SlideShare a Scribd company logo
“Knowledge is Power”
“Knowledge is an important aspect
of human life that leads to activities
that contribute to one gaining
wealth, influence, and power.”
Question:
•How does information become
knowledge?
 “Knowledge is the appropriate
collection of information through
experience or education, which could
be useful in various situations.”
MEDIA AND INFORMATION LITERACY
(MIL)
Legal, Ethical, and Societal Issues in
Media and Information
Plagiarism
What is plagiarism?
Plagiarism
the act of using another person's words
or ideas without giving credit to that
person
http://www.merriam-webster.com/dictionary/plagiarism
The practice of taking someone else's
work or ideas and passing them off as
one's own.
https://en.oxforddictionaries.com/definition/plagiarism
a) Common Knowledge
• Facts that can be found in numerous places and
are likely to be widely known.
Example:
• Rodrigo Duterte was elected President of the Philippines in
2016.
This is generally known information.
You do not need to document this fact
b) Interpretation
• You must document facts that are not generally known,
or ideas that interpret facts.
Example:
• Michael Jordan is the greatest basketball player ever to have
played the game.
This idea is not a fact but an interpretation or an opinion. You
need to cite the source.
c) Quotation
• Using someone’s words directly. When you use a direct
quote, place the passage between quotation marks, and
document the source according to a standard
documenting style.
Example:
• According to John Smith in The New York Times, “37% of all
children under the age of 10 live below the poverty line”.
 You need to cite the source.
d) Paraphrase
• Using someone’s ideas, but rephrasing them in
your own words.
• Although you will use your own words to
paraphrase, you must still acknowledge and cite
the source of the information.
TYPES OF PLAGIARISM
L G B I R S A I G M A P
E T O A P O Y P H O C S
A T W T I R O S R E G S
H E
A T K A U P R B P O E C
P L
O A P I R D U E I A O S
S G
L I B N S O S E A R Z L
B I A
O F
T E T O O N T O E F R O
F T
G O N E
E A P I F S C E E C M T
R R
TYPES OF PLAGIARISM
Sources Not Cited
The Ghost Writer
The Photocopy
The Potluck Paper
The Poor Disguise
The Labor of Laziness
The Self-stealer
Sources Cited
The Forgotten Footnote
Misinformer
The Too-perfect Paraphrase
The Resourceful Citer
The Perfect crime
TYPES OF PLAGIARISM:
SOURCES NOT CITED
1. “The Ghost Writer”
The writer turns in
another’s work,
word-for-word, as his
or her own.
Source: http://rainbowriting.com/ghostwriter-resume/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
2. “The Photocopy”
 The writer copies
significant portions
of text straight from
a single source,
without alteration. Source:
http://indianexpress.com/article/opinion/columns/
photocopying-books-for-students-copyright-high-
court-3075857/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
3. “The Potluck Paper”
The writer copies from
several different
sources, tweaking the
sentences to make them
fit together while
retaining most of the
original phrasing.
Source:
http://www.laweekly.com/restaurants/10-
potluck-etiquette-rules-2374604
TYPES OF PLAGIARISM:
SOURCES NOT CITED
4. “The Poor Disguise”
The writer has
altered the paper’s
appearance slightly
by changing key
words and phrases.
Source:
https://www.amazon.com/Accoutremen
ts-Fuzzy-Glasses-Classic-
Disguise/dp/B000JNS2ZS
TYPES OF PLAGIARISM:
SOURCES NOT CITED
5. “The Labor of Laziness”
The writer takes the
time to paraphrase
most of the paper from
other sources and make
it all fit together. Source:
https://heartofashepherd.com/2015/07/06/proverbs-69-
11-failing-to-instill-a-daily-discipline-of-study-and-labor-
in-your-child-allows-the-laziness-of-a-sluggard-to-
become-a-predictable-path-to-poverty-and-sorrow-2/
TYPES OF PLAGIARISM:
SOURCES NOT CITED
6. “The Self-Stealer”
The writer
“borrows”
generously from his
or her previous
work.
Source: http://com1010.library.wayne.edu/
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED)
1. “The Forgotten Footnote”
 The writer mentions an
author’s name for a
source, but neglects to
include specific
information on the
location of the material
referenced. Source:
http://drennank.wonecks.net/2011/08/12/forg
ot-to-register/
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED)
2. “The Misinformer”
The writer provides
inaccurate information
regarding the sources,
making it impossible to
find them.
Source: https://itunes.apple.com/us/app/pinocchio-
for-ipad-iphone/id422133774?mt=8
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED)
3. “The Too-Perfect
Paraphrase”
The writer properly cites
a source, but neglects to
put in quotation marks
on text that has been
copied word-for-word,
or close to it. Source: http://www.webslaw.com/how-to-craft-
the-perfect-lawyer-bio.php
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED)
4. “The Resourceful Citer”
The writer properly cites all
sources, paraphrasing and
using quotations
appropriately. The catch?
The paper contains almost
no original work!
Source:
http://w
ww.free
pik.com/
free-
photo/y
oung-
man-
holding-
many-
books_8
57159.ht
m
TYPES OF PLAGIARISM:
SOURCES CITED (BUT STILL PLAGIARIZED)
5. “The Perfect Crime”
The writer properly
quotes and cites sources
in some places, but goes
on to paraphrase other
arguments from those
sources without
citation. Source:
http://www.manilaspeak.com/commentary
/plagiarism%E2%80%95an-academic-crime
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
Source: https://www.sagaftra.org/musicvideos
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
The following are considered plagiarism:
• Copying media (especially images) from other
websites to paste them into your own papers or
websites.
• Making a video using footage from others’ videos or
using copyrighted music as part of the soundtrack.
WHAT ABOUT IMAGES, VIDEOS, AND MUSIC?
Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
Without receiving proper permission or providing
appropriate citation, the following are considered
plagiarism:
• Performing another person’s copyrighted music (i.e.,
playing a cover).
• Composing a piece of music that borrows heavily
from another composition.
Formative Assessment: Recitation
Questions
1. Why does plagiarism
matter?
2. Why is it important to
understand the different
types of plagiarism?
Source: http://www.plagiarism.com/
Formative Assessment: Recitation
Questions
3. Why should you avoid
plagiarism?
4. How can you avoid
plagiarism?
Source: http://www.plagiarism.com/
References
•Media and Information Literacy (MIL) by Boots
Liquigan
•http://www.plagiarism.org/plagiarism-101/what-
is-plagiarism/
•http://www.plagiarism.org/assets/downloads/type
s_of_plagiarism.doc
•https://www.ox.ac.uk/students/academic/guidanc
e/skills/plagiarism?wssl=1
•https://www.youtube.com/watch?v=cRJL82uhwyU
Photo Credit
• http://rainbowriting.com/ghostwriter-resume/
• http://indianexpress.com/article/opinion/columns/photocopying
-books-for-students-copyright-high-court-3075857/
• http://www.laweekly.com/restaurants/10-potluck-etiquette-
rules-2374604
• https://www.amazon.com/Accoutrements-Fuzzy-Glasses-Classic-
Disguise/dp/B000JNS2ZS
• https://heartofashepherd.com/2015/07/06/proverbs-69-11-
failing-to-instill-a-daily-discipline-of-study-and-labor-in-your-
child-allows-the-laziness-of-a-sluggard-to-become-a-predictable-
path-to-poverty-and-sorrow-2/
Photo Credit
• http://com1010.library.wayne.edu/
• http://drennank.wonecks.net/2011/08/12/forgot-to-register/
• https://itunes.apple.com/us/app/pinocchio-for-ipad-
iphone/id422133774?mt=8
• http://www.webslaw.com/how-to-craft-the-perfect-lawyer-
bio.php
• http://www.manilaspeak.com/commentary/plagiarism%E2%80%
95an-academic-crime
• https://www.sagaftra.org/musicvideos
• http://www.plagiarism.com/

More Related Content

What's hot

EAPP LESSON 2.pptx
EAPP LESSON 2.pptxEAPP LESSON 2.pptx
EAPP LESSON 2.pptx
DIOMEDISPOLLESCAS
 
MIL LESSON 5.pptx
MIL LESSON 5.pptxMIL LESSON 5.pptx
MIL LESSON 5.pptx
NormanMisoles
 
mil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptxmil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptx
DesireTSamillano
 
CW Module 2 f.docx
CW Module 2 f.docxCW Module 2 f.docx
CW Module 2 f.docx
ElnevithDejarme1
 
Proseso sa Pagsulat ng Pananaliksik
Proseso sa Pagsulat ng PananaliksikProseso sa Pagsulat ng Pananaliksik
Proseso sa Pagsulat ng Pananaliksik
KokoStevan
 
4th Quarterly Exam-Final in Reading and Writing.docx
4th Quarterly Exam-Final in Reading and Writing.docx4th Quarterly Exam-Final in Reading and Writing.docx
4th Quarterly Exam-Final in Reading and Writing.docx
AMIHANGRANDE2
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
danielloberiz1
 
Reading and Writing - Cause and Effect
Reading and Writing - Cause and EffectReading and Writing - Cause and Effect
Reading and Writing - Cause and Effect
Juan Miguel Palero
 
MIL MODULE 03.pptx
MIL MODULE 03.pptxMIL MODULE 03.pptx
MIL MODULE 03.pptx
MICHELYNDEANNSALAZAR
 
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptxWeek 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
AntonetteAlbina3
 
Mga Kasanayan sa Mapanuring Pagbasa. pdf
Mga Kasanayan sa Mapanuring Pagbasa. pdfMga Kasanayan sa Mapanuring Pagbasa. pdf
Mga Kasanayan sa Mapanuring Pagbasa. pdf
Krystal Pearl Dela Cruz
 
DLL-NARATIBO.docx
DLL-NARATIBO.docxDLL-NARATIBO.docx
DLL-NARATIBO.docx
honeybelmonte
 
Introduction-to-Creative-Nonfiction-1.pptx
Introduction-to-Creative-Nonfiction-1.pptxIntroduction-to-Creative-Nonfiction-1.pptx
Introduction-to-Creative-Nonfiction-1.pptx
MELANYVENTURA4
 
Korespondensiya Opisyal.pptx
Korespondensiya Opisyal.pptxKorespondensiya Opisyal.pptx
Korespondensiya Opisyal.pptx
JoanMacaumbosTorrere
 
Etech ppt
Etech pptEtech ppt
Etech ppt
wendelpascua
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
Sue Barrett
 
Avoiding Plagiarism 1
Avoiding Plagiarism 1Avoiding Plagiarism 1
Avoiding Plagiarism 1
houxy
 
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptxLesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
CathApostol1
 
Imaginative vs. Technical Writing
Imaginative vs. Technical WritingImaginative vs. Technical Writing
Imaginative vs. Technical Writing
Andre Philip Tacderas
 
lakbaysanaysay.pptx
lakbaysanaysay.pptxlakbaysanaysay.pptx
lakbaysanaysay.pptx
ferdinandsanbuenaven
 

What's hot (20)

EAPP LESSON 2.pptx
EAPP LESSON 2.pptxEAPP LESSON 2.pptx
EAPP LESSON 2.pptx
 
MIL LESSON 5.pptx
MIL LESSON 5.pptxMIL LESSON 5.pptx
MIL LESSON 5.pptx
 
mil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptxmil 7 Demonstrate ethical use of information..pptx
mil 7 Demonstrate ethical use of information..pptx
 
CW Module 2 f.docx
CW Module 2 f.docxCW Module 2 f.docx
CW Module 2 f.docx
 
Proseso sa Pagsulat ng Pananaliksik
Proseso sa Pagsulat ng PananaliksikProseso sa Pagsulat ng Pananaliksik
Proseso sa Pagsulat ng Pananaliksik
 
4th Quarterly Exam-Final in Reading and Writing.docx
4th Quarterly Exam-Final in Reading and Writing.docx4th Quarterly Exam-Final in Reading and Writing.docx
4th Quarterly Exam-Final in Reading and Writing.docx
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
Reading and Writing - Cause and Effect
Reading and Writing - Cause and EffectReading and Writing - Cause and Effect
Reading and Writing - Cause and Effect
 
MIL MODULE 03.pptx
MIL MODULE 03.pptxMIL MODULE 03.pptx
MIL MODULE 03.pptx
 
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptxWeek 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
Week 5 Mga Kasanayan Sa Akademikong Pagbasa.pptx
 
Mga Kasanayan sa Mapanuring Pagbasa. pdf
Mga Kasanayan sa Mapanuring Pagbasa. pdfMga Kasanayan sa Mapanuring Pagbasa. pdf
Mga Kasanayan sa Mapanuring Pagbasa. pdf
 
DLL-NARATIBO.docx
DLL-NARATIBO.docxDLL-NARATIBO.docx
DLL-NARATIBO.docx
 
Introduction-to-Creative-Nonfiction-1.pptx
Introduction-to-Creative-Nonfiction-1.pptxIntroduction-to-Creative-Nonfiction-1.pptx
Introduction-to-Creative-Nonfiction-1.pptx
 
Korespondensiya Opisyal.pptx
Korespondensiya Opisyal.pptxKorespondensiya Opisyal.pptx
Korespondensiya Opisyal.pptx
 
Etech ppt
Etech pptEtech ppt
Etech ppt
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Avoiding Plagiarism 1
Avoiding Plagiarism 1Avoiding Plagiarism 1
Avoiding Plagiarism 1
 
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptxLesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
Lesson 7 VARIOUS KINDS OF CONCEPT PAPER.pptx
 
Imaginative vs. Technical Writing
Imaginative vs. Technical WritingImaginative vs. Technical Writing
Imaginative vs. Technical Writing
 
lakbaysanaysay.pptx
lakbaysanaysay.pptxlakbaysanaysay.pptx
lakbaysanaysay.pptx
 

Similar to PLAGIARISM - Media and Information Literacypptx

11 rm plagiarism
11 rm plagiarism11 rm plagiarism
11 rm plagiarism
SURENDRABABU BOYELLA
 
Plagiarism 4
Plagiarism 4Plagiarism 4
Plagiarism 4
guest8f83b1
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
Lahore American School
 
Plagiarism lecture
Plagiarism lecturePlagiarism lecture
Plagiarism lecture
wordsmithgz
 
Plagiarism Prevention Setting a Level Playing Field for Researchers
Plagiarism Prevention Setting a Level Playing Field for ResearchersPlagiarism Prevention Setting a Level Playing Field for Researchers
Plagiarism Prevention Setting a Level Playing Field for Researchers
Kenneth Pinto
 
Plagiarism ok to use this
Plagiarism ok to use thisPlagiarism ok to use this
Plagiarism ok to use this
Eric Strayer
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
zhian asaad
 
Plagiarism powerpoint
Plagiarism powerpointPlagiarism powerpoint
Plagiarism powerpoint
Gagandeep Singh
 
plagiarism power point.ppt
plagiarism power point.pptplagiarism power point.ppt
plagiarism power point.ppt
HalaAbdelgaffar
 
plagiarism_Giving credit where credit is due.ppt
plagiarism_Giving credit where credit is due.pptplagiarism_Giving credit where credit is due.ppt
plagiarism_Giving credit where credit is due.ppt
sonamgupta080319
 
Plagiarism concept
Plagiarism conceptPlagiarism concept
Plagiarism concept
Ankita Kunwar
 
TOPIC 3 PPT.pptx
TOPIC 3 PPT.pptxTOPIC 3 PPT.pptx
TOPIC 3 PPT.pptx
IvanhoeBalarote
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
Rebecca
 
Nagel- COMM 1110 Fall 2015 plagiarism
Nagel- COMM 1110 Fall 2015 plagiarismNagel- COMM 1110 Fall 2015 plagiarism
Nagel- COMM 1110 Fall 2015 plagiarism
Clayton State University Library
 
Research and plagiarism
Research and plagiarismResearch and plagiarism
Research and plagiarism
kdmitchell
 
plagiarism-hacking-software_piracy
plagiarism-hacking-software_piracyplagiarism-hacking-software_piracy
plagiarism-hacking-software_piracy
Abhishek Shukla
 
Www Essays.pdf
Www Essays.pdfWww Essays.pdf
Www Essays.pdf
Dawn Romero
 
Can you cut? Can you paste?
Can you cut? Can you paste?Can you cut? Can you paste?
Can you cut? Can you paste?
Kay Cunningham
 
RM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docxRM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docx
MehwishShabbir4
 
L cite your sources
L cite your sourcesL cite your sources
L cite your sources
Ms. D
 

Similar to PLAGIARISM - Media and Information Literacypptx (20)

11 rm plagiarism
11 rm plagiarism11 rm plagiarism
11 rm plagiarism
 
Plagiarism 4
Plagiarism 4Plagiarism 4
Plagiarism 4
 
Plagiarism Powerpoint
Plagiarism PowerpointPlagiarism Powerpoint
Plagiarism Powerpoint
 
Plagiarism lecture
Plagiarism lecturePlagiarism lecture
Plagiarism lecture
 
Plagiarism Prevention Setting a Level Playing Field for Researchers
Plagiarism Prevention Setting a Level Playing Field for ResearchersPlagiarism Prevention Setting a Level Playing Field for Researchers
Plagiarism Prevention Setting a Level Playing Field for Researchers
 
Plagiarism ok to use this
Plagiarism ok to use thisPlagiarism ok to use this
Plagiarism ok to use this
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism powerpoint
Plagiarism powerpointPlagiarism powerpoint
Plagiarism powerpoint
 
plagiarism power point.ppt
plagiarism power point.pptplagiarism power point.ppt
plagiarism power point.ppt
 
plagiarism_Giving credit where credit is due.ppt
plagiarism_Giving credit where credit is due.pptplagiarism_Giving credit where credit is due.ppt
plagiarism_Giving credit where credit is due.ppt
 
Plagiarism concept
Plagiarism conceptPlagiarism concept
Plagiarism concept
 
TOPIC 3 PPT.pptx
TOPIC 3 PPT.pptxTOPIC 3 PPT.pptx
TOPIC 3 PPT.pptx
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Nagel- COMM 1110 Fall 2015 plagiarism
Nagel- COMM 1110 Fall 2015 plagiarismNagel- COMM 1110 Fall 2015 plagiarism
Nagel- COMM 1110 Fall 2015 plagiarism
 
Research and plagiarism
Research and plagiarismResearch and plagiarism
Research and plagiarism
 
plagiarism-hacking-software_piracy
plagiarism-hacking-software_piracyplagiarism-hacking-software_piracy
plagiarism-hacking-software_piracy
 
Www Essays.pdf
Www Essays.pdfWww Essays.pdf
Www Essays.pdf
 
Can you cut? Can you paste?
Can you cut? Can you paste?Can you cut? Can you paste?
Can you cut? Can you paste?
 
RM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docxRM Q1_Q15_Q16_Q17.docx
RM Q1_Q15_Q16_Q17.docx
 
L cite your sources
L cite your sourcesL cite your sources
L cite your sources
 

Recently uploaded

The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
2 December UAE National Day - United Arab Emirates
2 December UAE National Day - United Arab Emirates2 December UAE National Day - United Arab Emirates
2 December UAE National Day - United Arab Emirates
UAE Ppt
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
Raheem Muhammad
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
kekzed
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
RIDHIMAGARG21
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
Claudio Gallicchio
 
Genesis chapter 3 Isaiah Scudder.pptx
Genesis    chapter 3 Isaiah Scudder.pptxGenesis    chapter 3 Isaiah Scudder.pptx
Genesis chapter 3 Isaiah Scudder.pptx
FamilyWorshipCenterD
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
Prsentation for VIVA Welike project 1semester.pptx
Prsentation for VIVA Welike project 1semester.pptxPrsentation for VIVA Welike project 1semester.pptx
Prsentation for VIVA Welike project 1semester.pptx
prafulpawar29
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPEACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
Charmi13
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
Ben Linders
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
gfysze
 
Legislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptxLegislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptx
Charmi13
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
SkillCertProExams
 

Recently uploaded (19)

The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
2 December UAE National Day - United Arab Emirates
2 December UAE National Day - United Arab Emirates2 December UAE National Day - United Arab Emirates
2 December UAE National Day - United Arab Emirates
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
 
Genesis chapter 3 Isaiah Scudder.pptx
Genesis    chapter 3 Isaiah Scudder.pptxGenesis    chapter 3 Isaiah Scudder.pptx
Genesis chapter 3 Isaiah Scudder.pptx
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
Prsentation for VIVA Welike project 1semester.pptx
Prsentation for VIVA Welike project 1semester.pptxPrsentation for VIVA Welike project 1semester.pptx
Prsentation for VIVA Welike project 1semester.pptx
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPEACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
ACTIVE IMPLANTABLE MEDICAL DEVICE IN EUROPE
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
一比一原版(unc毕业证书)美国北卡罗来纳大学教堂山分校毕业证如何办理
 
Legislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptxLegislation And Regulations For Import, Manufacture,.pptx
Legislation And Regulations For Import, Manufacture,.pptx
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
 

PLAGIARISM - Media and Information Literacypptx

  • 1. “Knowledge is Power” “Knowledge is an important aspect of human life that leads to activities that contribute to one gaining wealth, influence, and power.”
  • 2. Question: •How does information become knowledge?  “Knowledge is the appropriate collection of information through experience or education, which could be useful in various situations.”
  • 3. MEDIA AND INFORMATION LITERACY (MIL) Legal, Ethical, and Societal Issues in Media and Information Plagiarism
  • 4. What is plagiarism? Plagiarism the act of using another person's words or ideas without giving credit to that person http://www.merriam-webster.com/dictionary/plagiarism The practice of taking someone else's work or ideas and passing them off as one's own. https://en.oxforddictionaries.com/definition/plagiarism
  • 5. a) Common Knowledge • Facts that can be found in numerous places and are likely to be widely known. Example: • Rodrigo Duterte was elected President of the Philippines in 2016. This is generally known information. You do not need to document this fact
  • 6. b) Interpretation • You must document facts that are not generally known, or ideas that interpret facts. Example: • Michael Jordan is the greatest basketball player ever to have played the game. This idea is not a fact but an interpretation or an opinion. You need to cite the source.
  • 7. c) Quotation • Using someone’s words directly. When you use a direct quote, place the passage between quotation marks, and document the source according to a standard documenting style. Example: • According to John Smith in The New York Times, “37% of all children under the age of 10 live below the poverty line”.  You need to cite the source.
  • 8. d) Paraphrase • Using someone’s ideas, but rephrasing them in your own words. • Although you will use your own words to paraphrase, you must still acknowledge and cite the source of the information.
  • 10. L G B I R S A I G M A P
  • 11. E T O A P O Y P H O C S
  • 12. A T W T I R O S R E G S H E
  • 13. A T K A U P R B P O E C P L
  • 14. O A P I R D U E I A O S S G
  • 15. L I B N S O S E A R Z L B I A O F
  • 16. T E T O O N T O E F R O F T G O N E
  • 17. E A P I F S C E E C M T R R
  • 18. TYPES OF PLAGIARISM Sources Not Cited The Ghost Writer The Photocopy The Potluck Paper The Poor Disguise The Labor of Laziness The Self-stealer Sources Cited The Forgotten Footnote Misinformer The Too-perfect Paraphrase The Resourceful Citer The Perfect crime
  • 19.
  • 20. TYPES OF PLAGIARISM: SOURCES NOT CITED 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: http://rainbowriting.com/ghostwriter-resume/
  • 21. TYPES OF PLAGIARISM: SOURCES NOT CITED 2. “The Photocopy”  The writer copies significant portions of text straight from a single source, without alteration. Source: http://indianexpress.com/article/opinion/columns/ photocopying-books-for-students-copyright-high- court-3075857/
  • 22. TYPES OF PLAGIARISM: SOURCES NOT CITED 3. “The Potluck Paper” The writer copies from several different sources, tweaking the sentences to make them fit together while retaining most of the original phrasing. Source: http://www.laweekly.com/restaurants/10- potluck-etiquette-rules-2374604
  • 23. TYPES OF PLAGIARISM: SOURCES NOT CITED 4. “The Poor Disguise” The writer has altered the paper’s appearance slightly by changing key words and phrases. Source: https://www.amazon.com/Accoutremen ts-Fuzzy-Glasses-Classic- Disguise/dp/B000JNS2ZS
  • 24. TYPES OF PLAGIARISM: SOURCES NOT CITED 5. “The Labor of Laziness” The writer takes the time to paraphrase most of the paper from other sources and make it all fit together. Source: https://heartofashepherd.com/2015/07/06/proverbs-69- 11-failing-to-instill-a-daily-discipline-of-study-and-labor- in-your-child-allows-the-laziness-of-a-sluggard-to- become-a-predictable-path-to-poverty-and-sorrow-2/
  • 25. TYPES OF PLAGIARISM: SOURCES NOT CITED 6. “The Self-Stealer” The writer “borrows” generously from his or her previous work. Source: http://com1010.library.wayne.edu/
  • 26. TYPES OF PLAGIARISM: SOURCES CITED (BUT STILL PLAGIARIZED) 1. “The Forgotten Footnote”  The writer mentions an author’s name for a source, but neglects to include specific information on the location of the material referenced. Source: http://drennank.wonecks.net/2011/08/12/forg ot-to-register/
  • 27. TYPES OF PLAGIARISM: SOURCES CITED (BUT STILL PLAGIARIZED) 2. “The Misinformer” The writer provides inaccurate information regarding the sources, making it impossible to find them. Source: https://itunes.apple.com/us/app/pinocchio- for-ipad-iphone/id422133774?mt=8
  • 28. TYPES OF PLAGIARISM: SOURCES CITED (BUT STILL PLAGIARIZED) 3. “The Too-Perfect Paraphrase” The writer properly cites a source, but neglects to put in quotation marks on text that has been copied word-for-word, or close to it. Source: http://www.webslaw.com/how-to-craft- the-perfect-lawyer-bio.php
  • 29. TYPES OF PLAGIARISM: SOURCES CITED (BUT STILL PLAGIARIZED) 4. “The Resourceful Citer” The writer properly cites all sources, paraphrasing and using quotations appropriately. The catch? The paper contains almost no original work! Source: http://w ww.free pik.com/ free- photo/y oung- man- holding- many- books_8 57159.ht m
  • 30. TYPES OF PLAGIARISM: SOURCES CITED (BUT STILL PLAGIARIZED) 5. “The Perfect Crime” The writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation. Source: http://www.manilaspeak.com/commentary /plagiarism%E2%80%95an-academic-crime
  • 31. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/ Source: https://www.sagaftra.org/musicvideos
  • 32. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/ The following are considered plagiarism: • Copying media (especially images) from other websites to paste them into your own papers or websites. • Making a video using footage from others’ videos or using copyrighted music as part of the soundtrack.
  • 33. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/ Without receiving proper permission or providing appropriate citation, the following are considered plagiarism: • Performing another person’s copyrighted music (i.e., playing a cover). • Composing a piece of music that borrows heavily from another composition.
  • 34. Formative Assessment: Recitation Questions 1. Why does plagiarism matter? 2. Why is it important to understand the different types of plagiarism? Source: http://www.plagiarism.com/
  • 35. Formative Assessment: Recitation Questions 3. Why should you avoid plagiarism? 4. How can you avoid plagiarism? Source: http://www.plagiarism.com/
  • 36. References •Media and Information Literacy (MIL) by Boots Liquigan •http://www.plagiarism.org/plagiarism-101/what- is-plagiarism/ •http://www.plagiarism.org/assets/downloads/type s_of_plagiarism.doc •https://www.ox.ac.uk/students/academic/guidanc e/skills/plagiarism?wssl=1 •https://www.youtube.com/watch?v=cRJL82uhwyU
  • 37. Photo Credit • http://rainbowriting.com/ghostwriter-resume/ • http://indianexpress.com/article/opinion/columns/photocopying -books-for-students-copyright-high-court-3075857/ • http://www.laweekly.com/restaurants/10-potluck-etiquette- rules-2374604 • https://www.amazon.com/Accoutrements-Fuzzy-Glasses-Classic- Disguise/dp/B000JNS2ZS • https://heartofashepherd.com/2015/07/06/proverbs-69-11- failing-to-instill-a-daily-discipline-of-study-and-labor-in-your- child-allows-the-laziness-of-a-sluggard-to-become-a-predictable- path-to-poverty-and-sorrow-2/
  • 38. Photo Credit • http://com1010.library.wayne.edu/ • http://drennank.wonecks.net/2011/08/12/forgot-to-register/ • https://itunes.apple.com/us/app/pinocchio-for-ipad- iphone/id422133774?mt=8 • http://www.webslaw.com/how-to-craft-the-perfect-lawyer- bio.php • http://www.manilaspeak.com/commentary/plagiarism%E2%80% 95an-academic-crime • https://www.sagaftra.org/musicvideos • http://www.plagiarism.com/

Editor's Notes

  1. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  2. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  3. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  4. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  5. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  6. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  7. Types of Plagiarism Anyone who has written or graded a paper knows that plagiarism is not always a black-and-white issue. The boundary between plagiarism and research is often unclear. Learning to recognize the various forms of plagiarism, especially the ambiguous ones, is an important step in the fight to prevent it. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  8. PLAGIARSIM
  9. PHOTOCOPY
  10. GHOST
  11. POTLUCK
  12. POOR
  13. LABOR
  14. FORGOTTEN
  15. CRIME
  16. Types of Plagiarism Anyone who has written or graded a paper knows that plagiarism is not always a black-and-white issue. The boundary between plagiarism and research is often unclear. Learning to recognize the various forms of plagiarism, especially the more ambiguous ones, is an important step in the fight to prevent it. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  17. 1. “The Ghost Writer” The writer turns in another’s work, word-for-word, as his or her own. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  18. 2. “The Photocopy” The writer copies significant portions of text straight from a single source, without alteration. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  19. 3. “The Potluck Paper” The writer tries to disguise plagiarism by copying from several different sources, tweaking the sentences to make them fit together while retaining most of the original phrasing. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  20. 4. “The Poor Disguise” Although the writer has retained the essential content of the source, he or she has altered the paper’s appearance slightly by changing key words and phrases. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  21. 5. “The Labor of Laziness” The writer takes the time to paraphrase most of the paper from other sources and make it all fit together, instead of spending the same effort on original work. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  22. 6. “The Self-Stealer” The writer “borrows” generously from his or her previous work, violating policies concerning the expectation of originality adopted by most academic institutions. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  23. 1. “The Forgotten Footnote” The writer mentions an author’s name for a source, but neglects to include specific information on the location of the material referenced. This often masks other forms of plagiarism by obscuring source locations. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  24. 2. “The Misinformer” The writer provides inaccurate information regarding the sources, making it impossible to find them. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  25. 3. “The Too-Perfect Paraphrase” The writer properly cites a source, but neglects to put in quotation marks text that has been copied word-for-word, or close to it. Although attributing the basic ideas to the source, the writer is falsely claiming original presentation and interpretation of the information. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  26. 4. “The Resourceful Citer” The writer properly cites all sources, paraphrasing and using quotations appropriately. The catch? The paper contains almost no original work! It is sometimes difficult to spot this form of plagiarism because it looks like any other well-researched document. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  27. 5. “The Perfect Crime” Well, we all know it doesn’t exist. In this case, the writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation. This way, the writer tries to pass off the paraphrased material as his or her own analysis of the cited material. Source: www.plagiarism.org/assets/downloads/types_of_plagiarism.doc
  28. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Using an image, video or piece of music in a work you have produced without receiving proper permission or providing appropriate citation is plagiarism. The following activities are very common in today’s society. Despite their popularity, they still count as plagiarism. -Copying media (especially images) from other websites to paste them into your own papers or websites. -Making a video using footage from others’ videos or using copyrighted music as part of the soundtrack. -Performing another person’s copyrighted music (i.e., playing a cover). -Composing a piece of music that borrows heavily from another composition. Certainly, these media pose situations in which it can be challenging to determine whether or not the copyrights of a work are being violated. For example: -A photograph or scan of a copyrighted image (for example: using a photograph of a book cover to represent that book on one’s website) -Recording audio or video in which copyrighted music or video is playing in the background. -Re-creating a visual work in the same medium. (for example: shooting a photograph that uses the same composition and subject matter as someone else’s photograph) -Re-creating a visual work in a different medium (for example: making a painting that closely resembles another person’s photograph). -Re-mixing or altering copyrighted images, video or audio, even if done so in an original way. The legality of these situations, and others, would be dependent upon the intent and context within which they are produced. The two safest approaches to take in regards to these situations is: 1) Avoid them altogether or 2) Confirm the works’ usage permissions and cite them properly. Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
  29. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Using an image, video or piece of music in a work you have produced without receiving proper permission or providing appropriate citation is plagiarism. The following activities are very common in today’s society. Despite their popularity, they still count as plagiarism. -Copying media (especially images) from other websites to paste them into your own papers or websites. -Making a video using footage from others’ videos or using copyrighted music as part of the soundtrack. -Performing another person’s copyrighted music (i.e., playing a cover). -Composing a piece of music that borrows heavily from another composition. Certainly, these media pose situations in which it can be challenging to determine whether or not the copyrights of a work are being violated. For example: -A photograph or scan of a copyrighted image (for example: using a photograph of a book cover to represent that book on one’s website) -Recording audio or video in which copyrighted music or video is playing in the background. -Re-creating a visual work in the same medium. (for example: shooting a photograph that uses the same composition and subject matter as someone else’s photograph) -Re-creating a visual work in a different medium (for example: making a painting that closely resembles another person’s photograph). -Re-mixing or altering copyrighted images, video or audio, even if done so in an original way. The legality of these situations, and others, would be dependent upon the intent and context within which they are produced. The two safest approaches to take in regards to these situations is: 1) Avoid them altogether or 2) Confirm the works’ usage permissions and cite them properly. Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
  30. WHAT ABOUT IMAGES, VIDEOS, AND MUSIC? Using an image, video or piece of music in a work you have produced without receiving proper permission or providing appropriate citation is plagiarism. The following activities are very common in today’s society. Despite their popularity, they still count as plagiarism. -Copying media (especially images) from other websites to paste them into your own papers or websites. -Making a video using footage from others’ videos or using copyrighted music as part of the soundtrack. -Performing another person’s copyrighted music (i.e., playing a cover). -Composing a piece of music that borrows heavily from another composition. Certainly, these media pose situations in which it can be challenging to determine whether or not the copyrights of a work are being violated. For example: -A photograph or scan of a copyrighted image (for example: using a photograph of a book cover to represent that book on one’s website) -Recording audio or video in which copyrighted music or video is playing in the background. -Re-creating a visual work in the same medium. (for example: shooting a photograph that uses the same composition and subject matter as someone else’s photograph) -Re-creating a visual work in a different medium (for example: making a painting that closely resembles another person’s photograph). -Re-mixing or altering copyrighted images, video or audio, even if done so in an original way. The legality of these situations, and others, would be dependent upon the intent and context within which they are produced. The two safest approaches to take in regards to these situations is: 1) Avoid them altogether or 2) Confirm the works’ usage permissions and cite them properly. Source: http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/
  31. Why does plagiarism matter? Plagiarism is a breach of academic integrity. It is a principle of intellectual honesty that all members of the academic community should acknowledge their debt to the originators of the ideas, words, and data which form the basis for their own work. Passing off another’s work as your own is not only poor scholarship, but also means that you have failed to complete the learning process. Plagiarism is unethical and can have serious consequences for your future career; it also undermines the standards of your institution and of the degrees it issues. (Source: https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism?wssl=1)
  32. Why does plagiarism matter? Plagiarism is a breach of academic integrity. It is a principle of intellectual honesty that all members of the academic community should acknowledge their debt to the originators of the ideas, words, and data which form the basis for their own work. Passing off another’s work as your own is not only poor scholarship, but also means that you have failed to complete the learning process. Plagiarism is unethical and can have serious consequences for your future career; it also undermines the standards of your institution and of the degrees it issues. (Source: https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism?wssl=1)