MINUTES ACADEMIC STANDARDS COMMITTEE April 6, 2007 Present: Gary McCall

advertisement
MINUTES
ACADEMIC STANDARDS COMMITTEE
April 6, 2007
Present: Gary McCall, Mike Spivey, Mark Martin, Debbie Chee, Bill Kupinse, John
Finney, Rob Taylor, Chris Kline, Brad Tomhave, Wade Hands, Greta Austin, Ken
Clark, Seth Weinberger, Melissa Bass, Danya Clevenger, Jack Roundy
1. Minutes: The March 23rd minutes were approved as written.
2. Announcements: Kline commended Wade Hands on a recently published volume,
celebrated on Wednesday at 4 pm in CWLT. Kline also noted that Suzanne Barnett’s
Asia Symposium will be held next Wednesday, Thursday and Friday. Austin
announced that on April 25 we will host a speaker from Afghanistan to talk about
Women in Islamic Law.
3. Petitions Committee (PC) Actions: Tomhave provided the following report of PC
actions since our last meeting.
Date
3/28/07
4/4/07
Year-to-date
Approved
2 (1 PPT)
3 (3 PPT)
160 (36 R + 45 PPT)
Denied
1
0
40
No Action
0
0
1
Total
3
3
201
4. Academic Honesty: Weinberger walked the committee through a series of
recommendations from the academic honesty subcommittee (Weinberger, Austin,
Martin—documents attached). He pointed out recommendations that will require
committee discussion, such whether to adopt the Amherst/Tufts quiz on academic
honesty, and how and when to administer it. He noted several policy language
changes, including an “intellectual community” text that the ASC would need to
develop (perhaps using models from other institutions). He noted the internet
plagiarism examples the subcommittee proposes for adoption. He pointed out the
subcommittee’s recommendation that we use Princeton’s “non-print and electronic
sources” document, with an added statement analogizing internet use with music
sharing and downloading. In the subcommittee’s behalf, he invited Spivey to
contribute text on plagiarism in mathematics. Martin shared a document he prepared
with material solicited from Spivey (also attached) addressing plagiarism in
mathematics and the sciences. Weinberger also noted the subcommittee’s ideas for
promulgating understanding of academic honesty during orientation, through the
booklet containing “Advice to New Students,” and other appropriate orientation
vehicles. He concluded by pointing out the subcommittee’s recommendation that ASC
discuss creating an honor code for the university.
Spivey acknowledged his contribution to the Martin document, but noted that it did
not constitute guidelines for practice. He agreed to provide more specific statement for
the subcommittee’s use.
Hands talked about how different faculty have differing views on copying and sharing
by students when they are working on homework problems, so in this area, we may
have to leave it to the individual faculty member to draw the rules for students in each
course. General rules may not be possible in these cases.
Kline raised the question of what we may usefully add to our academic handbook.
Austin followed with an observation that the handbook now appears on our web page.
Clevenger pointed out that students don’t receive hard-copy handbooks any more.
Finney concurred, saying the academic handbook is printed in small numbers only,
for faculty use. Our policy statements will be made available mainly on the web.
Martin, addressing what may be generalized in our academic honesty policy, noted
that in the subcommittee’s meetings, Austin kept coming back to “cite, cite, cite.”
This, the subcommittee thought, is a safe generalization, despite variances in faculty
approaches. The base question for students is: “Is this your work?” And this question
applies in every case. At the same time, Martin said, students are not reliably
sophisticated in applying this general principle to all contexts—a student who would
never dream of looking on another’s test might happily copy another’s lab report,
because he wouldn’t see the cases as parallel, or of equal importance.
McCall endorsed the notion of an honor code to address these issues. An honor code
should lay down the fundamental principle—regardless of perceived importance of
varying assignments, they should all be undertaken with integrity, and what is
claimed to be a student’s work should be that student’s work.
Kupinse took issue with the analogy that linked proper use of internet sources with
downloading music. Because many of our students regularly download music without
paying for it, and because they don’t think doing so is a problem, our use of the
analogy may cut against our goal of promoting the importance of academic honesty.
Weinberger replied that he thought students are aware that unauthorized downloading
of music is illegal and unethical. Kupinse said he thought many of our students, even
if they are aware of the issues, still have unsettled views on the music downloading
question, and don’t think of it as a crime. Hands replied that our culture has pushed
this matter into a questionable space, and for that reason, he argued for a more “black
and white” analogy—for example, looking on another student’s test as a measure of
how seriously unethical internet plagiarism is. Weinberger conceded Kupinse’s and
Hands’ points, but argued that the “downloading” context of the music and internet
sources made for a more direct analogy. He thought abandoning the analogy
altogether might make more sense than substituting a less direct analogue. McCall
pointed out another complication, that free downloadable music is available; he
suggested that if we preserve the analogy, we should add specifics (he suggested
“unauthorized downloading of music”). Clevenger pointed out that in her experience
students do know that unauthorized downloading of music is wrong, but also know
that most of their peers have done it. In her view, the analogy will work, because it
hits home. Taylor, on the other hand, thought that the music analogy breaks down
very easily. Technology changes very rapidly, and this instance, already a gray area,
will change further as the technology landscape changes. Austin spoke in favor of
substituting Hands’ copying of a neighbor’s test for the analogy. Kline said our main
objective must be to communicate that while collaborative learning is encouraged in
the sense of “working through” what one learns, when the time comes to “demonstrate
your understanding,” a student must clearly undertake to present his or her own
work.
Bass asked how many of the expectations we have discussed are specific to individual
instructors, and how many of them can be generalized across campus. She reported
teaching some students who only cite what they quote, for example, and not
everything they borrow—she wondered if colleagues across campus had differing
standards from hers. Weinberger said he thought the “plagiarism in plain English”
document put forward a reasonable, general set of standards, useful for the full
campus. Martin wondered whether we should have a central clearinghouse for the
materials faculty use to address these questions.
As we think of our academic handbook, Kline asked, what might be the role of
illustrative materials to illuminate policy? Finney answered that the fact that the
Logger is online permits links, and links could be used illustratively. The ASC has to
approve changes in our policy text, but links would be easy to add and modify as
needed. Chee said she favored a link from our policy statements to a user-friendly
explanatory web page. ASC could approve both revised policy language and additional
materials to be used. Links could be clarifying.
Kline complimented subcommittee members on the good thinking they had already
done. Going forward, she asked if the subcommittee (with the help of additional
volunteers, perhaps?) could look into just what to include in the policy statement.
Finney offered to provide an electronic copy of the current policy for the group to revise
for ASC approval. The revised policy text could be the topic of our next meeting, Kline
thought, and we could then move on to consider additional materials to supplement
the policy (probably linked online). As a final step, we could then discuss steps to be
taken on campus to promulgate our revised academic honesty policy. Finney
suggested that the subcommittee bring proposals to our next meeting for how and
where to place the links to additional materials.
Martin noted the subcommittee recommendation that the “advice to incoming
students” document would be a good vehicle for promulgating our revised policy.
As we were wrapping up, Kline announced that she would soon be drafting the
committee’s annual report for presentation to the Faculty Senate on April 16.
We adjourned at 8:50.
Respectfully submitted by the ASC amanuensis,
Jack Roundy
Recommendations from ASC Subcommittee on Academic Honesty
April 6, 2007
Greta Austin
Mark Martin
Seth Weinberger
During the meeting of the ASC Subcommittee on Academic Honesty on March 29, 2007,
the subcommittee proposed several recommendations to make before the full ASC
regarding the academic honesty policy of UPS, particularly as it relates to honesty in the
electronic age. The recommendations are as follows:
1. Quiz on Academic Honesty
a. The subcommittee strongly believes that all freshmen and new faculty
should be required to take a quiz on academic honesty. The quiz is used at
several other institutions, including Amherst College and Tufts University.
Permission could likely be obtained from Tufts (the developer of the quiz)
for use at UPS.
b. The subcommittee would like the ASC to discuss what the appropriate
time for the quiz would be. Possibilities mentioned included during
Prelude or during a session of the freshmen seminars, and/or during new
faculty orientation. It was noted that there has been resistance to
implementing academic honesty education during Prelude, and the
committee should discuss what options are available for adding such
content.
2. Academic Honesty Policy Language
a. The subcommittee recommends adding a section on “Intellectual
Community,” similar to that found in Princeton University’s policy.
b. The subcommittee discussed changing the language regarding academic
honesty in the electronic age.
i. The subcommittee has forwarded two examples of the
inappropriate use of websites for consideration by the ASC.
ii. The subcommittee recommends including the Princeton Statement
on “Non-Print and Electronic Sources” including a statement
analogizing Internet use with music sharing and downloading
(forwarded to the committee).
c. The subcommittee discussed adding language concerning the use of
“common knowledge” to be added to the Princeton Statement on “When
to Cite Sources.”
i. The subcommittee has forwarded potential language on student
reluctance to cite and student awareness of plagiarism.
ii. The subcommittee has forwarded the document “Plagiarism in
Plain English” for consideration.
d. The subcommittee recommends adding language concerning the “grey
areas” of plagiarism. See Princeton’s section on “The Question of
Collaboration” and “Other Forms of Assistance.”
e. The subcommittee discussed the request from Spivey on the ASC to deal
with the problem of academic honesty in mathematics problems. The
subcommittee felt that it lacked the ability to discuss the problem, and
hoped that Spivey could draft some relevant language.
3. Public Discussion of Academic Honesty
a. The subcommittee recommends that, during orientation, entering students
hear one or two presentations on the academic honesty policy as well as
the nature of the intellectual community of the University.
b. The subcommittee recommends that the “Advice to New Students”
booklet distributed during orientation include pieces on academic honesty,
such as a “mea culpa” as was published in The Trail.
c. The subcommittee recommends that the ASC discuss the creation of an
honor code for the University.
TO BE ADDED TO NON-PRINT AND ELECTRONIC SOURCES
While the Internet has made research much easier, it has also made plagiarism – both
intentional and accidental – easier as well. Even though a website may lack an
identifiable author and is widely and publicly available, that does not mean that the
information contained on that site is in the public domain. Borrowing from the Internet is
like downloading music. Just as downloading copied music files without purchasing
them is theft, using information from websites without citing them is plagiarism. If
others have made the effort to develop a website and disseminate information, their work
must be recognized when you use that information for your own purposes.
TO BE ADDED TO THE EXAMPLES OF PLAGIARISM
INAPPROPRIATE USES OF A WEBSITE:
I: Example in which language of website has been modified.
a) ORIGINAL:
Literally, the word hijab means "curtain". In the Qur’an the term hijab is not used as
a reference to women’s clothing; rather, it was the screen behind which the Muslims
were told to address the Prophet’s wives. (The term is also used to describe the
"screen" separating God from Moses, as he received divine revelation.) When the
Prophet’s wives went out, the screen consisted of a veil over their face. It does not
appear that covering the face was adopted by the other Muslim women at the time
since it was a special injunction for the Prophet’s wives as is clear in the verses
below:
And (as for the Prophet’s wives) when you ask for anything you want (or need), ask
them from behind a hijab (screen), that makes for greater purity of your hearts.
(33:53)
O wives of the Prophet! You are not like any of the (other) women: If you do fear
(God) be not too complaisant of speech, lest one in whose heart is a disease should
be moved with desire: but speak with a speech (that is) just. (33:32)
http://www.mwlusa.org/publications/positionpapers/hijab.html
b) PLAGIARIZED
The literal meaning of the word hijab is “curtain”; the Qur’an also describes the partition
or veil between God and Moses as a hijab. The Qur’an uses the term hijab to describe
not women’s clothing, but instead the screen or partition from behind which Muslims
must speak to the wives of the Prophets. (The Prophet’s wives used a veil to cover their
faces when they went outside in public. This requirement was apparently limited only to
the Prophet’s wives and did not apply to women in Medina in general (see, e.g., Q 33:32
and 33:53).
Explanation:
Although not every single sentence follows in the same order, the ideas are all the same.
The sentences have been carefully reworded and rephrased, but they clearly are based on
the Muslim Women’s League website.
II: Example where website is used verbatim.
a) Original website:
(http://www.cfr.org/publication/12717/alqaeda_in_the_islamic_maghreb_aka_salafi
st_group_for_preaching_and_combat.html?breadcrumb=%2Fpublication%2Fpubl
ication_list%3Ftype%3Dbackgrounder)
Al-Qaeda in the Islamic Maghreb (aka Salafist Group for Preaching and
Combat)
Author: Andrew Hansen
Introduction
Reports from North Africa point to a recent resurgence in terrorist activity by several
local Islamist movements, the most prominent of which is the Salafist Group for
Preaching and Combat (GSPC). An Algeria-based Sunni group that recently renamed
itself al-Qaeda in the Islamic Maghreb, the organization has taken responsibility for a
number of terrorist attacks in the region, declared its intention to attack Western targets,
and sent a squad of jihadis to Iraq. Experts believe these actions suggest widening
ambitions within the group’s leadership, now pursuing a more global, sophisticated and
better-financed direction. Long categorized as part of a strictly domestic insurgency
against Algeria’s military government, GSPC claims to be the local franchise operation
for al-Qaeda, a worrying development for a region which has been relatively peaceful
since the bloody Algerian civil war of the 1990s drew to a close.
What is al-Qaeda in the Islamic Maghreb?
The group originated as an armed Islamist resistance movement to the secular Algerian
government. Its insurrection began after Algeria’s military regime canceled the second
round of parliamentary elections in 1992 after it became clear the Islamic Salvation
Front, a coalition of Islamist militants and moderates, might win and take power. The
GSPC declared its independence from another insurgent group, the Armed Islamic Group
(GIA) in 1998, believing the GIA’s brutal tactics were hurting the Islamist cause. The
GSPC gained support from the Algerian population by vowing to continue fighting while
avoiding the indiscriminate killing of civilians. The group has since surpassed the GIA in
influence and numbers to become the primary force for Islamism in Algeria, with the
majority of its members refusing government offers of amnesty after Algeria’s civil war
of the mid-1990s. According to a 2005 U.S. State Department report on terrorism, its
ranks have dwindled to only a few hundred from nearly 28,000 at the height of its power.
b) Plagiarized Text:
Reports from North Africa point to a recent resurgence in terrorist activity by several
local Islamist movements, the most prominent of which is the Salafist Group for
Preaching and Combat (GSPC). An Algeria-based Sunni group that recently renamed
itself al-Qaeda in the Islamic Maghreb, the organization has taken responsibility for a
number of terrorist attacks in the region, declared its intention to attack Western targets,
and sent a squad of jihadis to Iraq. Experts believe these actions suggest widening
ambitions within the group’s leadership, now pursuing a more global, sophisticated and
better-financed direction. Long categorized as part of a strictly domestic insurgency
against Algeria’s military government, GSPC claims to be the local franchise operation
for al-Qaeda, a worrying development for a region which has been relatively peaceful
since the bloody Algerian civil war of the 1990s drew to a close.
The group originated as an armed Islamist resistance movement to the secular Algerian
government. Its insurrection began after Algeria’s military regime canceled the second
round of parliamentary elections in 1992 after it became clear the Islamic Salvation
Front, a coalition of Islamist militants and moderates, might win and take power. The
GSPC declared its independence from another insurgent group, the Armed Islamic Group
(GIA) in 1998, believing the GIA’s brutal tactics were hurting the Islamist cause. The
GSPC gained support from the Algerian population by vowing to continue fighting while
avoiding the indiscriminate killing of civilians. The group has since surpassed the GIA in
influence and numbers to become the primary force for Islamism in Algeria, with the
majority of its members refusing government offers of amnesty after Algeria’s civil war
of the mid-1990s. According to a 2005 U.S. State Department report on terrorism, its
ranks have dwindled to only a few hundred from nearly 28,000 at the height of its power.
Works Cited:
Hansen, Andrew, “Al-Qaeda in the Islamic Maghreb,” Council on Foreign Relations
Backgrounder, Feb. 26, 2007 (available at
http://www.cfr.org/publication/12717/alqaeda_in_the_islamic_maghreb_aka_salafist_gro
up_for_preaching_and_combat.html?breadcrumb=%2Fpublication%2Fpublication_list%
3Ftype%3Dbackgrounder).
Explanation: Even though the source website is listed in the “Works Cited” page, the
text has been lifted word-for-word, and represents no original contribution. Furthermore,
since the text is identical to the source, the entire quote should be in block quote form to
indicate that the wording is taken from another source.
PROPOSED ADDITION TO THE PRINCETON STATEMENT ON WHEN TO
CITE SOURCES:
[language to be added to the second paragraph on p. 1]:
Some students may be reluctant to include many footnotes or citations. They may think
that including many citations makes their work look unoriginal. This is not true. Citing
one’s sources does many things. First, it allows others to see what material you have
used in order to arrive at your conclusions. Second, citing recognizes your intellectual
debts to those who have worked on the same topic before you. Third, providing
references enables other readers to check your statements and to find more information
on their own. When in doubt, you should cite more rather than less.
Some authors have suggested helpful ways to avoid plagiarism: “Be conscious of where
your eyes are as you put words on paper or on a screen. If your eyes are on your source
at the same moment your fingers are flying across the keyboard, you risk doing
something that weeks, months, even years later could result in your public humiliation.
Whenever you use a source extensively, compare your page with the original. If you
think that someone could run her finger along your sentences and find synonyms or
synonymous phrases for words in the original in roughly the same order try again. You
are least likely to plagiarize inadvertently if, as you write, you keep your eyes not on your
source but on the screen or on your own page, and you report what your source has to say
after those words have filtered through your own understanding of them.” 1
Wayne Booth, Gregory Colomb and Joseph Williams, The Craft of Research (Chicago: University of
Chicago Press, 1995), 170.
1
Draft comments involved mathematics/science and academic honesty:
Issues involving academic honesty, of course, also exist in mathematics and the bench sciences. Some
aspects of a mathematics and science curriculum provide familiar problems to be addressed by professors
in this regard. There are also some unique issues in these disciplines that will challenge our commitment
toward greater awareness of academic honesty campus-wide. Not unexpectedly, professors will need to
tailor recommendations to “fit” the unique nature and construction of a given course.
Many courses in the sciences (and some mathematics courses) require students to write term papers and
essays. For these assignments, the same standards for authorship, referencing, and attribution exist as
required for any term paper written in a typical writing intensive course.
However, science courses can provide challenges when considering academic honesty issues. Some
laboratory courses have extensive laboratory reports or progress reports, which are subject to problems and
possible solutions similar to those discussed earlier. Other courses have data collection and analysis of one
form or another, which cannot be so easily evaluated. In some cases, there are a limited number of correct
solutions to a given problem, complicating efforts to enhance academic honesty policies. Of special
concern are group independent projects or “team efforts,” where the borders of authorship between students
can become blurred. Students are often unclear on such boundaries, and professors should try to establish
policy in this area where possible.
No one solution fits all classroom situations, in these disciplines as in others. There are clear-cut examples
of concern for academic honesty policy, and incidents that are less obvious. Tools and approaches (and
perhaps examples) will need to be provided to assist professors campus-wide in order to support awareness
of academic honesty issues across the curriculum.
Addendum: Some specific examples of honesty concerns in mathematics, provided by Michael Spivey, are
as follows (with many thanks):
1. After an exam, a professor allowed students to rework missed problems for partial credit. The students
were warned not to work together on these “reworked” problems, and treat the situation like an exam
(though unproctored). One student copied one another student’s work verbatim.
2. Two students had a mathematics project due. The night before, a third student assisted the first two to
find a solution to a question on that project on the Internet, which was paraphrased and turned in as their
own work by the two students.
3. There is often evidence of students working together on homework assignments. Some of this collusion
is acceptable, even desirable. But it can lead to academic honesty issues in practice (without guidance).
The goal should be for students complete assignments in their own words.
4. It is also possible, particularly in mathematics and physics, for students to turn in very similar solutions
to specific problems, because there are only a few “routes” to a correct answer. This complicates academic
honesty issues, to say the least!
Plagiarism in Plain English
The following is adapted, with permission, from the University of Washington, Asian Law Center:
It is essential for all students to understand what plagiarism is, because it is an extremely serious
academic offense.
What is plagiarism?
Plagiarism is the unattributed use of the words or ideas of another. Scholarship and research require
us to look at what previous researchers have done. Building on their work naturally requires using
their ideas. In some cases, a previous writer may have said something particularly well, and we will
want to use their exact words. There is nothing wrong with this; this is perfectly normal. What is
wrong is to pretend that these ideas and words are your own.
How do you pretend that these words and/or ideas are your own? 1. You fail to indicate the
source. 2. You do not indicate that the words in question are those of another, not your own.
•
•
•
•
•
When you quote somebody, use quotation marks, and follow the quotation with a footnote
indicating the source.
When you use someone’s idea or data without directly quoting the person, you obviously should
not use quotation marks, since the words are your own, but you should still use a footnote to
indicate the source.
You may not paraphrase another author. You need to put their ideas into your own words—but
you still must use a footnote to indicate the source.
You may use a footnote or an internal citation in parentheses (the Social Sciences method):
e.g. (Brasher 1993, 39). I don’t care how you attribute. What matters is that you do attribute
(“cite”) your sources.
When you use material from Internet sources, you must also footnote this. If you are
puzzled about how to do this, see the UPS library’s website:
http://library.ups.edu/research/guides/citeurls.htm.
Some students seem to think that footnoting everything creates a bad impression because it seems
that nothing comes from the author. On the contrary, accurate and complete citation adds strength
to your piece. It shows the amount of research you did and provides evidence for your assertions.
Please note also the difference between plagiarism and just writing a poor paper:
•
•
•
If your paper consists of 20,000 words directly quoted from another source, then provided
you have used quotation marks and identified the source, this is not plagiarism. It is, of
course, not a good paper and I could not give it a passing grade. But it is not dishonest, and
it is not grounds for disciplinary proceedings.
If your paper consists of 19,000 original words and 1,000 words that you have copied from
another source without any indication of their origin, this is dishonest and it is plagiarism.
If your paper consists of 20,000 words in which you have borrowed the structure, ideas
and/or phrasing from another source but have failed to credit the source by providing
references or footnotes within the body of the paper (and not just in a bibliography), this is
plagiarism.
Once again: You must attribute.
Download