GW SEAS Academic Expectations Workshop

Post on 15-Feb-2017

568 views 2 download

Transcript of GW SEAS Academic Expectations Workshop

Academic Expectations PowerpointFall 2016

Academic integrity is the core set of values and behaviors that students, faculty, and staff commit to as

being apart of an academic institution. This commitment to integrity ensures the value of the research,

graduates, and degrees for all, making it paramount for all to abide by these policies and procedures.

What is Academic Integrity?

What is considered cheating?

Fabrication - making up data, information, or citations

Falsification - knowingly making a false statement; signing someone else’s signature on a document

Facilitating - aiding someone else in acting dishonestly

●Using unauthorized materials for an exam

●Copying another student’s work

●Submitting the same work in two classes without the permission of both instructors

Other examples of cheating:

What is plagiarism?

●Stealing the ideas or words of another and passing them off as one’s own

●Failure to cite or attribute quotations, paraphrases, or borrowed information

●Directly copying and pasting a sentence from existing research without the use of quotation marks or a citation

●Using an idea from existing research in your own paper, pretending that you came up with it

●Utilizing experiment data from another’s work without crediting them

Examples of plagiarism

QuotingUsing exact words from another source

ParaphrasingRestating an idea using your own style and voice[note: changing a few words does not qualify]

SummarizingTaking multiple main ideas from a source and putting them into your own wordsAnd remember: using all of these methods requires the use of a citation!

Avoiding Plagiarism

This office is dedicated entirely to dealing with cases of academic dishonesty which occur in the university community. It is comprised of both faculty and other students.

If you are found to be cheating or plagiarizing, this is the office which will handle the disciplinary procedures.

More info about the office can be found at: https://studentconduct.gwu.edu/academic-integrity

Office of Academic Integrity

●Giving credit to someone’s ideas, research, data, phrasing, or written words

●A literal break in writing to show whose ideas you

are using

What is a citation?

●Give credit where credit is due

●Delineate your ideas from those of others

●Legitimize your work

●Strengthen your case

Why do we use citations?

●There are many citation styles for different fields of study.

●The IEEE Style is a common style in Engineering fields.

○IEEE is the Institute of Electrical and Electronics Engineers

Using Citations

●Author (First Initial. Last Name). Title. Source. Vol(Issue), pp. #. Year.

●EX. M. Inaba, S. Kagami, F. Kanehiro, Y. Hoshino and H. Inoue. A platform for robotics research based on the remote-brained robot approach. Int. J. Robotics Res. 19(10), pp. 933-54. 2000.

IEEE Style - Details

In-Text Citations

●A reference to the correct citation must be placed in the text as well as at its conclusion.

●Each citation receives a number, to reference it in your biliography.

●A list a citations that appear at the end of a work

●Generally either in alphabetical or appearance order

●Follow formatting guidelines

Bibliographies

REFERENCES [1] T. Auer, M. Held, “Heuristics for the Generation of Random Polygons,” 8th Canadian Conference computational Geometry, pp. 38–44, Carleton University Press, Canada(1996). [2] J. O’Rourke, J., M. Virmani, “Generating Random Polygons,” Technical Report 011, CS Department, Smith College, Northampton, MA 01063 (1991) [3] K. Abrahamson. On the modality of convex polygons. Discrete & Computational Geometry, 5:409{419, 1990. [4] J. Hershberger. An optimal visibility graph algorithm for triangulated simple polygons. Algorithmica, 4:141{155,1989. [5] Franco P. Preparata and Michael I. Shamos. Computational Geometry An Introduction. Springer-Verlag, New York, 1985. [6] C. Zhu, C., G. Sundaram, J. Snoeyink, J. S. B. Mitchel, “Generating random polygons with given vertices,” Computational Geometry. Theory and Application, Vol 6 Issue 5, 277–290, (1996) [7] S. Sadhu, S. Hazarika, K. Kumar Jain,S. Basu,T. De: GRP CH Heuristic for Generating Random Simple Polygon.IWOCA2012:293-302

Bibliography Example

●Ask the library reference librarians

●Check out a citation/reference guideline book

●Visit: https://www.ieee.org/index.html

For more information:

To summarize: you must provide a citation when you…

●Use a direct quote from another author●Paraphrase or summarize another’s ideas in your

own words●Use a diagram, image, or other media that you did

not create yourself●Use data you did not collect yourself

If you aren’t sure, it is always best to include the reference to be safe!

The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records.

What is FERPA?

●You have the right to review your own educational records

○You must request this in writing

●The University cannot disclose any of your records to others without your consent

○This means that family members, friends, and anyone else will not be able to see your records unless you say they can

What does it mean for you?

For more information on FERPA, please visit: https://studentconduct.gwu.edu/ferpa.

The GW Writing Center

Available by appointment for help with every step of the writing process, from brainstorming to revision to publication. The GW Writing Center works to assist students in strengthening writing and editing abilities.

https://writingcenter.gwu.edu/202-994-3765

Similar to the GW Writing center, but with experts trained to work with students with non-native English speakers.

https://eap.columbian.gwu.edu/writing-support-program202-994-7079

EAP Writing Support Program

SEAS Graduate AdvisingSEH 2800

seasgrad@gwu.edu

Be sure to check in at the student services desk if you haven’t yet!

Thank you!