Crisis on campus : confronting academic misconduct /
Saved in:
Author / Creator: | Decoo, Wilfried, 1946- |
---|---|
Imprint: | Cambridge, Mass. : MIT Press, c2002. |
Description: | xvii, 262 p. : ill. ; 25 cm. |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/4676976 |
Table of Contents:
- Preface
- 1. Introduction
- 1.1. Finding the right balance
- 1.2. Entering the realm of academic misconduct
- 1.3. The extent of academic misconduct
- 1.4. Changing circumstances and risk factors
- 1.5. Countering and curing
- 2. Detection
- 2.1. Introduction
- 2.2. The detection of fabrication and falsification
- 2.3. The detection of text plagiarism
- 2.4. The detection of the plagiarism of ideas
- 2.5. The detection of software plagiarism
- 2.6. The detection of misused connections
- 2.7. The detection of academic make-believe
- 2.8. The detection of possibly deceitful educational software
- 2.9. Conclusion
- 3. Analysis
- 3.1. Introduction
- 3.2. Analyzing alleged fabrication and falsification
- 3.3. Analyzing alleged plagiarism
- 3.4. Analyzing the misuse of professional connections
- 3.5. Analyzing the self-promotion of one's own work
- 3.6. Analyzing academic make-believe
- 3.7. Analyzing possibly deceitful courseware
- 3.8. Analyzing the plagiarism of ideas
- 3.9. Conclusion
- 4. Assessment
- 4.1. Introduction
- 4.2. Fabrication or not? Falsification or not?
- 4.3. Plagiarism or not?
- 4.4. Can a thesis or doctoral committee be guilty of misconduct?
- 4.5. Can publications become misconduct?
- 4.6. When do research projects become deceptive?
- 4.7. When do educational media become deceptive?
- 4.8. When does ignorance become misconduct?
- 4.9. Assessing hidden motives
- 4.10. Conclusion
- 5. Reporting and handling
- 5.1. Introduction
- 5.2. Should one report misconduct?
- 5.3. The whistle-blower
- 5.4. Recommendations for reporting
- 5.5. The institutional response
- 5.6. The accused
- 5.7. The responsibility of editors and librarians
- 5.8. Conclusion
- 6. Prevention
- 6.1. Introduction
- 6.2. Constructive measures
- 6.3. Deterrent measures
- 6.4. Conclusion
- 7. General conclusion
- 7.1. My core issues
- 7.2. Final recommendations
- 7.3. A never-ending story
- Epilogue
- Appendix. Cerberus
- A.1. Comparing texts
- A.2. Cerberus text-comparison mechanisms
- A.3. Using the Cerberus program
- A.4. Performance aspects
- A.5. The Cerberus source code
- References
- Index