Educational CyberPlayGround's PLAGIARISM DETECTION: Catching
Digital Cheaters
Plagiarism Detection in Term Papers, and Essays and Research
A compendium of links to valuable information about plagiarism
and the internet. Teacher resources for detecting plagiarism and
cheating. Student resources to help avoid plagiarism on the
Educational CyberPlayGround®.
"An idea can transform the world & rewrite all the rules.
Which is why I have to steal it"
~ anon
YouTube stars are being paid to sell academic cheating.
More than 250 channels are promoting
EduBirdie
, based in Ukraine, which allows students to buy essays, rather
than doing the work themselves. YouTube said it would help
creators understand they cannot promote dishonest behaviour. Sam
Gyimah, Universities Minister for England, says
YouTube has a moral responsibility to act
. He said he was
shocked by the nature and scale of the videos uncovered by the
BBC
:
"It's clearly wrong because it is enabling and normalising
cheating potentially on an industrial scale." The BBC Trending
investigation uncovered more than 1,400 videos with a total of
more than 700 million views containing EduBirdie adverts
selling cheating to students and school pupils.
http://www.bbc.com/news/education-43956001
LAWYERS, TEACHERS, ADMINISTRATORS, FACULTY, MUST ABIDE BY ALL
THE SAME ETHICS, LAWS, AND RULES THAT CHILDREN DO!!
OH THE DELICIOUS IRONY
Angela Adrian is a serial plagiarist and she is into IT related
laws.
"Adrian is an expert in intellectual property law, a former editor
of the International Journal of Intellectual Property Management,
a legal scholar whose resume boasts more degrees than a protractor
Although most of what Alanis Morissette sang about in her hit song
"Ironic" wasn't irony at all, had she included a line or two about
Angela Adrian she would have nailed it."
She's also a serial plagiarist.
2015 1 researcher faked 171 papers
and is responsible for 7% of all retractions since 1980. Meet
Yoshitaka Fujii
, the most prolific Japanese fraudster in modern science who also
had a Master's degree in Medical Ethics!!!
RESOURCES FOR
HIGHER ED STUDENTS
AND PROFESSORS
2017
Unemployed Professors
!!!! Unemployed Professors Writing Student Papers for Employed
Professors. This is another paper mill form Montreal Canada where
you will pay $200 for your essay to written by another professor
but you can pay them to write anything.
Contact
Copycat scientific papers on PubMed
CISCOM is the medical publication database of the Research Council
for Complementary Medicine.
plagiarism checks with standard tools such as http://www.
grammarly
.com/ and bring minor edits until the papers pass the test, a
process sometimes referred to as
text laundering
http://mathbabe.org/2014/05/12/text-laundering/ it very unlikely
that the authors wrote the papers. The only solid hypothesis is
that the same ghostwriter wrote all the CISCOM meta-analyses. Who
knows how many papers are written by ghostwriter companies? Anyone
can launder their text sufficiently to jump through all the
standard hoops and then be satisfied that they won't get caught.
You just keep running your text through the software, adding
“the's” and changing the beginning of sentences, until it comes
out with a green light. The rules aren't that you can't
plagiarize, but instead that you can't plagiarize without adequate
laundering.
10 high-profile plagiarism cases 2014
Sen. John Walsh, Rand Paul,Doris Kearns Goodwin, Mike Barnicle,
Stephen Ambrose, Jayson Blair, Alex Haley, Fareed Zakaria, Jonah
Lehrer, Vladimir Putin
They all could have avoided this shame if they had just used the
Electronic Reserve
-
CORNELL CREATES ELECTRONIC RESERVES GUIDELINES
2006 Following a complaint from the Association of American
Publishers, Cornell University, working with the association, has
developed a set of guidelines to help faculty avoid copyright
violations when placing materials on electronic reserve. The
association sent a letter to Cornell expressing concern over what
it saw as the common practice of failing to apply
fair-use principles to electronic content
. Allan Adler, vice president for legal and governmental affairs
at the association, said
the new guidelines embody the notion that copyright protections
apply equally to hard-copy and online material.
Cutting and pasting a few sentences at a time from the Internet
is NOT cheating,
This is
FAIR USE .
You simply need to cite the source.
NYT, To Stop Cheats, Colleges Learn Their Trickery By TRIP
GABRIEL 7/6/2010 nytimes.com/2010/07/06/education/06cheat.html
It shouId be clear that the real purpose of education should be to
help students learn how to think, rather than trying to teach them
merely to pass exams through rote learning. But that concept would
seem to require a considerable restructuring of educational
processes that is decidedly unconventional by today's norms.
TOOLS
Teachers should be tempted to teach a security class with an exam
with this software, and fail anyone who actually installs it.
Anti-cheating software called
Protortrack
, monitors computer activity, collects audio and video from a
student's webcam and uses facial and knuckle scanning to make sure
an online student isn't looking up answers during an exam.
Security specialist Jake Binstein took exception to Protortrack,
which he
"incredibly invasive" spyware
. Recently, Binstein came up with a list of tips for students
hoping to
undermine the program
, in effect allowing them to cheat the anti-cheating software.
Instead of simply letting Proctortrack govern their online
educations, Binstein suggested that students develop “a hacker
mentality that will allow them to bypass ridiculous systems.”
Students Need to Protect their Copyright
Graduate students must learn how to protect their intellectual
property and to get credit for what they've done:
Examples include a student not receiving authorship on written
work, or having a professor take credit for their work. "This
isn't an indictment of profs at all," said Howlett. "It's just to
ensure that students' rights are protected in the case that it
does happen."
Get alerted if one of your articles turns up on some Web site that
you haven't authorized to run it.
you can occasionally use the search engines to look for a phrase
from one of your articles.
You can use a service like
Tracerlock
to alert you when your name turns up on a new Web site (for when
someone who doesn't know better copies your article verbatim
onto his/her site).
Spyonit.com
allows you to set up a spy that alerts you whenever a specified
word or phrase shows up on AltaVista or Northern Light. It's
under the "Swiss Army Spies" and it's called PermaSearch.
(Spyonit is free but requires a non-intrusive registration.)
Directory of Service Provider Agents for Notification of
Claims of Infringement
This outlines an Internet Service Provider's (ISP) obligations if
one of its subscribers offers infringing copy online. The statute
describes "notice and takedown" provisions, which state that once
an ISP receives notice of the infringement, it must take down the
unauthorized material.
Harvard dean who authorized secret search of faculty email
Fired
The Harvard University dean who approved a secret search of
faculty email to track down a media leak about student cheating
will step down on July 1, the dean announced on Tuesday.
According to the
Harvard Gazette,
Dean Evelynn M. Hammonds will return to teaching and research in
the departments of the History of Science and African and African
American Studies at the university, located in the US city of
Cambridge, Massachusetts.
The
Boston Globe broke the story
about her authorization of a secret search of 16 deans' email
accounts.
Harvard admitted to the Globe that it secretly gained access to
the email accounts of the resident deans but that it was necessary
to safeguard the privacy of students involved in a 2012 cheating
scandal. That scandal involved some 125 students enrolled in a
spring 2012 class about government. In a
statement
issued on Monday, Hammonds and Dean Michael D. Smith confirmed
that a "very narrow, careful, and precise subject-line search" of
official university email accounts had been approved and carried
out by the university's IT department in the fall of 2012. The
deans emphasized that only the subject lines, not the content of
the emails, were searched and read:
"To be clear: No one's emails were opened and the contents of
no one's emails were searched by human or machine. The
subject-line search turned up two emails with the queried
phrase, both from one sender. Even then, the emails were not
opened, nor were they forwarded or otherwise shared with
anyone in IT, the administration, or the board. Only a partial
log of the 'metadata' - the name of the sender and the time
the emails were sent - was returned."
Faculty members' reaction to the news that their employer had
searched their email had been fast and furious. One, Harry Lewis,
a former dean of Harvard College and a professor of computer
science at the university,
questioned
why the higher-ups didn't simply ask who had sent information
about the cheating to the Harvard Crimson newspaper, from whence
it made its way to the Boston Globe.
In fact, the university didn't inform faculty of the email search
until the Boston Globe asked about it, the Globe reported. Lewis,
in his blog postings, poses questions that are relevant to many
employees in many other organizations when it comes to what type
of expectations we should have about the privacy of our work email
accounts:
"This seems to me a sad incident which raises many questions.
If an employee's boss wants to spy on her, who has to sign off
on it and how does it get done? How many such searches have
been done over the past five years? Is it always done without
informing the target?"
Whether or not you know the answers to these thoughtful questions
as they pertain to your own employer, it's likely safe to assume
that your business email account is considered fair game for
surveillance.
Can we blame institutions for this? As Harvard emphasized, it has
a responsibility to protect students' privacy. Other businesses
are obligated to protect intellectual privacy and to ensure that
employees aren't using their business accounts to break the law.
Whether you agree with the fairness or not, bear in mind that Big
Brother could be watching.
2013 Harvard Digs a Deeper Hole on Cheating, E-Mail
http://www.businessweek.com/articles/2013-04-03/harvard-digs-a-deeper-hole-on-cheating-e-mail#r=read
"Now Harvard admits that the e-mail surveillance was wider than
the school originally admitted. Evelynn Hammonds, dean of Harvard
College, said officials performed two reviews of a resident dean's
e-mail that the school hadn't acknowledged last month, according
to a transcript of remarks she made April 2 to a Faculty of Arts
& Sciences meeting. The confusion over how much, and what kind
of, digital monitoring Harvard does led University President Faust
to form the Barron task force."
Point:
Anytime anyone uses language from another source (another student,
Wikipedia, a book, a song....) in their own writing (exam or
paper) without quotation and attribution is guilty of plagiarism
and is unacceptable under any circumstances. Period. End of story.
There is no ambiguity here at all.
Students or professors who are guilty of plagiarism do not belong
in an institution committed to scholarship. In my view, plagiarism
should be punished by permanent expulsion/firing. They need to
find another job, where integrity isn't an occupational
qualification.
~ Professor Emeritus Gerald Faulhaber: Wharton School, University
of Pennsylvania
Counter Point:
An open-book take-home exam needs to have very carefully
constructed rules as to what is or is not permissible, and the
penalties for violating those rules need to be stated clearly up
front. This case may rest on whether that was done properly. Also,
there's generally no one-size-fits-all set of requirements for all
course exams for all sorts of different courses in different
departments, so this situation deserves much more anticipatory
care.
In this case, I suppose there's a chance that the dean involved
does not understand the nature of browsing? or that the rules were
not explicitly stated? Use of e-mail with other students should
probably be verboten. Browsing a reliable source might be fair
game in some cases, but is wikipedia really reliable enough?
Perhaps the students all copied a particular webpage, which might
look like collusion to the administration, but which could seem
like an obvious thing to do by the students -- especially if the
website that was explicitly under some sort of
open-source/CREATIVE COMMONS openness, begging to be copied -- in
which case no student would need to copy anything from or share
anything with another student. And what consitutes fair use in the
case, especially if a student lists of all of the URLs from which
the information was gathered?
I've just given a top-of-the-head risk-oriented reaction. But we
need a lot more information about what actually happened.
~ Peter G. Neumann csl.sri.com
POINT: This issue of
Harvard Magazine
has an
article on Harry Lewis
, who has radically reorganized a course on discrete math
underlying computer science, emphasizing collaboration in groups
working together around tables in an unusual non-auditorium-style
classroom setting, with much less LECTURING than commonplace.
This is a marvelous article, and very timely in light of the
ongoing probe of the case of suspected massive plagiarism at
Harvard. It should be mandatory reading for professors and
students alike.
Counter Point:
The Harvard Cheating Scandal Is Stupid
Worth reading for his own unique perspective, but this is the
money quote: "So let me make my own counter-allegation: the
students aren't guilty of cheating, the university is guilty of
entrapment
. Here's what you're not allowed to do: ask a basic question, "
Do interest groups make Congress more or less representative as
an institution?
" and then threaten that "
the response will be judged on how well it draws from the course
materials to make an argument.
" NO. You could evaluate the answer on its merits or the rigor of
the thinking, but whether and how it draws on the course materials
is
exactly what you do not want
-- it facilitates the grading of the essays, sure, keeps
everything inside the gates, but it derails learning. When you
write that, you force 125 people to collaborate on the real final
exam question: "What does the professor want?" Apparently, what he
wants is an easy way to grade, and you all got caught giving it to
him. ~
thelastpsychiatrist.com/
Pount: Reminds me of a test a "friend" took
at a University in the lake area of NY. He gave a perfectly
correct answer to an exam in Electrical Engineering but was
heavily marked down because it was NOT the method taught in class.
No matter whether it was right or wrong, it was not as lectured. I
have never to my memory EVER marked that way. In fact I would give
a plus grade for such thinking. ~
Dave Farber
Counter Point: I think that this is more complex
than both Stephen Wilks and Dave Farber note. I teach a course on
globalization and international politics to juniors and seniors at
Penn. They are bright and often familiar with many of the
issues
we cover in class at a superficial level. There are instances
where many of them could write a reasonably coherent essay in
answer to test questions without ever having cracked a book or
attended a class. I am trying to help them learn to approach these
problems conceptually, analytically and systematically, using
theories and sophisticated conceptual arguments. While it is
possible that they could be aware of theoretical or conceptual
approaches that we do not cover, that does not happen all that
often. Their is a big difference between grading on how many
points from the readings and lectures they can work into a 1300
word answer and how well they use the ideas, concepts and theories
that we have developed in class to analyze a problem they —
hopefully — have not see before.
This is not a matter of which method they use to solve an EE
problem. In the courses I teach most students can write something
about any question. I hope that what we cover in class improves
the quality of their thinking and analysis. I am looking for
arguments grounded in theory and concepts. Again, if they bring in
frameworks that I have not covered, more power to them. But as
noted above, it is a rare occurrence.
I have not gotten into this argument previously, but I will say
that given the ubiquity of information in the internet age, making
sure that students understand that they must cite any ideas that
are not their own, regardless of the source, is a daily battle. It
is, however, one that is about the very basis of academic and
intellectual integrity and is it is certainly worth fighting.
~Steve Kobrin
POINT: As you know, I am not an academic, although I've taught a
course at Harvard Law School
and given numerous classes and lectures at colleges around the
country. My familiarity with Harvard, where I've been representing
students in “cheating” cases for some four decades, causes me to
be very suspect of this latest “scandal.” I find that Harvard,
more than any of the many dozens of colleges with which I'm
familiar or at which I have represented accused students, engages
in the use of vague rules and regulations, the enforcement of
which by mid-level student life administrators put the students at
the administrators' unconstrained mercy. Harvard is also in a very
small group of colleges where there is no student representation
on the disciplinary Administrative Board of Harvard College; since
faculty members pay as little attention as possible to the Ad
Board, this leaves the students' fate almost entirely in the hands
of the student life bureaucrats. This explains not only the lack
of fairness, but also the bizarre absence of rational fact-finding
on the Ad Board. Let's just say that I'm sufficiently familiar
with Harvard so that when it came time for my son to apply to
college, I left all decisions and choices up to him but warned him
strongly away from Harvard. He took my advice, happily, and went
to Columbia. There is something very wrong with the culture of
Harvard, and this latest “scandal” is, I suspect, just another
result of the failure of the faculty and governing boards, and the
ascendance of the mindless mid-level student life bureaucracy. ~
Harvey Silverglate
Tel. (617) 661-9156
( I practice law -- criminal defense, civil liberties, and
academic freedom/student rights cases. I'm the co-author of the
1998 book
The Shadow University: The Betrayal of Liberty on America's
Campuses
(in paperback, 1999, from HarperPerennial), where I explain this
phenomenon that actually began to take root in the mid-1980s.)
FIRE academic freedom/student rights cases
. In addition to his legal work, Silverglate has led parallel
careers as newspaper columnist, book author, and Chairman of the
Foundation for Individual Rights in Education (FIRE).
2012 TPP Text On Fair Use Leaks; US Proposals Are Really About
Limiting Fair Use, Not Expanding It.
Which is why there's so much secrecy over its negotiations.
http://www.techdirt.com/articles/20120804/00173819933/tpp-text-fair-use-leaks-us-proposals-are-really-about-limiting-fair-use-not-expanding-it.shtml
Public statement from the USTR that it was adding language to the
TPP agreement that embraced "limitations and exceptions" to
copyright law -- even as we believe that it's wrong to call fair
use rights "limitations and exceptions" when they're really just
enforcing the public's own rights to information. We also found it
bizarre and ridiculous that no text was being shared -- and noted
that the USTR would garner a lot more trust if it was actually
transparent and opened up the language in question for public
discussion. Others expressed some specific worries about even the
nature of the statement.
That said, it was a big deal that the USTR would even acknowledge
such things as fair use in a document like this, because
historically it had never done so. It appeared to be a "step" in
the right direction, but a relatively small one.
The text of the current negotiations on that particular section
leaked to KEI
there are reasons to be greatly concerned. As many public interest
groups had wondered, it appears that the text focuses on expanding
the "three step" test for these expansions of user rights. The
three step test for user rights, as is written into the Berne
Convention agreement is much more limited than most of what we
conceive of as fair use (it's also a relativel recent addition to
the Berne agreement, being added in 1971.
2012 Paper:Policing the Network: Using DPI for Copyright
Enforcement
Abstract: Deep Packet Inspection (DPI) and other network
surveillance techniques have become important factors in the
policy debate over online copyright infringement. These new
technical capabilities reopened an old debate about the
responsibility of internet service providers (ISPs) for policing
the internet. This paper attempts to understand the extent to
which new technological capabilities have the power to alter
regulatory principles. It examines political conflict and
negotiation over proposals to use DPI for online copyright
enforcement in the EU and the USA, using a hybrid of actor-network
theory from science, technology and society studies and
actor-centered institutionalism in political science. It shows
that while the technology disrupted a policy equilibrium, neither
the EU nor the US applied DPI to copyright policing in a way that
realized its radical potential. The key factor preventing such an
integrated response was the disjunction between the interests of
network oper
ators and the interests of copyright holders.
Full Text: PDF
library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/pol_net
Example: Post writer suspended for plagiarism
Washington Post / March 17, 2011
The Washington Post suspended one of its most seasoned reporters
yesterday after editors determined that “substantial'' parts of
two recent news
articles were taken without attribution from another newspaper.
Sari Horwitz, a longtime Post investigative reporter, was
suspended for three months for plagiarizing sections of stories
that first appeared in The Arizona Republic.
A Double Standard - Lawyers never cite the source they just use
it.
Corynne McSherry of the Electronic Frontier Foundation handles
copyright cases regularly. She notes that, while legal documents
are copyrighted, "it is common for lawyers to 'borrow' language
from other filings and rare for another lawyer to complain about
it. For example, we saw language from our class action complaint
in the Sony rootkit case replicated in other Complaints. Taking
too much, however, is frowned upon."
http://arstechnica.com/tech-policy/news/2010/10/copied-pleadings-show-theres-no-honor-among-antipiracy-lawyers.ars
An instructor can largely avoid the issue of plagiarism by giving
assignments that require personal knowledge or that compel
students to provide regular accounts of their studies.
Plagiarism
find articles, rules, resources, sites, ethics, policies for
teachers, including
Law
, with recommendations on how to combat plagiarism.
Teach Students How to Cite The Source
Helping them to write a research paper IS teaching them.
Demonstrate how
to do basic tasks, then have them do it them during class.
Especially when this is something they have never done before,
they need time to practice.
A workshop
is perfect for this - you can circulate and help those with
problems. This is particularly true of something as complex as a
bibliography; kids have a lot of problems with this simply because
different sources are in different formats. Use web resources that
help kids build their own citations - citationmachine-east.net, or
noodle tools. Break down the work into workable bites. One key
piece will be organizing the writing of the paper. Consider using
a graphic organizer to help them put it all together.
See the
classification of educational objectives, known as Bloom's
Taxonomy
, which incorporates cognitive, psychomotor, and affective domains
of knowledge. While working at the University of Chicago in the
1950s and '60s, he wrote two important books, Stability and Change
in Human Characteristics and Taxonomy of Educational Objectives
(1956). Bloom's taxonomy provides structure in which to categorize
test questions. This taxonomy helps teachers pose questions in
such a way to determine the level of understanding that a student
possesses. For example, based upon the type of question asked, a
teacher can determine that a student is competent in content
knowledge, comprehension, application, analysis, synthesis and/or
evaluation. This taxonomy is organized in a hierarchal way to
organize information from basic factual recall to higher order
thinking.
Bloom's taxonomy
[1]
helps teachers better prepare questions that would foster basic
knowledge recall all the way to questioning styles that foster
synthesis and evaluation. By structuring the questioning format,
teachers will be able to better understand what a child's
weaknesses and strengths are and determine ways to help students
think at a higher-level.
Teachers | Digital Cheating with cell phone cameras | Digitial
Cheating IPod Crib Notes and IPod Dictionary
M.M.S. REGULATORS - CHEATERS WHO LEAD BY EXAMPLE
BP took the ultimate gamble. They avoided the legally-required
checks on safety, and lied about environmental impacts. They
cozied up with regulators and the M.M.S. It has been reported that
In the moments leading up to the disaster, BP may have put profits
before safety. Now 11 workers are dead, and wetlands critical to
the stability and endurance of the gulf coastline may be damaged
beyond all hope. BP gambled with OUR future, and what was lost can
never be regained. BP should be obligated to take full
responsibility for damages and losses caused by their flagrant
disregard for the rule-of-law. This will send an important message
to other high-stakes gamblers, that Uncle Sam expects you to play
by the rules, and won't bail out any cheaters. Jon Stubbs
Lafayette
Schools banning music players
mp3 players loaded with study guides and dictionaries are smuggled
into classrooms. iPod-ready crib notes published by SparkNotes and
iPod dictionaries are published and sold by, iPREPpress, a
business that retails reference material that can be viewed on the
digital music players like the iPod Nano, which has a screen about
the size of a postage stamp and becomes a digital cheat sheet in
the hands of unscrupulous students.
Out and out cheating is a huge problem.
Math Assignments have been posted on Chinese websites where
students pay money for solutions. There is a fine line between
"collaboration" and cheating, and that line isn't always apparent
to students.
CELL PHONES
send text messages and photos of exams to other students.
Ugh Oh, caught & put up on Utube
. Not a good thing when your college finds out.
Schools all over the US are "cracking down on students whose
cellphones disrupt classes and make it easier to cheat
," For example, Milwaukee's 222 schools just started enforcing an
if-you-use-it-we'll-take-it rule "prompted by fights that
escalated into brawls when students used cellphones to summon
family members and outsiders."
Cell phones with built-in digital cameras and e-mail allow sneaky
students to send silent questions and answers to one another right
under teachers' noses.
Digital Cheaters can alert each other using a signal that is out
of range of Adults. They are too old to
hear the sound
. Confiscate cell phones prior to tests and use C-Guard
, which interrupts cell-phone signals within a 262-foot radius.
Students have been caught using a computer's spell checker on a
test that evaluated, in part, spelling; and listening to iPods
with lecture notes recorded on them.
Academic Integrity
Turn It In now used by 9,500 high schools and colleges.
LEARN ABOUT TURN IT IN
AND GET
LESSON PLANS Turnitin have tried many tricks, some described in
blogs and videos. One is to replace every "e" in plagiarized text
with a foreign letter that looks like it, such as a Cyrillic "e,"
meant to fool Turnitin's scanners. Another is to use the Macros
tool in Microsoft Word to hide copied text. Turnitin says neither
scheme works.
Masterpapers.com
High School to Dissertation Research Service is a writing company
which has been providing its customers with writing and research
services for several years.
The US-based
CrossRef
, a non-profit membership association for publishers, has created
a database of 20 million academic papers. Publishers of journals
will be able to run an academic's submission through the database
and discover whether there are matches with already published
papers. The database, known as
CrossCheck
, covers a wide range of articles,
Fake Degrees - Digital Diploma Mills
Oh yes, don't foreget to Get fake degrees, fake diploma, fake GED,
fake transcripts with actual designs from hundreds of real
schools. You're the only one who will know that you have a fake
one. Yeah sure!
HomeWork Answers
Course Hero
, homework sharing, where students from more than 3,500
institutions upload papers, class notes and past exams.
Cramster
, specializes in solutions to textbook questions in science and
engineering. Answers from 77physics textbooks.
Insider look at how this is done
Online Degree Bubble Downgraded to 'Junk' status.
http://chronicle.com/article/The-Shadow-Scholar/125329/
Ed Dante, The Shadow Scholar is a ghostwriter for a custom-essay
company, drafting paper after paper for students who can't
complete them on their own. He writes undergraduate papers and
graduate theses, proposals ... whatever: "The subject matter, the
grade level, the college, the course--these things are irrelevant
to me." "I work at an online company that generates tens of
thousands of dollars a month by creating original essays based on
specific instructions provided by cheating students. I've worked
there full time since 2004. On any day of the academic year, I am
working on upward of 20 assignments. In the midst of this great
recession, business is booming. At busy times, during midterms and
finals, my company's staff of roughly 50 writers is not large
enough to satisfy the demands of students who will pay for our
work and claim it as their own. ... I will make roughly $66,000
this year. Not a king's ransom, but higher than what many actual
educators are paid. ...
The New York Times reported that 61 percent of undergraduates have
admitted to some form of cheating on assignments and exams. ...
[P]art of my job is to be whatever my clients want me to be. I say
yes when I am asked if I have a Ph.D. in sociology. I say yes when
I am asked if I have professional training in
industrial/organizational psychology. I say yes when asked if I
have ever designed a perpetual-motion-powered time machine and
documented my efforts in a peer-reviewed journal." In the higher
education cheating mill article, The Shadow Scholar said not only
that he made his money by defrauding colleges and universities,
but that eventually he realized that he had to become a liar
himself in order to lure and retain clients, by presenting himself
with credentials that he had not earned.
He argues that his ghostwritten papers are simply grist for the
degree-mills - the kinds of schools
currently under investigation by the federal government
for fraud - and laments the "focus on evaluation over education"
which he says made his college experience a "tremendous
disappointment."
It certainly seems true that, just as the banks fueled the
mortgage bubble, so colleges are fueling a
degree bubble
. Dante's job is made possible by colleges determined to feed
America's increasing
addiction to credentials and certifications
. And
other academic ghostwriters agree
that, just as foreign demand for a piece of the American housing
market fueled the mortgage bubble and led to widespread mortgage
fraud, so foreign demand for American degrees is leading to
corruption in the way degrees are granted.
Teachers aren't paying close attention.
"My customers are your students,"
he says. "I promise you that. Somebody in your classroom uses a
service that you can't detect, that you can't defend against, that
you may not even know exists."
Suggests:
All that is required is for teachers to get involved in their
students' writing process. I often teach freshman courses, and I
assign short papers to students (3 to 4 pages) every two weeks. On
Fridays, I schedule 30-minute editing sessions with each one,
making for a long day of revision, but a productive one. We go
over commas
and verbs and syntax and transitions, sentence by sentence and
word by word.
With that much focus on the composition, students won't risk the
exposure. They know they can't pass off someone else's prose as
their own when under the microscope. Moreover, because they have a
rough draft to do first, they don't put the final version off to
the night before it's due, and hence don't suffer the
discombobulating need to find someone else to do it.
Technology can certainly be the enabling factor for teachers,
students, and budget folks alike, for instance, Skype serving
almost as well as face-to-face. The convenience factor is often
the prime reason for failed office visits. Face-to-face
questioning about and editing of a student's prose prevents them
from submitting someone else's work as a rough draft. If you ask
questions such as, "Why that verb?" and "What transition do we
need here?" and you're attentive, any fraudulence will surface.
Paper Mills Students find papers and Sources Used for Plagiarism
Lawyers for Boston University are trying to end the sale of term
papers over the Internet by filing a lawsuit against eight
"
paper mills
." The lawsuit charged companies including
Paper Shack, A-1 Termpapers and paperz.com
- which sell essays on academic topics to students - with violating
state and federal laws against wire fraud, mail fraud and
racketeering.
Cheaters 101 | Teachers | Free Term Paper | Buy Research Paper
Paperhelp.org 1-888-318-0063 Custom Writing Service - from a
high school essay to a PhD dissertation. We can: Write from
scratch according to your instructions. Plagiarism free papers,
100% guarantee! Edit and proofread your paper. Prices For The
Writing Services
Kimbel Library Disclaimer:
This list is updated every six months. We are not responsible
for any changes to content or purpose that these sites might
make between updates.
oppapers.com Other People's Free Term Papers for all you have to
logon.
academon.com Buy and Sell Term Papers
a1-termpaper.com
allfreeessays.com/teachers.html
wiu.edu/users/mfbhl/wiu/plagiarism.htm
zarr.com/student/default.asp UK-based www denies it is
encouraging plagiarism but openly says "the use of the
information for cheating purposes cannot be ruled out". It
invites students to submit their essays and lecture notes - with
the promise of getting paid when others access them.
researchpaper.com - the Web's largest collection of topics,
ideas, and assistance for school related research project.
speedyresearch.net Over 53,000 reports are available at $6.00
per page also assist with custom research.
essay911 we deliver custom-made papers only. A couple of samples
of custom-made papers written by our team. Order a custom paper
designed and written specifically for you for as little as
$11.95
per page.
essaytown.com is an American company, but we accept orders from
all countries, Australia to Zaire. Prices
start at 35.oo
(USD).
cheathouse.com pay to read papers by grade levels
347-404-5110
they help you cite the sources. Access for 3 days starts at
$10.00.
http://tinyurl.com/ljr78 - undergrad term papers up to masters
thesis starts at $19.95 a page. Since all our projects are
custom written, your paper will never end up in the
TurnItIn.com
database or any other database for pre-written papers. model
termpapers the Sister site http://tinyurl.com/mujhq
schoolsucks.com the free term-paper site receives ad revenue in
six digits, doubling every year.
The Evil House of Cheat, cheathouse.com fee-based term paper
services
FratFiles.com - over 100,000 papers compiled into one HUGE
database.
writemyessay.com - Custom essays on any topic!
Teachers Learn How to Avoid Plagiarism
Students can avoid detection
when they pay to have content written for them.
oppapers.com
, a custom-made paper costs $3.95 a page for seven-day delivery
and $8.95 a page for overnight delivery.
essaysfree.com
charge $22 per page for papers delivered in seven days and $55
for 'emergency service' and buyers must pay for the paper before
they see it.
computergal
300 word essay $21.99
http://www.thecomputergal.citymax.com/page/page/2729486.htm
Outsource your homework to India | FP Passport
http://blog.foreignpolicy.com/node/9139
Students studying computing in the UK and US are outsourcing
their university coursework to graduates in India and Romania.
Work is being contracted out for as little as 5 on contract
coding websites usually used by businesses. Students are
outsourcing everything from simple coursework to full blown
final year dissertations. It's causing a major headache for
lecturers who say it is almost impossible to detect."
Transcopyright™* ALL THE FREEDOM THAT'S LEGAL
understand everyone's need to quote portions on line, which is
what I've fought for most of my life. Theodor Holm Nelson,
Fellow of the Oxford Internet Institute
John Barrie, a doctoral candidate at the University of
California at Berkeley, created
Plagiarism.org
as a technical solution to "wipe out term paper mills."
Paste in your text.
http://www.plagiarismdetect.com
Free plagiarism detection system for students to check academic
papers and written documents for plagiarism.
MOSS
(Measure Of Software Similarity) is a free service for detecting
programming plagiarism in IT classes.
DI Tracker
which reports on matches for blocks of Web-text longer than one
line. It also matches other formats: PowerPoint, JPEG, code,
audio and video files.
WORDCHECK
tracks keyword usage to determine matching.
MatchDetectReveal
(MDR) to match suspect documents against those on the Web or in
other large repositories.
Turnitin
uses source analysis software to check papers and return
Originality Reports
to teachers or students; the fineness of matching is down to an
8-word string. The program is practically useless if a student
uses a thesaurus to change every other word in a paper to a new
word of equivalent meaning. Turnitin is also completely impotent
in detecting that a student paid a ghostwriter to compose a
paper from scratch.
Plagiarism Detection in Term Papers, and Essays and Research
A compendium of links to valuable information about plagiarism
and the internet. Teacher resources for detecting plagiarism
and cheating. Student resources to help avoid plagiarism on
the Educational CyberPlayGround
®
.
An instructor can largely avoid the issue of plagiarism by
giving assignments that require personal knowledge or that
compel students to provide regular accounts of their studies.
Plagiarism--find articles, rules, resources, sites, ethics,
policies for teachers, including
Law
, with recommendations on how to combat plagiarism.
Iparadigms.com owns Turnitin.com
IPARADIGMS.COM (510) 287-9720
email ebriand@iparadigms.com 510 287 9729
Market Intelligence
The Software & Information Industry Association.
Presumption of Guilt vs. The Honor Code
Some educators have rejected the service and other anti-cheating
technologies on the grounds that they presume students are
guilty, undermining the trust that instructors seek with
students. Washington & Lee University, for example,
concluded several years
ago that Turnitin was inconsistent with the school's honor
code,"which starts from a basis of trusting our students," said
Dawn Watkins, vice president for student affairs. "Services like
Turnitin.com give the implication that we are anticipating our
students will cheat."
http://www.nytimes.com/2010/07/06/education/06cheat.html
]
Students Rights
Parents did you know
that
Iparadigms.com makes a deal with the schools and they school
directes the children to use Turnitin.com
- Students have no choice, they can NOT DECLINE, their rights to
assert their own choice is violated. The students
claimed that this agreement infringed the copyrights
to their own work, given that parts of their essays could
resurface whenever similar text appeared in future reports
generated by turnitin.
A.V., et al. v. IParadigms, Limited Liability Company
Trespass To Chattels - Internet Library of Law and Court
Decisions
- April 2, 2008
Civ. Act. No. 07-0293 (E.D. Va., March 11, 2008) by
Martin Samson
one of the foremost authorities on Internet Law, having authored
the Internet Library.
Court
decision
(PDF) by
Judge Hilton
holds that minors entered into valid 'click wrap' agreement
with defendant IParadigms LLC (“IParadigms”)
by clicking an “I agree” icon
which appeared directly below an online Usage Agreement, and
indicated their assent to be bound thereby.
Plaintiffs were high school students that were directed by the
schools they attended to submit class work to defendant
IParadigm's “Turnitin” website to check for plagiarism.
As part of this submission process,
plaintiffs were obligated to assent to the site's Usage
Agreement.
Because the Usage Agreement
contained a limitation of liability clause precluding
liability to plaintiffs as a result of their use of the
Turnitin site
, the
Court rejected plaintiffs' copyright infringement claims
, which arose out of defendant's storage of plaintiffs' class
work in a database used to check student homework for
plagiarism.
In reaching this result, the
Court rejected plaintiffs' claims that, as minors, they were
not bound by the terms of the site's Usage Agreement
.
Because they had accepted the benefits of the agreement - the
ability to submit their class work for grade to their
respective schools was dependent upon their use of the site
-
they could not escape the contractual conditions upon which
such benefits were rendered.
The Court rejected the counterclaims advanced by defendant
iParadigms, including a claim for indemnification as a result of
the commencement of this action. This claim was based on a
separate “Usage Policy” found on the Turnitin site. The Court
held that plaintiffs were not bound by this policy, which was
not linked or otherwise referenced in the Usage Agreement to
which plaintiffs were in fact bound. There was no evidence that
plaintiffs were aware of this separate “usage policy,” which was
contained in a link on each page of the Turnitin site. As a
result, and because the parties' contract stated that it
constituted the full agreement between the parties, the
plaintiffs' use of the site was held not to create a valid
browse wrap agreement, and the claim for indemnification,
predicated on the Usage Policy, was dismissed.
2007 McLean Students Sue Anti-Cheating Service Plaintiffs Say
Company's Database of Term Papers, Essays Violates Copyright
Laws
[
1
]
Attorneys for the company and various universities and public
school systems, including Fairfax , have concluded that the
service doesn't violate student rights. Turnitin is used by
6,000 institutions in 90 countries, including Harvard and
Georgetown universities, company officials have said. Some
public schools in Arlington, Prince George's and Loudoun
counties use the service. According to the lawsuit, each of the
students obtained a copyright registration for papers they
submitted to Turnitin.
The lawsuit filed against Turnitin's parent company,
iParadigms LLC, seeks $150,000 for each of six papers written
by the students.
One of the McLean High plaintiffs wrote a paper titled "What
Lies Beyond the Horizon." It was submitted to Turnitin with
instructions that it not be archived, but it was, the lawsuit
says.
It's only piracy
if YOU
make the copies
see?
2008 Judge Rules Plagiarism-Detection Tool Falls Under 'Fair
Use'
The Chronicle of Higher Education, 8.4.4
http://chronicle.com/weekly/v54/i30/30a01301.htm
By JEFFREY R. YOUNG
A federal judge has ruled that a commercial plagiarism-detection
tool
popular among professors does not violate the copyrights of
students, even
though it stores digital copies of their essays in the database
that the
company uses to check works for academic dishonesty. The
decision has
implications for other digital services, such as Google's effort
to scan
books in major libraries and add them to its index for search
purposes.
The lawyer for the students who sued the company said he plans
to appeal.
Judge Claude M. Hilton, of the U.S. District Court in
Alexandria, Va., in
March found that scanning the student papers for the purpose of
detecting
plagiarism is a "highly transformative" use that falls under the
fair-use
provision of copyright law. He ruled that the company "makes no
use of any
work's particular expressive or creative content beyond the
limited use of
comparison with other works," and that the new use "provides a
substantial
public benefit."
The case has been closely watched by the thousands of colleges
who use the
plagiarism-detection tool, called Turnitin, as well as by
opponents of the
service, who hope to prevent professors from becoming
anticheating police.
In March 2007, four high-school students two in Virginia and two
in
Arizona sued iParadigms, the company that runs Turnitin, arguing
that
the company took their papers against their will and profited
from using
them. The students' high schools required papers to be checked
for
plagiarism using Turnitin, and the service automatically adds
scanned
papers to its database. The company boasts about the size of its
database
as a selling point, and colleges pay thousands of dollars a year
to use
it. The students sought $900,000 as compensation for six papers
they had
submitted.
Judge Hilton seemed unmoved by nearly all the students'
arguments.
"Schools have a right to decide how to monitor and address
plagiarism in
their schools and may employ companies like iParadigms to help
do so," he
said in his 24-page ruling.
More Issues to Explore
"I'm definitely appealing," said Robert A. Vanderhye, a retired
lawyer in
Virginia who took on the students' case pro bono. "I am positive
that the
appellate court will reverse" on the fair-use issue, he added.
The judge, he continued, "copied" the company's brief. "He
didn't even
consider any of our arguments," said Mr. Vanderhye.
Specifically, Mr. Vanderhye said, the judge did not address
whether or not
Turnitin violated federal student-privacy laws by allowing users
of the
service to see papers that show students' names along with the
names of
their instructors and other personal information. If the tool
finds that a
newly submitted paper contains material that matches papers
already in the
database, it gives the instructor the option of retrieving the
old paper
for a detailed comparison.
Katie Povejsil, vice president for marketing at Turnitin, said
the company
was "delighted" by the ruling.
"This was a very important case for us," she said. "This clears
up some
questions" in customers' minds about the legality of the
product.
Peter A. Jaszi, a law professor at American University, said the
judge's
argument that the plagiarism tool is covered by fair use because
it is
transformative may well stand up to an appeal.
"However, I would expect that, on appeal, the lawyers for the
plaintiffs
might explore a wrinkle that the judge doesn't really address in
the
opinion," he said. "That is whether or not a new use, a use of
copyrighted
material for a new purpose, is an effective or promising use."
Mr. Jaszi
said previous courts have argued that how beneficial a use of
copyrighted
material is helps determine whether it is covered by fair use.
"The big debate about Turnitin, as far as I can tell," said Mr.
Jaszi, "is
about whether it's a good tool."
The decision could bode well for Google. The company has been
sued by
groups representing publishers and authors who argue that the
company is
violating their copyrights by digitizing their books without
express
permission. Google contends that, because its digital copies are
for the
purpose of providing an index, it is essentially transforming
the
material.
"If this opinion, as it stands, were to be endorsed on appeal,
it can only
help the cause of Google Library," said Mr. Jaszi.
2004 Student wins battle against Tunitin plagiarism detection
requirement
January 21, 2004
http://www.cnn.com/2004/LAW/01/21/ctv.plagiarism/index.html
[full text]
[ "The senate committee at McGill University in Montreal sided
last Thursday with sophomore
Jesse Rosenfeld, who argued that he should not be required to
submit his essays to Turnitin.com,
a Web site that verifies originality by comparing documents to
thousands of others. [snip] Rosenfeld said he had
"an ethical and political problem" with the university's
policy of submitting student work to Turnitin.com." I was
having to prove I didn't plagiarize even before my paper was
looked at by my professor,"
Rosenfeld said, according to the Globe and Mail. [snip] Boyko
also believes universities should not be permitted to turn over
essays to sites like
Turnitin.com, which he said makes money off students' work
without their consent
.
[snip]
Lawyers say the problem with Turnitin.com is that student
papers are copied in their entirety to the services'
database, which is a potential infringement of students'
copyrights.
(An author doesn't need to file for a copyright; the law
automatically bestows on authors the rights to their written
works.) And the copying is sometimes done without students'
knowledge or consent, which is a potential invasion of their
privacy. [
1
] "The value to our company is not in the collection of words
and characters in an essay, but in the series of numbers derived
from the essay once we transform those words and characters into
digital fingerprints," Barrie said. [
2
] "In short, the value to us is not derived from the student's
actual work."
Barrie says in this way, Turnitin.com does not violate
students' copyrights to their work, adding that students
retain control over their copy. ... ] Turnitin.com made more
than $50,000,000 since 1998, and never paid any royalties to
any student whose intellectual property Turnitin has copied,
stored, disseminated to third parties, and used to create a
for-profit, derivative works-based service.
Back on
October 10, 2006, Bloomberg reported
: "I thought our first clients would be Harvard, Princeton,
Yale," says John Barrie, president of Oakland,
California-based
iParadigms LLC, the maker of Turnitin.
"I now think our last clients will be Harvard, Princeton and
Yale. They have the most to lose."
Less than one month later (Nov. 2), Bloomberg reports that
Harvard has signed up with Barrie, iParadigms, and Turnitin
. Curiously, the contract between Harvard and iParadigms was
signed in September, BEFORE the Oct. 10 Bloomberg report:
The contract, signed in early September, follows a series of
plagiarism scandals at Harvard, including one involving a
student novelist and another over columns and cartoons published
in the student newspaper. [IPBiz notes that the flap at Crimson
over plagiarized columns and the separate flap over political
cartoons happened AFTER September. IPBiz does not know why
Bloomberg did not mention the contract in its October piece.]
The article by Emily Sachar [Nov. 2] begins:
Harvard University has become the first Ivy League institution
to license anti-plagiarism software, the president of the
software company said today.
Harvard College, the university's undergraduate school, licensed
the software in the first weeks of September and has made it
available to all of the faculty, according to John Barrie,
president of iParadigms LLC, the Oakland, California- based
company that makes Turnitin.com.
The contract, signed in early September, follows a series of
plagiarism scandals at Harvard, including one involving a
student novelist and another over columns and cartoons published
in the student newspaper.
``With Harvard's decision, the message is now broadcast in
spades,'' Barrie said in a telephone interview today [Nov. 2].
``
Plagiarism software and Turnitin are now part of how education
works
.''
Harvard spokesman Robert Mitchell today confirmed the contract
with Turnitin and said the faculty will roll out the software's
use on a department-by-department basis in the college, which
has 6,613 students. Mitchell said he did not know why Harvard
chose to adopt the software.
Sociology 189, ``Law and Social Movements,'' is using the
Turnitin software this term after a faculty member requested it,
Mitchell said.
*** The Sachar article concludes:
Law professors Laurence Tribe and Charles Ogletree have also
apologized in the past two years for failing to attribute the
work of others in books they published.
Of 56,611 undergraduates surveyed in a 2005 study by Duke
University's Center for Academic Integrity, 37 percent admitted
copying Internet material without attribution, compared with 10
percent in 1999.
There is no mention of using Turnitin, or other software, to
test the work of professors for plagiarism. The current debate
at Southern Illinois University [SIU] involves an academic
administrator.
STUDENT SUES ONLINE TERM-PAPER VENDORS
DoingMyHomework.com, FreeforEssays.com, &
FreeforTermPapers.com, all of which are owned by an Illinois
company called R2C2
.
A graduate student has filed a lawsuit charging three online
vendors of term papers with selling a paper she wrote without
her permission.[
3
] Blue Macellari is currently pursuing graduate degrees at Johns
Hopkins University and Duke University. The paper in question,
which was written when she was a student at Mount Holyoke
College, was posted on Macellari's personal Web page in 1999 but
turned up for sale. Macellari said she did not give her
permission to use the paper, which itself could violate honor
codes at Johns Hopkins and Duke.
John Palfrey, law professor at Harvard University and
executive director of the Berkman Center for Internet and
Society, said that the defendants will have difficulty
prevailing if Macellari's complaint is accurate.
On the question of whether the action would have an appreciable
effect on the sale of papers online, Palfrey was less
optimistic. Comparing Macellari's lawsuit to similar actions to
limit spam, he noted that spam continues to grow unabated. "Its
hard to bring enough spam lawsuits to make a big difference," he
said.
IT IS OK - > You are SUPPOSED to use others' works to
support your ideas which is what doing a research paper is
for !
It's FINE to use someone else's work because it is very hard
to have an original idea.
You can
paraphrase
, but you STILL have to give a
citation
because
IDEAS count
, too, even if you are told to "put it in your own words".
How to Cite The Source
Get an A by finding and then showing the teacher what they
didn't know.
Learn how to write proper quotations, citations, and
bibliographies
.
ASK STUDENTS TO:
-- analyze, interpret, infer or synthesize" material they have
read
-- compare-and-contrast essays or personal opinion pieces
--
What is the nature of the assessment?
Perhaps test at a higher level where its harder to "cheat?"
Cut-and-Paste Plagiarism
Preventing, Detecting and Tracking Online Plagiarism. An online
article for educators that defines plagiarism, offers prevention
suggestions,gives detective tips, and describes ways to track it
down. Included within the article is a list of some of the
sources of plagiarized papers so that you can become familiar
with them. The author suggests that one way of detecting a
plagiarized paper is to identify unusual keywords or unique
phrases in the paper and then conduct a web search for those
words through a large search engine.
Students Use Internet to Cheat
By Jay Mathews and Valerie StraussWashington Post Staff
Writers Tuesday, May 15, 2001; Page A07
http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&contentId=A26738-2001May14¬Found=true
More than half of students from 25 high schools across the
country said in a new survey that they had used the Internet to
commit plagiarism for school assignments.
The survey by Rutgers University management professor Donald
McCabe, who has researched academic integrity for many years,
also said that nearly half of the students questioned said they
think their teachers sometimes know students are cheating in
class but ignore it.
McCabe said addressing the issue is difficult because it has
become so common that, as one student told him, "It's starting
to become 'normal' in some cases."
Plagiarism and Academia: Personal Experience
A paper published in the December 2004 issue of the SIGCSE
Bulletin, "Cryptanalysis of some encryption/cipher schemes using
related key
attack," by Khawaja Amer Hayat, Umar Waqar Anis, and S.
Tauseef-ur- Rehman, is the same as a paper that John Kelsey,
David Wagner, and I published in 1997.
It's clearly plagiarism. Sentences have been reworded or
summarized a bit and many typos have been introduced, but
otherwise it's the same paper. It's copied, with the same
section, paragraph, and sentence structure -- right down to the
same mathematical variable names. It has the same quirks in the
way references are cited. And so on.
We wrote two papers on the topic; this is the second. They don't
list either of our papers in their bibliography. They do have a
lurking reference to "[KSW96]" in the body of their introduction
and design principles, presumably copied from our text; but a
full citation for "[KSW96]" isn't in their bibliography. Perhaps
they were worried that one of the referees would read the papers
listed in their bibliography, and notice the plagiarism.
The three authors are from the International Islamic University
in Islamabad, Pakistan. The third author, S. Tauseef-Ur-Rehman,
is a department head (and faculty member) in the
Telecommunications Engineering Department at this Pakistani
institution. If you believe his story -- which is probably
correct -- he had nothing to do with the research, but just
appended his name to a paper by two of his students. (This is
not unusual; it happens all the time in universities all over
the world.) But that doesn't get him off the hook. He's still
responsible for anything he puts his name on.
And we're not the only ones. The same three authors plagiarized
a paper by French cryptographer Serge Vaudenay and others. And
one of my blog readers found a third plagiarized paper, and
potentially a
fourth.
I wrote to the editor of the SIGCSE Bulletin, who removed the
paper from their website and demanded official letters of
admission and apology. They said that they would ban them from
submitting again, but have since backpedaled. Mark Mandelbaum,
Director of the Office of Publications at ACM, now says that ACM
has no policy on plagiarism and that nothing additional will be
done. I've also written to Springer-Verlag, the publisher of my
original paper.
I don't blame the journals for letting these papers through.
I've refereed papers, and it's pretty much impossible to verify
that a piece of research is original. We're largely
self-policing.
Mostly, the system works. These three have been found out, and
should be fired and/or expelled. Certainly ACM should ban them
from submitting anything, and I am very surprised at their claim
that they have no policy with regards to plagiarism. Academic
plagiarism is serious enough to warrant that level of response.
I don't know if the system works in Pakistan, though. I hope it
does. These people knew the risks when they did it. And then
they did it again.
If I sound angry, I'm not. I'm more amused. I've heard of
researchers from developing countries resorting to plagiarism to
pad their CVs, but I'm surprised to see it happen to me. I mean,
really; if they were going to do this, wouldn't it have been
smarter to pick a more
obscure author?
And it's nice to know that our work is still considered relevant
eight years later.