SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
INTERNATIONAL JOURNAL OF LIBRARY AND
INFORMATION SCIENCE (IJLIS)

International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

ISSN : 2277 – 3533 (Print)
ISSN : 2277 – 3584 (Online)
Volume 3, Issue 1, January - June (2014), pp. 10-16
© IAEME: www.iaeme.com/IJLIS.asp

IJLIS
©IAEME

Journal Impact Factor (2013): 5.1389 (Calculated by GISI),

www.jifactor.com

ROLE OF LIBRARIAN IN QUALITY SUSTENANCE IN RESEARCH
PUBLICATIONS THROUGH PLAGIARISM CHECKER
PREVENTION, DETECTION AND RESPONSE
*Dr.K. Sridhar,

**R.Saravana Subbu Selvan,

***V.Prabhu

* Librarian, (Govt. Aided Stream), DRBCCC Hindu College, Chennai –72
**Assistant Librarian, DRBCCC Hindu College, Chennai-72
***Library Assistant, DRBCCC Hindu College, Chennai - 72

ABSTRACT
This topic will make awareness among our professionals to prevent plagiarism in
future and help them to detect plagiarism and reduce the impact of plagiarism on education
and educational institutions. Planning your research publications well is the first and most
important step you can take towards preventing plagiarism. If you know you are going to use
other sources of information, you need to plan how you are going to include them in your
research publications. This means working out a balance between the ideas you have taken
from other sources and your own, original ideas.
Keywords: Plagiarism, Research, Librarian, Education, Ideas and Sources etc.
INTRODUCTION
Plagiarism is originated in European Countries during Seventeenth Centuries from
Latin word “Plagiarius” (i.e.,) Kidnaper. Indian Universities framed plagiarism code of
Student Right and Responsibilities in 2005. According to Oxford English Volume XI in
Second Edition said that “Plagiarism is the wrongful appropriation or purloining and
publication as one’s own, of the ideas, or the expression of the ideas (literary, artistic,
musical, mechanical etc) of another”. Plagiarism is quickly becoming part of our educational
culture. More and more students are turning to the internet for quick "shortcuts" around the
rewarding but time-consuming work of writing research papers and the expansion on Internet
10
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

is very fast and drastic development in the publishing area so, the rate of plagiarism is
increasing very fast and quickly.
TYPES OF PLAGIARISM
There are two types of Plagiarism. First one is Sources are Cited and another one is
Sources are not Cited.
Sources are cited
The forgotten Footnote
Neglects to include specific information on the location of the material referenced
The Misinformer
The writer provides inaccurate information regarding the sources
The Too-Perfect Paraphrase
Neglects to put in quotation marks text that has been copied word-for-word
The Resourceful Citer
The writer properly cites all sources but the paper contains almost no original work
The Perfect Crime
The writer tries to pass off the paraphrased material as his or her own analysis of the
cited material
Sources are not cited
The Ghost Writer
The writer turns in another’s work, word-for-word
The Photocopy
The writer copies significant portions of text straight from a single source
The Potluck Paper
Tweaking the sentences to make them fit together
The Poor Disguise
Altered the paper’s appearance slightly by changing key words and phrases
The Labor of Laziness
The writer takes the time to paraphrase most of the paper instead of spending the
same effort on original work
The Self-Stealer
The writer "borrows" generously or "recycles" from his or her previous work
11
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

LEVELS OF PLAGIARISM
Copying of Ideas : Most Extreme Form
Blatant Plagiarism : Copying verbation without quotation marks and relevant citation
and/or paraphrasing large parts without citation
Intelligent Plagiarism – I: Paraphrasing substantial and crucial sections from one or
more sources without relevant citation.
Intelligent Plagiarism – II : Selective or inadequate citation
Lazy Plagiarism – I : Copying a few sentences/phrases Verbation with
acknowledgement but without quotation marks or indent
Lazy Plagiarism – II : Incorrect citation/Misleading Sources
MOTIVATIONS TO PLAGIARISE
Internet as a major and easy source in research
“cut and paste” as easy option
Freely available information – easy important motivation
WHY STUDENTS AND ACADEMICS PLAGIAISE
Deadline Pressure
Students: Excessive Meliance on term papers & written assignments
Academics: Pressure to publish papers
Quality of Research Atmosphere
Inadequate academic resources and infrastructure – boost plagiarism
Insufficient Training/Exposure
Lack of exposure from early stages of Education on creative originality &
meaning/practice of plagiarism
Inadequate training in citation and reference styles
Reasons for unintentional Plagiarism
Genuine inability to express
The mind set of “not finding anything wrong” in plagiarizing contents
Not knowing various rules of citation, quotation etc.,
Casual attitude of authorities towards plagiarism
Absence of institutional mechanism & academic honor code of conduct in academic
institutions and professional bodies

12
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

WHY PLAGIARISING IS WRONG
If you Plagiarize, You are cheating yourself
You don’t learn to write out your thoughts in your own words
You don’t get specific individual needs and skills
Plagiarism is dishonest
INSTITUTIONAL RESPONSES TO PLAGIARISM
There are three pillars in institutional responses to plagiarize the research publications
Deterrence
Deterrence from Plagiarism is to be nurtured by promotion of faculty and institutional
academic integrity by sensitization, training and value inculcation
Detection
It constitutes neither effective prevention nor correction; but an intermediate step
between the two
Commercial software’s to detect Plagiarism as a simple recipe
These software’s are no panacea for breakdown of academic integrity
It is only one of the range of measures required in an effective policy package
Dealing
Multipronged approach-Prevention, Deterrence, Detection and Response with equal
attention
Introduction to Ideas of Originality at the Undergraduate level
Citation styles and Plagiarism practices at P.G level
Factors in UG and PG syllabus and Evaluation system
Institutional Mechanisms at the M.Phil /PhD level- Exposure ,Deterrence, Detection
and Response
Plagiarism in Research Papers by Faculty
MODEL SUGGESTION FOR RESPONSE TO PLAGIARISM AMONG STUDENTS
Plagiarism Levels(As per the
grading of levels of
Plagiarism)

P.G students (term paper /
assignment etc.,)

M.Phil/Ph.D Thesis

Levels 1 and 2 (most serious)

Warning (first time),
resubmission

Resubmission of the particular
section/chapter (violation of
honor code)

Levels 3 and 4 (Intelligent
Plagiarism)

Warning grades/marks affected

Resubmit assignment /chapter,
repeat course on plagiarism

Levels 5 and Level 6 (Lazy
Plagiarism)

Warning, course on plagiarism
to be repeated, additional
exams

Resubmit assignment/chapter,
repeat course on plagiarism

13
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

IN ORDER TO AVOID PLAGIARISM
Directly quoting another person’s actual words (oral or written)
Using another person’s ideas, opinions or theories
Paraphrasing the words, ideas, opinions or theories (oral or written)
Borrowing facts, statistics or illustrative material
Offering materials of others in the form of projects or collections without
acknowledgement
ROLE OF PLAGIARISM CHECKER
To filter the duplicate content
To receive a fairer of your document
To do effective research
Saves instructor time
Useful for Intellectual property issues
Allow students to check their own work
To avoid the plagiarism habit
FREE ONLINE PLAGIARAISM CHECKER
Plagiarism Detect
The Plagiarism Checker
Plagium
Duplic Checker
Plagiarism Checker
Article Checker
eTBlast- Virginia Tech
Chimpsky- University of Waterloo
CopyTracker and Viper –privately developed
eTBlast and Chimpsky are more credible but had limitations
Based on the above free online plagiarism software’s to help teachers, writers and
editors do their work more efficiently and if we have a collection of documents that you
think might contain plagiarized content, you can check them quickly with mentioned below
free software.
COMMERCIAL SOFTWARES
iParadigm- customised packages for different applications
Turnitin- Academic institutions
iThenticate- Publishers
WriteCheck- Students
Checkforplagiarism.net
Copyscape
Plagiarism Detecter
Plagiarism Scanner
14
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

Safe Assign
Scanmyessay
Urkund
Copyscape
Ephorus
UNDERSTANDING THE PLAGIARISM REPORT CONTENTS
Each plagiarism report is split into three sections, the top, following this is the
Sources section and following it is the Paper Text section. The details are as below:
Top section contains your Overall Plagiarism Index, this is a rating of the total
plagiarism found in your document (this is calculated by adding individual percentages of all
links found in the Sources section). Color codes are as follows:
Blue: 0% (No plagiarism found).
Green: 1% ~ 5% (Acceptable level of Plagiarism).
Yellow: 6% ~ 16% (Moderate level of Plagiarism).
Red: 17% ~ 100% (High level of Plagiarism).
Sources section contains links to publications, websites, articles, journals, books,
student papers, blogs, internet links, etc. of where plagiarism occurred from.
Paper Text section shows what plagiarism has occurred.
For example, if you copy/paste something from wikipedia.com then the link
wikipedia.com will show up in the Sources section while what has been copied from there
will be highlighted in the Paper Text section of the report. Linking each Source to the
particular highlighted content in the paper text is an index number. So number 1, for example,
in Sources will correspond to all number 1s in the Paper Text section. Your ultimate goal is to
get the plagiarism percentage down to the acceptable limit (1% ~ 5%), through document
correction and re-checking for plagiarism after each iteration.
ROLE OF LIBRARIAN IN THE CONTEXT OF PLAGIARISM
Teach citation skills
Librarians can help teachers, professors and educate students to the proper use of the
Internet.
Librarians may be assigned the work to check proper references and match with full
text in case of suspicious text.
Librarians should work with the academic institution to curb plagiarism by
incorporating instructions about it into library orientation programs.
Librarians should also be knowledgeable about reference sources as well as
familiarize themselves with standard citation and pass on this knowledge to the
academics as well as the students who come to the library to do their research.
Make available citation manuals and teaching materials in library and disseminate
these largely to the library users.

15
International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print),
ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME

CONCLUSION
The plagiarism seems to be a problem that academics recognize and wish to do
something about and one that lends itself to a range of solutions. So, in this connection free
online tools are becoming available to help identify plagiarism. Librarians explain the
research process, demonstrate how and when to cite sources and we offer a detailed
explanation of what constitutes plagiarism. Librarians must take initiative if we want students
to view the library as a viable, user-friendly, authentic alternative to the Internet. The Web is
like an arms race -- a constantly escalating contest of technology.” If librarians let down their
guard, in the end, students will be the losers of this race.
REFERENCE
1. Auer, Nicole J. & Ellen M. Krupar. (2001). “Mouse Click Plagiarism: The Role of
Technology – Plagiarism and the Librarian's Role in Combating It. Library Trends, 49
(3) 415-32.
2. Cullen, Bob. (2002, April) On My Honor… Washingtonian. 31-39. Retrieved from
Lexis Nexis Academic Universe on January 8, 2003.
3. Foster, Andrea L. (2002, May 17) “Plagiarism-detection Tool Creates Legal Quandary.”
The Journal of Higher Education 37. Retrieved from Lexis-Nexis Academic Universe
on October 1, 2002.
4. Roach, Ronald. (2001, Sept. 27) “Rutgers Tests Internet Plagiarism Software.” Black
Issues in Higher Education. 18:16 46.
5. Safer Morley, (Anchor) (2002, November 10) 60 Minutes (Television Broadcast) New
York. Columbia Broadcasting System
6. White, Edward M. (1999) “Student Plagiarism as an Institutional and Social Issue.” In
Perspectives on Plagiarism and Intellectual Property in a Postmodern World. Buranen
Lise & Alice M. Roy ( Eds.) New York: State University of New YorkPress.
7. Dr.R.Prabu, Dr.K.Sridhar, “Information and Communication Technology Skills among
the Colleges Librarians Affiliated To Bharathidasan University: A Study” International
Journal of Library and Information Science (IJLIS), Volume 1, Issue 2, 2012,
pp. 25 - 33, ISSN Print: 2277 – 3533, ISSN Online: 2277 – 3584.
8. Dr.K.Sridhar, “Perspectives of Digital Libraries in Medical Education”, International
Journal of Library and Information Science (IJLIS), Volume 1, Issue 1, 2012,
pp. 29 - 36, ISSN Print: 2277 – 3533, ISSN Online: 2277 – 3584.

16

Weitere ähnliche Inhalte

Was ist angesagt?

Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying Ziar Khan
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareAshish Arora
 
IRJET - Online Assignment Plagiarism Checking using Data Mining and NLP
IRJET -  	  Online Assignment Plagiarism Checking using Data Mining and NLPIRJET -  	  Online Assignment Plagiarism Checking using Data Mining and NLP
IRJET - Online Assignment Plagiarism Checking using Data Mining and NLPIRJET Journal
 
Anti-plagiarism tools for our repositories
Anti-plagiarism tools for our repositoriesAnti-plagiarism tools for our repositories
Anti-plagiarism tools for our repositoriesJan Mach
 
Software tools for checking plagiarism
Software tools for checking plagiarismSoftware tools for checking plagiarism
Software tools for checking plagiarismVenkitachalam Sriram
 
Preventing and detecting plagiarism
Preventing and detecting plagiarismPreventing and detecting plagiarism
Preventing and detecting plagiarismJISC RSC Southeast
 
Organising and Managing Research
Organising and Managing ResearchOrganising and Managing Research
Organising and Managing ResearchDr. Vinayak Bharadi
 
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...Indian Institute of Management Ahmedabad
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyTifanija
 
8 avoiding plagiarism-khalid
8 avoiding plagiarism-khalid8 avoiding plagiarism-khalid
8 avoiding plagiarism-khalidKhalid Mahmood
 

Was ist angesagt? (15)

Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Ijet journal
Ijet journalIjet journal
Ijet journal
 
IRJET - Online Assignment Plagiarism Checking using Data Mining and NLP
IRJET -  	  Online Assignment Plagiarism Checking using Data Mining and NLPIRJET -  	  Online Assignment Plagiarism Checking using Data Mining and NLP
IRJET - Online Assignment Plagiarism Checking using Data Mining and NLP
 
Anti-plagiarism tools for our repositories
Anti-plagiarism tools for our repositoriesAnti-plagiarism tools for our repositories
Anti-plagiarism tools for our repositories
 
Academic dishonesty
Academic dishonestyAcademic dishonesty
Academic dishonesty
 
Plag detection
Plag detectionPlag detection
Plag detection
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Software tools for checking plagiarism
Software tools for checking plagiarismSoftware tools for checking plagiarism
Software tools for checking plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Preventing and detecting plagiarism
Preventing and detecting plagiarismPreventing and detecting plagiarism
Preventing and detecting plagiarism
 
Organising and Managing Research
Organising and Managing ResearchOrganising and Managing Research
Organising and Managing Research
 
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
An Overview on Plagiarism: A Challenging Issue on Scholarly Writings in this ...
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
8 avoiding plagiarism-khalid
8 avoiding plagiarism-khalid8 avoiding plagiarism-khalid
8 avoiding plagiarism-khalid
 

Ähnlich wie 20304050607081

DQ3-2 Responses1.The internet is filled with many sites and ma.docx
DQ3-2 Responses1.The internet is filled with many sites and ma.docxDQ3-2 Responses1.The internet is filled with many sites and ma.docx
DQ3-2 Responses1.The internet is filled with many sites and ma.docxkanepbyrne80830
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiaristAboul Ella Hassanien
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmarijtsrd
 
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxresource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxdebishakespeare
 
Upgrading the Scholarly Infrastructure
Upgrading the Scholarly InfrastructureUpgrading the Scholarly Infrastructure
Upgrading the Scholarly InfrastructureBjörn Brembs
 
Approaches To Shodhganga A Reservoir Of Indian Theses
Approaches To Shodhganga  A Reservoir Of Indian ThesesApproaches To Shodhganga  A Reservoir Of Indian Theses
Approaches To Shodhganga A Reservoir Of Indian ThesesJustin Knight
 
Access To Online Databases Predicate For Faculty Research Output
Access To Online Databases  Predicate For Faculty Research OutputAccess To Online Databases  Predicate For Faculty Research Output
Access To Online Databases Predicate For Faculty Research OutputSamantha Martinez
 
Plagiarism and Research Integrity
Plagiarism and Research IntegrityPlagiarism and Research Integrity
Plagiarism and Research IntegrityAnup Kumar Das
 
Create and maintain an up-to-date ResearcherID profile
Create and maintain an up-to-date ResearcherID profile Create and maintain an up-to-date ResearcherID profile
Create and maintain an up-to-date ResearcherID profile Nader Ale Ebrahim
 
Open access repositories
Open access repositoriesOpen access repositories
Open access repositoriesIryna Kuchma
 
UKSG webinar: Making scholarly communication great again. Do institutional re...
UKSG webinar: Making scholarly communication great again. Do institutional re...UKSG webinar: Making scholarly communication great again. Do institutional re...
UKSG webinar: Making scholarly communication great again. Do institutional re...UKSG: connecting the knowledge community
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarismLCCeszymanski
 
Introduction to Altmetrics
Introduction to Altmetrics Introduction to Altmetrics
Introduction to Altmetrics Linda Galloway
 

Ähnlich wie 20304050607081 (20)

DQ3-2 Responses1.The internet is filled with many sites and ma.docx
DQ3-2 Responses1.The internet is filled with many sites and ma.docxDQ3-2 Responses1.The internet is filled with many sites and ma.docx
DQ3-2 Responses1.The internet is filled with many sites and ma.docx
 
seminar on how to write research papers without being called plagiarist
seminar on how to write research papers without  being called  plagiaristseminar on how to write research papers without  being called  plagiarist
seminar on how to write research papers without being called plagiarist
 
PLAG PPT.pdf
PLAG PPT.pdfPLAG PPT.pdf
PLAG PPT.pdf
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmar
 
A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021A systematic literature review of academic cyberbullying 2021
A systematic literature review of academic cyberbullying 2021
 
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docxresource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
resource 1TitleINTELLECTUAL PROPERTY RIGHTS CONCEPTUAL AWAREN.docx
 
Upgrading the Scholarly Infrastructure
Upgrading the Scholarly InfrastructureUpgrading the Scholarly Infrastructure
Upgrading the Scholarly Infrastructure
 
Approaches To Shodhganga A Reservoir Of Indian Theses
Approaches To Shodhganga  A Reservoir Of Indian ThesesApproaches To Shodhganga  A Reservoir Of Indian Theses
Approaches To Shodhganga A Reservoir Of Indian Theses
 
Access To Online Databases Predicate For Faculty Research Output
Access To Online Databases  Predicate For Faculty Research OutputAccess To Online Databases  Predicate For Faculty Research Output
Access To Online Databases Predicate For Faculty Research Output
 
Plagiarism and Research Integrity
Plagiarism and Research IntegrityPlagiarism and Research Integrity
Plagiarism and Research Integrity
 
Create and maintain an up-to-date ResearcherID profile
Create and maintain an up-to-date ResearcherID profile Create and maintain an up-to-date ResearcherID profile
Create and maintain an up-to-date ResearcherID profile
 
Lern, june 2016, digital media slides
Lern, june 2016, digital media slidesLern, june 2016, digital media slides
Lern, june 2016, digital media slides
 
Open access repositories
Open access repositoriesOpen access repositories
Open access repositories
 
UKSG webinar: Making scholarly communication great again. Do institutional re...
UKSG webinar: Making scholarly communication great again. Do institutional re...UKSG webinar: Making scholarly communication great again. Do institutional re...
UKSG webinar: Making scholarly communication great again. Do institutional re...
 
Plagiarism Issues
Plagiarism Issues Plagiarism Issues
Plagiarism Issues
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarism
 
Introduction to Altmetrics
Introduction to Altmetrics Introduction to Altmetrics
Introduction to Altmetrics
 
Use Plagiarism Software.pptx
Use Plagiarism Software.pptxUse Plagiarism Software.pptx
Use Plagiarism Software.pptx
 
20304050607084
2030405060708420304050607084
20304050607084
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Kürzlich hochgeladen (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

20304050607081

  • 1. INTERNATIONAL JOURNAL OF LIBRARY AND INFORMATION SCIENCE (IJLIS) International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME ISSN : 2277 – 3533 (Print) ISSN : 2277 – 3584 (Online) Volume 3, Issue 1, January - June (2014), pp. 10-16 © IAEME: www.iaeme.com/IJLIS.asp IJLIS ©IAEME Journal Impact Factor (2013): 5.1389 (Calculated by GISI), www.jifactor.com ROLE OF LIBRARIAN IN QUALITY SUSTENANCE IN RESEARCH PUBLICATIONS THROUGH PLAGIARISM CHECKER PREVENTION, DETECTION AND RESPONSE *Dr.K. Sridhar, **R.Saravana Subbu Selvan, ***V.Prabhu * Librarian, (Govt. Aided Stream), DRBCCC Hindu College, Chennai –72 **Assistant Librarian, DRBCCC Hindu College, Chennai-72 ***Library Assistant, DRBCCC Hindu College, Chennai - 72 ABSTRACT This topic will make awareness among our professionals to prevent plagiarism in future and help them to detect plagiarism and reduce the impact of plagiarism on education and educational institutions. Planning your research publications well is the first and most important step you can take towards preventing plagiarism. If you know you are going to use other sources of information, you need to plan how you are going to include them in your research publications. This means working out a balance between the ideas you have taken from other sources and your own, original ideas. Keywords: Plagiarism, Research, Librarian, Education, Ideas and Sources etc. INTRODUCTION Plagiarism is originated in European Countries during Seventeenth Centuries from Latin word “Plagiarius” (i.e.,) Kidnaper. Indian Universities framed plagiarism code of Student Right and Responsibilities in 2005. According to Oxford English Volume XI in Second Edition said that “Plagiarism is the wrongful appropriation or purloining and publication as one’s own, of the ideas, or the expression of the ideas (literary, artistic, musical, mechanical etc) of another”. Plagiarism is quickly becoming part of our educational culture. More and more students are turning to the internet for quick "shortcuts" around the rewarding but time-consuming work of writing research papers and the expansion on Internet 10
  • 2. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME is very fast and drastic development in the publishing area so, the rate of plagiarism is increasing very fast and quickly. TYPES OF PLAGIARISM There are two types of Plagiarism. First one is Sources are Cited and another one is Sources are not Cited. Sources are cited The forgotten Footnote Neglects to include specific information on the location of the material referenced The Misinformer The writer provides inaccurate information regarding the sources The Too-Perfect Paraphrase Neglects to put in quotation marks text that has been copied word-for-word The Resourceful Citer The writer properly cites all sources but the paper contains almost no original work The Perfect Crime The writer tries to pass off the paraphrased material as his or her own analysis of the cited material Sources are not cited The Ghost Writer The writer turns in another’s work, word-for-word The Photocopy The writer copies significant portions of text straight from a single source The Potluck Paper Tweaking the sentences to make them fit together The Poor Disguise Altered the paper’s appearance slightly by changing key words and phrases The Labor of Laziness The writer takes the time to paraphrase most of the paper instead of spending the same effort on original work The Self-Stealer The writer "borrows" generously or "recycles" from his or her previous work 11
  • 3. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME LEVELS OF PLAGIARISM Copying of Ideas : Most Extreme Form Blatant Plagiarism : Copying verbation without quotation marks and relevant citation and/or paraphrasing large parts without citation Intelligent Plagiarism – I: Paraphrasing substantial and crucial sections from one or more sources without relevant citation. Intelligent Plagiarism – II : Selective or inadequate citation Lazy Plagiarism – I : Copying a few sentences/phrases Verbation with acknowledgement but without quotation marks or indent Lazy Plagiarism – II : Incorrect citation/Misleading Sources MOTIVATIONS TO PLAGIARISE Internet as a major and easy source in research “cut and paste” as easy option Freely available information – easy important motivation WHY STUDENTS AND ACADEMICS PLAGIAISE Deadline Pressure Students: Excessive Meliance on term papers & written assignments Academics: Pressure to publish papers Quality of Research Atmosphere Inadequate academic resources and infrastructure – boost plagiarism Insufficient Training/Exposure Lack of exposure from early stages of Education on creative originality & meaning/practice of plagiarism Inadequate training in citation and reference styles Reasons for unintentional Plagiarism Genuine inability to express The mind set of “not finding anything wrong” in plagiarizing contents Not knowing various rules of citation, quotation etc., Casual attitude of authorities towards plagiarism Absence of institutional mechanism & academic honor code of conduct in academic institutions and professional bodies 12
  • 4. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME WHY PLAGIARISING IS WRONG If you Plagiarize, You are cheating yourself You don’t learn to write out your thoughts in your own words You don’t get specific individual needs and skills Plagiarism is dishonest INSTITUTIONAL RESPONSES TO PLAGIARISM There are three pillars in institutional responses to plagiarize the research publications Deterrence Deterrence from Plagiarism is to be nurtured by promotion of faculty and institutional academic integrity by sensitization, training and value inculcation Detection It constitutes neither effective prevention nor correction; but an intermediate step between the two Commercial software’s to detect Plagiarism as a simple recipe These software’s are no panacea for breakdown of academic integrity It is only one of the range of measures required in an effective policy package Dealing Multipronged approach-Prevention, Deterrence, Detection and Response with equal attention Introduction to Ideas of Originality at the Undergraduate level Citation styles and Plagiarism practices at P.G level Factors in UG and PG syllabus and Evaluation system Institutional Mechanisms at the M.Phil /PhD level- Exposure ,Deterrence, Detection and Response Plagiarism in Research Papers by Faculty MODEL SUGGESTION FOR RESPONSE TO PLAGIARISM AMONG STUDENTS Plagiarism Levels(As per the grading of levels of Plagiarism) P.G students (term paper / assignment etc.,) M.Phil/Ph.D Thesis Levels 1 and 2 (most serious) Warning (first time), resubmission Resubmission of the particular section/chapter (violation of honor code) Levels 3 and 4 (Intelligent Plagiarism) Warning grades/marks affected Resubmit assignment /chapter, repeat course on plagiarism Levels 5 and Level 6 (Lazy Plagiarism) Warning, course on plagiarism to be repeated, additional exams Resubmit assignment/chapter, repeat course on plagiarism 13
  • 5. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME IN ORDER TO AVOID PLAGIARISM Directly quoting another person’s actual words (oral or written) Using another person’s ideas, opinions or theories Paraphrasing the words, ideas, opinions or theories (oral or written) Borrowing facts, statistics or illustrative material Offering materials of others in the form of projects or collections without acknowledgement ROLE OF PLAGIARISM CHECKER To filter the duplicate content To receive a fairer of your document To do effective research Saves instructor time Useful for Intellectual property issues Allow students to check their own work To avoid the plagiarism habit FREE ONLINE PLAGIARAISM CHECKER Plagiarism Detect The Plagiarism Checker Plagium Duplic Checker Plagiarism Checker Article Checker eTBlast- Virginia Tech Chimpsky- University of Waterloo CopyTracker and Viper –privately developed eTBlast and Chimpsky are more credible but had limitations Based on the above free online plagiarism software’s to help teachers, writers and editors do their work more efficiently and if we have a collection of documents that you think might contain plagiarized content, you can check them quickly with mentioned below free software. COMMERCIAL SOFTWARES iParadigm- customised packages for different applications Turnitin- Academic institutions iThenticate- Publishers WriteCheck- Students Checkforplagiarism.net Copyscape Plagiarism Detecter Plagiarism Scanner 14
  • 6. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME Safe Assign Scanmyessay Urkund Copyscape Ephorus UNDERSTANDING THE PLAGIARISM REPORT CONTENTS Each plagiarism report is split into three sections, the top, following this is the Sources section and following it is the Paper Text section. The details are as below: Top section contains your Overall Plagiarism Index, this is a rating of the total plagiarism found in your document (this is calculated by adding individual percentages of all links found in the Sources section). Color codes are as follows: Blue: 0% (No plagiarism found). Green: 1% ~ 5% (Acceptable level of Plagiarism). Yellow: 6% ~ 16% (Moderate level of Plagiarism). Red: 17% ~ 100% (High level of Plagiarism). Sources section contains links to publications, websites, articles, journals, books, student papers, blogs, internet links, etc. of where plagiarism occurred from. Paper Text section shows what plagiarism has occurred. For example, if you copy/paste something from wikipedia.com then the link wikipedia.com will show up in the Sources section while what has been copied from there will be highlighted in the Paper Text section of the report. Linking each Source to the particular highlighted content in the paper text is an index number. So number 1, for example, in Sources will correspond to all number 1s in the Paper Text section. Your ultimate goal is to get the plagiarism percentage down to the acceptable limit (1% ~ 5%), through document correction and re-checking for plagiarism after each iteration. ROLE OF LIBRARIAN IN THE CONTEXT OF PLAGIARISM Teach citation skills Librarians can help teachers, professors and educate students to the proper use of the Internet. Librarians may be assigned the work to check proper references and match with full text in case of suspicious text. Librarians should work with the academic institution to curb plagiarism by incorporating instructions about it into library orientation programs. Librarians should also be knowledgeable about reference sources as well as familiarize themselves with standard citation and pass on this knowledge to the academics as well as the students who come to the library to do their research. Make available citation manuals and teaching materials in library and disseminate these largely to the library users. 15
  • 7. International Journal of Library and Information Science (IJLIS), ISSN: 2277 – 3533 (Print), ISSN: 2277 – 3584 (Online), Volume 3, Issue 1, January - June (2014), © IAEME CONCLUSION The plagiarism seems to be a problem that academics recognize and wish to do something about and one that lends itself to a range of solutions. So, in this connection free online tools are becoming available to help identify plagiarism. Librarians explain the research process, demonstrate how and when to cite sources and we offer a detailed explanation of what constitutes plagiarism. Librarians must take initiative if we want students to view the library as a viable, user-friendly, authentic alternative to the Internet. The Web is like an arms race -- a constantly escalating contest of technology.” If librarians let down their guard, in the end, students will be the losers of this race. REFERENCE 1. Auer, Nicole J. & Ellen M. Krupar. (2001). “Mouse Click Plagiarism: The Role of Technology – Plagiarism and the Librarian's Role in Combating It. Library Trends, 49 (3) 415-32. 2. Cullen, Bob. (2002, April) On My Honor… Washingtonian. 31-39. Retrieved from Lexis Nexis Academic Universe on January 8, 2003. 3. Foster, Andrea L. (2002, May 17) “Plagiarism-detection Tool Creates Legal Quandary.” The Journal of Higher Education 37. Retrieved from Lexis-Nexis Academic Universe on October 1, 2002. 4. Roach, Ronald. (2001, Sept. 27) “Rutgers Tests Internet Plagiarism Software.” Black Issues in Higher Education. 18:16 46. 5. Safer Morley, (Anchor) (2002, November 10) 60 Minutes (Television Broadcast) New York. Columbia Broadcasting System 6. White, Edward M. (1999) “Student Plagiarism as an Institutional and Social Issue.” In Perspectives on Plagiarism and Intellectual Property in a Postmodern World. Buranen Lise & Alice M. Roy ( Eds.) New York: State University of New YorkPress. 7. Dr.R.Prabu, Dr.K.Sridhar, “Information and Communication Technology Skills among the Colleges Librarians Affiliated To Bharathidasan University: A Study” International Journal of Library and Information Science (IJLIS), Volume 1, Issue 2, 2012, pp. 25 - 33, ISSN Print: 2277 – 3533, ISSN Online: 2277 – 3584. 8. Dr.K.Sridhar, “Perspectives of Digital Libraries in Medical Education”, International Journal of Library and Information Science (IJLIS), Volume 1, Issue 1, 2012, pp. 29 - 36, ISSN Print: 2277 – 3533, ISSN Online: 2277 – 3584. 16