SlideShare a Scribd company logo
1 of 24
Download to read offline
Preventing & Detecting Plagiarism  Using the TurnitinUK plagiarism detection software RSC South East : 4 July, 2007 Gill Rowell  Advisor, Plagiarism Advisory Service .
Today’s session ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
JISCPAS approach to plagiarism prevention ,[object Object],[object Object],[object Object],[object Object]
 
TurnitinUK: the plagiarism detection software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does TurnitinUK check? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Process ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Originality Report ,[object Object],[object Object],[object Object],[object Object],[object Object]
Clicking on links will take you to web sites where matching text has been found. Uploaded paper is displayed with any matching text highlighted and numbered.
 
The role of plagiarism detection software ,[object Object],[object Object],[object Object],[object Object]
But… ,[object Object],[object Object],[object Object]
Preventing & Detecting Plagiarism  Using the TurnitinUK plagiarism detection software Now let’s do some plagiarising ourselves, and try out TurnitinUK.
Preventing & Detecting Plagiarism  Using the TurnitinUK plagiarism detection software Implementation: some issues to consider
Exercise: questions to ask ,[object Object],[object Object],[object Object]
Some things to consider… ,[object Object],[object Object],[object Object]
The formative approach? ,[object Object],[object Object],[object Object],[object Object],[object Object]
The summative approach? ,[object Object],[object Object],[object Object],[object Object]
Options for summative screening ,[object Object],[object Object],[object Object]
Use via VLE ,[object Object],[object Object],[object Object],[object Object],[object Object]
Preventing & Detecting Plagiarism  Using the TurnitinUK plagiarism detection software Any further questions?
Copyright and Data Protection issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Opportunities for sharing experiences ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Reference management software: Zotero
Reference management software: ZoteroReference management software: Zotero
Reference management software: ZoteroVenkitachalam Sriram
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010esyin
 
Plagiarism checker
Plagiarism checkerPlagiarism checker
Plagiarism checkerisaacnailor
 
Correct use of sources harvard
Correct use of sources harvardCorrect use of sources harvard
Correct use of sources harvardSarah George
 
Carma internet research module preparing for manuscript submission
Carma internet research module   preparing for manuscript submissionCarma internet research module   preparing for manuscript submission
Carma internet research module preparing for manuscript submissionSyracuse University
 
What is plagiarism
What is plagiarismWhat is plagiarism
What is plagiarismamandajune
 
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerPlagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerTechsparks
 
Types of plagiarism law
Types of plagiarism law Types of plagiarism law
Types of plagiarism law Sarah George
 
In-text Citations - APA 6th ed
In-text Citations - APA 6th edIn-text Citations - APA 6th ed
In-text Citations - APA 6th edJanice Orcutt
 
Types of plagiarism numeric
Types of plagiarism numericTypes of plagiarism numeric
Types of plagiarism numericSarah George
 
W3C HCLS Dataset Description Guidelines
W3C HCLS Dataset Description GuidelinesW3C HCLS Dataset Description Guidelines
W3C HCLS Dataset Description GuidelinesMichel Dumontier
 
Reference Management and Plagiarism prevention
Reference Management and Plagiarism preventionReference Management and Plagiarism prevention
Reference Management and Plagiarism preventionVenkitachalam Sriram
 
Plagiarism scavenger hunt
Plagiarism scavenger huntPlagiarism scavenger hunt
Plagiarism scavenger huntAndres69044
 
How to interpret turnitin reports
How to interpret turnitin reportsHow to interpret turnitin reports
How to interpret turnitin reportsDileeka Fernando
 

What's hot (19)

Reference management software: Zotero
Reference management software: ZoteroReference management software: Zotero
Reference management software: Zotero
 
Plagarism + Turnitin Bus Induction Feb 2010
Plagarism + Turnitin   Bus Induction Feb 2010Plagarism + Turnitin   Bus Induction Feb 2010
Plagarism + Turnitin Bus Induction Feb 2010
 
Plagiarism checker
Plagiarism checkerPlagiarism checker
Plagiarism checker
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Correct use of sources harvard
Correct use of sources harvardCorrect use of sources harvard
Correct use of sources harvard
 
Carma internet research module preparing for manuscript submission
Carma internet research module   preparing for manuscript submissionCarma internet research module   preparing for manuscript submission
Carma internet research module preparing for manuscript submission
 
What is plagiarism
What is plagiarismWhat is plagiarism
What is plagiarism
 
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism CheckerPlagiarism - Everything you need to know|Thesis Plagiarism Checker
Plagiarism - Everything you need to know|Thesis Plagiarism Checker
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Types of plagiarism law
Types of plagiarism law Types of plagiarism law
Types of plagiarism law
 
In-text Citations - APA 6th ed
In-text Citations - APA 6th edIn-text Citations - APA 6th ed
In-text Citations - APA 6th ed
 
Types of plagiarism numeric
Types of plagiarism numericTypes of plagiarism numeric
Types of plagiarism numeric
 
Plagiarism ppt
Plagiarism pptPlagiarism ppt
Plagiarism ppt
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
W3C HCLS Dataset Description Guidelines
W3C HCLS Dataset Description GuidelinesW3C HCLS Dataset Description Guidelines
W3C HCLS Dataset Description Guidelines
 
Reference Management and Plagiarism prevention
Reference Management and Plagiarism preventionReference Management and Plagiarism prevention
Reference Management and Plagiarism prevention
 
Plagiarism scavenger hunt
Plagiarism scavenger huntPlagiarism scavenger hunt
Plagiarism scavenger hunt
 
How to interpret turnitin reports
How to interpret turnitin reportsHow to interpret turnitin reports
How to interpret turnitin reports
 

Similar to Preventing and detecting plagiarism

2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx
2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx
2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptxeric939791
 
Plagiarism and Research Integrity
Plagiarism and Research IntegrityPlagiarism and Research Integrity
Plagiarism and Research IntegrityAnup Kumar Das
 
Paul swain info officer for web
Paul swain info officer for webPaul swain info officer for web
Paul swain info officer for webPaul Swain
 
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docx
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docxWeek 2 Assignment 1 SubmissionIf you are using the Blackbo.docx
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docxcelenarouzie
 
Technology and.pdf
Technology and.pdfTechnology and.pdf
Technology and.pdfsdfghj21
 
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...Combatting Contract Cheating: Training Staff in Your Institution - Quality As...
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...Thomas Lancaster
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650kareneckroth
 
Barbara Maine Project
Barbara    Maine  ProjectBarbara    Maine  Project
Barbara Maine Projectedalderton
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofstedbellla33
 
How to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseHow to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseEvan Silberman
 
Major Concepts of Technology
Major Concepts of TechnologyMajor Concepts of Technology
Major Concepts of TechnologyJoe Tedesco
 
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...Thomas Lancaster
 
Rolando Valentin High Tech Cheating Final Presentation
Rolando Valentin High Tech Cheating Final PresentationRolando Valentin High Tech Cheating Final Presentation
Rolando Valentin High Tech Cheating Final Presentationrvalentin1125
 
NM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsNM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsJulia Parra
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 

Similar to Preventing and detecting plagiarism (20)

2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx
2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx
2021 UoN Turnitin Similarity Checker & Plagiarism Policy.pptx
 
Plagiarism and Research Integrity
Plagiarism and Research IntegrityPlagiarism and Research Integrity
Plagiarism and Research Integrity
 
Paul swain info officer for web
Paul swain info officer for webPaul swain info officer for web
Paul swain info officer for web
 
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docx
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docxWeek 2 Assignment 1 SubmissionIf you are using the Blackbo.docx
Week 2 Assignment 1 SubmissionIf you are using the Blackbo.docx
 
Technology and.pdf
Technology and.pdfTechnology and.pdf
Technology and.pdf
 
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...Combatting Contract Cheating: Training Staff in Your Institution - Quality As...
Combatting Contract Cheating: Training Staff in Your Institution - Quality As...
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650
 
Using TurnitinUK to promote ethical use of electronic sources. Rowell
Using TurnitinUK to promote ethical use of electronic sources. RowellUsing TurnitinUK to promote ethical use of electronic sources. Rowell
Using TurnitinUK to promote ethical use of electronic sources. Rowell
 
Plagiarism as a Threat in Education
Plagiarism as a Threat in EducationPlagiarism as a Threat in Education
Plagiarism as a Threat in Education
 
Barbara Maine Project
Barbara    Maine  ProjectBarbara    Maine  Project
Barbara Maine Project
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
 
How to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online CourseHow to Prevent Cheating in an Online Course
How to Prevent Cheating in an Online Course
 
Virginia Power MmIT 2015
Virginia Power MmIT 2015Virginia Power MmIT 2015
Virginia Power MmIT 2015
 
Major Concepts of Technology
Major Concepts of TechnologyMajor Concepts of Technology
Major Concepts of Technology
 
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
The Current Landscape Of Contract Cheating - Higher Education Academy Worksho...
 
Rolando Valentin High Tech Cheating Final Presentation
Rolando Valentin High Tech Cheating Final PresentationRolando Valentin High Tech Cheating Final Presentation
Rolando Valentin High Tech Cheating Final Presentation
 
NM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsNM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD Ecosystems
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Plagiarism Issues
Plagiarism Issues Plagiarism Issues
Plagiarism Issues
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 

More from JISC RSC Southeast

Shibboleth - A technical perspective
Shibboleth - A technical perspectiveShibboleth - A technical perspective
Shibboleth - A technical perspectiveJISC RSC Southeast
 
JISC RSC SE update for AOSEC Libraries & ICT Learning centres network
JISC RSC SE update for AOSEC Libraries & ICT Learning centres networkJISC RSC SE update for AOSEC Libraries & ICT Learning centres network
JISC RSC SE update for AOSEC Libraries & ICT Learning centres networkJISC RSC Southeast
 
(Social) Web 2.0 follow up notes and resources
(Social) Web 2.0 follow up notes and resources (Social) Web 2.0 follow up notes and resources
(Social) Web 2.0 follow up notes and resources JISC RSC Southeast
 
The Solent experience - migration to Moodle and beyond
The Solent experience - migration to Moodle and beyondThe Solent experience - migration to Moodle and beyond
The Solent experience - migration to Moodle and beyondJISC RSC Southeast
 
e-SkillsUK Passports use at Easlteigh College
e-SkillsUK Passports use at Easlteigh Collegee-SkillsUK Passports use at Easlteigh College
e-SkillsUK Passports use at Easlteigh CollegeJISC RSC Southeast
 
Newbuild, new challenges, new skills
Newbuild, new challenges, new skillsNewbuild, new challenges, new skills
Newbuild, new challenges, new skillsJISC RSC Southeast
 
Assistive technology - tapping the potential
Assistive technology - tapping the potentialAssistive technology - tapping the potential
Assistive technology - tapping the potentialJISC RSC Southeast
 
Athens to Shibboleth at Totton College
Athens to Shibboleth at Totton CollegeAthens to Shibboleth at Totton College
Athens to Shibboleth at Totton CollegeJISC RSC Southeast
 
Library Newbuild - trends in academic library design
Library Newbuild - trends in academic library designLibrary Newbuild - trends in academic library design
Library Newbuild - trends in academic library designJISC RSC Southeast
 
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesIdentifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesJISC RSC Southeast
 
Federated Access Management, JISC Presentation
Federated Access Management, JISC PresentationFederated Access Management, JISC Presentation
Federated Access Management, JISC PresentationJISC RSC Southeast
 
Resilient WAN connections using low cost xDSL circuits
Resilient WAN connections using low cost xDSL circuitsResilient WAN connections using low cost xDSL circuits
Resilient WAN connections using low cost xDSL circuitsJISC RSC Southeast
 

More from JISC RSC Southeast (19)

Shibboleth - A technical perspective
Shibboleth - A technical perspectiveShibboleth - A technical perspective
Shibboleth - A technical perspective
 
JISC RSC SE update for AOSEC Libraries & ICT Learning centres network
JISC RSC SE update for AOSEC Libraries & ICT Learning centres networkJISC RSC SE update for AOSEC Libraries & ICT Learning centres network
JISC RSC SE update for AOSEC Libraries & ICT Learning centres network
 
(Social) Web 2.0 follow up notes and resources
(Social) Web 2.0 follow up notes and resources (Social) Web 2.0 follow up notes and resources
(Social) Web 2.0 follow up notes and resources
 
The Solent experience - migration to Moodle and beyond
The Solent experience - migration to Moodle and beyondThe Solent experience - migration to Moodle and beyond
The Solent experience - migration to Moodle and beyond
 
JISC Learner Experiences
JISC Learner ExperiencesJISC Learner Experiences
JISC Learner Experiences
 
e-SkillsUK Passports use at Easlteigh College
e-SkillsUK Passports use at Easlteigh Collegee-SkillsUK Passports use at Easlteigh College
e-SkillsUK Passports use at Easlteigh College
 
Newbuild, new challenges, new skills
Newbuild, new challenges, new skillsNewbuild, new challenges, new skills
Newbuild, new challenges, new skills
 
Assistive technology - tapping the potential
Assistive technology - tapping the potentialAssistive technology - tapping the potential
Assistive technology - tapping the potential
 
Athens to Shibboleth at Totton College
Athens to Shibboleth at Totton CollegeAthens to Shibboleth at Totton College
Athens to Shibboleth at Totton College
 
JISC Collections Update
JISC Collections UpdateJISC Collections Update
JISC Collections Update
 
Library Newbuild - trends in academic library design
Library Newbuild - trends in academic library designLibrary Newbuild - trends in academic library design
Library Newbuild - trends in academic library design
 
Web 2.0 For Libraries
Web 2.0 For LibrariesWeb 2.0 For Libraries
Web 2.0 For Libraries
 
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesIdentifying and preventing plagiarism: issues for HE tutors in FE Colleges
Identifying and preventing plagiarism: issues for HE tutors in FE Colleges
 
Podcasting And Vodcasting
Podcasting And VodcastingPodcasting And Vodcasting
Podcasting And Vodcasting
 
101 Uses For Autolib
101 Uses For Autolib101 Uses For Autolib
101 Uses For Autolib
 
Cataloguing eBooks in Autolib
Cataloguing eBooks in AutolibCataloguing eBooks in Autolib
Cataloguing eBooks in Autolib
 
Federated Access Management, JISC Presentation
Federated Access Management, JISC PresentationFederated Access Management, JISC Presentation
Federated Access Management, JISC Presentation
 
Resilient WAN connections using low cost xDSL circuits
Resilient WAN connections using low cost xDSL circuitsResilient WAN connections using low cost xDSL circuits
Resilient WAN connections using low cost xDSL circuits
 
Mainstreaming e-Learning
Mainstreaming e-LearningMainstreaming e-Learning
Mainstreaming e-Learning
 

Recently uploaded

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Preventing and detecting plagiarism

  • 1. Preventing & Detecting Plagiarism Using the TurnitinUK plagiarism detection software RSC South East : 4 July, 2007 Gill Rowell Advisor, Plagiarism Advisory Service .
  • 2.
  • 3.
  • 4.
  • 5.  
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Clicking on links will take you to web sites where matching text has been found. Uploaded paper is displayed with any matching text highlighted and numbered.
  • 11.  
  • 12.
  • 13.
  • 14. Preventing & Detecting Plagiarism Using the TurnitinUK plagiarism detection software Now let’s do some plagiarising ourselves, and try out TurnitinUK.
  • 15. Preventing & Detecting Plagiarism Using the TurnitinUK plagiarism detection software Implementation: some issues to consider
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Preventing & Detecting Plagiarism Using the TurnitinUK plagiarism detection software Any further questions?
  • 23.
  • 24.