Upload
seasgrad
View
568
Download
2
Embed Size (px)
Citation preview
Academic Expectations PowerpointFall 2016
Academic integrity is the core set of values and behaviors that students, faculty, and staff commit to as
being apart of an academic institution. This commitment to integrity ensures the value of the research,
graduates, and degrees for all, making it paramount for all to abide by these policies and procedures.
What is Academic Integrity?
What is considered cheating?
Fabrication - making up data, information, or citations
Falsification - knowingly making a false statement; signing someone else’s signature on a document
Facilitating - aiding someone else in acting dishonestly
●Using unauthorized materials for an exam
●Copying another student’s work
●Submitting the same work in two classes without the permission of both instructors
Other examples of cheating:
What is plagiarism?
●Stealing the ideas or words of another and passing them off as one’s own
●Failure to cite or attribute quotations, paraphrases, or borrowed information
●Directly copying and pasting a sentence from existing research without the use of quotation marks or a citation
●Using an idea from existing research in your own paper, pretending that you came up with it
●Utilizing experiment data from another’s work without crediting them
Examples of plagiarism
QuotingUsing exact words from another source
ParaphrasingRestating an idea using your own style and voice[note: changing a few words does not qualify]
SummarizingTaking multiple main ideas from a source and putting them into your own wordsAnd remember: using all of these methods requires the use of a citation!
Avoiding Plagiarism
This office is dedicated entirely to dealing with cases of academic dishonesty which occur in the university community. It is comprised of both faculty and other students.
If you are found to be cheating or plagiarizing, this is the office which will handle the disciplinary procedures.
More info about the office can be found at: https://studentconduct.gwu.edu/academic-integrity
Office of Academic Integrity
●Giving credit to someone’s ideas, research, data, phrasing, or written words
●A literal break in writing to show whose ideas you
are using
What is a citation?
●Give credit where credit is due
●Delineate your ideas from those of others
●Legitimize your work
●Strengthen your case
Why do we use citations?
●There are many citation styles for different fields of study.
●The IEEE Style is a common style in Engineering fields.
○IEEE is the Institute of Electrical and Electronics Engineers
Using Citations
●Author (First Initial. Last Name). Title. Source. Vol(Issue), pp. #. Year.
●EX. M. Inaba, S. Kagami, F. Kanehiro, Y. Hoshino and H. Inoue. A platform for robotics research based on the remote-brained robot approach. Int. J. Robotics Res. 19(10), pp. 933-54. 2000.
IEEE Style - Details
In-Text Citations
●A reference to the correct citation must be placed in the text as well as at its conclusion.
●Each citation receives a number, to reference it in your biliography.
●A list a citations that appear at the end of a work
●Generally either in alphabetical or appearance order
●Follow formatting guidelines
Bibliographies
REFERENCES [1] T. Auer, M. Held, “Heuristics for the Generation of Random Polygons,” 8th Canadian Conference computational Geometry, pp. 38–44, Carleton University Press, Canada(1996). [2] J. O’Rourke, J., M. Virmani, “Generating Random Polygons,” Technical Report 011, CS Department, Smith College, Northampton, MA 01063 (1991) [3] K. Abrahamson. On the modality of convex polygons. Discrete & Computational Geometry, 5:409{419, 1990. [4] J. Hershberger. An optimal visibility graph algorithm for triangulated simple polygons. Algorithmica, 4:141{155,1989. [5] Franco P. Preparata and Michael I. Shamos. Computational Geometry An Introduction. Springer-Verlag, New York, 1985. [6] C. Zhu, C., G. Sundaram, J. Snoeyink, J. S. B. Mitchel, “Generating random polygons with given vertices,” Computational Geometry. Theory and Application, Vol 6 Issue 5, 277–290, (1996) [7] S. Sadhu, S. Hazarika, K. Kumar Jain,S. Basu,T. De: GRP CH Heuristic for Generating Random Simple Polygon.IWOCA2012:293-302
Bibliography Example
●Ask the library reference librarians
●Check out a citation/reference guideline book
●Visit: https://www.ieee.org/index.html
For more information:
To summarize: you must provide a citation when you…
●Use a direct quote from another author●Paraphrase or summarize another’s ideas in your
own words●Use a diagram, image, or other media that you did
not create yourself●Use data you did not collect yourself
If you aren’t sure, it is always best to include the reference to be safe!
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records.
What is FERPA?
●You have the right to review your own educational records
○You must request this in writing
●The University cannot disclose any of your records to others without your consent
○This means that family members, friends, and anyone else will not be able to see your records unless you say they can
What does it mean for you?
For more information on FERPA, please visit: https://studentconduct.gwu.edu/ferpa.
The GW Writing Center
Available by appointment for help with every step of the writing process, from brainstorming to revision to publication. The GW Writing Center works to assist students in strengthening writing and editing abilities.
https://writingcenter.gwu.edu/202-994-3765
Similar to the GW Writing center, but with experts trained to work with students with non-native English speakers.
https://eap.columbian.gwu.edu/writing-support-program202-994-7079
EAP Writing Support Program
SEAS Graduate AdvisingSEH 2800
Be sure to check in at the student services desk if you haven’t yet!
Thank you!