plagiarism.pptx ics

19
PLAGIARISM & ITS DETECTION Submitted by: Arshiya Zahid Roll # 19 Submitted to: Ma'am Kiran Shahzad

Upload: maryamfarooqi

Post on 17-Jun-2015

154 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Plagiarism.pptx ics

PLAGIARISM & ITS DETECTION

Submitted by: Arshiya Zahid

Roll # 19

Submitted to: Ma'am Kiran Shahzad

Page 2: Plagiarism.pptx ics

The act of presenting another’s work or ideas as your own.

Using another’s exact words without proper citation.

PLAGIARISM DEFINED:

The word “plagiarism” comes from the Latin plagiarus meaning “kidnapper”

Page 3: Plagiarism.pptx ics

The first copyright law was passed in 1709 protecting the rights of publisher against book piracy.

Plagiarism is very ancient art.

HISTORY OF PLAGIARISM

3 great men who built their careers on plagiarism

1: Stephen Ambrose: invented pop history.

2: T.s .Eliot: wrote poems.

3: Dr.Martin Luther king Jr: advance the human race.

Page 4: Plagiarism.pptx ics

Intentional: Copying a friend’s work Cutting and pasting blocks of

text from electronic sources without documenting

Web publishing without permissions of creators

Unintentional: Paraphrasing poorly

Citing poorly

Quoting poorly

Failure to use your own “voice”

THE TWO CATEGORIES OF PLAGIARISM

Page 5: Plagiarism.pptx ics

FIVE COMMON TYPES OF PLAGIARISM

1. COPY & PASTE PLAGIARISM

2. WORD SWITCH PLAGIARISM

3. STYLE PLAGIARISM

4. METAPHOR PLAGIARISM

5. SELF PLAGIARISM

Page 6: Plagiarism.pptx ics

PLAGIARISM DETECTIONHistory:The earlier plagiarism detectors used HALSTEAD’S SOFTWARE SCIENCE METRICS to detect plagiarism.

Detection:

“Plagiarism detection is the process of locating instances of plagiarism within a work or document.”

1. Manual :• Requires great effort or excellent memory

• Impractical

2: Software assisted :• Allows vast collection to be compared to each other

• Making successful detection.

Page 7: Plagiarism.pptx ics

1. In text document

External detection system: • compare a suspicious document with a reference collection• Reliably identify plagiarism

Intrinsic detection system:• Analyze the text without performing comparisons to external documents. • This approach recognize changes in the unique writing style of an author as an

indicator for plagiarism• Not reliably identify plagiarism

Page 8: Plagiarism.pptx ics

Global similarity assessment approaches :

Use the characteristics taken from larger parts of documents to compute similarity

Local similarity assessment approaches:Only examine pre-selected texts segment as input

APPROACHES

Page 9: Plagiarism.pptx ics

1. FINGERPRINTS

Currently the most widely applied approach to plagiarism detection

This method forms a set of multiple substrings called minutiae.

Minutiae matching with those suspicious documents to suggest plagiarism

Used in internet

Page 10: Plagiarism.pptx ics

Used in computer science

Remains expensive

Suspicious documents are compared for verbatim text

(reference collection from all documents)

External plagiarism detection

2. STRING MATCHING

Page 11: Plagiarism.pptx ics

Bag of words analysis vector to the domain of

plagiarism detection.

Documents are represented as one or multiple

vectors, e.g. for different document parts.

which are used for pair wise similarity computations.

3 . B A G O F W O R D S

Page 12: Plagiarism.pptx ics

4. CITATION ANALYSIS

Relies on citation analysis. Only approach that does not rely on textual similarity. examines the citation and reference information in texts

to identify similar patterns this approach is suitable for scientific texts, or other

academic documents Citation analysis to detect plagiarism is a relatively

young concept.

Page 13: Plagiarism.pptx ics

Intrinsic plagiarism detection

Stylometry analyze an author’s unique writing style

By comparing stylometric models for different text segments, passages that

are stylistically different from others, hence potentially plagiarized, can be

detected.

5 . S T Y L O M E T RY

Page 14: Plagiarism.pptx ics

PERFORMANCE

indicate that their performance depends on the type of plagiarism present

Except for citation pattern analysis, all detection approaches rely on textual similarity

Page 15: Plagiarism.pptx ics

Institutional software

Ithenticate

JISC plagiarism advisory service

Moos

Small SEO

eTBLAST

Individual software

• Copy catch gold

• Glatt

• Plagscan

• copyscape

• Wcopyfind

PLAGIARISM DETECTION TOOLS

Page 16: Plagiarism.pptx ics

• S T E P S

1. Understand what is plagiarism

2. Be familiar in the area that you are talking about

3. Restate the subject to yourself a couple of times

4. Reference your quotes and sources

5. When in doubt give credit

HOW TO AVOID PLAGIARISM

Page 17: Plagiarism.pptx ics

Destroy professional reputation Destroy student Reputation: Monetary repercussion:

CONSEQUENCES ON PLAGIARISM

Page 18: Plagiarism.pptx ics

CONCLUSION ON PLAGIARISM

Page 19: Plagiarism.pptx ics

THANK YOU!!!