539
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Spinning-translation and the act of plagiarising: how to avoid and resist

ORCID Icon
Pages 49-64 | Received 01 May 2019, Accepted 19 Dec 2019, Published online: 07 Jan 2020

References

  • Auer, N.J., and E.M. Krupar. 2001. “Mouse Click Plagiarism: The Role of Technology in Plagiarism and the Librarian’s Role in Combating It.” Library Trends 40: 415–432.
  • Austin, M.J., and L.D. Brown. 1999. “Internet Plagiarism: Developing Strategies to Curb Student Academic Dishonesty.” The Internet and Higher Education 2: 21–33. doi:10.1016/S1096-7516(99)00004-4.
  • Austin, Z., S. Simpson, and E. Reynen. 2005. “The Fault Lies Not in Our Students, but in Ourselves: Academic Honesty and Moral Development in Health Professions Education – Results of a Pilot Study in Canadian Pharmacy.” Teaching in Higher Education Series 10: 143–156. doi:10.1080/1356251042000337918.
  • Baeza-Yates, R., and B. Ribeiro-Neto. 1999. Modern Information Retrieval. New York, NY: ACM Press.
  • Bailey, J. 2018. “A Brief History of Article Spinning.” Plagiarism Today, March 8. https://www.plagiarismtoday.com/2018/03/08/a-brief-history-of-article-spinning/
  • Barbrook, R. 2002. “The Napsterization Of Everything.” Science as Culture 11: 277–285. doi:10.1080/09505430220137289.
  • Barrón-Cedeño, A., P. Gupta, and P. Rosso. 2013. “Methods for Cross-Language Plagiarism Detection.” Knowledge-Based Systems 50: 211–217. doi:10.1016/j.knosys.2013.06.018.
  • Barrón-Cedeño, A., P. Rosso, D. Pinto, and A. Juan. 2008. “On Cross-lingual Plagiarism Analysis Using a Statistical Model.” In Proceedings of the ECAI’08 PAN Workshop: Uncovering Plagiarism, Authorship and Social Software Misuse, edited by B. Stein, E. Stamatatos, and M. Koppel, 9–13. Patras, Greece.
  • Bellow, S. 1944. Dangling Man. London, UK: Penguin Publishing Group.
  • Belter, R.W., and A. du Pré. 2009. “A Strategy to Reduce Plagiarism in an Undergraduate Course.” Teaching of Psychology 36: 257–261. doi:10.1080/00986280903173165.
  • Bennett, R. 2005. “Factors Associated with Student Plagiarism in a Post-1992 University.” Assessment & Evaluation in Higher Education 30: 137–162. doi:10.1080/0260293042000264244.
  • Benning, V. 1998. “High-Tech Cheating Hits the Campus: Computers Make It Easy for College Students to Break Rules.” The Washington Post, A01. Washington.
  • Berls, J. 1998. “Teachers Turn Copycat to Nab Computer-Powered Plagiarists; Internet, CD-ROM References Make Cheating Easier.” Chicago Tribune, 7. Chicago.
  • Brin, S., J. Davis, and H. Garcia-Molina. 1995. “Copy Detection Mechanisms for Digital Documents.” ACM International Conference on Management of Data, Stanford University, Stanford.
  • Callahan, D. 2004. The Cheating Culture: Why More Americans are Doing Wrong to Get Ahead. Orlando, FL: Harcourt.
  • Carroll, J. 2002. A Handbook for Deterring Plagiarism in Higher Education. Oxford: Oxford Centre for Staff and Learning Development.
  • Ceska, Z., M. Toman, and K. Jezek. 2008. “Multilingual Plagarism Detection.” In Artificial Intelligence: Methodology, Systems, and Applications. 13th International Conference, AIMSA 2008, Varna, Bulgaria, September 2008, Proceedings, edited by R. Dochev, M. Pistore, and P. Traverso, 83–92. Heidelberg: Springer.
  • Clarke, R., and T. Lancaster. 2013. “Commercial Aspects of Contract Cheating.” Paper presented at the Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education, New York.
  • Culwin, F. 2006. “An Active Introduction to Academic Misconduct and the Measured Demographics of Misconduct.” Assessment & Evaluation in Higher Education 31: 167–182. doi:10.1080/02602930500262478.
  • Currie, P. 1998. “Staying Out of Trouble: Apparent Plagiarism and Academic Survival.” Journal of Second Language Writing 7: 1–18. doi:10.1016/S1060-3743(98)90003-0.
  • Danilova, V. 2013. “Cross-Language Plagiarism Detection Methods.” In Proceedings of the Student Research Workshop associated with RANLP 2013, edited by G. Angelova, K. Bontcheva, and R. Mitkov, 51–57. Hissar, Bulgaria: Recent Advances in Natural Language Processing.
  • Davis, L. 2011. “Arresting Student Plagiarism: Are We Investigators or Educators?” Business Communication Quarterly 74: 160–163. doi:10.1177/1080569911404053.
  • Dick, M., J. Sheard, C. Bareiss, J. Carter, D. Joyce, T. Harding, and C. Laxer. 2003. “Addressing Student Cheating: Definitions and Solutions.” Association of Computer Manufactuers (ACM), Special Interest Group in Computer Science Education (SIGCSE) Bulletin 35:172–184.
  • Duggan, F. 2006. “Plagiarism: Prevention, Practice and Policy.” Assessment & Evaluation in Higher Education 31: 151–154. doi:10.1080/02602930500262452.
  • Ellery, K. 2008. “An Investigation into Electronic‐Source Plagiarism in a First‐Year Essay Assignment.” Assessment & Evaluation in Higher Education 33: 607–617. doi:10.1080/02602930701772788.
  • Ercegovac, Z., and J.V. Richardson. 2004. “Academic Dishonesty, Plagiarism Included, in the Digital Age: A Literature Review.” College and Research Libraries 65: 301–318. doi:10.5860/crl.65.4.301.
  • Evans, R. 2006. “Evaluating an Electronic Plagiarism Detection Service: The Importance of Trust and the Difficulty of Proving Students Don’t Cheat.” Active Learning in Higher Education 7: 87–99. doi:10.1177/1469787406061150.
  • Ferrero, J., L. Besacier, D. Schwab, and F. Agnès. 2017. “Deep Investigation of Cross-Language Plagiarism Detection Methods.” In Proceedings of the 10th Workshop on Building and Using Comparable Corpora, 6–15. Vancouver, Canada: Association for Computational Linguistics.
  • Flinders Learning Online. 2018. Text-Matching Software. https://flo.flinders.edu.au/mod/book/tool/print/index.php?id=1127805
  • Flowerdew, J., and Y. Li. 2007. “Plagiarism and Second Language Writing in an Electronic Age.” Annual Review of Applied Linguistics 27: 161–183. doi:10.1017/S0267190508070086.
  • Gabrilovich, E., and S. Markovitch. 2007. “Computing Semantic Relatedness Using Wikipediabased Explicit Semantic Analysis.” In Proceedings of the 20th International Joint Conference on Artifical Intelligence (IJCAI’07), 1606–1611. Hyderabad, India: Morgan Kaufmann Publishers.
  • Gillam, L., J. Marinuzzi, and P. Ioannou. 2010. Turnitoff-Defeating Plagiarism Detection Systems. http://epubs.surrey.ac.uk/790662/2/HEA-ICS_turnitoff.pdf
  • Hale, J.L. 1987. “Plagiarism in the Classroom.” Communication Research Reports 4: 66–70.
  • Harris, R. 2001. The Plagiarism Handbook: Strategies for Preventing and Dealing with Plagiarism. Los Angeles, CA: Pyrczac Publishing.
  • Hart, M., and T. Friesner. 2004. “Plagiarism and Poor Academic Practice – A Threat to the Extension of E-Learning in Higher Education.” Electronic Journal on E-Learning 2: 89–96.
  • Heather, J. 2010. “Turnitoff: Identifying and Fixing a Hole in Current Plagiarism Detection Software.” Assessment & Evaluation in Higher Education 35: 647–660. doi:10.1080/02602938.2010.486471.
  • Hoad, T.C., and J. Zobel. 2003. “Methods for Identifying Versioned and Plagiarized Documents.” Journal of the American Society for Information Science and Technology 54: 203–215. doi:10.1002/(ISSN)1532-2890.
  • Howard, R.M. 1995. “Plagiarisms, Authorships, and the Academic Death Penalty.” College English 57: 708–736. doi:10.2307/378403.
  • Howard, T.W. 2003. “Who “Owns” Electronic Texts?” In Professional Writing and Rhetoric: Readings from the Field, edited by T. Peeples, 250–264. New York: Longman.
  • Jocoy, C., and D. DiBiase. 2006. “Plagarism by Adult Learners Online: A Case Study in Detection and Remediation.” International Journal of Research in Open and Distance Learning 7: 1–15.
  • Jones, I.M. 2009. “Cyber Plagarism: Different Method – Same Song.” Journal of Legal, Ethical and Regulatory Issues 12: 89–100.
  • Jones, M., and L. Sheridan. 2015. “Back Translation: An Emerging Sophisticated Cyber Strategy to Subvert Advances in ‘Digital Age’ Plagiarism Detection and Prevention.” Assessment & Evaluation in Higher Education 40: 712–724. doi:10.1080/02602938.2014.950553.
  • Lancaster, T., and F. Culwin. 2007. “Preserving Academic Integrity-fighting against Nonoriginality Agencies.” British Journal of Educational Technology 38: 153–157. doi:10.1111/j.1467-8535.2006.00491.x.
  • Lea, M.R., and S. Jones. 2010. “Digital Literacies in Higher Education: Exploring Textual and Technological Practice.” Studies in Higher Education 36: 377–393. doi:10.1080/03075071003664021.
  • Maurer-Hermann, F.K., and B. Zaka. 2006. “Plagiarism - A Survey.” Journal of Universal Computer Science 12: 1050–1084.
  • McCabe, D.L. 2005. “Cheating Amongst College and University Students: A North American Perspective.” International Journal of Educational Integrity 1: 1–11.
  • McKeever, L. 2006. “Online Plagiarism Detection Services – Saviour or Scourge?” Assessment & Evaluation in Higher Education 31: 155–165. doi:10.1080/02602930500262460.
  • Mcnamee, P., and J. Mayfield. 2004. “Character N-Gram Tokenization for European Language Text Retrieval.” Information Retrieval Proceedings 7: 73–97. doi:10.1023/B:INRT.0000009441.78971.be.
  • Meyer zu Eissen, S., and B. Stein. 2006. “Intrinsic Plagiarism Detection.” In Lecture Notes in Computer Science, edited by M. Lalmas, A. MacFarlane, S. M. Ruger, A. Tombros, T. Tsikrika, and A. Yavlinsky, 565–569. Amsterdam: Springer.
  • MTM LinguaSoft. 2018. Back Translation: What Is It? How Does It Work? https://www.mtmlinguasoft.com/back-translation-what-is-it-how-does-it-work/
  • Obeid, R., and D.B. Hill. 2017. “An Intervention Designed to Reduce Plagiarism in a Research Methods Classroom.” Teaching of Psychology 44: 155–159. doi:10.1177/0098628317692620.
  • Palvenko, A. 2000. “L2 Influence on L1 in Late Bilingualism.” Issues in Applied Linguistics 11: 175–205.
  • Park, C. 2003. “In Other (People’s) Words: Plagiarism by University Students–Literature and Lessons.” Assessment & Evaluation in Higher Education 28: 471–488. doi:10.1080/02602930301677.
  • Park, C. 2004. “Rebels without a Clause: Towards an Institutional Framework for Dealing with Plagiarism by Students.” Journal of Further and Higher Education 28: 291–306. doi:10.1080/0309877042000241760.
  • Pataki, M. 2012. “A New Approach for Searching Translated Plagiarism.” Proceedings of the 5th International Plagiarism Conference, 49–64, Newcastle, UK. https://pdfs.semanticscholar.org/f987/6105318ef821b2353dca9f2d3164a3caca3a.pdf
  • Patel, A., K. Bakhtiyari, and M. Taghavi. 2011. “Evaluation of Cheating Detection Methods in Academic Writings.” Library Hi Tech 29: 623–640. doi:10.1108/07378831111189732.
  • Pecorari, D. 2001. “Plagiarism and International Students: How the English-Speaking University Responds.” In Linking Literacies: Perspectives on L2 Reading-Writing Connections, edited by D. Belcher and A. Hirvela, 229–245. Ann Arbor: University of Michigan Press.
  • Pinto, D., J. Civera, A. Barrón-Cedeño, A. Juan, and P. Rosso. 2009. “A Statistical Approach to Crosslingual Natural Language Tasks.” Journal of Algorithms 64: 51–60. doi:10.1016/j.jalgor.2009.02.005.
  • Potthast, M., A. Barrón-Cedeño, B. Stein, and P. Rosso. 2011. “Cross – Language Plagiarism Detection.” Language Resources and Evaluation 45: 45–62. doi:10.1007/s10579-009-9114-z.
  • Potthast, M., B. Stein, and M. Anderka. 2008. “A Wikipedia-Based Multilingual Retrieval Model.” 30th European Conference on IR Research (ECIR’08), 522–530. Glasgow, Scotland: Springer.
  • Prentice, F.M., and C.E. Kinden. 2018. “Paraphrasing Tools, Language Translation Tools and Plagiarism: An Exploratory Study.” International Journal for Educational Integrity 14: 1–16. doi:10.1007/s40979-018-0036-7.
  • Purdue University. 2018. Plagiarism and ESL Writers: An Overview. https://owl.purdue.edu/owl/english_as_a_second_language/esl_students/plagiarism_and_esl_writers.html
  • Rogerson, A.M., and G. McCarthy. 2017. “Using Internet Based Paraphrasing Tools: Original Work, Patchwriting or Facilitated Plagiarism?” International Journal of Educational Intergrity 13: 1–15.
  • Roig, M. 1997. “Can Undergraduate Students Determine whether Text Has Been Plagiarized?” The Psychological Record 47: 113–122. doi:10.1007/BF03395215.
  • Ross, G.M. 2004. “Plagiarism Really Is A Crime: A Counterblast against Anarchists and Postmodernists.” In Proceedings of Plagiarism: Prevention, Practice & Policy Conference, edited by A.P. Smith and F. Duggun, 69–70. Newcastle: Northumbria University Press.
  • Shahid, U., S. Farooqi, R. Ahmad, Z. Shafiq, P. Srinivasan, and F. Zaffar. 2017. “Accurate Detection of Automatically Spun Content via Stylometric Analysis.” In Data Mining (ICDM), 2017 IEEE International Conference. New Orleans: IEEE.
  • Sharman, J.C., and C. Wilshire. 2007. “Fighting Plagiarism in Australian Universities: Why Bother?” Australian Journal of Political Science 42: 503–508. doi:10.1080/10361140701513620.
  • Simon, C.A., J.R. Carr, S.M. McCullough, S.J. Morgan, T. Oleson, and M. Ressel. 2004. “Gender, Student Perceptions, Institutional Commitments and Academic Dishonesty: Who Reports in Academic Dishonesty Cases?” Assessment & Evaluation in Higher Education 29: 75–90. doi:10.1080/0260293032000158171.
  • Sousa-Silva, R. 2014. “Detecting Translingual Plagiarism and the Backlash against Translation Plagiarists.” Language and Law/Linguagem E Direito 1: 70–94.
  • Stamatatos, E., and M. Koppel. 2011. “Plagiarism and Authorship Analysis: Introduction to the Special Issue.” Language Resources and Evaluation 45: 1–4. doi:10.1007/s10579-011-9136-1.
  • Sutherland-Smith, W. 2005. “The Tangled Web: Internet Plagiarism and International Students’ Academic Writing.” Journal of Asian Pacific Communication 15: 15–29.
  • Sutherland-Smith, W. 2010. “Retribution, Deterrence and Reform: The Dilemmas of Plagiarism Management in Universities.” Journal of Higher Education Policy and Management 32: 5–16. doi:10.1080/13600800903440519.
  • Thomas, M.W. 2000. “Eschewing Credit: Heywood, Shakespeare, and Plagiarism before Copyright.” New Literary History 31: 277–293. doi:10.1353/nlh.2000.0025.
  • Turnitin. 2019. “Strategies to Resist Plagiarism.” http://www.turnitin.com/blog/strategies-to-resist-plagiarism
  • Underwood, J., and A. Szabo. 2003. “Academic Offences and E-Learning: Individual Propensities in Cheating.” British Journal of Educational Technology 34: 467–477. doi:10.1111/bjet.2003.34.issue-4.
  • Velásquez, J.D., Y. Covacevich, F. Molina, E. Marrese-Taylor, C. Rodríguez, and F. Bravo-Marquez. 2016. “DOCODE 3.0 (Document COpy DEtector): A System for Plagiarism Detection by Applying an Information Fusion Process from Multiple Documental Data Sources.” Information Fusion 27: 64–75. doi:10.1016/j.inffus.2015.05.006.
  • Walker, A. 2001. “British Psychology Students’ Perceptions of Group-Work and Peer Assessment.” Psychology, Learning and Teaching 1: 28–36. doi:10.2304/plat.2001.1.1.28.
  • WAME. 2018. Recommendations on Publication Ethics Policies for Medical Journals. http://wame.org/recommendations-on-publication-ethics-policies-for-medical-journals#Plagiarism
  • Williams, J.B. 2005. “Plagiarism: Deterrence, Detection and Prevention.” In The Handbook for Economics Lecturers, 1–19. Bristol: Higher Education Academy Economics Network.
  • Youmans, R.J. 2011. “Does the Adoption of Plagiarism-Detection Software in Higher Education Reduce Plagiarism?” Studies in Higher Education 36: 749–761. doi:10.1080/03075079.2010.523457.
  • Zechner, M., M. Muhr, R. Kern, and M. Granitzer. 2009. External and Intrinsic Plagiarism Detection Using Vector Space Models. http://ceur-ws.org/Vol-502/paper9.pdf
  • Zhang, Q., D.Y. Wang, and G.M. Voelker. 2014. “DSpin: Detecting Automatically Soun Content on the Web.” https://www.ndss-symposium.org/ndss2014/programme/dspin-detecting-automatically-spun-content-web/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.