GIJEEE is an international forum for scientists and engineers involved in the fields of engineering sciences and its applications to publish high quality and refereed papers.
Plagiarism is the process of a menace of deceitful copying in any form, mutation or morphing, practiced by unethical authors in the world of academic and research achievements.
Although plagiarism is mostly associated with the written word, such as when a student or a teacher does not cite a source accurately in a term paper, it can also apply to graphic images and music. Taking credit on a conference or journal websites, personal blog for a video on YouTube, for example, would also be considered plagiarism. There have been several celebrity cases of plagiarism involving musicians.
We are all too aware of the ravages of misconduct in the academic community. Students submit assignments inherited from their friends, online paper mills provide term papers on popular topics, and occasionally researchers are found falsifying data or publishing the work of others as their own.
Plagiarism can be both accidental and intentional. Either way, it can still be prosecuted as a crime. Avoiding plagiarism is more than simply forgetting or neglecting to cite original sources
The ways of Plagiarism
Invariably, some authors resort to plagiarism hoping to further their academic career in a manner which is deceitful and unacceptable to the scientific community. There are different ways the plagiarism is practiced.
The Plane plagiarism. The most common method is to copy the content of the original paper , add and delete information, add new sentences , change the tile and so on and so forth. Such authors take care to see that the original author and the paper are never referred in their plagiarized paper, hoping that they would never be caught
Verbatim Plagiarism. The copying of portions of another author's paper with citing, but not clearly differentiating what text has been copied (e.g., not applying quotation marks correctly) and/or not citing the source correctly. Verbatim copying, near-verbatim copying, or purposely paraphrasing sentences of another author's paper and/or, copying elements of another author's paper (such as non-common knowledge illustrations and equations) without citing the source and without clearly delineating (e.g., in quotation marks) the source material.
NB: Representing substantial portions of another’s work as one’s own can result in the stronger penalties in the event of citation of that work.
The Embedded plagiarism. This kind is the most deceiving . They simply copy the essence of the original paper but take care to keep the reference to the original author all along and also in the references as well. As a result the plagiarized paper also would be a look alike original paper but may appear in a different journal or conference or as the case may be. The role of the original author as a result is delegated in its essence from the original author category when somebody happens to refer the plagiarized paper first in a different journal or conference in the first place.
The self absorbed plagiarism. The third most commonly practiced plagiarism is the self absorbed plagiarism , wherein , the author mutes the first paper into different forms with different titles to be presented in diverse conferences and journals just to increase the number of publications to enhance ones number of publications. The self-plagiarism occurs when authors reuse portions of their previous writings in subsequent research papers. Occasionally, the derived paper is simply a re-titled and reformatted version of the original one, but more frequently it is assembled from bits and pieces of previous work.
When a single author publishes many papers on the same subject matter in the shortest possible period , it is an indication pointing towards self abasement on the intellectual plane.
The accidental plagiarism. Where ,the sources may be cited, however, the information can be found in the source is not properly listed or in some cases, the papers cited as references themselves may be not original.
The investigation and the role of GRENZE on Plagiarism
The GRENZE propagates the bounden values and richness of intellectual property rights as the basic principle of the Codes of Ethics. Plagiarism is a clear violation of such ethical principles. It does violate copyright laws, as a result, the subject offers himself/herself embedded within the criminal environment to be punishable by statutes.
The structure of Investigation.
The process of investigation
The action taken.
Confidentiality
Criminal penalties
Penalties for plagiarism
The third party claims against GRENZE.
Structure of Investigation.
Upon receipt of an allegation of plagiarism, the GRENZE initiates the investigation process as per the following structure.
Depending on the details of the claim, the investigation may include, but not be limited to, any or all of the following steps:
Once the investigation has been completed, the GRENZE advisory body, based on a recommendations, will determine the penalties to be imposed depending on the type of plagiarism.
The Process of Investigation.
The GRENZE follows a process on plagiarism. Researchers can forward the suspected plagiarized papers complaint to admin @ thegrenze.com along with the original and plagiarized paper . As soon a complaint is registered, the process is set in motion. The GRENZE shall constitute a team of experts under the technical head of the conference to study and report on the complaints. The copies of both the papers are collected. The associated references are also collected for reference and study. Such a report involves meticulous synthesis and analysis of both the papers and the quoted and un quoted references.
The comparative study is made highlighting the plagiarized concepts , abstracts, paragraphs, figures, results, references, conclusions, Inferences, etc. The report is then concluded as the proof of plagiarism practiced and shall be sent to the original author and the first author of the plagiarized paper for their remarks, corrections, suggestions, justifications, etc. and for a response within three days.
If the response is not forthcoming either by way of acknowledgement or otherwise, the complaint from the first author shall be dropped and the case shall remain closed without citing any further reasons.
In case the plagiarized author avoids response, the report shall be sent to the co-authors if the contacts are available.
Still if the responses are not forth coming , the first author shall be contacted again to inform that their plagiarized paper as well as the report shall be sent to the head of the institution where the author is working , for their comments and remarks.
At this point , it is noticed that the responses arrive at lightning speed.
Action Taken
Once the plagiarism is confirmed , the report is submitted to GRENZE for record. The action is then taken to inform the digital library source of the nature of plagiarism with a request to delete the article from the proceedings in the indexed digital library.
The authors will be asked to write a formal letter of apology to the authors of the plagiarized paper, including an admission of the plagiarism.
Confidentiality
All aspects of an investigation will be treated with the utmost regard for confidentiality. The names and contacts of the person(s) making the claim and their relationship to the allegation (e.g., author of plagiarized work, reviewer or editor of plagiarizing work) will be kept confidential and used only for the purpose and duration of the investigation. However, in order to ensure timely and effective resolution, the information shall be shared as per the frame work or structure of investigation. As part of the investigation, it may be necessary for GRENZE to contact current and/or past employers of the authors. Additionally, some institutions have specific requirements for their employees to disclose any pending legal/ethical matters.
The GRENZE, at its discretion, may decide to publish in the all the forthcoming GRENZE conference web sites, the title of the plagiarized paper, the title of the original author, the authors name, the conference name, journal name, or as is what is required, as a mark of un ethical practices as well to act as a deterrent to unethical practices. However, during the investigation or later , under no circumstances will the GRENZE disclose any of individual author's personal information or registration details or address details unless the same author is repeatedly found to be practicing plagiarism.
Criminal Penalties
Penalties for Plagiarism
When plagiarism has been found to have occurred, the GRENZE will take the actions listed below as determined by the type of plagiarism. Unless determined otherwise during the investigation, all authors are deemed to be individually and collectively responsible for the content of a plagiarizing paper.
Should a claim arise against GRENZE (i.e., that a paper published by GRENZE through any of its associations has a plagiarized content, the GRENZE, through its proper body shall fully cooperate with the third party during the investigative phase and will inform the GRENZE Publications Board or the digital library publication boards of any conference publishing agencies of the conclusions and of the actions taken.
Conclusion
Should the authors refuse to comply with the above (e.g., if they refuse to write a formal letter of apology) or if it is determined during the plagiarism investigation that there have been multiple violations of any of the above forms of plagiarism by the same authors, the GRENZE retains the right to impose further sanctions such as automatic rejection of all current and future submissions for some extended period of time, invoking penalties prescribed by the GRENZE Codes of Ethics, and possibly statutory/injunctive relief. For information -the U.S. Copyright law allows a copyright owner to seek a maximum of $150,000 in damages upon a determination of willful infringement of copyright
REFERENCES
[1] “GRENZE Code of Ethics and Professional Conduct”
[2] Softtware Engineering Code of Ethics and Professional Practice”
http://www.acm.org/serving/se/code.htm
[3]SeeCollber and Kobourov, http://portal.acm.org/citation.cfm?doid=1053291.1053293.
[4] Manuscripts submitted to ACM Journals and Transactions based on the author’s own previously copyrighted work (e.g., appearing in a conference proceedings) must be disclosed at the time of submission and an explicit reference to the prior publication must be included in the submitted manuscript. The norm for ACM Journals and Transactions is that the submitted manuscript must contain at least 25% new content material (i.e., material that offernewinsights,newresults,etc.).Formoredetailssee http://www.acm.org/pubs/sim_submissions.html .
[5] Legal consequences of Plagiarism
http://www.ehow.com/about_6385612_legal-consequences-plagiarism.html
[6] ACM Policy and Procedures on Plagiarism
http://www.acm.org/publications/policies/plagiarism_policy