PLAGIARISM: MISCONDUCT AWARENESS ON NOVICE RESEARCH WITHIN THE CYBERWORLD

Plagiarism within the cyber-digital environment is a significant problem amongst firsttime authors and researchers. It is imperative that an author's contribution to the knowledge community be authentic at all times. Institutions provide the opportunity for novice researchers to contribute towards the furthering of their academic careers through, inter alia, the publications of first-time writings and articles. This achievement may also be regarded as a measure of the researchers' accomplishments and success. This article aims to dissuade novice authors from committing plagiarism within the cyber-digital environment by using the Internet as a research tool. To achieve this objective, the article attempts to provide enlightenment by explaining concepts such as novice authorship, plagiarism, the cyber-digital environment and fair-use doctrine. Although plagiarism may have important legal implications for novice authors, this contribution is written mostly from an information technology perspective.


Novice authorship
Although plagiarism is not solely committed by novice researchers, they appear to be more likely to commit plagiarism, possibly through a lack of awareness.In the context of the article, novice researchers are first-time or inexperienced authors who write an article with the expectation for it to be published in journals for the recognition of their knowledge within the cyber-digital environment for that specific area of excellence.Apart from the common mistakes made by novice researchers when preparing a digital manuscript for submission, in errors of varying degrees, 1 there seems to be a propensity for first-time authors to copy directly from the works … Writers must acknowledge the sources not only of words, but also of ideas, insofar as is possible, even when they are not quoting word for word from the Web.Moreover, in final-draft writing, writers may not paraphrase a source by using its phrases or sentences, with a few changes in grammar or word choiceeven when the source is cited.
Thus, Howard answers the questions posed above in her explanation of plagiarism and cautions against the use of "patch-writing"."Patch-writing" is one of the three categories of Howard's plagiarism policy, a discussion of which follows.
2 Elmore 2005 http://bit.ly/eLCmSH.For the purpose of the article, this description is within the context of cyber-digital environment.3 Howard 1995 College English 799.

3.2
The three categories 4 of Howard's plagiarism policy 5 In order to contextualise Internet plagiarism, it is desirable to clarify plagiarism by defining the three categories of Howard's plagiarism policy, namely "cheating", "nonattribution" and "patch-writing".According to Howard, 6 cheating in this context means the "Borrowing, purchasing, or otherwise obtaining work composed by someone else and submitting it under one's own name"; non-attribution means "Writing own's paper but including passages copied exactly from the work of another (regardless of whether that work is published or unpublished or whether it comes from a printed or electronic source); and patch-writing involves "Writing passages that are not copied exactly but that have nevertheless been borrowed from another source, with some changes".
Howard 7 defines patch-writing as "paraphrasing the source's language too closely".
Howard further gives examples of the three categories of plagiarism and provides measures for each.

How can plagiarism be avoided?
As mentioned, there is often some form of infringement relating to the use of another author's work by novice authors.This section is an attempt to address ways to avoid plagiarism and thereby assist novice authors to avoid being caught out unawares in the midst of having committed an act of plagiarism.
In order to avoid plagiarism, authors must give credit in any instance in which they specifically for plagiarism detection that can be employed by novice authors to determine whether their work leads to infringement through plagiarism.One of these tools is PlagiarismDetect.Com, a subscriber service available to the public.

3.4
What to expect from Advanced PlagiarismDetect.com 9 PlagiarismDetect.Com is one of the most recent plagiarism-detection software tools available on the market.The tool's purpose is to assist researchers in detecting any possibility of plagiarism and, in so doing, helping to avoid such infringements.Manifestation of plagiarism Plagiarism, as stated in the introductory section of the article, is a problem amongst first-time authors and researchers.Failure to deliver an authentic contribution to a body of knowledge because of plagiarism is seen as shameful and a significant transgression within the academic context.This section explains the manifestation of plagiarism, thereby addressing the primary objective of the article.
Plagiarism is the intentional taking of another author's work and claiming it as one's own. 10 This practice has been observed not only amongst first-time researchers at every level, but also amongst academics, administrators and professional researchers publishing in peer-reviewed journals. 11Plagiarism, if detected, becomes punishable by our law courts.There are various situations that can be classified as acts of plagiarism, 12 such as a failure to give references and citations in a case in which an author's work is used without permission or even in a case in which conveying common knowledge constitutes plagiarism. 13An explanation of these two situations follows.9 The tool guarantees total confidentiality and safety.10 Within the context of this article, plagiarism occurs within the cyber-digital environment and is thus referred to as digital plagiarism, in other words, plagiarism with regard to e-information available on the Web as the intentional taking of another's work claiming it as one's own.11 Spinello Cyberethics .12 Halbert and Ingulli CyberEthics.13 For example, copying works regardless of the copyright sign (©) being clearly indicated.

References and citations
As indicated, references and citations should always be given where an author's work is used without permission.Failure to do so will constitute infringement and thus plagiarism, which, if detected, becomes punishable by our law courts.
An author makes use of previous studies14 to provide support for his/her proposed rationale for undertaking a research project.In order to assess the validity of the cited studies, editors and reviewers must have the opportunity to view the original source material if necessary.Inaccurate citations can be a significant barrier to this process.In general researchers seek to advance a specified field of study by building on previously conducted and reported studies.The use of selective references enables novice researchers to build a case justifying an approach to a research question.
It should be noted, however, that should the author use these phrases or sentences in his/her own paper without the use of quotation marks, the author would be plagiarising. 15Using another author's phrases or sentences without the use of quotation marks is considered to be plagiarism even if the author cites in his/her own text the source of the phrases or sentences he/she has quoted.

4.2
What constitutes common knowledge? 16other situation in which infringement constitutes plagiarism is the case in which conveying common knowledge constitutes plagiarism.This can manifest itself in two forms, namely quotations and paraphrasing.

499/508
Quotations involve using another author's expressions.Authors are required in such instances to place the passage or phrase they are using in quotation marks and document the source according to a standard documentation style.Failure to do so amounts to infringement and, thus, plagiarism. 17Paraphrasing involves using another author's ideas, but phrasing them in one's own words.This is generally a skill authors uses most when incorporating sources into their writing.Although authors may use their own words to paraphrase, it is still necessary to acknowledge the source of the information.

Digital content protected
Cyber-digital content is the information posted by the author on the Web, which enjoys copyright protection similar to that under the Copyright Act 18 as analogue works.Such content can easily be mistaken for works in the public domain, 19 as the author is not clearly identified.In such cases, the author citing the work should include both the web-site address and the date on which the author accessed the web-site.Digital content includes electronic versions of books or e-books, graphics, video, audio, music, e-mail, web-sites and online databases.Using digital content requires permission that is beyond the scope of fair-use.Another cyber-digital environment is electronic reserves.

Electronic reserves
Electronic reserves are an extension of traditional library reserves managed according to fair-use exclusions and the rights of copyright holders as embodied in the current copyright law. 20 without the permission of the copyright holder in cases in which the nature, scope or extent of copying exceeds the reasonable limits of fair-use. 21

5.3
The Web 2.0 The Web 2.0 is a conglomeration of tools, including the Internet, that has become a popular source of information for research papers, and thus many questions have arisen about the manner in which to avoid plagiarising these sources.If an author wishes to use virtual information from a web-site, many of the same rules apply. 22pying visual information or graphics from a web-site 23 is very similar to quoting information, and the source of the virtual information or graphic must be cited.
Failure to do this amounts to infringement and, thus, plagiarism.Brinson et al 24 and Buys and Cronjé 25 conclude that it is advisable that if permission is granted, it should always be in writing for future reference and evidential purposes.

The fair-use doctrine
The article has demonstrated the manner in which infringement and thus plagiarism manifest through novice authors using, unauthorised, the protected works of others available within the cyber-digital environment without adequately crediting the original authors.The meaning of plagiarism has been explained and the manifestations thereof described with the aim of providing guidance to novice authors.This section examines the fair-use doctrine.
The fair-use doctrine refers to an aspect of copyright law that provides for the licit, non-licensed citation or incorporation of copyrighted material in another author's work under certain, specifiable conditions.According to Masango, 26  use" is not unique to countries such as South Africa; a similar principle, "fair dealing", exists in some other jurisdictions. 27ir use makes copyrighted work available to the public as raw material without the need for permission or clearance, provided that such free usage serves the purpose of copyright law. 28The doctrine, advocated by Rao, 29 hereby attempts to balance the interests of individual copyright holders with the social or cultural benefits that follow from the creation and distribution of derivative works.It is related to fair dealing in most respects. 30The social and cultural benefits referred to entail ethical responsibility.

Ethical responsibility
Ethical responsibility should be viewed as the cultural milieu within the cyber-digital environment with respect to other authors' works, as these authors are normally not in the physical presence of one another.
Ethics 31 forms a cornerstone of every form of research by every researcher, whether veteran or novice.Leonard and Cronan, 32 and Leonard, Cronan and Kreie 33 extend this, stating that ethical morality refers to the principles of right or wrong, which individuals, acting as free moral agents, use to make choices to guide their behaviour.A number of authors have advocated viewing plagiarism as an issue of ethics and moral conduct in the case of novice researchers as opposed to misconduct. 34The factors to be considered in determining fair use is discussed in the following paragraph.

Four factors for determining fair use
As indicated, fair use is the most significant limitation on the copyright holder's exclusive rights.It is not a science deciding whether the use of a work is fair and thus there are no set guidelines that are universally accepted.Instead, the novice researcher who wishes to use a copyrighted work must weigh up four factors: 35 (a) the purpose and character of the use; (b) the nature of the copyrighted work; (c) the amount and substantiality of the portion used; and (d) the effect of use on the potential market for the copyrighted work.
In determining this, the novice researcher should also consider the following questions: Will the expression by the author be used, and is the expression protected by copyright? 36 Stripped to its essence, fair use is put to the test by the three questions above.
Should the answer to all these questions be in the affirmative, then the fair-use doctrine will apply.Should, however, the answer be in the negative, and the works are nevertheless used, then there is infringement and thus plagiarism will be committed.

Conclusion
The article has examined plagiarism amongst first-time authors and the research community.In an attempt to dissuade novice authors from committing plagiarism within the cyber-digital environment by using the Internet as a research tool, the article has discussed fair-use doctrine and the manner in which it manifested within the cyber-digital environment.

503/508
With regard to both digital plagiarism and fair use, it is no wonder that in the cyberdigital environment, researchers often do not understand just how easy it is for researchers to make use of other author's work.The law appears confusing, ambiguous, and unclear because of a lack of cyberspace policing.Such confusion in this regard is detrimental with regard to academic publishing , as an academic who does not publish will perish. 37As a result of such confusion plagiarism can be easily committed, which is something that must be curbed.Plagiarism is a serious act that can have juridical consequences for which a plagiarist may be unprepared.If caught plagiarising, the punishment is harsh.If "e-policing" were virtually seen to be done (by documenting it somewhere visibily), plagiarism would, to a larger extent be combated.In order to lend greater effect to the Copyright Act, it is important to keep abreast of international copyright laws, such as those of the United States of America and Australia.If digital plagiarism were indeed enforceable within the cyberspace, legal certainty, legal security, legal protection and legal deterrence, on the face of it, would be assured in scholarly writing without this being reduced to "lipservice", as it were.

31 PER
Lahore J and Rothnie WA Digital Agenda -The Copyright Amendment (Digital Agenda) Act 2000 (Butterworths Sydney 2004) Leonard and Cronan 2001 JAIS Leonard LNK and Cronan TP "Illegal, inappropriate, and unethical behaviour in an information technology context: A study to explain influences" 2001 JAIS 1(12) 1-and Kreie 2004 Information Management Leonard LNK, Cronan TP and Kreie J "What influences IT ethical behaviour intentions -Planned behavior, reasoned action, perceived importance, individual characteristics?"2004 Information Management 143-158 Litman Digital Copyright Litman J Digital Copyright (Prometheus New York 2001) MacDonald, McDonald and Norman 2002 Journal of Business Ethics MacDonald C, McDonald M and Norman W "Charitable conflicts of interest" 2002 Journal of Business Ethics 67-74 Masango 2007 Libri Masango CA "Perceptions about copyright of digital content and its effects on scholarship: A South African perspective" 2007 Libri 57(2) 84-91 Masango 2009 IJIM Masango CA "Understanding copyright in support of scholarship: Some possible challenges to scholars and academic librarians in the digital environment?"2009 IJIM 29(3) 232-236 Patry Fair Use Privilege in Copyright Law Patry WF The Fair Use Privilege in Copyright Law 2 nd ed (Bureau of National Affairs Washington 1995) Quinn Ethics for the Information Age Quinn MJ 2005 Ethics for the Information Age (Pearson Addison Wesley Boston 2005) Rao 2003 Online Information Review Rao SS "Copyright: Its implications for electronic information" 2003 Online Information Review 264-275 Materials may not be placed in electronic reserves 17 And thus heavily punished if caught, as he/she would be pretending to be the original author (Litman Digital Copyright; Spinello Cyberethics).18 98 of 1978.19 Works belonging to no particular author that can be used by anyone without infringement.In other words, works that do not enjoy copyright protection.20 Copyright Act.