Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
Look at the heading of the text.Содержание книги
Поиск на нашем сайте
What is the text about? How can you define plagiarism? Do you know the types of plagiarism?
PLAGIARISM
Plagiarism, as defined in the 1995 Random House Compact Unabridged Dictionary, is the "use or close imitation of the language and thoughts of another author and the representation of them as one's own original work." Within academia, plagiarism by students, professors, or researchers is considered as academic dishonesty or academic fraud and offenders are subject to academic censure, up to and including expulsion. In journalism, plagiarism is considered as a breach of journalistic ethics, and reporters caught plagiarizing typically face disciplinary measures ranging from suspension to termination. While plagiarism in scholarship and journalism has a centuries-old history, the development of the Internet, where articles appear as electronic text, has made the physical act of copying the work of others much easier, simply by copying and pasting text from one web page to another. There are several different kinds of plagiarism:
Plagiarism detection is the process of locating instances of plagiarism within a work or document. The widespread use of computers and the advent of the Internet has made it easier to plagiarize the work of others. Detection can be either manual or computer-assisted. Manual detection requires substantial effort and excellent memory, and is impractical in cases where too many documents must be compared, or original documents are not available for comparison. Computer-assisted detection allows vast collections of documents to be compared to each other, making successful detection much more likely.
1. Skim the text and find: a) the definition of plagiarism b) the types of plagiarism c) the definition of plagiarism detection d) the ways of plagiarism detection
2. Look closer at the types of plagiarism and then look at the samples of plagiarism to determine the type. Give your reasons: Copy & Paste Plagiarism: Any time you lift a sentence or significant phrase intact from a source, you must use quotations marks and reference the source. Word Switch Plagiarism: If you take a sentence from a source and change around a few words, it is still plagiarism. If you want to quote a sentence, then you need to put it in quotation marks and cite the author and article. Style Plagiarism: When you follow a Source Article sentence-by-sentence or paragraph-by-paragraph, it is plagiarism, even though none of your sentences is exactly like those in the Source Article or even in the same order. What you are copying in this case, is the author's reasoning style.
Metaphor Plagiarism: Metaphors are used either to make an idea clearer or give the reader an analogy that touches the senses or emotions better than a plain description of the object or process. If you cannot come up with your own metaphor to illustrate an important idea, then use the metaphor in the Source Article, but give the author credit for it.
Idea Plagiarism: If the author of the source article expresses a creative idea or suggests a solution to a problem, the idea or solution must be clearly attributed to the author.
TEXT 4 Read the text: SOFTWARE FORENSICS
Computers and networks have played an important role in peoples’ everyday life over the last decade. But while computers have made our lives easier and have improved our standard of living, have also introduced a new venue of criminal activities. Cyber attacks in the form of viruses, trojan horses, logic bombs, fraud, credit card cloning, plagiarism of code have increased in severity and frequency. The creation of a new field with its own methods and tools, called software forensics, has helped to tackle these issues in a proper way and not in an ad hoc manner. The term software forensics implies the use of these tools and methods for some legal or official purpose. Software forensics could be used to examine and analyze software in any form, source or executable code, to identify the author. Although source code (the textual form of a computer program that is written by a computer programmer) is much more formal and restrictive than spoken or written languages, there is still a large degree of flexibility when writing a program. This flexibility includes characteristics that deal with the layout of the program (placement of comments, indentation), characteristics that are more difficult to change automatically by pretty printers and code formatters, and deal with the style of the program (comment lengths, variable names, function names) and features that we hypothesize are dependent on the programming experience (the statistical distribution of lines of code per function, usage of data structures). Research studies on this field have proved that many of these features (layout, style, structure) of computer program can be specific to a programmer. Source code authorship analysis can be divided into 5 sub-fields according to the application area: 1. Author identification. The aim here is to decide whether some piece of code was written by a certain programmer. This type of application area has a lot of similarities with the corresponding literature where the task is to determine that a piece of work has been written by a certain author. 2. Author characterization. This application area determines some characteristics of the programmer of a piece of code, such as cultural educational background and language familiarity, based on their programming style. 3. Plagiarism detection. This method attempts to find similarities among multiple sets of source code files. 4. Author discrimination. This task is the opposite of the above and involves deciding whether some pieces of code were written by a single author or by some number of authors. 5. Author intent determination. In some cases we need to know whether a piece of code was written having this as its goal or was the result of an accidental error. In many cases, an error during the software development process can cause serious problems. It seems that source code authorship analysis is an important area of practice in computer security, computer law, and academia as well as an exciting area of research.
Comprehensive questions: v How can you identify software forensics? What are the objectives of software forensics? v What characteristic features of the author’s style can you find in any program? v How can source code authorship analysis be divided? v Where is code authorship analysis used?
2. Fill in the chart with the information from the text: WHAT IS ….?
Find words in the text that collocate with the words given below. Look up the meaning of the ones you don’t know in the dictionary. Do you know any other collocations with them? Write down your own sentences with them. 4. Give definitions to the following words from the text: 1. Viruses are …….. 2. Trojan horses are ……. 3. Logic bombs are …….. 4. Credit card cloning is ……… 5. Cyber attacks are …………
TEXT 5
|
||||||||||||||||||||||||||||||||||||||||||||||
Последнее изменение этой страницы: 2016-12-12; просмотров: 542; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.141.41.109 (0.009 с.) |