You are on page 1of 18

Submitted by: Arshiya Zahid

Roll number: 19
Subject: Computer Skills
Term paper on: Plagiarism
Submitted to: Maam kiran Shahzad



Context

1: plagiarism meaning 3
2: Word origin 3
3: definitions 3
4: history of plagiarism 3
5: types of plagiarism 4
6: five common types of plagiarism 5
7: 3 great men who built their careers on plagiarism 6
8: Plagiarism detection 7
9: Plagiarism detection history 7
10: software assisted detection 8
11: factors of plagiarism detection 11
12: Non exhaustive system 12
13: Source code detection system 12
14: plagiarism detection tools 13
15: How to avoid plagiarism 15
16: Consequences of plagiarism 16
17: conclusion on plagiarism 17
18: references 18




THE PLAGI ARI SM



Plagiarism meaning:
The practice of taking someone else's work or ideas and passing them off as one's own.
"There were accusations of plagiarism"
Word origin:
The word plagiarism is derived from the Latin word plagiaries, which means to kidnap or
abduct. The word began to be used in the English language sometime during the 1600s.
Definitions of plagiarism:
1: Plagiarism is passing off someone elses work, whether intentionally or
unintentionally, as your own for your own benefit. (Carroll: 2002:9)
2: defined as the use of any source, published or unpublished, without proper
acknowledgment. (Princeton)
3: Plagiarism is considered academic dishonesty and a breach of journalistic ethics. It is
subject to sanctions like expulsion. (Wikipedia)
History of plagiarism
Plagiarism is a very ancient art. Shakespeare stole most of his historical plots directly
from Holinshed. Laurence Sterne and Samuel Taylor Coleridge were both accused of
plagiarism. Oscar Wilde was repeatedly accused of plagiarism. Martin Luther King
plagiarized of his doctoral thesis. George Harrison was successfully sued for
plagiarizing the Chiffons' He's So Fine for My Sweet Lord. Alex Haley copied large
passages of his novel Roots from The African by Harold Courlander. Princess Michael
was accused of plagiarism over her book on royal brides. Jayson Blair, then a reporter
for the New York Times, plagiarized many articles and faked quotes. The first English
copyright law was passed in 1709. It had as much to do with protecting the rights of
publishers against book piracy. The United States refused to give any protection to
foreign authors and publishers until 1891 and didnt sign on to the Berne Convention
until 1988.
CATEGORI ES OF PLAGI ARI SM

Unintentional Plagiarism:
Paraphrasing poorly: changing a few words without changing the sentence structure
of the original, or changing the sentence structure but not the words.
Quoting poorly: putting quotation marks around part of a quotation but not around all
of it, or putting quotation marks around a passage that is partly paraphrased and partly
quoted.
Citing poorly: Omitting an occasional citation or citing inaccurately.



Intentional Plagiarism
Passing off as ones own pre-written papers from the Internet or other sources.
Copying an essay or article from the Internet, on-line source, or electronic database
without quoting or giving credit.
Cutting and pasting from more than one source to create a paper without quoting or
giving credit.
Borrowing words or ideas from other students or sources without giving credit.
FI VE COMMEN
TYPES OF
PLAGI ARI SM



1. "Copy & Paste Plagiarism"
"Any time you lift a sentence or significant phrase intact from a
source, you must use quotations marks and reference the
source."

2. "Word Switch Plagiarism"
If you take a sentence from a source and change around a few words, it is still
plagiarism. If you want to quote a sentence, then you need to put it in quotation marks
and cite the author and article. IN many cases, paraphrasing and then citing the original
sources is a better option.
3. "Style Plagiarism"
"When you follow a Source Article sentence-by-sentence or paragraph-by-paragraph, it
is plagiarism, even though none of your sentences are exactly like those in the source
article or even in the same order. What you are copying in this case is the author's
reasoning style."
4. "Metaphor Plagiarism"
"Metaphors are used either to make an idea clearer or give the reader an analogy that
touches the senses or emotions better than a plain description of the object or process.
Metaphors, then, are an important part of an author's creative style. If you cannot come
up with your own metaphor to illustrate an important idea, then use the metaphor in the
Source Article, but give the author credit for it."


5. Self-Plagiarism:
Self-plagiarism occurs when a student submits his or her own previous work, or mixes
parts of previous works, without permission from all professors involved. For example,
Self-plagiarism applies to submitting the same piece of work for assignments in different
classes without previous permission from both professors.
3 GREAT MEN WHO BUI LT THEI R CAREERS ON
PLAGI ARI SM

#1:Stephen Ambrose
Ambrose invented pop history. He was the historical advisor on Saving Private
Ryan and wrote the book Band of Brothers, Space. Ambrose
also wrote award-winning biographies on Presidents
Eisenhower and Nixon. He was a plagiarizing butthole.


#2.T.S. Eliot:
T.S. Eliot wrote several great, enduring poems, such as "The Love Song of J. Alfred
Prufrock" which had a ridiculous title, and "The Hollow Men," which, we were depressed
to discover, wasn't about a naked, invisible, murdering lunatic. He was also a
plagiarizing butthole.





#3.Dr. Martin Luther King Jr.:
We're not saying that King wasn't an incredible person who
did more to advance the human race than most of us can
ever hope to do. He was also a plagiarizing butthole.

.
PLAGI ARI SM DETECTI ON
Plagiarism detection is the process of locating instances of plagiarism within a work or
document. The widespread use of computers and the advent of the Internet has made it
easier to plagiarize the work of others. Most cases of plagiarism are found in academia,
where documents are typically essays or reports.
Detection of plagiarism can be either manual or software-assisted. Manual detection
requires substantial effort and excellent memory, and is impractical in cases where too
many documents must be compared, or original documents are not available for
comparison. Software-assisted detection allows vast collections of documents to be
compared to each other, making successful detection much more likely.
History of plagiarism detection
The earliest automatic plagiarism detectors used Halsteads software science metrics to
determine the Level of similarity between program pairs. The specic Quantities
suggested by Hallstead were:
1 = number of unique operators
2 = number of unique operands
N1 = number of operator occurrences
N2 = number of operand occurrences
These four metrics were employed by ottenstein in the rst automated plagiarism
detection system that we have found in the literature. IN this system, pairs of Programs
with identical values for each of 1, 2, n1 and n2 are assumed to be similar and
therefore deserving closer inspection. The systems which followed experimented with
these, and other metrics such as the number of loops and the number of procedures, to
nd more accurate measures of similarity between pairs of programs (berghel and
sallach ;grier; rinewalt;elizandro atcal.colectively,these have been called attribute
counting metric system became quite complex.

Software-assisted detection

Computer-assisted plagiarism detection (CaPD) is an Information retrieval (IR) task
supported by specialized IR systems, referred to as plagiarism detection systems
(PDS).



In text documents:
Systems for text-plagiarism detection implement one of two generic detection
approaches, one being external, the other being intrinsic. External detection systems
compare a suspicious document with a reference collection, which is a set of
documents assumed to be genuine. Based on a chosen document model and
predefined similarity criteria, the detection task is to retrieve all documents that contain
text that is similar to a degree above a chosen threshold to text in the suspicious
document. Intrinsic PDS solely analyze the text to be evaluated without performing
comparisons to external documents. This approach aims to recognize changes in the
unique writing style of an author as an indicator for potential plagiarism. PDS are not
capable of reliably identifying plagiarism without human judgment. Similarities are
computed with the help of predefined document models and might represent false
positives.
Approaches:
The figure below represents a classification of all detection approaches currently in use
for computer-assisted plagiarism detection. The approaches are characterized by the
type of similarity assessment they undertake: global or local. Global similarity
assessment approaches use the characteristics taken from larger parts of the text or the
document as a whole to compute similarity, while local methods only examine pre-
selected text segments as input.



1: Fingerprinting:
Fingerprinting is currently the most widely applied approach to plagiarism detection.
This method forms representative digests of documents by
selecting a set of multiple substrings .from them. The sets
represent the fingerprints and their elements are called
minutiae A suspicious document is checked for plagiarism by
computing its fingerprint and querying minutiae with a
precompiled index of fingerprints for all documents of a
reference collection. Minutiae matching with those of other
documents indicate shared text segments and suggest
potential plagiarism if they exceed a chosen similarity
threshold. Computational resources and time are limiting
factors to fingerprinting, which is why this method typically only compares a subset of
minutiae to speed up the computation and allow for checks in very large collection, such
as the Internet.
2: String matching:
String matching is a prevalent approach used in computer science. When applied to the
problem of plagiarism detection, documents are compared for verbatim text overlaps.
Numerous methods have been proposed to tackle this task, of which some have been
adapted to external plagiarism detection. Checking a suspicious document in this
setting requires the computation and storage of efficiently comparable representations
for all documents in the reference collection to compare them pairwise. Generally, suffix
document models, such as suffix trees or suffix vectors, have been used for this task.
Nonetheless, substring matching remains computationally expensive, which makes it a
non-viable solution for checking large collections of documents.
3: Bag of words:
Bag of words analysis represent the adoption of vector space retrieval, a traditional IR
concept, to the domain of plagiarism detection. Documents are represented as one or
multiple vectors, e.g. for different document parts, which are used for pair wise similarity
computations. Similarity computation may then rely on the traditional cosine similarity
measure, or on more sophisticated similarity measures.

4: Citation analysis:
Citation-based plagiarism detection relies on citation analysis, and is the only approach
to plagiarism detection that does not rely on the textual similarity. CbPD examines the
citation and reference information in texts to identify similar patterns in the citation
sequences. As such, this approach is suitable for scientific texts, or other academic
documents that contain citations. Citation analysis to detect plagiarism is a relatively
young concept. It has not been adopted by commercial software, but a first prototype of
a citation-based plagiarism detection system exists.
]
Similar order and proximity of
citations in the examined documents are the main criteria used to compute citation
pattern similarities. Citation patterns represent subsequences non-exclusively
containing citations shared by the documents compared. Factors, including the absolute
number or relative fraction of shared citations in the pattern, as well as the probability
that citations co-occur in a document are also considered to quantify the patterns
degree of similarity.
5: Stylometry:
Stylometry subsumes statistical methods for quantifying an authors unique writing
style and is mainly used for authorship attribution or intrinsic CaPD. By constructing and
comparing stylometric models for different text segments, passages that are stylistically
different from others, hence potentially plagiarized, can be detected.
Performance:
Comparative evaluations of plagiarism detection systems

indicate that their performance
depends on the type of plagiarism present (see figure). Except for citation pattern
analysis, all detection approaches rely on textual similarity. It is therefore symptomatic
that detection accuracy decreases the more plagiarism cases are obfuscated.














Factors of plagiarism Software
The design of plagiarism detection software for use with text documents is
characterized by a number of factor


Factor Description and alternatives
Scope of search
In the public internet, using search engines / Institutional databases /
Local, system-specific database.
Analysis time
Delay between the time a document is submitted and the time when
results are made available.
Document
capacity / Batch
processing
Number of documents the system can process per unit of time.
Check intensity
How often and for which types of document fragments (paragraphs,
sentences, fixed-length word sequences) does the system query
external resources, such as search engines.
Comparison
algorithm type
The algorithms that define the way the system uses to compare
documents against each other
Precision and
Recall
Number of documents correctly flagged as plagiarized compared to
the total number of flagged documents, and to the total number of
documents that were actually plagiarized. High precision means that
few false positives were found, and high recall means that few false
negatives were left undetected.







Non exhaustive system
The following systems are mostly web-based, and are closed-source, with the
exception of CitePlag and Copy tack. The following list is non-exhaustive:
Free
Chimpsky
CitePlag
CopyTracker
eTBLAST
Plagium
SeeSources
The Plagiarism Checker
Commercial
Attributor
Copy scape
Plag Tracker
Iparadigms: Ithenticate, Turnitin
Plagiarism Detect
PlagScan
VeriGuide



The source code detection system
Plagiarism in computer source code is also frequent, and requires different tools than
those used for text comparisons in document. Significant research has been dedicated
to academic source-code plagiarism.
A distinctive aspect of source-code plagiarism is that there are no essay mills, such as
can be found in traditional plagiarism. Since most programming assignments expect
students to write programs with very specific requirements, it is very difficult to find
existing programs that already meet them. Since integrating external code is often
harder than writing it from scratch, most plagiarizing students choose to do so from their
peers.
According to Roy and Cody,

source-code similarity
detection algorithms can be classified as based on
either
Strings look for exact textual matches of
segments, for instance five-word runs. Fast, but
can be confused by renaming identifiers.
Tokens as with strings, but using a lexer to convert the program
into tokens first. This discards whitespace, comments, and identifier names,
making the system more robust to simple text replacements. Most academic
plagiarism detection systems work at this level, using different algorithms to
measure the similarity between token sequences.
Parse Trees build and compare parse trees. This allows higher-level similarities
to be detected. For instance, tree comparison can normalize conditional
statements, and detect equivalent constructs as similar to each other.
Program Dependency Graphs (PDGs) a PDG captures the actual flow of
control in a program, and allows much higher-level equivalences to be located, at
a greater expense in complexity and calculation time.
Metrics metrics capture 'scores' of code segments according to certain criteria;
for instance, "the number of loops and conditionals", or "the number of different
variables used". Metrics are simple to calculate and can be compared quickly,
but can also lead to false positives: two fragments with the same scores on a set
of metrics may do entirely different things.
Hybrid approaches for instance, parse trees + suffix trees can combine the
detection capability of parse trees with the speed afforded by suffix trees, a type
of string-matching data structure.

PLAGI ARI SM DETECTI ON TOOLS


Institutional
Software/programmes

Ithenticate Ithenticate is the anti-plagiarism detection
software for the corporate market. It combats the
piracy of intellectual property by checking the
originality of written work.
http://www.ithenticate.com/static/home.html
JISC Plagiarism
Advisory Service
The Plagiarism Advisory Service promotes an
holistic approach to plagiarism prevention. This
involves pedagogical practices and institutional
policies and procedures. In addition, it provides
an online plagiarism detection service in which
submitted work can be checked against the
materials in the Tuitions database and matches
are highlighted in a colour coded originality report
with a link to sources.
http://www.jiscpas.ac.uk/

Moss Moss (for a Measure Of Software Similarity) is an
automatic system for determining the similarity of
C, C++, Java, Pascal, Ada, ML, Lisp, or Scheme
programs. It is an Internet service used for
detecting plagiarism in programming classes.
Moss can run on Unix or Windows systems.
http://www.cs.berkeley.edu/%7Eaiken/moss.html
MyDropBox.com MyDropBox offers a suite of programmes for
plagiarism prevention,; peer review of papers; an
online learning environment that enables instructors
to manage online assessments and mark papers
online (on the Web).
http://www.mydropbox.com/

Individual
Software/programmes

Copy Catch Gold Copy Catch Gold plagiarism detection software is
available on the Managed Windows Service
(MWS). It can be used to detect collusion and
plagiarism in electronically submitted material.
Copy Catch can easily compare files from a whole tutor
or year group and show the level of content overlap.
http://www.liv.ac.uk/csd/software/plagiarism/copycatch/
Essay Verification
Engine (EVE2)
Download software which checks text for matches.
http://www.canexus.com/

Glatt Software for detecting plagiarism in text.
http://www.plagiarism.com/
Plagiarism Finder Plagiarism-Finder is a Windows application that runs
on every PC with Internet access. It examines
documents for matches and produces a detailed
report highlighting concurrent passages and a link to
the source. The report is displayed on the computer
screen.
http://www.m4-software.com/
Plagiserve.com Plagiserve is a free plagiarism service that
matches papers or text to source searches both
on the Web and Plagiserves own database.
plagiserve.com.
WcopyFind WcopyFind can produce a html report of extracts
of matching text portions or matching words in
phrases of a specified minimum length from a
collection of text, html and word processor
document files.
http://plagiarism.phys.virginia.edu/Wsoftware.html


HOW TO AVOID PLAGIARISM
Steps
1: Understand what plagiarism is.
Plagiarism not only includes the word-for-word copying but
close fake of it also. Using synonyms and other word
choices is not an excuse to justify plagiarism. You should
write a piece of text strictly in your own words and then cite
your sources
2: Be familiar in the area that you are talking about.
By understanding the subject, you are more likely to write in your own words, rather
than restate someone else's definition of this subject. Look for information on the topic
you want to write about. This can be on the Internet or in books, although books are
almost always more authoritative than the Internet.

3: Restate the subject to yourself a couple of times.
The key is to understand the material and be able to express its meaning in your own
words. Try to avoid reading from another author's material too much, as you will be
more inclined to restate that author's exact statement.
4: Reference your quotes and sources.
You should include a bibliography or works cited in your paper. If you use a direct
quote from another author's work, then you should quote it and cite it properly. Many
teachers accept the standard MLA format, unless otherwise specified.


5: When in doubt, give credit.
Mention the source inside your paraphrase.
Put quotation marks around unique phrases you think could be interpreted as being
copied: "A 'paradigm shift' happens when one scientific revolution forces the community
to think of the world in a fundamentally different way."

What is the Difference between Plagiarism and Paraphrasing?

While plagiarism is directly lifting words and ideas from another person's written work,
paraphrasing is taking these words and turning them into your own. In order to be
appropriate paraphrasing must take the information and present it accurately. Paraphrasing
can also be considered unethical and even illegal in some situations if the interpretation is
not thorough enough.
CONSEQUENCES OF PLAGIARISM

Destroyed Professional Reputation:
A professional business person, politician, or public figure may
find that the damage from plagiarism follows them for their
entire career. Not only will they likely be fired or asked to step
down from their present position, but they will surely find it
difficult to obtain another respectable job. Plagiarism making any kind of meaningful
career impossible.
Monetary Repercussions:
Many recent news reports and articles have exposed plagiarism by journalists, authors,
public figures, and researchers. IN the case where a journalist works for a magazine,
newspaper or other publisher, or even if a student is found plagiarizing in school, the
offending plagiarist could have to pay monetary penalties.
The legal repercussions:
The legal repercussions of plagiarism can be quite serious. Copyright laws are
absolute. One cannot use another persons material without citation and reference. An
author has the right to sue a plagiarist. Some plagiarism may also be supposed criminal
offense. Those who writes for a living, such as journalists or authors, are particularly
susceptible to plagiarism issues. Those who write frequently must be ever-vigilant not to
err. Writers are well-aware of copyright laws and ways to avoid plagiarism. As a
professional writer, to plagiarize is a serious ethical and perhaps legal issue.
CONCLUSI ON ON PLAGI ARI SM
Plagiarism many people think of plagiarism as copying another's work, or borrowing
someone else's original ideas. But terms like "copying" and "borrowing" can disguise
the seriousness of the offense:
"plagiarize" means
To steal and pass off (the ideas or words of another) as one's own
To use (another's production) without crediting the source
To commit literary theft
To present a new and original idea or product derived from an existing source.

In other words, plagiarism is an act of fraud. It involves both stealing someone else's
work and lying about it afterward. Plagiarism is important to me as a university
student because I would not want to be accused of stealing someone else work or
giving in an assignment where I did not acknowledge my sources. Most cases of
plagiarism can be avoided, however, by citing sources. Simply acknowledging that
certain material has been borrowed, and providing your
audience with the information necessary to find that
source, is usually enough to prevent plagiarism.


REFRENCES
Word origin taken from: timesofindia.indiatimes.com
History of plagiarism taken from: www.collegeboard.com; www.plagiarism.orgThe
Johns Hopkins Guide to Literary Theory and Criticism; The Columbia essay by
Anthony Julius in the Guardian November 30 1996; Guardian news reports,
November 24 1986, March 10 1997, July 11 1997, and . https:/very-brief-history-
of-plagiarism.
Types of plagiarism taken from: MLA handbook for writers of research papers.
(7th Ed.). The Modern Language Association of America. New York: 2009. Print.
Five Types of Plagiarism Taken From: www.bowdoin.edu and
Barnbaum. Plagiarism: A Student's Guide to Recognizing It and Avoiding It.
Valdosta State University.
hwww.valdosta.edu/~cbarnbau/personal/teaching_MISC/plagiarism. (Accessed
23 January 2006).
Liles, Jeffrey A. and Michael E. Rozalski. It's a Matter of Style: A Style Manual
Workshop for Preventing Plagiarism. College & Undergraduate Libraries, 11.
2004,
3 great men who built their career by plagiarism taken from:
(www.cracked.com/article)
Avoid plagiarism taken from : (www.wikihow.com/Avoid-Plagiarism)
Consequences of plagiarism taken from:(www.ithenticate.com)
Conclusion on plagiarism taken from: (plagiarism-rnr.wikispaces.com)
History of plagiarism detection taken from: citeseerx.ist.psu.edu/viewdoc
Plagiarism detection taken from (www.wikipedia.org)

You might also like