A Busy Student Finds a Source

Categories:

                                  Required Case Studies
Case Study #1: A Busy Student Finds a Source
Plagiarism refers to unauthorized use of various sources of information without giving the original authors the due credit. Indeed, the unethical aspect of plagiarism is using another person’s work without crediting it.[1] In the case of Esmay, it is commendable that she has done a lot of work to avoid plagiarism. However, it is clear that she has literally stolen what someone else has worked for. It should be noted that that she has intentionally avoided the acceptable way of writing papers although she went ahead and cited the Oklahoma source. In basic terms, plagiarism is defined as the use of someone else’s work and ideas intentionally or unintentionally to present them as your own.[2]
Esmay was in the right path of avoiding plagiarism but she did not avoid it at all. It is true that she took the idea of another person’s original paper. It is fine that she did not plagiarize the words but the ideas of the original writer. It was also unfortunate she chose to deliberately plagiarize from the web paper. It should also be noted that she could have used the paper in a proper way. This could be achieved by avoiding the act of taking the position of the other writer. The writer could have used the paper to develop her own thoughts. By paraphrasing, she avoided the task of thinking which is important in developing academicians.[3]
Case Study #2: A Visitor with a Big Request
            If I choose to remain ethical, then definitely I will not find it easy to cooperate with my brother’s friend, mark. I will not hesitate to tell him that the advances he is making violate the ethics of information technology. It is noted that secrecy and confidentiality are the most ignored rules in information ethics.[4] I will inform Mark that whatever is under my disposal from GMU is supposed to be used to safeguard my interest as a bona fide member. It is true that he will have approached me within the basis of the fact that I am a relative to his friend since he is my brother. I will use the same foundation to inform him the ethical standards of online accounts that individuals break hence compromising their net benefits. My major concern in explaining these issues will be the effort needed in making him understand why he should use other alternatives.
From my understanding, personal gain at the expense of honesty is very unethical and unprofessional.[5] Practically, providing Mark with my password and social security pin is a great mistake which many people do. In due course, a person who has such personal details of another person is able to manipulate them to suit their demands. In addition, it is true that I will have put myself into a big risk of persecution for breaking the IT morals of my organization.
Case Study #3: Great Images
            The basic way to avoid plagiarism when it comes to the case of images on the internet is to cite their source directly.[6] The fact that an image has been tagged implies that it should be recognized that it is a production that belongs to someone else. In this case, where the image is appealing and very usable in the website I am developing, I should ensure that the image does not become the central figure of my site.[7] It should be applied in the company of other original works of my own effort. Notably, for the sake of production ethics, one should also be keen to note that the image which depicts the civil right global movement appears in the site to the best knowledge of the public domain.[8]
The photo will have been well applied in the site if only its source is cited. There is perpetually not a safe way of using it without acknowledging that it is not my own creation.[9] In order to use the logo entitled ‘Civil Rights–Everybody’s Business’ properly, I will process and analyze the whole idea of informing others that civil rights is everybody’s concern. In order to remain professional, I will have to acknowledge other external sources used in my work. Coming up with a personal different logo for my specific site will not be a major challenge and therefore there will be limited chances of plagiarizing images.[10]
2. Elective Case Studies
Case Study #4: Collecting the Data
            The fact that legal provisions and copyright laws in the digital industry allow collaboration of website users, the decisions of a particular organization are not under any individual control. Every organization enjoys absolute liberty of formulating its websites and using them for their businesses. The autonomy of a firm gives it a chance to exist as an information technology unit. The move by the research company will not be supported by our advocacy group. This will definitely be the right choice to make. Our website does not need to conceal the identities of collaborating firms since we are advocates of the public. Our centralized system of operation should not be altered to create a ground for the market researcher. The other organization does research for on-line gardening which is different from the purpose of our site. It is not worth to infringe our website advocacy role with the commercial role of the extra cookie.
Case Study #5: A Problem Paper
            According to academic writing norms, it is proper to make mistakes when making choices in regards to ground research. Indeed, according to the ethics of writing research papers, blunders are inevitable. The problem with many students who compile papers on different topics is that they try to conceal their mistakes by forgetting that their tutors are only interested in making them knowledgeable and not just to help them attain good grades. Brooke deserved the F grade for using intentional falsification. He was not supposed to use data which was collected from non conventional sources. This made his work to lose the expected standard. Secondly, due to use of a fake data gathering procedure, Brooke could not realize the right outcome. He was wrong to use irrelevant

[1] Purdue University. “Purdue Online Writing Lab.” Safe practices. Last modified 2012,
http://owl.english.purdue.edu/owl/resource/589/03/

[2] Barry Gilmore, Plagiarism: why it happens, how to prevent it. (Darmstadt: Heinermann, 2008), 110.

[3] [3] George Mason University. “University Policies.” University Policy Number 1301. Last modified August 30 2008. http://universitypolicy.gmu.edu/1301gen.html

[4] George Mason University. “University Policies.” University Policy Number 1301. Last modified August 30 2008. http://universitypolicy.gmu.edu/1301gen.html

[5] George Mason University. “University Policies.” University Policy Number 1301. Last modified August 30 2008. http://universitypolicy.gmu.edu/1301gen.html

[6] Purdue University. “Purdue Online Writing Lab.” Safe practices.Last modified 2012.
http://owl.english.purdue.edu/owl/resource/589/03/

[7] Bill Marsh, Plagiarism: Alchemy and Remedy in Higher Education. (New York: Sunny Press, 2007), 98.

[8] Peter Singer, Practical ethics. (Cambridge: Cambridge University Press, 2011), 50.

[9] Ian Gregory, Continuum Research Methods Series. (New York: Continuum International Publishing, 2003), 112.

[10] Ian Gregory, Continuum Research Methods Series. (New York: Continuum International Publishing, 2003), 112.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *