Acknowledging Sources: Citations and Avoiding Plagiarism

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following actions constitutes plagiarism?

  • Summarizing information from a source and citing it.
  • Quoting a source directly and providing a citation.
  • Presenting someone else's ideas as your own without giving credit. (correct)
  • Paraphrasing a source and giving credit to the original author.

In APA style, how is an in-text citation typically formatted?

  • (Author, Year) (correct)
  • (Author, Year, Page Number)
  • (Author, Page Number)
  • (Year, Author)

Where do footnotes or endnotes typically appear in a document?

  • At the bottom of the page (footnotes) or at the end of the paper (endnotes) (correct)
  • In-text, immediately after the cited material
  • At the beginning of the document
  • In a separate appendix

What is the primary purpose of a bibliography or reference list?

<p>To provide full details of all the sources cited in your work. (D)</p> Signup and view all the answers

In which style are references typically listed alphabetically by author and include full source details?

<p>Harvard Style (D)</p> Signup and view all the answers

When referencing an online article, what information should be included, if available?

<p>Author, date, title of release, and URL. (D)</p> Signup and view all the answers

What is the definition of Intellectual Property (IP)?

<p>Unique and original works, such as ideas, inventions, and artistic creations. (B)</p> Signup and view all the answers

What is the purpose of a trademark?

<p>To legally register a symbol or word to represent a company or product. (A)</p> Signup and view all the answers

What does copyright protect?

<p>Tangible forms of expression, such as writings and artwork (C)</p> Signup and view all the answers

What is Digital Rights Management (DRM)?

<p>A strategy to stop piracy of digital content. (B)</p> Signup and view all the answers

According to the Privacy Act 1988 (Australia), what type of information is considered sensitive?

<p>Health information, racial or ethnic origin, and religious beliefs. (A)</p> Signup and view all the answers

What is the role of the Australian Information Commissioner (OAIC)?

<p>To regulate compliance with the Privacy Act and handle privacy complaints. (B)</p> Signup and view all the answers

Which of the following is a key principle of the Australian Privacy Principles (APPs)?

<p>Ensuring transparency and providing access to personal information. (C)</p> Signup and view all the answers

What action should a company take to safely dispose of digital data, according to the provided text?

<p>Physically destroy the storage device or wipe the data. (B)</p> Signup and view all the answers

In the context of copyright, what does 'fair dealing' refer to?

<p>Specific uses of copyrighted material allowed without permission, such as for research or study. (B)</p> Signup and view all the answers

Flashcards

What is plagiarism?

Presenting someone else's words or ideas as your own without giving credit to the original author.

What are In-Text Citations?

Acknowledging sources within the body of your paper, with format varying by citation style (APA, MLA, etc.).

What are Endnotes or Footnotes?

Citations included as footnotes (at the bottom of the page) or endnotes (at the end of the paper), often used in Chicago or Turabian style.

What is a Bibliography or References List?

A list containing full details of all sources cited in your work, placed at the end of your paper.

Signup and view all the flashcards

What is Intellectual Property (IP)?

The general name for laws covering patents, trademarks, designs and/or copyright.

Signup and view all the flashcards

What is a Patent?

The right to ownership of something for a period of time.

Signup and view all the flashcards

What is a Trademark?

A symbol or word legally registered to someone.

Signup and view all the flashcards

What is a Design (IP)?

A legal document that grants the owner exclusive commercial rights to exploit a unique visual appearance of a product.

Signup and view all the flashcards

What is Copyright?

Protects any tangible form of expression.

Signup and view all the flashcards

What is the Privacy Act 1988 (Australia)?

An Australian law regulating the handling of personal information by government and organizations.

Signup and view all the flashcards

What is Personal Information?

Information collected regarding an individual that makes that person identifiable.

Signup and view all the flashcards

What is Sensitive Information?

Specific categories like health, ethnic origin, or religious beliefs which have extra protections under privacy laws.

Signup and view all the flashcards

What is Digital Citizenship?

Using technology/internet responsibly and safely within a community.

Signup and view all the flashcards

What is Catfishing?

A type of cyberbullying like using a fake identity to trick someone into a relationship.

Signup and view all the flashcards

What is Social Networking?

The use of websites/apps to interact, share content, and build communities.

Signup and view all the flashcards

Study Notes

Acknowledgment of Sources

  • When using external sources, proper acknowledgment is crucial.
  • Acknowledging sources involves crediting the origin of information.
  • All written work must give credit to all sources used.
  • Plagiarism is presenting someone else's words or ideas as your own without proper credit.

Ways of Acknowledging – In-Text Citations

  • In-text citations acknowledge sources within the body of your paper; format varies by citation style.
  • APA style includes the author and year in parentheses, such as "(Smith, 2020)."
  • Harvard style also includes the author and year in parentheses, like "(Smith, 2020)."
  • MLA style includes the author and page number, such as "(Smith 25)."
  • Chicago style uses footnotes or endnotes for detailed citations, indicated by a superscript number in the text.

Ways of Acknowledging – Endnotes or Footnotes

  • Chicago and Turabian styles often use footnotes or endnotes for citations.
  • Footnotes appear at the bottom of the page, while endnotes are at the end of the paper.

Ways of Acknowledging – Bibliography or References List

  • A bibliography or references list at the end of your paper provides full details of all cited sources.
  • APA style requires the reference list to be organized alphabetically by the author's last name.
  • Harvard style also lists references alphabetically and includes full-source details.
  • MLA style alphabetizes the works cited and includes all referenced sources.

Referencing Online Articles

  • When referencing online articles, include the author or authoring organization's name.
  • For individual authors, provide the last name, first name, and initial. For companies, provide the web name.
  • Include the date of publication if available.
  • Provide the title of the release if available.
  • Include the publisher if available.
  • Include the accessed day, month, and year.
  • Include the full URL.

Intellectual Property (IP)

  • Intellectual Property (IP) refers to creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names, and images used in commerce
  • IP laws protect the rights of creators in their creative and inventive endeavors.
  • These laws give creators exclusive economic rights for a limited time.
  • General IP laws cover patents, trademarks, designs, and copyrights.
  • A patent grants ownership of an invention for a specific period.
  • A trademark is a legally registered symbol or word.
  • Design laws protect exclusive commercial rights to a product's unique visual appearance.
  • Copyright protects any tangible form of expression.
  • Digital Rights Management (DRM) is a strategy to stop piracy.
  • Intellectual property rights allow IP owners to sell their materials.
  • Acknowledging the IP owner recognizes the source of an idea.

Privacy Act 1988 (Australia)

  • The Privacy Act 1988 is an Australian law regulating how the government and organizations handle personal information.
  • The Act covers the collection, use, storage, and disclosure of personal information.
  • It gives individuals greater control over how businesses and government agencies handle their personal information.
  • The Privacy Act applies to most Australian government agencies and private-sector organizations with an annual turnover of over $3 million.
  • It also covers some smaller businesses, like those providing health services or trading in personal information.

Personal Information

  • Personal information is any data collected about an individual that makes that person identifiable.
  • This includes names, contact details, signatures, dates of birth, pictures of family, social media accounts, and stories about one's life.

Sensitive Information

  • Sensitive information includes health details, racial or ethnic origin, political opinions, criminal records, bank account details, tax file numbers, and religious beliefs.
  • Additional safeguards apply to handling this type of information.
  • Sensitive information is typically data people would not want to share and might cause distress if accessed without authorization.
  • People are generally less likely to share sensitive information compared to personal information.

Enforcement

  • The Australian Information Commissioner (OAIC) enforces compliance with the Privacy Act.
  • The OAIC can investigate complaints, conduct audits, and impose penalties for non-compliance.
  • Mandatory data breach notification requirements mandate that organizations must notify affected individuals and the OAIC if a data breach is likely to result in serious harm.

Australian Privacy Principles (APPs)

  • The Privacy Act incorporates thirteen Australian Privacy Principles (APPs) that outline the obligations of organizations when collecting, using, storing, and disclosing personal information.
  • These principles ensure transparency, consent, data security, accuracy, and access to personal information.
  • If a company collects information, it must be crucial to their day-to-day business.
  • If sensitive information is collected, individual consent is required.
  • Personal information must be used as part of the normal business function.
  • The information must be kept secure to prevent interference, misuse, and loss; medical records are only accessible to medical staff directly dealing with the patient.
  • If a person wants to see what information a company has on them, the company must show it to them.

Privacy Act Principles – Sample Breaches

  • Breaches occur when businesses fail to disclose why personal information is collected, how it will be used, and who it will be disclosed to.
  • Breaches occur when businesses do not give customers the option of not identifying themselves.
  • Breaches occur when businesses identify a customer without giving them the option of not being identified.
  • Breaches occur when businesses deny customers access to the personal information the business collects about them and deny the customer access to correct the information they collect about an individual.
  • Businesses breaches the act if reasonable attempts has not been made to secure personal data, not providing it to a 3rd party without content.
  • Businesses must safely dispose of information if and when it is not needed.

Identity Theft

  • Is when someone pretends that they are you
  • Identity theft can be used for incurring debts via banking activities against your name without your consent and creating travel documents which then can be used for criminal activities.
  • Anyone can be a victim of identity theft.
  • If you post personal information on the internet, you might be at risk of identity theft
  • Do not download files from websites that are not known to you
  • Do not open emails if you do not know the sender and should delete them

Safe Disposal of Data

  • Companies must destroy or de-identify data when finished with it.
  • Paper data is burned or shredded.
  • Digital data on a hard drive or USB is physically destroyed or wiped.
  • Companies must ensure the owner can't be identified by removing or covering over names.
  • For example, the Schools Curriculum and Standards Authority of West Australia must delete past WACE exams after a period.
  • Copyright is part of Intellectual Property law.
  • Copyright grants creators exclusive rights to their original works to protect creativity and innovation.
  • Rights include the authority to reproduce, distribute, display, perform, and create derivative works.
  • The Copyright Act 1968 is key legislation in Australia that governs copyright law.
  • The act protects original literary, dramatic, musical, and artistic works, plus sound recordings, broadcasts, and published editions.
  • Copyright protection in Australia is free and automatic.
  • Copyright protection extends to both published and unpublished works.
  • Copyright provides exclusive rights for fair dealing, private use, and moral rights to a product.
  • The act covers the common works: text, artistic works, sound and film recordings, and computer games and programs
  • Copyright terms can be transferred, inherited, or purchased. Items can become copyright-free 70 years after the author's death.
  • If an individual creates a work, they own the copyright. If an employee creates it, the employer owns the copyright.

Public Right of Access

  • (i.e. what is not protected under the Copyright Act)
  • Material that is out of copyright
  • 10% rule - i.e. a single copy of a chapter/publication
  • Library/educational institution/government copying
  • Fair dealing
  • It can be copied only under certain conditions:
    • for research or study
    • for criticism or review
    • for news reporting
    • for professional advice
    • for parody or satire

Private Use

  • In 2006, it was approved to record a broadcast for later viewing for private use, and it includes copying a sound recording, magazine or newspaper article.

Moral Rights

  • The right to be clearly labeled as the author.
  • There is a right for others to NOT claim your work
  • There is a right to NOT have the work treated poorly/in a poor manner.
  • Moral rights came into copyright in 2000 in Australia.

Digital Citizenship

  • Digital citizenship is the responsible and safe use of technology/internet to engage in society.
  • Key aspects include the responsible use of social media (online etiquette), and understanding cyberbullying and applying strategies to manage and limit it

Digital Citizenship Guidelines Using Networking

  • It requires engaging with social networking sites in a manner that respects oneself and others.
  • Check and update privacy settings regularly. Think before posting to consider the content' long-term impact
  • Respect others and avoid harmful behaviour.

Cyberbullying

  • Cyberbullying includes harassment that sends offensive or threatening messages.
  • Exclusion intentionally excludes someone from an online group.
  • Cyberstalking involves behaviour towards an individual
  • Catfishing involves someone using a fake identity to trick you into believing you are in an online romantic relationship with them; they may embarrass or humiliate you by sharing secrets.

Strategies to Manage/Limit Cyber Bullying

  • Do Not Engage: Avoid responding to cyberbullies.
  • Block/Report: Use platform tools to block and report bullying behavior.
  • Keep Evidence: Save messages or screenshots as proof.
  • Schools and organizations should educate about the effects of cyberbullying, establish counselling and support and implement anti-cyberbullying policies and consequences.

Impact of Digital Technologies on Work-Life Balance

  • Remote work options allow better work-life integration.
  • Technology helps manage tasks more efficiently.
  • Blurred Boundaries: Difficulty in separating work from personal life leading to longer work hours and increased stress levels
  • Constant Connectivity: Pressure to be always available can lead to burnout.

Social Networking

  • Social networking involves using websites and applications to interact with others, share content, and build communities.
  • Networking can be used for friendship and family, professional connections and career opportunities or information sharing.
  • General social networks include Facebook (profiles, newsfeeds, groups, events), Instagram (photo and video sharing, stories, and reels), LinkedIn (professional networking, job search, and industry news), and X (to connect its users and allow them to share their thoughts with their followers and others through the use of hashtags).
  • Specialized Social Networks include Reddit (community-based discussions), and PrinterArte (visual discovery and bookmarking of ideas and inspirations)
  • Online Chat Rooms: Real-time text communication among users with common interests, e.g. Discord servers, Telegram groups; includes instant messaging, file sharing, and user moderation.
  • Virtual Worlds: Definition: Online environments where users interact through avatars, e.g. Minecraft, Fortnite, Includes user-created content, social interaction, economic systems

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser