
sheets’) into examinations, and consulting them
even under the watchful eyes of invigilators. It also involved
students obtaining sight of an examination paper
in advance. The fraudulent creation of research results has also
been an issue. However, in the 21st century,
the opportunities for cheating have exploded. This has resulted
in universities becoming more concerned
about ensuring the integrity of their examination processes and
the degrees they award. Our paper focuses
on cheating in the writing of dissertations or theses required at
undergraduate or postgraduate level, with
an emphasis on plagiarism and ghostwriting. We do not propose
a simple solution to these problems, as
preventing or stopping cheating is not just a matter of catching
the wrongdoers. Cheating is endogenous
to the current university education system, and needs to be
addressed in terms of not only prevention and
detection but also how people who are found to engage in such
misconduct are treated. We suggest that
creative ways of promoting learning would help to minimise
cheating at universities. It is also important to
ensure that the issue is discussed openly among students and
faculty staff.
Introduction
There have been some dramatic instances of academic fraud at
universities.1-3 Professors have been found to
have no credible academic credentials, having either
exaggerated or outright lied in their curriculum vitae.4-6 Vice-
chancellors have been accused of plagiarism7,8 or been found to
have plagiarised their theses.9 Laboratory directors
have been involved in the falsification of research findings.10-
12 However, such dramatic events, although interesting
4. and often newsworthy, are fortunately quite rare. What is more
concerning is the mundane matter of fraud or
cheating at the routine examination level. The main form of
cheating at university is inappropriate assistance in
examinations, or in the preparation of written work submitted
for evaluation.13
The extent of cheating at universities is hard to gauge.14-17
This is largely because the most common reaction once
cheating is exposed is that the institution becomes secretive.
Over the years, students have been found consulting
crib sheets or notes written on their skin, or hidden in pencil
boxes or even sandwiches – to mention only a few hiding
places. Students struggling to answer a question might also try
to glance at the answer sheet of a fellow student.
Another form of cheating occurs when students have been
informed about examination questions in advance.
Perhaps more seriously, students have sometimes employed
other people to actually sit their examinations. The
most famous culprit of this offence was the late Senator Edward
Kennedy, who paid a co-student and friend to
sit a Spanish examination in his place. The university spotted
the substitution and both students were expelled.18
However, despite the wide range of nefarious ways in which
students have been known to cheat the system, academics
often argue that traditionally there has been a low occurrence of
this type of behaviour. An accurate estimate of the
number of such incidents is almost impossible, as the only cases
reported are those in which individuals are caught.
Cheating in examinations is difficult. It is hard to smuggle
items into an examination hall and consult them unseen
– despite the watchful eye of an invigilator. Nonetheless, some
students try to do this. To counter the problem,
5. at certain universities some subjects are examined in ‘open
book’ exams, where the student may bring into the
examination room any texts he or she might like to consult. This
practice allows the student to refer to any material
he or she wishes during the examination. In such exams, the
application and interpretation of knowledge is tested,
and for this reason open-book exams are often regarded as a
superior form of test.
In many universities there has been a substantial increase in the
use of term papers, assignments, and dissertations
to evaluate the progress or knowledge development of students.
Such documents are produced by the student
outside of an examination environment. One reason for this
system is the now widespread belief in the value of
ongoing assessment instead of simply an end-of-term
examination. However, when this type of written work is
used for assessment, the system is especially vulnerable to
cheating.19 Because of this vulnerability, some older
academics insist that formal examinations remain the only
reliable method of student evaluation.
All forms of academic cheating are highly detrimental to any
university. Academic cheating undermines the good
name of the institution and calls into question the integrity of
both the faculty and students. There is every reason
for a university to take all forms of cheating seriously, and to
eliminate it wherever possible.
This paper focuses on two specific types of academic
misconduct, namely plagiarism and ghostwriting.
http://www.sajs.co.za
http://orcid.org/0000-0001-5038-0724
mailto:[email protected]
http://dx.doi.org/10.17159/sajs.2016/20150300
6. http://dx.doi.org/10.17159/sajs.2016/20150300
37South African Journal of Science http://www.sajs.co.za
Volume 112 | Number 5/6
May/June 2016
Inappropriate assistance in preparing written
work
There are several ways in which students can cheat in the
preparation
of written work. The two offences addressed in this paper are
plagiarism
and ghostwriting. Plagiarism has affected the academic
community
for centuries,20 and allegations of plagiarism have been made
against
certain famous academics, including Galileo and Newton.21 By
contrast,
ghostwriting in academia appears to be a relatively modern
phenomenon,
perhaps only a few hundred years old.
Stavisky22 states that there has been a long tradition of
plagiarism in
American universities, fostered by fraternity groups and dating
back to the
19th century. Fraternity files have been used to recycle written
academic
work. Stavisky also states that in the 1940s, advertisements
appeared
weekly in a prestigious New York newspaper, advertising
ghostwriting
services – which included producing dissertations, theses, and
term
7. papers. Stavisky goes on to describe how this practice
proliferated in
the 1960s and 1970s. With the arrival of the Internet,
ghostwriting has
become a global industry. The terms ‘paper mill’ and ‘essay
mill’ are
often used to describe this industry.
Plagiarism and ghostwriting, although different, have the same
outcome: the
student presents fraudulent academic work that is purportedly
his or her
own. In fact, it is the creation of another person or persons. The
sections
below discuss plagiarism and ghostwriting separately and in
greater detail.
Plagiarism
Plagiarism refers to the use of other people’s ideas and words
without
giving the original author appropriate acknowledgement.23,24
If ideas are
used in an essay or dissertation that have been found in the
published
work of another author, it is academic misconduct not to
specifically
acknowledge the original source. The acknowledgement must
follow the
rules of the referencing system employed in the work. Although
the use
of ideas without acknowledging them is an offence, it is even
worse if the
actual words of other authors are copied without
acknowledgement. This
principle sometimes leads to debate about how many words can
be cited
8. without incurring an accusation of plagiarism. Guidelines such
as three,
four, or five words are sometimes quoted. However, there is no
simple
answer to this question, and it is generally agreed that even a
small
number of words reproduced from another text need to be
attributed.
There are several reasons why plagiarism is unacceptable in
academic
writing. The Penn State University website25 lists a number of
reasons,
which include:
• Plagiarism committed intentionally is an act of deceit and may
even
constitute fraud.
• The plagiarist denies him or herself ‘the opportunity to learn
and
practice’ the skills of academic research.
• A plagiarist does not avail him or herself of the ‘opportunity
to
receive honest feedback’ on his or her academic skills.
• The plagiarist opens him or herself to future enquiry into his
or her
‘integrity and performance in general’.
Clearly plagiarism is unacceptable. Universities generally state
in their
regulations that plagiarism is a disciplinary offence.26
However, it is not
always easy to ascertain what sort of penalty will be imposed on
9. authors
who are found to have plagiarised.
In recent decades, the Internet has become a common tool for
academic
research, and this has enabled plagiarism to flourish on a large
scale.27-29
It is impossible to estimate the exact extent of online
plagiarism, but
there are regular reports of students’ work being found to
contain large
passages copied from other people’s works by cut-and-paste
methods,
without any attribution. In 2015, Adams reported that in the
United
Kingdom, ‘in the past 4 years more than 58 000 undergraduates
have
been investigated by their universities for plagiarism’30. Some
of these
cases involve whole essays being copied and fraudulently
presented
under the name of the student being assessed.
Because of this situation, computer-based plagiarism detection
methods
and tools have become extremely popular with university
faculty and
administrative staff.31 The market leader, Turnitin.com, claims
to have
10 000 clients working in 135 countries, and this product alone
is
estimated as being used to check 40 million academic papers
each year.
Using anti-plagiarism software makes it relatively easy to detect
and
quantify how much plagiarism appears in a piece of academic
10. work.
However, this type of checking may be considered to be a ‘band
aid’ or
‘sticky plaster’ placed on a wound when perhaps a more medical
and
surgical intervention is actually required.32
When plagiarism is suspected and this suspicion is supported by
the software results, the issue arises of how to deal with the
offence.
University regulations specifically forbid plagiarism and may
prescribe the
need to refer such behaviour to a disciplinary procedure.
However, such
disciplinary action does not always happen.33 Sometimes
plagiarism is
treated by giving the student a mark of zero for the work
submitted.
Sometimes the student is required to resubmit a new version of
the work.
In other words, formal disciplinary action is not automatically
invoked.34
The process of university disciplinary action can be a long and
costly
procedure, and universities are often reluctant to follow this
course on
the grounds of the resources a formal plagiarism enquiry would
require.
Mathews35 quotes an academic, who wished to remain
anonymous, as
saying, ‘I’m ashamed to admit it but you simply don’t have the
time to
launch a plagiarism case.’
If this is indeed the case, is the university not implicitly
condoning
11. plagiarism? In any event, plagiarism is frequently regarded
more as a
misdemeanour than a felony. Nonetheless, the practice of
plagiarism
undermines the integrity of the academic process, and calls into
question the quality of education that is said to be evident in the
holding
of a degree.
It has been suggested that plagiarism is rife in certain cultures,
and in
developing countries in particular.36 This may be true, but the
challenge
is certainly not absent from western culture or universities.
Ghostwriting
Ghostwriting is the practice of hiring a writer (or writers) to
produce a
piece of work that follows a predefined style, and none of the
original
writing credit is attributed to the ghostwriter. The practice of
ghostwriting
has long existed in the field of literature. Related practices
occur in
other forms of the arts, including music composition, singing,
and the
visual arts. In the university context, all subjects are to some
extent
vulnerable to plagiarism. But with regard to ghostwriting,
computational
sciences are particularly vulnerable. Specialist websites can
produce
programming code for computer science students.37
Undergraduates
have been known to pass on, or indeed sell, their laboratory
journals to
12. other students – which in some cases have been copied verbatim
the
following year.
Ghostwriting has traditionally been associated with famous
individuals
who have contracted someone else to produce a work in the
field of
literature, perhaps an autobiography, because they do not have
the time
or skills to complete the task themselves.38 The ghostwriter
produces
the work for an agreed fee. This is a legal and sustainable
business,
and many ghostwriting agencies have a substantial history of
success.39
In pre-Internet days, a student struggling to complete an essay
or
assignment might have asked a friend or family member (or
another
individual) to help write a piece of the work. Sometimes money
changed
hands, but not always. It would generally have been difficult to
find
someone to do this type of work and the incidence of such
collusion
would have been low. The Internet has changed things, and a
large
number of essay-writing services are now offered on the web.40
Some providers offer a full range of services, from writing a
simple essay
to producing a doctoral thesis. Furthermore, the purchaser is
able to
specify if he or she wants an essay to be written to a particular
13. standard
of excellence, such as being good enough to obtain a first class
or a
second class grade. Some of these services respond quickly,
offering a
24-hour turnaround time for an essay. Of course, the fee asked
for the
Review Article Plagiarism and ghostwriting
Page 2 of 7
http://www.sajs.co.za
38South African Journal of Science http://www.sajs.co.za
Volume 112 | Number 5/6
May/June 2016
production of one of these essays depends on the standard
required
and the time-frames for delivery.27 The academic networks
these
organisations purport to have established suggest that a large
number
of competent academics are willing to earn money from the
process of
defrauding, or at least undermining, the examination process.
When ghostwriting services first appeared on the Internet, they
were
relatively unsophisticated and a number of ghostwritten essays
were
caught by anti-plagiarism software. However, today the
suppliers of
these essays claim they can produce work that will not be
14. detected
by such software. Although there are programs that claim to be
able
to identify authors by their style using the principles of
stylometry, a
competently-produced piece of work by a ghostwriter would be
original
and thus would not be detected by software alone.
The range of organisations offering ghostwriting services is
impressive.
A recent Google search produced over 4.6 million references to
these
services in less than half a second. A number of these
organisations
claim that they employ graduates and faculty members from the
best
universities. It has been estimated that in the United Kingdom
alone,
more than GBP200 million is spent annually on these
services.41
The classification of this type of academic misconduct is not
always easy
to define. Ghostwriting differs from plagiarism, although this
point is not
universally agreed on. For example, University College London
(UCL) states
that plagiarism includes ‘turning in someone else’s work as
your own’.42
Plagiarism is sometimes defined as theft, and the word
‘plagiarism’ comes
from the Latin word for kidnapping. But ghostwriting is
different; there is
no direct theft involved. It is rather a question of
misrepresentation or lying
15. about the authorship of the work. However, this type of offence
could be
considered an extreme form of plagiarism at least. Some
academics feel
that ghostwriting is considerably more serious than plagiarism
with regard
to the degree of violation of academic trust.
Tomard39 suggests that there are three distinct categories of
students
who employ ghostwriters. The first are students whose
command of
the English language is not sufficient to be able to write a
competent
research report. The second group includes students who have
not
been able to grasp the detail of the processes involved in
academic
research methodology, and therefore need an expert in the field
of study
to write up the research. The third group consists of students
who are
both uninterested in their studies and sufficiently well-funded to
be able
to afford the high fees asked by ghostwriting agencies. Being
able to
identify these groups should facilitate the university in creating
policies
to counter this type of academic misconduct.
When a dissertation is presented to a university, traditionally it
has
to be accompanied by a Certificate of Own Work.43 This
certificate is
sometimes a simple one-sentence statement, signed by the
student.
16. If it transpires that the statement was false, that renders the
work null
and void and a degree would not be awarded. If a degree has
already
been awarded and it is subsequently found out that the student
did not
perform the work, the degree may be withdrawn. However,
certification
of authenticity has generally not been required for other work
submitted,
such as essays or term papers. Perhaps such certification should
now
become a routine requirement.
If a piece of academic work has been ghostwritten, this can
generally be
detected only if the evaluator is personally acquainted with the
student’s
level of subject knowledge and his or her natural writing style.
Extent of cheating
As noted earlier, it is difficult to give an estimation of the
extent to which
cheating occurs. However, it is clear that the ghostwriting
industry is
highly active and appears to be expanding. This trend is
certainly cause
for concern.
Universities are often quite secretive about issues concerning
discipline, or
in fact any legal action in which they are involved.
Documentary filmmakers
have suggested that there are a growing number of students
taking action
against universities on a wide range of issues. Most of these
17. cases have to
do with universities not living up to promises they made to
students before
the students registered. However, in at least one case on record,
a student
sued a university after he was accused of plagiarism.44 He
argued that
the university had not appropriately informed him that
plagiarism would
be regarded as academic misconduct, and therefore he could not
be held
responsible for an activity he did not realise was regarded as
misconduct.
It is hard to imagine how anyone could have come through
schooling in
the western world, including the early years of university,
without having
the issue of plagiarism fully explained to them.
The special case of dissertations
Formerly, dissertations and theses were an academic activity
that was
required only at the level of masters and doctoral degrees.
However, this
has changed, and dissertations are now often required at
undergraduate
level.45,46 As a material piece of work that is researched and
written
almost wholly by the student, sometimes without much direct
assistance
by academic staff, the dissertation has become an important part
of
many degrees.
Students often struggle with their dissertations, which can be a
18. signi-
ficant challenge. Ranging in length from perhaps as few as 5000
words
at undergraduate level to as many as 50 000 words at masters
level
and 80 000 words at doctorate level, the dissertation requires a
material
amount of focused worked over an extended period of time.
Sometimes at master’s level, and even more so at doctoral level,
many
universities experience a high rate of non-completion of this
type of
work.47-49 For a number of reasons, students are not able to
complete
all the work required for a dissertation. This happens more
frequently
among part-time students, especially at doctoral level. For this
reason
it has been suggested by some academics that a doctoral degree
candidate could outsource some of the work required. However,
this
leads to some challenging questions and issues.
Attitudes towards outsourcing differ considerably from
university to
university. Some universities take the stance that virtually
nothing should
be outsourced, whereas others are far more relaxed. The reality
is that
students have long outsourced certain aspects of their
dissertations. For
many decades and probably for most of the 20th century,
students have
had their dissertations typed by others, normally professional
typists.
19. When word processors became commonplace and desktop
typesetting
became available, students had their work professionally
produced
without any questions being raised.
However, there are a number of other aspects of the research
work
that outsiders now offer to undertake for students, and which
are not
as acceptable as typing and typesetting. For example, it has
been
proposed that compiling the literature review, collecting the
data, and
analysing the results are all activities that could be outsourced.
These
are important doctoral-level activities, and as such are central to
the
intellectual development of the student. Having these tasks
performed
by anyone other than the student (i.e. the degree candidate)
undermines
the objective of acquiring the degree. It is difficult to see how
this level of
outsourcing could be acceptable to the academic world.
Another aspect of dissertations also presents a major problem,
although it might not be regarded as so obviously problematic
as the
issues described above. That is the actual writing of the
dissertation.
Frequently students are not accomplished academic writers, and
the
way they attempt to present the arguments behind their research
can be
difficult to understand. Traditionally a supervisor would give
20. the student
guidance with regard to academic writing style, and in some
cases
supervisors would actually edit the text of the dissertation.
However,
some universities explicitly forbid supervisors to do this, and
the result
has been that students now tend to hire freelance editors. In
some cases,
the amount of work undertaken by these editors has amounted to
having
the dissertation ghostwritten.
At the same time, as mentioned earlier, the ghostwriting
industry now
offers the writing of an entire dissertation as part of its product
range.
Some of the claims are startling, as they suggest an entire
dissertation
can be produced within a matter of weeks – if not days. It is
hard to
imagine what calibre of university would accept a student who
presents
a dissertation, even at undergraduate level, without having had a
number
Review Article Plagiarism and ghostwriting
Page 3 of 7
http://www.sajs.co.za
39South African Journal of Science http://www.sajs.co.za
Volume 112 | Number 5/6
May/June 2016
21. of consultations with his or her supervisor. In the case of
masters or
doctoral degrees, universities require a number of years of
supervised
research before a final dissertation can be submitted or
considered.
Nonetheless, the fact that dissertations are being offered for
sale
by ghostwriting enterprises strongly suggests that there are
indeed
universities that accept this type of written work and award
degrees on
the basis of ghostwritten dissertations.
The ethics of the ghostwriter
It does not appear that ghostwriters have much, if any, ethical
concern
about the work they do. Ghostwriting agencies boast that they
hire only
writers with the highest qualifications from the best
universities, and
judging from the apparent satisfaction of their clients this does
seem
to be the case. One ghostwriter who decided to write
anonymously for
The Times Higher Education50 stated:
I don’t justify the work I’m doing on ethical
grounds. While what I do is not illegal, it does
enable others to break rules and suffer the
consequences if they are caught. The agencies
maintain the image of legitimate businesses:
many do not even refer to ‘cheating’. You are
simply ‘helping’ with an assignment (making up,
as one agency argues, for the university’s failure
22. to provide adequate tuition). While I’m happy
to acknowledge that I am dependent on clients’
continued cheating, this doesn’t mean I am not
conscious that my job is a symptom of an illness, a
fracture, in our universities.
It is challenging not to sympathise with the argument that the
university
system is ‘fractured’. However, the argument used by many
essay mills
– that they are only ‘helping’ students – is at best
disingenuous.36 This is
a for-profit industry that operates within the law but exhibits
little concern
about the morality of its activity.51
Interestingly, the same ghostwriter quoted above50 also
commented that:
I stay away from applied fields – it is my only ethical
standard as a ghost writer. I will not help a nurse to
qualify on false pretences: who knows, it might be
my parents who find themselves in their care.
This is an interesting admission of the impropriety involved in
the act
of ghostwriting.
The reaction of the universities
The issue of plagiarism and ghostwriting is of critical
importance to
universities for at least two reasons. The first is that these types
of
misconduct discredit the degrees that are awarded. If plagiarism
and
ghostwriting are perceived as being rife at a particular
23. university, this is
a disincentive to anyone who desires a robust qualification to
attend that
institution. The second reason is that it is unfair for a student to
obtain
credit for work he or she did not actually do. Having the money
to buy
completed academic work does not enhance the intellectual
capability
of the student – as the holding of a degree is supposed to
indicate.
Furthermore, the consequence of such misconduct is that honest
students are placed at a disadvantage.
With regard to plagiarism, in general universities have reacted
rather
slowly and with some trepidation. A few years ago, when
plagiarism
was suspected in a master’s degree dissertation by an examiner
and the
use of anti-plagiarism software was suggested, the student’s
supervisor
might have exclaimed, ‘Are you impugning the integrity of my
student?’
Fortunately, those days are past and most universities now
require
dissertations to be submitted both electronically and in hard
copy (i.e. on
paper). Nonetheless, the question of what action to take against
people
who are found to be plagiarists has not been answered.
Ghostwriting is, in a sense, a more difficult issue than
plagiarism. The
outright purchasing of essays, term papers, and dissertations is
clearly
24. an act of fraud. It would be unwise for a university to do
anything less than
take the most severe disciplinary action. But in some cases,
obtaining
help from an informal mentor could come quite close to
ghostwriting,
and penalising this activity could present difficulties. Perhaps
the real
issue is that universities have been, and still are, focused on
catching
misconduct after it has occurred instead of preventing it. Is
there really
any way of preventing these types of cheating? The answer is an
unreserved ‘yes’. How this can be done is addressed below,
under the
subheading ‘Prevention and detection’.
The university as a fractured institution
In discussing how universities have become fractured, it is
necessary
to bear in mind the exceptional pressures these institutions have
had
to face in recent years. Since the mid-1990s many universities
have
been expected to deliver what is sometimes referred to as ‘mass
education’.52,53 This term is not well defined but its general
meaning is
clear: education has to be made available to large numbers of
students.
At the same time, the resources made available to universities
have
not correspondingly increased. Class sizes have increased, with
a
concomitant unfavourable shift in the ratio of students to
25. lecturers. In
some cases, lecturers no longer grade the work of their students
and
this task is sub-contracted to either teaching assistants or even
to
outside contractors. In addition, a greater number of students
from
other countries, who may have inadequate command of English,
are
being admitted to degree courses at English-medium
universities. These
factors have made the relationship between faculty and students
more
challenging, as illustrated by the following remarkable
statement made
by the anonymous ghostwriter50:
I operate on the assumption that the student
I’m working for will have little or no personal
interaction with academic staff. This means there
is only a small likelihood that the lecturer who sets
and marks the questions will be familiar with the
student’s style of writing.
If this is a correct assessment of the situation, and there is
prima facie
evidence to suggest that it is, then the universities for which
this is true
are not performing their expected function.
The American publication The Chronicle of Higher Education
interviewed
a ghostwriter who remarked as follows54:
You’ve never heard of me, but there’s a good
chance that you’ve read some of my work. I’m a
26. hired gun, a doctor of everything, an academic
mercenary. My customers are your students. I
promise you that. Somebody in your classroom
uses a service that you can’t detect, that you can’t
defend against, that you may not even know exists.
Matthews similarly reflected on ghostwriters’ services as
follows35:
There are also concerns that in an age of mass
higher education and high student-to-staff ratios,
lecturers are less able to get to know their students’
work, making this form of cheating more difficult
to detect. And there are fears that the pressures of
the job might encourage some academics to turn
a blind eye to the practice. But perhaps the most
important question is whether it is possible to
prevent this form of cheating in the first place.
It is clear that universities are not addressing this subject with
the energy or
commitment one might expect when such important issues are at
stake.
The function of universities
The purpose of a university is not only to communicate and test
students’
knowledge but also to inspire them to become lifelong
learners.55,56 This
means there should be an onus on the university to help students
realise that
engaging with the subject matter is interesting, enjoyable and
rewarding. If
these positive experiences are achieved, learning should occur
naturally and
students should become well-informed in their fields of study.
27. If this were the
case, there would be little (or less) motivation for anyone to
cheat.
Review Article Plagiarism and ghostwriting
Page 4 of 7
http://www.sajs.co.za
40South African Journal of Science http://www.sajs.co.za
Volume 112 | Number 5/6
May/June 2016
Although some academics would argue that they already take
this
approach to teaching, in reality most lecturers present fairly
routine
material, and students are expected to learn and to reproduce it
in rather
unimaginative ways – either during examinations or in essays,
term
papers, and even dissertations. This means the evaluation
processes in
universities are often a test of one’s memory of material that
has been
offered for the purposes of learning in a relatively structured
fashion.
When this approach is combined with large numbers of students,
the
temptation to engage in plagiarism or use ghostwriters appears
to offer
a solution to some students.
Prevention and detection
28. Some universities have taken the view that plagiarism and
ghostwriting
can be prevented by adequate detection methods and the
imposition
of appropriate penalties. For this reason, anti-plagiarism
software has
become a large business sector. The penalties imposed by unive-
rsities range from requiring the student to resubmit the piece of
work to suspending or even expelling him or her from the
university.
However, universities do not easily impose suspensions and
expulsions.
Students sometimes face only a rebuke and have to resubmit
their
work. Countering plagiarism in this half-hearted manner may,
however,
produce an ‘arms-race’ mentality, so that those who facilitate
students’
cheating will try to create increasingly clever ways of avoiding
anti-
plagiarism software. A better approach is to reassess the
university’s
attitude to teaching and learning.
The New Zealand Government has produced an interesting set
of
guidelines for the effective prevention and detection of
academic fraud.57
The approach is intended to create awareness of the potential
problems
of academic fraud, and to continually remind students about
how
unacceptable the practice is. It is then necessary for staff to
engage
continually with their students and to be on the lookout for any
surprising
29. changes in their performance. This means getting to know the
students
well. All of these suggestions are welcome, but they are time-
consuming
to put into practice. In general, academics regard themselves as
having a
full workload without taking on any extra engagements or
responsibilities.
Implementing the types of policies suggested in the New
Zealand
guidelines represents a significant move away from present
general
practice. The cost of such a transformation would be regarded
by
many to be a heavy burden on the financial resources of
educational
institutions. In addition, not all academics would necessarily
welcome
such a change. There is little doubt that many academics are
largely
comfortable with the present system.
With regard to ensuring the integrity of a dissertation, the issue
is one of
adequate supervision. If a programme of careful supervision is
in place,
there should be relatively little opportunity for plagiarism to
escape
unnoticed in the writing of a dissertation. To a large extent, a
dissertation
should be almost co-created by a student and his or her
supervisor, with
the student doing the work and the supervisor keeping a close
eye on
what is happening step-by-step.
30. With regard to ghostwriting, there should be almost no
opportunity for a
student to pass off a piece of work produced in this way. If the
supervisor
does not know the student well enough to be able to
immediately detect
that a written submission is inauthentic, the supervisor is not
actually
doing the job adequately. Unfortunately, some universities do
not
allocate sufficient time to supervisors for them to be able to get
to know
their students well enough; consequently, they may indeed be
unable to
detect if the work submitted has been written by someone else.
Summary and conclusion
This paper has reviewed the current situation with regard to
plagiarism
and ghostwriting at university level. The objective of the
discussion
was to stimulate debate as to how universities should react to
these
types of academic misconduct. (The paper has deliberately
avoided
addressing how these problems may be exaggerated in distance
learning
or e-Learning university programmes.)
The number of students who plagiarise or use ghostwriters
appears
to be on the increase. Although as a percentage of the entire
student
population, the number of those who engage in academic
misconduct
31. is believed to be small, even that small percentage represents a
large
number of students in absolute terms. This is cause for concern.
If
cheaters manage to ‘beat the system’ and obtain a degree they
have not
earned through their own academic performance, these
fraudsters would
represent a significant threat to the integrity of the relevant
department,
faculty, and university – indeed, to the whole notion of higher
education.
Plagiarism and ghostwriting must be eliminated to the fullest
extent
possible, because these practices are fundamentally unfair to
honest
students who rely on their own intellectual abilities to create the
academic
work required of them.
In general, plagiarism is a substantial and unwelcome
misconduct, but
it tends to be relatively easily identifiable. However, as it is
regarded
a form of academic fraud, there should be a material penalty
paid by
those who are found to engage in this behaviour. Although
universities
are in a position to impose such penalties, they do not appear to
do so
adequately and effectively, or often enough.
The use of a ghostwriter is an offence for which a greater
penalty should
be paid. Although ghostwriting is not illegal, lying about the
32. authorship
of a piece of work is potentially fraudulent. Ghostwriting
cannot be easily
detected by software in the same way as plagiarism can. There
are some
products that employ stylometry, and these may be of help and
could
be utilised by universities. However, ghostwriting is best
detected by
lecturers having personal knowledge of the capabilities of their
students.
Introducing a greater number of oral examinations could quickly
and
easily eliminate the entire issue of ghostwriting. Unfortunately,
it
would also create a substantial workload, which the current
university
examination system is ill-equipped to deal with.
Nonetheless, the overall approach of identifying academic
misconduct
and imposing penalties is unlikely in itself to solve the problem.
What
is really required is a new attitude to prevention. This would
involve
creating learning environments in universities that would invite
students
to become highly engaged with their subject material, and to
express their
creativity in such a way that it would be apparent who has
succeeded
in the learning process and who has not. Students who have
succeeded
should be valued and rewarded with an appropriate degree,
whereas
those who do not master the process will be deemed to have
33. failed.
With regard to misconduct at the dissertation level, it should
not be a
major problem for supervisors who are sufficiently engaged
with their
students to be able to detect misconduct. Most supervisors have
access
to anti-plagiarism software, and it is a simple matter to pass
submitted
work through such an analysis. On the question of ghostwriting,
although a supervisor should expect the writing style of a
student to
improve significantly during the course of producing a
dissertation, an
extraordinary level of improvement should become the subject
of an
enquiry and maybe even an investigation. There needs to be a
severe
penalty for those who engage in this type of misconduct; the
treatment
of serious academic misconduct must be sufficiently firm to
tackle the
problem effectively.
Finally, it is also important for the issue of plagiarism and
ghostwriting to
be discussed more openly and regularly within universities.
There might
even be certain proven or known incidents where the
transgressors
should be named and shamed.
Authors’ contributions
Both authors contributed equally to the manuscript.
34. Acknowledgement
The authors would like to acknowledge the assistance of Dr
Filistea
Naude from the Unisa Science Campus Library.
References
1. Retraction Watch [homepage on the Internet]. No date [cited
2015 Jul 28].
Available from: http://retractionwatch.com/
Review Article Plagiarism and ghostwriting
Page 5 of 7
http://www.sajs.co.za
http://retractionwatch.com
41South African Journal of Science http://www.sajs.co.za
Volume 112 | Number 5/6
May/June 2016
2. Bhattacharjee Y. The mind of a con man. New York Times.
2013
April 26 [cited 2015 July 28]. Available from:
http://www.nytimes.
com/2013/04/28/magazine/diederik-stapels-audacious-academic-
fraud.
html?pagewanted=all&_r=1
3. Honig B, Bedi A. The fox in the hen house: A critical
examination of plagiarism
among members of the academy of management. Acad Manag
Learn Edu.
2012;11(1):101–123. http://dx.doi.org/10.5465/amle.2010.0084
35. 4. Lewin T. Dean at M.I.T. resigns, ending a 28-year lie. New
York Times.
2007 April 27 [cited 2015 July 28]. Available from:
http://www.nytimes.
com/2007/04/27/us/27mit.html
5. Farrell EF. California poet laureate admits to lie on résumé.
Chronicle of Higher
Education. 2002;49(12).
6. Flynn NS. UCD inquiry to study vetting practices. The Irish
Times. 2001
November 13 [cited 2015 Aug 04]. Available from:
http://www.irishtimes.
com/news/ucd-inquiry-to-study-vetting-practices-1.336913
7. Guha A. Vice-Chancellors are not angels. Frontier.
2011;43(45); May 22–28
[cited 2016 May 17]. Available from:
http://frontierweekly.com/archive/vol-
number/vol/vol-43-2010-11/vol-43-45/vicechanellors-43-45.pdf
8. Monash head leaves over plagiarism charge. The Guardian.
2002 July
18 [cited 2015 Jul 28]. Available from:
http://www.theguardian.com/
education/2002/jul/18/highereducation.uk
9. Rodan P. A modest victory for academic values: The demise
of David
Robinson. Australian Universities’ Review. 2004;46(2):16–22.
10. Columbia University. The cloning scandal of Hwang Woo-
Suk [article on the
Internet]. c2015 [cited 2015 Jul 28]. Available from:
36. http://stemcellbioethics.
wikischolars.columbia.edu/The+Cloning+Scandal+of+Hwang+
Woo-Suk
11. McNeill D. In Japan, research scandal prompts questions.
The Chronicle of
Higher Education. 2014 June 30 [cited 2015 Jul 28]. Available
from: http://
chronicle.com/ar ticle/In-Japan-Research-
Scandal/147417/?cid=at&utm_
source=at&utm_medium=en
12. Office of Research Integrity. Case summaries [article on the
Internet]. c2015
[cited 2015 Jul 28]. Available from:
https://ori.hhs.gov/case_summary
13. Papp R, Wertz MH. Academic integrity violations: Isolated
problems or
epidemic? In: SAIS 2005 Proceedings; 2005 February 25–26;
Savannah,
GA, USA. Available from:
http://aisel.aisnet.org/sais2005/30/?utm_
source=aisel.aisnet.org%2Fsais2005%2F30&utm_medium=PDF
&utm_
campaign=PDFCoverPages
14. Sheard J, Dick M, Markham S, Macdonald I, Walsh M.
Cheating and
plagiarism: Perceptions and practices of first year IT students.
ACM SIGCSE
Bulletin. 2002;34(3):183–187.
http://dx.doi.org/10.1145/637610.544468
15. Thomas A, De Bruin GP. Plagiarism in South African
management journals.
37. S Afr J Sci. 2015;111(1/2), Art. #2014-0017, 3 pages.
http://dx.doi.
org/10.17159/sajs.2015/20140017
16. Goveneder P. Universities battle a rising tide of cheating.
Time Live. 2014
August 17. Available from:
http://www.timeslive.co.za/local/2014/08/17/
universities-battle-a-rising-tide-of-cheating1
17. The good, the bad, and the ugly. S Afr J Sci.
2003;99(9/10):402–403.
18. LeBlanc S. Harvard to honor Ted Kennedy, once expelled
for cheating.
CNSNews.com. 2008 December 01. Available from:
http://cnsnews.com/
news/article/harvard-honor-ted-kennedy-once-expelled-cheating
19. Wallace MJ, Newton PM. Turnaround time and market
capacity in contract
cheating. Educ Stud. 2014;40(2):233–236.
http://dx.doi.org/10.1080/0305
5698.2014.889597
20. George JF, Davison RM, Heales J, Munro M. Report of the
ad hoc committee
on member misconduct to the AIS Council. Communications of
the
Association for Information Systems. 2003;11(1):2.
21. Reston J. Galileo: A life. Washington: Beard Books; 2000.
22. Stavisky LP. Term paper ‘mills’, academic plagiarism, and
state regulation. Pol
Sci Quart. 1973:445–461. http://dx.doi.org/10.2307/2148993
38. 23. Clarke R. Plagiarism by academics: More complex than it
seems. J Assoc Inf
Systems. 2006;7(2):5.
24. Randall M. Pragmatic plagiarism: Authorship, profit, and
power. Toronto:
University of Toronto Press; 2001.
25. PennState. Why plagiarism is wrong [article on the
Internet]. c2015 [cited
2015 Sep 22]. Available from:
http://tlt.psu.edu/plagiarism/student-tutorial/
why-plagiarism-is-wrong/
26. University of Oxford. Plagiarism [homepage on the
Internet]. No date [cited
2015 Sep 22]. Available from:
http://www.ox.ac.uk/students/academic/
guidance/skills/plagiarism
27. Singh S. The zombie doctorate. In: Proceedings of the 14th
European
Conference on Research Methodology for Business and
Management Studies;
2015 June 11–12; Valletta, Malta. Reading, UK: Academic
Conferences and
Publishing International Ltd; 2015.
28. Hallak J, Poisson M. Corrupt schools, corrupt universities:
What can be
done? Paris: UNESCO International Institute for Education
Planning; 2007.
29. Richards D, Busch P, Germanou D, editors. Elearning
promoting plagiarism or
39. honesty? In: PACIS 2011 Proceedings; 2011 July 7–11;
Brisbane, Australia.
Available from: http://aisel.aisnet.org/pacis2011/
30. Adams R. Cheating found to be rife in British schools and
universities. The
Guardian. 2015 June 15. Available from:
http://www.theguardian.com/
education/2015/jun/15/cheating-rife-in-uk-education-system-
dispatches-
investigation-shows
31. Roberts J, Wasieleski D. The contemporary plagiarist: The
roles of technology
and moral development. In: ICIS 2011 Proceedings; 2011 Dec
4–7; Shanghai,
China. Available from:
http://aisel.aisnet.org/icis2011/proceedings/
IScurriculum/9
32. Warn J. Plagiarism software: No magic bullet! High Educ
Res Dev.
2006;25(02):195–208.
http://dx.doi.org/10.1080/07294360600610438
33. Thomas A, De Bruin GP. Student academic dishonesty:
What do academics
think and do, and what are the barriers to action? Afr J Bus
Ethics.
2012;6(1):13–24. http://dx.doi.org/10.4103/1817-7417.104698
34. Fuzile B. Plagiarism cases rock Fort Hare. Times Live. 2013
April 09. Available
from:
http://www.timeslive.co.za/thetimes/2013/04/09/plagiarism-
cases-
40. rock-fort-hare
35. Matthews D. Essay mills: University course work to order.
Times
Higher Education. 2013 October 10. Available from:
https://www.
timeshighereducation.co.uk/features/essay-mills-university-
course-work-to-
order/2007934.article?page=0%2C1
36. Matthews D. East Asia has ‘toxic academic culture’. Times
Higher Education.
2015 September 07. Available from:
https://www.timeshighereducation.com/
news/east-asia-has-%E2%80%98toxic-academic-
culture%E2%80%99
37. BESTGhostWriters. Programming ghostwriter [homepage on
the Internet]. No
date [cited 2015 Sep 22]. Available from:
http://www.bestghostwriters.net/
programming-ghostwriter/
38. PLoS. Ghostwriting collection [homepage on the Internet].
No date [cited
2015 Jul 28]. Available from:
http://collections.plos.org/ghostwriting
39. Tomar DA. Detecting and deterring ghostwritten papers: A
guide to best
practices [article on the Internet]. c2015 [cited 2015 Aug 04].
Available from:
http://www.thebestschools.org/resources/detecting-deterring-
ghostwritten-
papers-best-practices/
41. 40. Auger GA. Missing citations, bulking biographies, and
unethical collaboration:
Types of cheating among public relations majors. Journal Mass
Comm Educat.
2013;68(2):150–165.
http://dx.doi.org/10.1177/1077695813476953
41. Taylor M, Butt R. How do you make £1.6m a year and drive
a Ferrari A: Sell
essays for £400. The Guardian. 2006 July 29. Available from:
http://www.
theguardian.com/uk/2006/jul/29/highereducation.education
42. University College London. Plagiarism [homepage on the
Internet]. No date
[updated 2013 Sep 13; cited 2016 May 8]. Available from:
http://www.ucl.
ac.uk/current-students/guidelines/plagiarism
43. Remenyi D. Writing up your research. 2nd ed. Reading, UK:
Academic
Conferences and Publishing International Ltd; 2013. p. 127.
44. ‘Plagiarist’ to sue university. BBC News. 2004 May 27.
Available from: http://
news.bbc.co.uk/1/hi/education/3753065.stm
45. Collis J, Hussey R. Business research: A practical guide for
undergraduate
and postgraduate students. 4th ed. Basingstoke: Palgrave
Macmillan; 2013.
Review Article Plagiarism and ghostwriting
Page 6 of 7
http://www.sajs.co.za
46. responses. Perspect Educ. 2011;29(3):13–29.
49. Smith RL, Maroney K, Nelson KW, Abel AL, Abel HS.
Doctoral programs:
Changing high rates of attrition. J Humanist Educ Dev.
2006;45(1):17. http://
dx.doi.org/10.1002/j.2161-1939.2006.tb00002.x
50. Why I write for an essay mill. Times Higher Education.
2013 Aug 01. Available
from:
https://www.timeshighereducation.co.uk/comment/opinion/why-
i-
write-for-an-essay-mill/2006074.article
51. Bosch X, Ross JS. Ghostwriting: Research misconduct,
plagiarism, or
fool’s gold? Am J Med. 2012;125(4):324–326.
http://dx.doi.org/10.1016/j.
amjmed.2011.07.015
52. Scott P. The meanings of mass higher education:
Buckingham: Open
University Press; 1995.
53. Houle CO. The design of education. 2nd ed. San Francisco,
CA: Jossey-Bass
Higher & Adult Education Series; 1996.
54. Dante E [pseudonym]. The shadow scholar: The man who
writes your
students’ papers tells his story. The Chronicle of Higher
Education. 2010
November 12. Available from: http://chronicle.com/article/The-
Shadow-
Scholar/125329/
47. 55. Goodchild LF, Wechsler HS. The history of higher
education. ASHE Reader
Series. Boston, MA: Pearson Custom Publishing; 1997.
56. Newman JH, Turner FM. The idea of a university. New
Haven, CT: Yale
University Press; 1996.
57. New Zealand Qualifications Authority. Effective practice in
preventing and
detecting academic fraud [document on the Internet]. c2013
[cited 2015 Aug
04]. Available from: http://www.nzqa.govt.nz/assets/Providers-
and-partners/
NZQA-Effective-practice-guide.pdf
Review Article Plagiarism and ghostwriting
Page 7 of 7
http://www.sajs.co.za
http://dx.doi.org/10.1080/03075078012331377206
http://dx.doi.org/10.1002/j.2161-1939.2006.tb00002.x
http://dx.doi.org/10.1002/j.2161-1939.2006.tb00002.x
https://www.timeshighereducation.co.uk/comment/opinion/why-
i-write-for-an-essay-mill/2006074.article
https://www.timeshighereducation.co.uk/comment/opinion/why-
i-write-for-an-essay-mill/2006074.article
http://dx.doi.org/10.1016/j.amjmed.2011.07.015
http://dx.doi.org/10.1016/j.amjmed.2011.07.015
http://chronicle.com/article/The-Shadow-Scholar/125329
http://chronicle.com/article/The-Shadow-Scholar/125329
http://www.nzqa.govt.nz/assets/Providers-and-partners/NZQA-
Effective-practice-guide.pdf
48. http://www.nzqa.govt.nz/assets/Providers-and-partners/NZQA-
Effective-practice-guide.pdf
Reproduced with permission of the copyright owner. Further
reproduction prohibited without
permission.
The New Cheating Economy
Author: Wolverton, Brad
Abstract: Business is booming right under colleges' noses. It's
not just papers and assignments anymore. Now it's the whole
course. Fifteen credits were all he needed. That's what the
school district in California where Adam Sambrano works as a
career-guidance specialist required for a bump in pay. But when
he saw the syllabus for a graduate course he'd enrolled in last
year at Arizona State University, he knew he was in trouble.
Among the assignments was a 19-page paper, longer than
anything he'd ever written. The idea of that much research
worried Mr. Sambrano, who also spends time serving in the
Army National Guard. Before the class started, he went on
Craigslist and enlisted the service of a professional cheater. For
$1,000 -less than the monthly housing allowance he was
receiving through the GI Bill, he says -- Mr. Sambrano hired a
stranger to take his entire course.
Full text: Business is booming right under colleges' noses. It's
not just papers and assignments anymore. Now it's the whole
course. Fifteen credits were all he needed. That's what the
school district in California where Adam Sambrano works as a
career-guidance specialist required for a bump in pay. But when
he saw the syllabus for a graduate course he'd enrolled in last
year at Arizona State University, he knew he was in trouble.
Among the assignments was a 19-page paper, longer than
anything he'd ever written. The idea of that much research
worried Mr. Sambrano, who also spends time serving in the
49. Army National Guard. Before the class started, he went on
Craigslist and enlisted the service of a professional cheater. For
$1,000 -less than the monthly housing allowance he was
receiving through the GI Bill, he says -- Mr. Sambrano hired a
stranger to take his entire course. He transferred $500 upfront,
"From Adam for ASU," according to a receipt obtained by The
Chronicle. Then he just waited for the cheater to do his work.
On any given day, thousands of students go online seeking
academic relief. They are first-years and transfers overwhelmed
by the curriculum, international students with poor English
skills, lazy undergrads with easy access to a credit card. They
are nurses, teachers, and government workers too busy to pursue
the advanced degrees they've decided they need. The Chronicle
spoke with people who run cheating companies and those who
do the cheating. The demand has been around for decades. But
the industry is in rapid transition. Just as higher education is
changing, embracing a revolution in online learning, the
cheating business is transforming as well, finding new and more
insidious ways to undermine academic integrity. A decade ago,
cheating consisted largely of students' buying papers off the
internet. That's still where much of the money is. But in recent
years, a new underground economy has emerged, offering any
academic service a student could want. Now it's not just a paper
or one-off assignment. It's the quiz next week, the assignment
after that, the answers served up on the final. Increasingly, it's
the whole class. And if students are paying someone to take one
course, what's stopping them from buying their entire degree?
The whole-class market is maturing fast. More than a dozen
websites now specialize in taking entire online
courses, including BoostMyGrade.com, OnlineClassHelp.com,
and TakeYourClass.com. One of them, NoNeedtoStudy.com,
advertises that it has completed courses for more than 11,000
students at such colleges as Duke, Michigan State, even
Harvard. As cheating companies expand their reach, colleges
have little incentive to slow their growth. There's no money in
catching the cheaters. But there's a lot of money in upping
50. enrollment. Two professors at Western Carolina University
were so concerned about the encroachment of cheating that they
set up a fake online class to learn more about the industry's
tactics, and see what they could detect. About a dozen students
agreed to enroll in the introductory psychology course,
including John Baley, then a graduate student in clinical
psychology. They were provided with fake names, email
addresses, and ID numbers, plus a pot of money for cheating
services. Half were asked to cheat, and they did so in a variety
of ways, collaborating inappropriately with classmates, buying
papers, and paying others to take tests. Mr. Baley went looking
for a company to take the whole class for him. He typed a few
words into his browser -"cheat for me in my online class" -- and
turned up dozens of results. Many sites seemed untrustworthy:
Their content was misspelled or grammatically incorrect, or
their customer-service reps had trouble with basic English.
Some requested confidential banking information or asked him
to enter it into a website with no security protection. But one
company impressed him. Its representatives responded
promptly, explained how their colleagues would complete the
course, and guaranteed a B or better -- or his money back. He
agreed to pay the company $900, half upfront, and handed over
his course username and password. Over the next 10 weeks, the
company, which Mr. Baley declined to name, to protect any
further research, passed him from the customer-service staff to
the management team to the person who took his course. At
each stage, he says, he dealt with people who were efficient,
responsive, and reliable. In fact, the cheaters performed better
than he thought they would. They completed every assignment
without prompting, at one point providing a written script for a
video presentation with less than 36 hours' notice. The
instructors, Alvin Malesky, an associate professor of
psychology, and Robert Crow, an assistant professor of
educational research, used Turnitin and Google to check
students' work for plagiarism and monitored them to see if
groups were taking exams at the same time. The professors
51. caught several students plagiarizing material. But they didn't
spot the paid test takers, purchased papers, or coordinated
assignments. And they had no clue that a person in New York to
whom Mr. Baley had mailed his books was behind the A's they
were giving. Even when professors knew that students were
cheating, and were trying to catch them, they came up short.
Mr. Baley's only frustration was with the barrage of marketing
he got. His Facebook and Instagram feeds were saturated with
ads for cheating companies, he says. That didn't let up for
months. Two years after the company took his class, its
representatives are still trying to enlist him to refer other
students as clients. Like any underground industry, academic
cheating has its share of sloppy opportunists and savvy
operators. Most work in the shadows. Click on a website that
offers academic work for hire, and you'll probably find little
information about the people or company behind it. The owners
often use aliases and mislead prospective customers with fake
addresses and exaggerated claims. No Need to Study LLC lists
its corporate address as 19 East 52nd Street, in New York,, but
complaints filed with the Better Business Bureau say that
address does not exist. A representative for the company said in
an email that it is a virtual business offering services
exclusively online and does not have an office open to the
public. A dissertation-writing service that claims to be based in
Chicago seems to operate out of Pakistan. "In order to create a
best academic assignment that rank #1 among other
assignments," its website says, "then you will seek for a
dedicated and experienced writer's help." Even more-
established companies can be difficult to track down. The
headquarters of one, Student Network
Resources, appears to be in the middle of a New Jersey
cornfield. A half-mile away, in a generic strip mall, it maintains
a post-office box in a packing-and-shipping store. The owner of
the store says he forwards the mail to Florida. It goes to the
company's founder and president, Mark DeGaeta. Mr. DeGaeta
got the idea for Student Network Resources in the late 1990s,
52. when he was still in high school, he says in an email to The
Chronicle. Over the years, he has registered more than a dozen
domains, including PaperDue.com and HelpMyEssay.com,
which funnel work to his company, whose name is relatively
unknown. When students place a request through one of the
sites, they enter their name, email address, and as much
information about the assignment as possible, including due
date and level (undergraduate, master's, or doctoral). That
information goes into Student Network's system, where a price
is set based on the difficulty of the assignment. The job is
posted to a private board for writers, stripped of any personal
details about the student. From there, a willing writer picks up
the order and corresponds with the client through a private
channel in which students often disclose personal information
about themselves and their courses. Then the writer delivers the
completed assignment. Mr. DeGaeta is mum about the revenue
he has brought in, but the business appears to be lucrative. Two
longtime writers say they've earned as much as $10,000 a
month. At peak times, the company says on its website, most of
its 150 writers earn more than $1,800 a week. Writers typically
pocket half the price of an order; the company gets the rest. If
those numbers are accurate, annual revenue for Student Network
Resources would be in the millions. The company has only two
employees. The founder has made a good living, according to
public records. He owns an apartment in a tony neighborhood of
New York, near the United Nations building, and seems to
reside near Miami Beach. But his business has fallen off in
recent years, he says, as the industry has expanded overseas.
The company emphatically denies that it is a cheating service. It
says it tells customers that they may not use its material for
academic credit -- and requires them to acknowledge as much
before purchasing papers, during the research process, and
before receiving the work. "We vehemently protect our
copyright," Mr. DeGaeta said in a written statement. "If the
customer decides to use our material as a reference they must
cite Student Network Resources Inc." Several current and
53. former writers told The Chronicle that they had believed that.
Amelia Albanese, a former community-college tutor who
worked for the company in 2010, says she thought she was
writing sample papers for tutors and teachers. When she
realized she was doing students' work, she quit. "I worked at a
college," she says, "and if the students I worked with had
cheated, I would have been furious." The company's business
depends on covering its tracks. A memo it sent to writers last
year gives step-by-step instructions for wiping the metadata
from documents they produce. "Every document that you
submit must have 100% blank 'Summary' properties," the memo
says. "You can make the 'Author' field (and other fields) blank
by default for all new documents by going to 'Preferences' 'User
Information' and replacing the content of the 'First:' and 'Last:'
fields with a blank space." According to Mr. DeGaeta, the
memo was aimed at preventing writers from poaching clients.
But if there's no trace of a cheater on a document, a college has
no way of knowing -- or if an instructor suspects something, no
proof -- that the student didn't do the work. Cheating has
become second nature to many students. In studies, more than
two-thirds of college students say they've cheated on an
assignment. As many as half say they'd be willing to purchase
one. To them, higher education is just another transaction, less
about learning than about obtaining a credential. The market,
which includes hundreds of websites and apps, offers a slippery
slope of options. Students looking for class notes and sample
tests can find years' worth on Koofers.com, which archives
exams from dozens of colleges. And a growing number of
companies, including Course Hero and Chegg, offer online
tutoring that attempts to stay above the fray (one expert calls
such services a "gateway drug"). Many students turn to
websites like Yahoo Answers or Reddit to find solutions to
homework problems. And
every month, hundreds of students put assignments up for bid
on Freelancer.com and Upwork, where they might get a paper
written for the cost of a few lattes. It's not uncommon for
54. students to disclose personal details in their orders, which
anyone online can see. This spring a student from the University
of North Carolina at Charlotte included an attachment to his
Upwork order that identified his institution and the introductory
philosophy class he was looking for help in. A few days later, a
Ph.D. candidate in Britain went on the same site to solicit help
with his dissertation. A document he attached to his order
included his name and his adviser's. Some of the most explicit
exchanges happen on Craigslist, which has become a hub of
cheating activity. Over two days in April, The Chronicle
analyzed Craigslist posts in seven cities in which a cheater or
cheating service offered to complete whole courses for students.
The search turned up more than 200 ads. In many cases, the
same ads ran in multiple cities, suggesting a coordinated
marketing effort. Craigslist posters appealed to students by
acknowledging how little time they had for busywork. "Online
classes are a pain in the ass," said one Chicago-area ad. Others
outright asked students to hand over their online credentials.
"You can trust us with your login and password information,"
said a Phoenix post. "We will do every section of your online
class including discussion boards, tests, assignments, and
quizzes." The Chronicle exchanged messages with several
Craigslist posters to inquire about the cost of their service and
how it worked. One person who has posted regularly in the Los
Angeles area said he had been in business for 10 years and had
a staff of "over 20 experts." His prices, he said, depended on the
number of hours it would take to complete a class, not how well
a student wanted to do. "We always get A's and B's," he said in
a text message. "Calculation based classes are $750. All others
are $600. Anyone quoting different is not a pro and doesn't
know what they are doing. Cheap quotes = F grades. "Oh," he
added, "and you can split up the payments." Another poster
said his prices depended on the institution. "A course from Penn
State World Campus requires more effort than a course from
Post University," he said in an email. "Previously, I completed a
remedial English course for a client at Kaplan University. This
55. person requested a 'B' for $90/week for eight weeks. Another
client at a Cal State University required an 'A' in a four week
upper division Asian Studies course for $300/week." The most
common way students cheat is through a simple web search --
typing, for example, "essay," "essay help," or "write my essay."
As many as half of the visits to some sites used for cheating
come through search engines, The Chronicle found. The
companies that have made the biggest strides in the business
have mastered the search game. Searchengine optimization
efforts have helped Ultius, founded in 2011, grow fast. The
Delaware-based company, with a call center in Las Vegas, has
hired more than 40 employees, including engineers and
customer-service representatives, according to job ads. It has
contracted with more than 1,400 writers. That growth has
coincided with a surge in traffic. Over a recent three-month
stretch, the site drew about 520,000 visits, according to a
Chronicle analysis of data compiled by SimilarWeb. Thirty to
40 percent of Ultius's traffic comes from students' web searches,
according to estimates on Alexa, which measures internet usage.
Ultius is the No. 1 or No. 2 search result that pops up when
someone Googles "buy a term paper," "buy a research paper," or
about a dozen other phrases that indicate an intent to purchase a
completed assignment, according to a Chronicle analysis of
search data compiled by Spyfu, a search-engine optimization
tool. Boban Dedovic, 27, the company's chairman, helped start
it after three semesters as a student at the University of
Maryland at College Park, during which he worked as a tutor.
To him, Ultius is a technology company that connects customers
to writers, he says via email. He denies that Ultius is part of
the cheating industry, referring to it as a "doc prep service." In
a written statement, the company says it works hard to ensure
that its customers don't misuse its services, informing them of
its fair-use policy (that its work is meant for reference only and
must be properly cited) at least three
times and requiring them to accept it. When the company
suspects a problem, it conducts an investigation, drafts an
56. internal report, and, if it finds a violation, disables the
customer's account. However, the company says, it cannot
individually monitor every one of its orders. Ultius protects its
business by keeping those orders private. When a student posts
an assignment on Craigslist or other sites, looking for someone
to pick it up, Google indexes that text, making it visible in
searches. But the customer experience at Ultius occurs behind a
wall, in the same way a bank keeps its clients' information
private. Because Google can't create a record of those pages,
professors wouldn't be able to find them. The company's
dealings with one Ph.D. candidate illustrate the increasingly
complex work that students are outsourcing, while faculty
members remain in the dark. Last year, Ultius contracted with a
student who described herself as a "single active duty parent" to
help write a concept paper for her doctoral program, records
show. The job included revisions requested by the chair of her
dissertation committee. The Ph.D. student requested that Ultius
complete a literature review and produce a theoretical
framework for her dissertation. The order required the company
to find data on migration patterns and economic growth in
Jamaica, and to apply advanced economic theory. The company
did the work, but the customer was so displeased with it that she
filed a complaint with the Better Business Bureau. That
complaint details the case. Ultius considers customer service a
top priority, and despite 19 complaints in the past three years,
mainly minor beefs over papers and assignments, it maintains an
A+ rating from the BBB. The Ph.D. student threatened to go
public with her story, but more often it's the paid cheaters who
make threats. After Mr. Sambrano, the high-school guidance
specialist, transferred $500 to have the whole course at Arizona
State done for him, he stopped hearing from his Craigslist
cheater and filed a PayPal claim against him. The cheater
advised him to drop the claim or he'd hand over evidence of the
arrangement to the university. Mr. Sambrano, afraid he'd be
expelled, dropped the charge. He says he ended up doing the
class himself. In another case, if not for a cheater turning a
57. student in, a college may never have known that the student was
paying someone else to log in to the course and complete the
work. In May an undergraduate at Colorado State University-
Global Campus, dissatisfied with the quality of the work done
for him, filed a PayPal claim. Angered, the cheater gave the
student's name to the instructor, along with text messages,
screen shots of the student's portal, and payment records
detailing how the student had arranged to have the entire course
done for him, says Jon M. Bellum, the provost. CSU-Global, an
online institution with about 15,000 students, had its
information-technology department look at the IP addresses
used for the student's coursework and found more than one. Mr.
Bellum would not disclose the penalty the student faced, citing
privacy law, but says such abuses can result in expulsion. Often,
though, the university is not aware of the violation. Colleges
have tried technology to combat cheating. Several thousand
institutions around the world use the antiplagiarism software
Turnitin, which says it has a database of some 600 million
papers. But a recent study found that custom work is "virtually
undetectable." Coursera, an online education platform
employed by dozens of prominent colleges, uses webcams and
"keyboard dynamics," which attempt to verify students'
identities on the basis of their typing patterns. But that doesn't
do much good if the cheater is always typing. CSU-Global says
it spends about $60,000 a year administering random identity
checks on its students. The tests require them to provide
answers to personal questions like what banks service their
loans or what streets they've lived on. If they don't answer
accurately, they can't log in to their classes. About 2 percent of
identity checks result in students' getting locked out of the CSU
system. Other institutions have blocked access to sites that help
students cheat. Victor Valley College, in California, has
prevented anyone on a campus computer from accessing the
website of Student Network Resources. But students can turn to
their own laptops or other devices. The biggest key to fighting
the problem is faculty engagement, says Tricia Bertram Gallant,
58. a former president
of the International Center for Academic Integrity. She often
speaks with professors about the business, she says, and finds
them surprised that someone else could be doing students' work.
"When I tell them about contract cheating, they're shocked," she
says. "They basically say, 'What? That goes on?'[226 128 137 ]"
Others are in denial that it could happen in their classes. And
even those who know about it and want to stop it say they're too
busy, or feel that the fight is futile, with new cheating
companies popping up all the time. But some professors are
catching on. Last fall, Megan Elwood Madden, an associate
professor in the School of Geology and Geophysics at the
University of Oklahoma, spotted a suspicious passage in a
student's paper. She ran it through Turnitin, finding several
plagiarized sources but no match for the bulk of the text. So she
Googled the student's research topic and found the assignment
posted on Course Hero with the student's request for help. A
web search did not turn up the text the student had handed in,
because it was hidden in Course Hero's system. But once Ms.
Elwood Madden had logged in to the site, she could see
communication between the student and a contractor suggesting
that the student had had the work completed for him, the
professor said in an email. She discovered that the student had
used Course Hero to arrange work in at least four other classes
as well. The revelations led the university to expel the student.
Such stories are rare, academic-integrity officers say, because
there are so few would-be enforcers in pursuit. After The
Chronicle published an article about the Western Carolina
experiment, two federal law-enforcement officials contacted the
professors, eager to hear more about the business. William
Josephson, a former assistant attorney general in New York who
has investigated fraud, says companies that assume false
identities violate federal laws governing interstate commerce.
Laws in at least 17 states prohibit students from using cheating
services to complete their assignments. But prosecutors aren't
enforcing them. Faculty members on the front lines are no more
59. active. That's also true in other countries where the cheating
industry has developed. This spring, Marcus J. Ball, a higher-
education reformer in Britain, came across an advertisement for
academic cheating services on the wall of a London subway
station. The ad offended Mr. Ball, who began emailing college
administrators and professors, trying to persuade them to sign a
petition for the British government to debate the issue of
contract cheating. His goal was to create a "unified block" of
people willing to stand up to the cheating companies, with
hopes of taking the fight to Canada, the United States, and
elsewhere. In May, Mr. Ball contacted more than 250 college
officials, including academic-integrity leaders in several
countries. Only five responded. "Academics are constantly
complaining about the essay-mill problem," he said in the email.
But when presented with a "practical way forward to potentially
solve the problem, they don't engage." Last year, Ms. Bertram
Gallant, who is director of the academic-integrity office at the
University of California at San Diego, organized a dozen
international experts to study the growth of contract cheating
and how to stop it. The group laid out a series of big goals.
Chief among them: Mobilize faculty members and students to
demand laws making it more difficult for cheating companies to
operate. It is creating a tool kit to help professors detect and
prevent cheating. And it is organizing an international
awareness day to bring more attention to the problem. But the
group can only muster so much fight. "There's just not enough
of us who care," says Ms. Bertram Gallant. "It's a very small
cadre internationally who really dedicate our lives to working
on this issue, and that's just not enough people." College
leaders haven't helped, she says. Many have failed to make the
issue a priority. Few colleges have academic-integrity offices,
she says, or devote dollars to the problem.
"There is a lot of money to support these companies, but not a
lot of money to support our research," she says. "All the money
is going to the illegal part of the industry, and none of it is
going to combat the industry." Colleges also might need to
60. rethink their approach, says Ms. Bertram Gallant. As online
education continues to grow, and cheating companies have more
opportunities to infiltrate classes, institutions would do well to
enlist people with the skills to ferret out violations, she says.
While educators may be equipped to catch plagiarism, they
don't have the tools to track a paid cheater who is assuming
someone else's identity. Instead, colleges continue to rely on
proud traditions to fight the scourge of cheating. This fall, as
students return to campus, some colleges will require them to
sign an honor code. Others will spell out for them the potential
consequences of academic dishonesty. In October, academic-
integrity officials at the University of Oklahoma plan to hold a
session to warn new students about paper mills. The tool they're
using to combat cheating? Tea bags. To remind the students of
the importance of ethics, the university is encouraging them
have a cup of "integri-tea."