Abstract
Universities have always had to deal with problems of plagiarism. Some are open and transparent about what they do, others treat it as a shameful or secret thing that needs to be quickly swept under the carpet. Since educators want to focus on teaching their subjects and not on detecting plagiarism, there is a strong desire for a simple, computer-based solution. However, plagiarism is a social problem that is not easily solved by using software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bassett, T. J., & Porter, P. W. (1991). “From the Best Authorities”: The Mountains of Kong in the Cartography of West Africa. The Journal of African History, 32(3), 367–413. Cited July 5, 2013, Available at http://www.jstor.org/stable/182661
Callahan, D. (2010, December 14). Why honor codes reduce student cheating. Huffington Post. Cited March 15, 2013, Available at http://www.huffingtonpost.com/david-callahan/why-honor-codes-reduce-st_b_795898.html
Dubin, D. (2004). The most influential paper Gerard Salton never wrote. Library Trends, 52(4), 748–764.
Franklyn-Stokes, A., & Newstead, S. E. (1995). Undergraduate cheating: Who does what and why? Studies in Higher Education, 20(2), 159–172.
Hunt, R. (2002). Four reasons to be happy about Internet plagiarism [Web page]. Cited August 22, 2013, http://www.stu.ca/~hunt/4reasons.htm
International Center for Academic Integrity. (n.d.).Educational resources [Web page]. Cited July 3, 2013, http://www.academicintegrity.org/icai/resources-4.php
Library of Congress. (2010). American treasures of the Library of Congress: California as an island. Cited July 5, 2013, http://www.loc.gov/exhibits/treasures/trm101.html
McCabe, D. L., & Pavela, G. R. (2000). Some good news about academic integrity. Change, 32(5), 32–38.
McCabe, D. L., & Treviño, L. K. (1993). Academic dishonesty: Honor codes and other contextual influences. The Journal of Higher Education, 64(5), 522–538.
McCabe, D. L., Treviño, L. K., & Butterfield, K. D. (1999). Academic integrity in honor code and non-honor code environments: A qualitative investigation. Journal of Higher Education, 70(2), 211–234.
McCabe, D. L., Treviño, L. K., & Butterfield, K. D. (2001). Cheating in academic institutions: A decade of research. Ethics & Behavior, 11(3), 219–232.
Michler, I. (2011, August 8) Professoren leiden unter Ansturm der Studenten. Die Welt Online. Cited July 5, 2013, http://www.welt.de/dieweltbewegen/article13532016/Professoren-leiden-unter-Ansturm-der-Studenten.html
Neufeld, J., & Dianda, J. (2007). Academic dishonesty: A survey of policies and procedures at Ontario Universities [Working paper]. Cited May 10, 2013, Available at http://www.cou.on.ca/publications/academic-colleague-papers/pdfs/academic-dishonesty-a-survey-of-policies-and-proce
Pavela, G. (1997). Applying the power of association on campus: A model code of academic integrity. Journal of College and University Law, 24(1), 97–118. Cited August 22, 2013, Available at http://www.academicintegrity.org/icai/assets/model_code.pdf
Risko, E. F., Buchanan, D., Medimorec, S., & Kingstone, A. (2013). Everyday attention: Mind wandering and computer use during lectures. Computers & Education, 68, 275–283. Cited August 18, 2013, http://www.sciencedirect.com/science/article/pii/S0360131513001218
Schild, W. (2010). Folter, Pranger, Scheiterhaufen: Rechtsprechung im Mittelalter. München: Bassermann.
Stäuble, M. (2013, August 9). Der Scheindoktor. Tages-Anzeiger. Cited August 9, 2013, Available at http://www.tagesanzeiger.ch/zuerich/Der-Scheindoktor/story/26179683
Steinhauer, E. (2011, March 2). Guttenberg aussondern? Bibliotheksrecht [Blog]. Cited January 1, 2013, http://www.bibliotheksrecht.de/2011/03/02/guttenberg-aussondern-10740355/
Theisen, M. R. (2013). Wissenschaftliches Arbeiten: Erfolgreich bei Bachelor- und Masterarbeit (16th ed.). München: Vahlen.
Theisohn, P. (2012). Literarisches Eigentum: Zur Ethik geistiger Arbeit im digitalen Zeitalter. Essay. Stuttgart: Kröner.
Seewanee University of the South. (2012). Honor Code Signing [Video]. Cited August 22, 2013, http://www.youtube.com/watch?v=5S6u0Q_Sbwk
Vanderbilt University. (n.d.). Honor Code Signing Ceremony [Web video]. Cited July 3, 2013, http://blip.tv/studentvu/honor-code-signing-ceremony-68584
VroniPlag Wiki. (2012). Nm/Comparisons [Web page]. Cited August 22, 2013, http://de.vroniplag.wikia.com/wiki/Nm/Comparisons
Wilhite, A. W., & Fong, E. A. (2012, February 3). Coercive citation in Academic Publishing. Science, 335(6068), 542–543.
Williams, K., & Carroll, J. (2009). Referencing & understanding plagiarism. Basingstoke: Palgrave Macmillian.
Wilson, F., & Ippolito, K. (2007). Working together to educate students. In T. S. Roberts (Ed.), Student plagiarism in an online world: Problems and solutions. Hershey, PA: IGI Global.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Weber-Wulff, D. (2014). Plagiarism Perspective. In: False Feathers. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39961-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-39961-9_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39960-2
Online ISBN: 978-3-642-39961-9
eBook Packages: Computer ScienceComputer Science (R0)