• Title/Summary/Keyword: plagiarism

Search Result 178, Processing Time 0.027 seconds

Research Ethics of Plagiarism of Adult Learners

  • Hwang, Hee-Joong;Chae, Soo-Joon
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.5 no.3
    • /
    • pp.41-47
    • /
    • 2017
  • Purpose - Adult learners are easily exposed to the risk of plagiarizing others' writings when writing papers or reports. Therefore, this study investigates the research ethics of adult learners and suggests alternatives for research ethics standards in online lifelong education system. The purpose of this study is to investigate the causes of violation of research ethics and preventive measures (education program) for adult learners. Research design, data, methodology - Before establishing a research ethics education plan, it is confirmed through the empirical investigation of adult learners in undergraduate. In this study, 30 questionnaires of 5-point Likert scale were used to examine the level of consciousness of adult learners related to research ethics. Results - First, the experience of participating in ethics education and the presence of prior knowledge did not affect the prevention of research ethics violation. Second, adult learners did not learn about research ethics in the pre- college education environment and they frequently engaged in research ethics violation without guilt or consciousness. Third, the students who experienced the research ethics violation (plagiarism) were more willing to know and use the plagiarism search program. Fourth, Opinions differed according to age as to the need to enforce research ethics compliance. Conclusions - Universities should clearly and easily announce and monitor plagiarism criteria or guidelines. When adult learners are relieved of the anxiety about the possibility of violation of research ethics, a developmental and original research atmosphere will be created.

Determinants of Writing Research According to International Standards in Web of Science Journals

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.94-102
    • /
    • 2021
  • The study aimed to define all the main determinants of writing a research paper in an integrated manner within the requirements of the science network journals, by introducing scientific research and the steps of writing a research paper, starting from choosing the title to writing the abstract, identifying the research problem, questions, importance and objectives of the study, how to choose previous studies, research methodology and tools, discussion and results In addition to determining the acceptable percentage of plagiarism for science network journals, recommendations, choosing appropriate references and choosing the appropriate references, in addition to determining the acceptable percentage of plagiarism for the journals of the Network of Science, the researcher used the method of analytical investigative research to find out the axes of the study and analyze different reference citation methods to deal with different sources of information (articles-books-theses-conference works-reviews), In addition to studying the most important international programs for measuring plagiarism ratios that are accredited within the journals of the Science Network, and the study concluded that the researcher must present original and innovative results, add an integrated and logical work, take into account all the scientific conditions in the design of the research, its steps and ethics, and take into account the international standards in citing Reference, taking into account the rates of plagiarism within Web of Science journals.

Reports Plagiarism Inspection for Efficient Implementing e-learning System (효과적인 e-런닝 시스템 구축을 위한 과제물 표절 검사)

  • 조동욱;홍윤선;조선옥
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.53-59
    • /
    • 2003
  • Recently, social interest are increasing to e-learning system. for realizing efficient e-teaming system, reports plagiarism inspection is the most important topic. This paper describes the methods of reports plagiarism inspection and analyzing the S/W tools to implement e-learning system.

  • PDF

A Method for Measuring Similarity Measure of Thesaurus Transformation Documents using DBSCAN (DBSCAN을 활용한 유의어 변환 문서 유사도 측정 방법)

  • Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.9
    • /
    • pp.1035-1043
    • /
    • 2018
  • There is a case where the core content of another person's work is decorated as though it is his own thoughts by changing own thoughts without showing the source. Plagiarism test of copykiller free service used in plagiarism check is performed by comparing plagiarism more than 6th word. However, it is not enough to judge it as a plagiarism with a six - word match if it is replaced with a similar word. Therefore, in this paper, we construct word clusters by using DBSCAN algorithm, find synonyms, convert the words in the clusters into representative synonyms, and construct L-R tables through L-R parsing. We then propose a method for determining the similarity of documents by applying weights to the thesaurus and weights for each paragraph of the thesis.

A Study on the Design and Implementation of Plagiarism Analysis System of Music Contents (음악콘텐츠 표절분석시스템 설계 및 구현에 관한 연구)

  • Shin, Mi-hae;Kim, Eui-jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.279-282
    • /
    • 2013
  • In this paper, we propose a novel implementation method to detect musical plagiarism which can provide human experts evidences to decide plagiarism using cutting-edge information technologies and thereby can solve exhaustive disputes on cases of musical plagiarism when the cases are decided by human experts' emotional preferences.

  • PDF

Generating Pylogenetic Tree of Homogeneous Source Code in a Plagiarism Detection System

  • Ji, Jeong-Hoon;Park, Su-Hyun;Woo, Gyun;Cho, Hwan-Gue
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.6
    • /
    • pp.809-817
    • /
    • 2008
  • Program plagiarism is widespread due to intelligent software and the global Internet environment. Consequently the detection of plagiarized source code and software is becoming important especially in academic field. Though numerous studies have been reported for detecting plagiarized pairs of codes, we cannot find any profound work on understanding the underlying mechanisms of plagiarism. In this paper, we study the evolutionary process of source codes regarding that the plagiarism procedure can be considered as evolutionary steps of source codes. The final goal of our paper is to reconstruct a tree depicting the evolution process in the source code. To this end, we extend the well-known bioinformatics approach, a local alignment approach, to detect a region of similar code with an adaptive scoring matrix. The asymmetric code similarity based on the local alignment can be considered as one of the main contribution of this paper. The phylogenetic tree or evolution tree of source codes can be reconstructed using this asymmetric measure. To show the effectiveness and efficiency of the phylogeny construction algorithm, we conducted experiments with more than 100 real source codes which were obtained from East-Asia ICPC(International Collegiate Programming Contest). Our experiments showed that the proposed algorithm is quite successful in reconstructing the evolutionary direction, which enables us to identify plagiarized codes more accurately and reliably. Also, the phylogeny construction algorithm is successfully implemented on top of the plagiarism detection system of an automatic program evaluation system.

A Study on Text Pattern Analysis Applying Discrete Fourier Transform - Focusing on Sentence Plagiarism Detection - (이산 푸리에 변환을 적용한 텍스트 패턴 분석에 관한 연구 - 표절 문장 탐색 중심으로 -)

  • Lee, Jung-Song;Park, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.2
    • /
    • pp.43-52
    • /
    • 2017
  • Pattern Analysis is One of the Most Important Techniques in the Signal and Image Processing and Text Mining Fields. Discrete Fourier Transform (DFT) is Generally Used to Analyzing the Pattern of Signals and Images. We thought DFT could also be used on the Analysis of Text Patterns. In this Paper, DFT is Firstly Adapted in the World to the Sentence Plagiarism Detection Which Detects if Text Patterns of a Document Exist in Other Documents. We Signalize the Texts Converting Texts to ASCII Codes and Apply the Cross-Correlation Method to Detect the Simple Text Plagiarisms such as Cut-and-paste, term Relocations and etc. WordNet is using to find Similarities to Detect the Plagiarism that uses Synonyms, Translations, Summarizations and etc. The Data set, 2013 Corpus, Provided by PAN Which is the One of Well-known Workshops for Text Plagiarism is used in our Experiments. Our Method are Fourth Ranked Among the Eleven most Outstanding Plagiarism Detection Methods.

Developing of Text Plagiarism Detection Model using Korean Corpus Data (한글 말뭉치를 이용한 한글 표절 탐색 모델 개발)

  • Ryu, Chang-Keon;Kim, Hyong-Jun;Cho, Hwan-Gue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.231-235
    • /
    • 2008
  • Recently we witnessed a few scandals on plagiarism among academic paper and novels. Plagiarism on documents is getting worse more frequently. Although plagiarism on English had been studied so long time, we hardly find the systematic and complete studies on plagiarisms in Korean documents. Since the linguistic features of Korean are quite different from those of English, we cannot apply the English-based method to Korean documents directly. In this paper, we propose a new plagiarism detecting method for Korean, and we throughly tested our algorithm with one benchmark Korean text corpus. The proposed method is based on "k-mer" and "local alignment" which locates the region of plagiarized document pairs fast and accurately. Using a Korean corpus which contains more than 10 million words, we establish a probability model (or local alignment score (random similarity by chance). The experiment has shown that our system was quite successful to detect the plagiarized documents.

A Two Phases Plagiarism Detection System for the Newspaper Articles by using a Web Search and a Document Similarity Estimation (웹 검색과 문서 유사도를 활용한 2 단계 신문 기사 표절 탐지 시스템)

  • Cho, Jung-Hyun;Jung, Hyun-Ki;Kim, Yu-Seop
    • The KIPS Transactions:PartB
    • /
    • v.16B no.2
    • /
    • pp.181-194
    • /
    • 2009
  • With the increased interest on the document copyright, many of researches related to the document plagiarism have been done up to now. The plagiarism problem of newspaper articles has attracted much interest because the plagiarism cases of the articles having much commercial values in market are currently happened very often. Many researches related to the document plagiarism have been so hard to be applied to the newspaper articles because they have strong real-time characteristics. So to detect the plagiarism of the articles, many human detectors have to read every single thousands of articles published by hundreds of newspaper companies manually. In this paper, we firstly sorted out the articles with high possibility of being copied by utilizing OpenAPI modules supported by web search companies such as Naver and Daum. Then, we measured the document similarity between selected articles and the original article and made the system decide whether the article was plagiarized or not. In experiment, we used YonHap News articles as the original articles and we also made the system select the suspicious articles from all searched articles by Naver and Daum news search services.

Publication Ethics and KODISA Journals

  • KIM, Dongho;YOUN, Myoung-Kil
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.2
    • /
    • pp.1-5
    • /
    • 2020
  • Purpose: The purpose of this paper is to identify the most common misconducts in publication ethics, to demonstrate KODISA journals' management of the misconducts, and to share the findings with future and potential authors of Journal of Research and Publication Ethics (JRPE). Research design, data and methodology: This is an analytical study that explores and examines research and publication ethics and misconducts. Results: Based on literature review, major publication misconducts that many academic journals had to contend with over the years encompass unethical authorship, including ghost, guest, and gift authorships, data falsification and fabrication, plagiarism, including self-plagiarism, submission and publication fraud (multiple submission and publication), and potential conflicts of interest. Conclusions: KODISA and its journals have strived and done great work in making the journals transparent and in combatting the issues associated with plagiarism, including self-plagiarism. However, it seems there is no mechanism to detect or deter unethical authorship, conflicts of interest, and fabrication and falsification misconducts. The inception of JRPE signifies how KODISA and its journals continuously view research and publication ethics as their foremost important factor in maintaining and improving the academic journals. The future research and scholastic manuscripts of JRPE could provide necessary and updated information about research and publication ethics, practices, and misconducts.