38 Ethics and Prevention of Cyberspace Plagiarism

Lalitha Poluru

 

I.   Objectives

 

The objectives of this module are to impart knowledge on the following aspects of plagiarism and its prevention:

 

•    Understand issues of plagiarism and its prevalence, types and reasons;

•    Discuss cases of plagiarism, roles of whistle blowers and institutions working as watch dogs for its prevention;

•    Detection of manual and cyberspace plagiarism with examples of commercial and open source software along with their advantages and disadvantages; and

•    Role of academicians, faculty members, library professionals and UGC in prevention of plagiarism and protection of academic and research ethics.

 

 

II.    Learning Outcomes 

 

On completion of this lesson, learners would attain knowledge on various aspects of plagiarism and its prevention. They would develop understanding of various issues of plagiarism, its prevalence, types and reasons. Learners would also be developed understanding on cyberspace plagiarism with examples of commercial and open source software along with their advantages and disadvantages. Learners would get better understanding on role of academicians, faculty members, library professionals and UGC in prevention of plagiarism and protection of academic and research ethics in India.

 

 

III.    Module Structure 

 

1.   Introduction

2.   What is Plagiarism?

3.   Types of Plagiarism

4.   Prevalence of Plagiarism

5.   Some Cases of Plagiarism

6.   Plagiarism Detection

6.1   Manual Detection

6.2   Cyberspace Plagiarism Detection

6.2.1.   Commercial Plagiarism Detection Software

6.2.2.   Open Source Plagiarism Detection Software

6.3   Limitations of Plagiarism Detection Software

7.   Prevention Strategies

7.1   Institutional Responsibilities

7.2   Role of Academic Community and Academicians

7.3   Role of Academic Librarians and Library Professionals

7.4   Role of UGC and INFLIBNET Centre

8.   Summary

9.   References

 

 

 

1.     Introduction 

 

The research misconduct and academic dishonesty are relatively old phenomena. Incidences of misconduct and academic dishonesty are increasing due to easy access to information through Internet and online resources, ease with which it can be copied and pasted, and attraction of rewards to researchers and faculty in terms of promotion and tenure appointments. With the massive growth of online information, it is impossible to know the ownership of an idea and to detect plagiarism without help  of  software tools and  techniques. Though plagiarism is considered to be relatively old phenomenon, millennium generation students and researchers are more known for cyber plagiarism with increased tendency of using the web content.

 

2.     What is Plagiarism? 

 

Though there are no authentic definitions for plagiarism, a number of individuals and institutions have defined plagiarism and its scope and intent. The word plagiarism originates from the Latin word ‘plagiarius’ (mean ‘kidnapper’) in the 17th century. The United States Public Health Service (USPHS)has defined a broader term called “research misconduct” as “fabrication, falsification or plagiarism, in proposing, performing or reviewing the research, or in reporting research results”. (Federal Register 54: 32446-32451, August 8, 1989. Adapted from Macrina, 2005).The United States Office of Research Integrity (“ORI Policy on Plagiarism,” n.d.)defines plagiarism as “both the theft and misappropriation of intellectual property and the substantial unattributed textual copying of another’s work”. Plagiarism is the appropriation of another person’s ideas, processes, results, or words without giving appropriate credit”(K. Satyanarayana, 2010).

The Merriam-Webster’s Online Dictionary defines plagiarismas “the act of stealing of work or idea or language without giving proper credit to the author and source” (Meriam-Webster, n.d.).

 

The fabrication here means making up of data or results and recording or reporting them. Falsification is manipulating research materials, equipment, or processes or changing or omitting data or results in such a way that the research is not accurately represented in the research record.

 

Plagiarism.org(n.d.) in its definition of plagiarism covers the following aspects:

 

•    Turning in someone else’s work as your own;

•    Copying words or ideas from someone else without giving credit;

•    Failing to put a quotation in quotation marks;

•    Giving incorrect information about the source of quotation;

•    Changing words but copying the sentence structure of a source without giving credit; and

•    Copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not.

 

Plagiarism is unprofessional, unethical and theft of intellectual property of the work that has been already produced in art and research. “Plagiarism is the act of representing as one’s own original work the creative works of another without appropriate acknowledgment of the author of sources”. Such creative works may include published and unpublished written documents, interpretations, computer software, designs, music, sounds, images, photographs, and ideas or ideological frameworks gained through working with another person or in a group. These works may be in print and/or electronic media (Melbourne,n.d.).

 

3.     Types of Plagiarism 

 

Plagiarism can be intentional or unintentional. Unintentional or accidental plagiarism happens due to lack of knowledge of referencing citation, and also due to intermingling of influences of one’s own thoughts and vastly available literature, and self plagiarism. Intentional plagiarism is copying of the others work without proper acknowledgement.

 

Intentional or unintentional, ways used for committing plagiarism are as follows:

•    Copy-paste: Copying “word-to-word” textual contents;

•    Idea plagiarism: Using similar concept or opinion which is not common knowledge;

•    Paraphrasing: Changing grammar, similar meaning, words, and reordering sentences in original work;

•    Artistic plagiarism:  presenting  someone  else’s  work  using different media, such as text, images, voice or video;

•    Code plagiarism: Using program code, algorithms, classes, or functions without permission or reference;

•    Forgotten or expired links to resources: Addition or quotations or reference marks but failing to provide information or up-to-date links to sources;

•    No proper use of quotation marks: Failing to identify exact parts of borrowed contents;

•    Misinformation of references: adding references to incorrect or non-existing original sources; and

•    Translated plagiarism: Cross language content translation and use without reference to original work (Maurer, Kappe, andZaka, 2006).

 

4.     Prevalence of Plagiarism 

 

The borderline between plagiarism and research is surprisingly murky as it is often said the advanced research is only possible by “standing on the shoulders” of others (Maurer, Kappe, andZaka, 2006). In research, it is almost mandatory to refer to the existing literature of respective subject to ensure that the research is being done to fill the gaps pertaining to new aspect of research and literature survey has been done to get support from existing literature but not to plagiarize. The researchers should understand the development of knowledge and learn to appreciate it by acknowledging research work that was earlier published. Unfortunately, there is some gap in understanding between acknowledging and plagiarizing. Perhaps, this may be the main cause for plagiarism. Bolden, (n.d.) lists following reasons for plagiarism:

 

•    Lack of research skills;

•    Lack of writing skills;

•    Problems in evaluating Internet sources;

•    Confusion about how to cite sources;

•    Misconception about terminology;

•    Pressure;

•    Poor time management and organizational skills;

•    Product-oriented writing assignments; and

•    Cultural factors.

Some other reasons of plagiarism are as follows:

 

•    Laziness;

•    Fear of failure;

•    Language jargon;

•    Publish to prosper (for career advancement); and

•    Recognition amongst the peers.

 

5.     Some Cases of Plagiarism 

 

The “Society for Scientific Values,” (n.d.) has listed the following instances of plagiarism:

 

i.    Kundu et al, NCCS-DBT: This case of misrepresentation of data in two JBC publications by Dr. Kundu and his students, as established by Society for Scientific Values, has received a very wide coverage in the media. The 2nd paper published in JBC was retracted by the journal.

 

ii.     Atiyah-Raju Case: Prof C.K. Raju charged Prof Michel Atiyah, former President of the Royal Society, UK, of plagiarizing or claiming inappropriate credit to some of his previously published ideas. After ascertaining from 3 independent experts that the complaint is valid, SSV contacted Dr. Atiyah for his views. Atiyah wrote to SSV that while he has not published anything on the subject under question, he has indeed lectured on the subject without being aware of Raju’s publications. Now that he is aware of them, he assured that he would certainly cite them if and when he publishes something on the subject.

 

iii.   Khanuja-CIMAP: Besides being a coauthor of most publications and patents originating from CIMAP of which he was the Director, some of the publications of Dr. Khanuja are plagiarized.

 

iv.   Selladurai, et al, Anna Univ.: Prof Selladurai and his students of Anna University have plagiarized a paper in an international journal.

 

v.     Vankar, IITK: Dr. Padma Vankar of IITK was charged by the Pesticides Manufacturers and Formulators Association of India with manipulation of pesticide data. Vankar was earlier involved in a plagiarism case.

 

vi.    Mashelkar: The highly publicized case of plagiarism involving the MashelkarCommittee on patents, as well as Mashelkar’s book on IPR entitled “Intellectual Property and Competitive Strategies in the 21st Century” by Shahid Ali Khan and R.A. Mashelkar that was published by Kluwer in 2004.

 

vii.    Karmeshu and Sharma, Shachi from JNU has alleged that Prof. Demetres Kouvatsos, a professor of information systems at the University of Bradford in the UK, copied ideas from a paper submitted to Performance Evaluation, a peer-reviewed journal that rejected the manuscript. Subsequently, Kouvatsos and Salam AdliAssi added a few incremental equations to their research and presented a paper at Euro- NGI 2007, a conference held in Norway.

 

viii.   Chiranjeevi, P. a Professor at Sri Venkateswara University, Tirupati, was indicted by an internal committee for plagiarizing and falsifying more than 70 research papers. Elsevier BV, the largest scientific publisher in the world, has retracted 13 of his articles published in their journals.

 

ix.    Prof. Shigeaki Kato from University of Tokyo whose 25 research articles were retracted is alleged to have been the ringleader of a scheme to cover up other research misconduct at the University of Tokyo, his former employer, which investigated the activity.

 

Retraction.com (“Retraction Watch,” n.d.) is a blog that keep tracts of articles that are retracted due to manipulation, plagiarism or falsification of data. GrieneisenandZhang(2012) reported that 4,449 scholarly publications were retracted from 1928-2011. Further they found that retraction is more due to alleged publishing misconduct (47%) which is more than alleged research misconduct (20%) or questionable data/interpretations (42%).

 

6.     Plagiarism Detection 

 

Plagiarism can be detected with little efforts by the experienced scientists and faculty members who are engaged in highly specialized area of research with their extensive reading, referring practices and with their interactions with their peers during seminars, conferences, symposium and colloquia. Further, detection can be either manual or computer- assisted. Manual detection requires substantial effort and excellent memory, and is impractical in cases where too many documents must be compared, or original documents are not available for comparison. Computer-assisted detection allows vast collections of documents to be compared to each other, making successful detection much more likely (“Plagiarism detection,” 2014).

 

6.1   Manual Detection 

 

Though the manual detection is difficult, however, it can be achieved by deploying strategic assessment skills. Detecting plagiarism is relatively easier task for well-experienced scientists and faculty members and reviewers working in a highly specialized area of research. Robert Harris, (2004) pointed out the following indicators for plagiarism in a text:

 

•    Mixed citation styles;

•    Lack of references or quotations;

•    Unusual formatting;

•    Anomalies of diction;

•    Anomalies of style; and

•    Blunders of clues, which include obvious indicators of copying.

 

6.2   Cyberspace Plagiarism Detection 

 

It is also important to check plagiarism in an article available in digital format against material published on the Web as it could have been prepared by few mouse clicks through cut-copy option from  several readily available papers on  the Internet. It is common practices that school students get their school assignments done through contract cheating that refers to outsourcing of assignments by students to agencies who produce the assignments on their behalf. These contract sites are grouped into four categories: auction sites, discussion forums, essay mills and feed aggregators. Schoolsucks.com, coursework.info, cheathouse.com and essayschool.com are few examples to sites for these kinds (Lancasterand Clarke., 2008).

 

Using technology for technology driven plagiarism, For Example, using plagiarism detection software for detecting the cyberspace plagiarism is the latest trend across academic institutions. The plagiarism detection technology uses a set of powerful algorithms to create a digital fingerprint of any text document. Then the document’s fingerprint is cross- referenced against local databases, and Internet. Finally a colour coded originality report; complete with source links is generated. (“what is plagiarism?”n.d.).See Fig. 1 to 3 given below to understand colour coded originality report from an open source software and a commercial anti- plagiarism software:

 

Sample of Research Articles Checked Through ‘Plagiarism Detector’-Open Source Software 

Fig.1: Article which has references that are not available as ‘Open Access’

 

 

Fig. 2: Article which has references that are available limited as ‘Open Access’

 

 

Fig.3: Article which has references that are available widely as ‘Open Access’

 

                                     Originality Report

Similarity Index Internet Sources Publications Student Papers
23% 16% 7% 6%

 

Table 1 Showing the Originality Report of the Document through Commercial Software

 

6.2.1.   Commercial Plagiarism Detection Software

 

A few examples of commercially available plagiarism detection software are given below:

 

i.   Easy Verification Engine (EVE2) is a very powerful tool that allows professors and teachers at all levels of the education system to determine if students have plagiarized material from the World Wide Web. EVE2 accepts essays in plain text, Microsoft Word, or Corel Word Perfect format and returns links to web pages from which a student may have plagiarized.(“Easy Verification Engine EVE2,” n.d.).

 

ii. Turnitin is a new, enhanced version that integrates with three essential instructional support tools: Originality Check- plagiarism prevention, GradeMark- paperless grading and PeerMark- peer reviewing. Turnitin helps to:

 

•    Work with a single, “all-in-one” view of a student’s paper in its original format, including styled text, graphics and photos.

•    View feedback from all sources in one comprehensive, multi- layered view.

•    Maintain academic integrity and engage students in their development as learners.(“Turnitin Plagiarism  Detection Software,” n.d.)

 

iii. iThenticate is the leading provider of professional plagiarism detection and prevention technology used worldwide by scholarly publishers and research institutions to ensure the originality of written work before publication. iThenticate helps editors, authors and researchers prevent misconduct by comparing manuscripts against its database of over 45 billion web pages and 130 million content items, including 38 million works from 530 scholarly publisher participants of CrossCheck, a service offered by CrossRef and powered by iThenticate software. iThenticate is developed by Turnitin, the leader in plagiarism and originality checking for educational institutions worldwide (“Plagiarism Detection Software | iThenticate,” n.d.).

 

6.2.2.   Open Source Plagiarism Detection Software 

 

Examples of a few open source plagiarism detection software that are available online are as follows:

 

i.   Crot open source software is available in two basic versions, Open source Plug-in for Moodle CMS which can be used only if embedded to the running version of Moodle course management system. This version is useful for educational institutes and the other one is Crot Desktop which is primarily intended for individual users. It is a shareware and free for three papers. (“CROT software,” n.d.)

 

ii.   DOC Cop creates repots displaying the correlation and matches between documents or a document and the Web. It gathers the evidence, and provides the information required to judge whether plagiarism has occurred without taking copyright or ownership of your material. (“Doccop Software,” n.d.)

 

iii.  Viper is fast becoming the plagiarism checker of choice, rising over and above other plagiarism checkers, with over 10 billion resources scanned and an easy interface which highlights potential areas of plagiarism in an article. (“Viper – Anti-plagiarism Scanner,” n.d.)

 

A comprehensive list of plagiarism detection software can be found from Vij, Soni, andMakhdumi, (2009).

 

6.3   Limitations of Plagiarism Detection Software 

 

Major limitations of Plagiarism Detection Software are as follows:

 

i.   There are number of open source plagiarism detection software that are available, while some of them are to be downloaded and installed others are available as shareware. Highly effective plagiarism detection software with Web-based online interfaces are not available free of cost.

 

ii.   Most plagiarism detection software rely on text-based matching of article or assignment submitted for plagiarism detection with documents available in the database of proprietor. As such, assignments or articles using materials not included in the databases cannot be detected.

 

iii.   Since one source for detection of plagiarism is not reliable, it is time consuming to check plagiarism using multiple sources with human intervention.

 

iv.    There are chances of losing formats of assignments / articles submitted in the process of plagiarism detection.

 

v.   Original research work and data are made available to a third party that may lead to copyright violation.

 

vi.      Use of plagiarism detection software may strain teacher- student relationship, as students may feel guilty till they are proven innocent.

 

vii.      Plagiarism detection software can be fooled by making intelligent changes in syntax of plagiarized portion of article or assignment.

 

viii.     Plagiarism detection software would also detect common phrases and sentences that are often used in contemporary writings leading to increase in overall proportion of plagiarized content in a given text.

 

7.   Prevention Strategies 

 

Preventing plagiarism is very difficult task as it is not a technological problem but associated with the ethical behaviour and application of appropriate research methodology. Consistent institutional approach is required against plagiarism  and educating students to understand the necessity to avoid plagiarism, and more importantly promoting ethical behaviour in their academic work (Cogdell, and Dorothy,2008). Combating plagiarism can happen through combinatorial strategies that encompass institutes, faculty members and students. The following strategies can be deployed to prevent plagiarism:

 

7.1   Institutional Responsibilities

Universities, as an academic policy, should take the following steps to prevent plagiarism:

 

i.   Frame clear policies with appropriate disciplinary action that should be made available on their websites;

 

ii.    Organize orientation programmes that should be conducted at the beginning of the each academic session wherein policies regarding plagiarism and research misconduct should be discussed;

 

iii.   Code of honour (declaration of academic integrity) should be taken from the students before handling the project work. Imparting education on plagiarism to students as well as to faculty;

 

iv.   Build institutional repositories including research articles, dissertations and theses, and student assignments to avoid plagiarism; and

 

v.    Regulatory bodies like UGC and AICTE should come up with a policy to deal with plagiarism.

 

As suggested by K.Satyanaraya, (2010) the Government of India should frame a ‘National Plan of Action’ that include government/funding agencies, journal editors, national academies, voluntary bodies, readers and public. Also every university should establish ‘Centre for Ethical Research’ with active involvement of librarians, department of library and information science, Director of Research, and Deans of Students’ Welfare (M.P. Satija, 2011).

 

7.2   Role of Academic Community and Academicians 

 

Evering and Moorman (2013) enunciated the following plan of action for members of academic community and academicians to address the complex issue of plagiarism:

 

•    Engage their students and colleagues in discussions about plagiarism;

•    Try to reach a consensus about what constitutes plagiarism;

•    Make distinctions between blatant and trivia plagiarism; and

•    Determine appropriate responses and consequences to acts of plagiarism.

In addition, faculty members may also engage with the students in the following activities:

 

•    Make plagiarism an explicit topic in their instruction.

•    Help students to see how ideas evolve, and why it is important to acknowledge the work of others.

•    Explain and model how to paraphrase and cite.

•    Provide opportunities to write for realistic purposes and broad audiences.

•    Review drafts of students’ writing before the final text is due; try to identify acts of plagiarism early.

•    Explicitly teach students how to search the Internet to find valid, reliable information.

 

7.3   Role of Academic Librarians and Library Professionals 

 

Imparting education on what plagiarism is and how it can be avoided is meant for the students who are not aware of plagiarism or who are associated with unintentional and accidental plagiarism. Academic librarians can play a vital role by conducting information literacy programmes knowing the basic competencies of the students. With the implementation of Choice Based Credit System, even a course can be offered by Departments of Library and Information Science of respective universities on Information Literacy Competencies with Plagiarism as one of the course contents to the aspirant students.

 

As a part of Information Literacy Programmes, workshops can be organized for different  categories of students on few possible  below mentioned topics:

 

•    Locating  different  kinds  of  information  from  print  and  e- resources;

•    Search strategies;

•    Academic honesty;

•    Bibliographic citations;

•    Copyright and fair use; and

•    IPR related issues.

 

The Information Literacy Programmes, with the above mentioned topics,should be targeted not only to the undergraduate and post-graduate students but also to the research scholars and freshly joined faculty members. Such kind of programmes when conducted in congenial way will help to bring more number of students and faculty members to the library creating a scholarly environment flourishing academic and research activities in the universities.

 

7.4   Role of UGC and INFLIBNET Centre 

 

The INFLIBNET Centre, as a mandate of the UGC, is hosting and maintaining a digital repository of Indian Electronic Theses and Dissertations accessible to all institutions and universities (“Shodhganga: Reservoir of Indian Theses,” n.d.). As on 18th August, 2014, researchers from 186 universities have started submitting their theses into the repository and 176 universities have signed MoU with the INFLIBNET Centre on Shodhganga and total number of theses submitted into the repository has grown to 19,994.The MoU signed between universities and INFLIBNET Centre for participating in Shodhganga, provides number of incentives to universities that are signatory to MoU on Shodhganga. One of the incentives is to provide plagiarism detection software to member universities. More than 100 universities are already getting access two plagiarism detection software, namely Turnitin and iThenticate. This initiative could prove to be a major step to avoid plagiarism and to develop qualitative research in Indian Universities.

 

8.   Summary 

 

Plagiarism is copying words or ideas, paraphrasing someone’s work without acknowledging the original author/creator. Plagiarism may be intentional or unintentional. Well-experienced academicians and peer reviewers can find plagiarism from the contents with little efforts. Cyberspace plagiarism  can be easily detected by checking quotes or important words through Google search and also using plagiarism detection software. Academicians and library professionals are required to put-in lot of efforts for prevention of plagiarism. In India, there is an urgent need for written policy to be framed by University Grants Commission (UGC) and other regulatory bodies to address plagiarism in Higher Education. It is also proposed to set-up ‘Ethical Research Centers’ in Indian universities. The Government of India should frame a ‘National Plan of Action’ that include government/funding agencies, journal editors, national academies, voluntary bodies, readers and public. Above all, each individual should be self-disciplined and think of the importance of creative and innovative thinking while prospering in their careers.

 

9.   References 

 

1.     Bolden, D. (n.d.). LibGuides.Plagiarism.Home. Retrieved August 22, 2014, from http://libguides.uah.edu/plagiarism

2.     Cogdell, Barbara andAidules, Dorothy. (2008). Dealing with Plagiarism as an Ethical Issue. In Robert Tim S (Ed.), Student Plagiarism in an Online World: Problems and Solutions, (pp. 38-59). USA: IGI Global.

3.     CROT software. (n.d.).CROT software. Retrieved August 22, 2014, from http://www.crotsoftware.com/

4.     Doccop Software. (n.d.). Retrieved from https://www.doccop.com/index.html

5.     Easy Verification Engine EVE2. (n.d.). Retrieved from http://www.canexus.com/

6.     Evering, L. C., and Moorman, G. (2012). Rethinking Plagiarism in the Digital Age. Journal of Adolescent and Adult Literacy, 56(1), 35–44. doi:10.1002/JAAL.00100

7.     Grieneisen, M. L., and Zhang, M. (2012). A Comprehensive Survey of Retracted Articles from the Scholarly Literature. PLoS ONE, 7(10), e44118.   doi:10.1371/journal.pone.0044118

8.     Hermann Maurer, Frank Kappe, and Bilal Zaka. (2006). Plagiarism – A Survey.Journal of Universal Computer Science, 12(8), 1050–1084.

9.     K. Satyanarayana. (2010). Plagiarism: a scourge afflicting the Indian science. Indian J Med Res, 131, 373–376.

10. Lancaster, T and Clarke, L. (2008). The Phenomenon of Contract Cheating. In Robert Tim S (Ed.), Student Plagiarism in an Online World: Problems and Solutions, (pp. 144-158). USA: IGI Global.

11.  M.P. Satija. (2011). Plagiarism: A Tempting Snake. University News, 49(21), 4–8.

12. Macrina, F. L. (2005). Scientific integrity: text and cases in responsible conduct of research. Washington, D.C.: ASM Press.

13. Melbourne, T. U. of. (n.d.).Plagiarism : Academic honesty and plagiarism. Retrieved August 21, 2014, from https://academichonesty.unimelb.edu.au/plagiarism.html#5

14. Meriam-Webster. (n.d.). Plagiarism. Retrieved from http://www.learnersdictionary.com/definition/plagiarism

15. ORI Policy on Plagiarism. (n.d.).The Office of Research Integrity of US Dept. of Health and Human Service. Retrieved from http://ori.hhs.gov/ori-policy-plagiarism

16. Plagiarism detection. (2014, July 29). In Wikipedia, the free encyclopedia. Retrieved from http://en.wikipedia.org/w/index.php?title=Plagiarism_detectionandoldi d=618933494

 

17. Plagiarism Detection Software | iThenticate. (n.d.). Retrieved August 22, 2014, from http://www.ithenticate.com/

18. Rajeev, Vij, Navin Kumar Soni, and Gayas Makhdumi. (2009). Encouraging Academic Honesty through Anti-Plagiarism software. In Proceedings of 7th International CALIBER-2009 (pp. 439–448). Ahmedabad: INFLIBNET Centre.

19. Retraction Watch. (n.d.).Retraction Watch. Retrieved August 22, 2014, from http://retractionwatch.com/

20. Robert, Tim S. (2008). “Student Plagiarism in an Online World: An Introduction” In Robert Tim S (Ed.), Student Plagiarism in an Online World: Problems and Solutions, (pp. 1-22). USA: IGI Global.

21. Robert Harris. (2004). Anti-Plagiarism Strategies for Research Papers. Retrieved from http://www.virtualsalt.com/antiplag.htm

22. Shodhganga: Reservoir of Indian Theses. (n.d.). Retrieved from http://shodhganga.inflibnet.ac.in/

23. Society for Scientific Values. (n.d.). Retrieved from http://www.scientificvalues.org/cases.html

24. Turnitin Plagiarism Detection Software. (n.d.). Retrieved from http://turnitin.com/en_us/features/overview

25. What is Plagiarism?(n.d.).Plagiarism.org – Best Practices for Ensuring Originality in Written Work. Retrieved August 22, 2014, from http://www.plagiarism.org/plagiarism-101/what-is-plagiarism/

26. Viper – Anti-plagiarism Scanner. (n.d.). Retrieved from http://www.scanmyessay.com/