eec 688/788 secure and dependable computing discussion#4 wenbing zhao department of electrical and...

28
EEC 688/788 EEC 688/788 Secure and Dependable Secure and Dependable Computing Computing Discussion#4 Discussion#4 Wenbing Zhao Wenbing Zhao Department of Electrical and Computer Department of Electrical and Computer Engineering Engineering Cleveland State University Cleveland State University [email protected] [email protected]

Upload: justin-shaw

Post on 18-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

EEC 688/788EEC 688/788Secure and Dependable Secure and Dependable ComputingComputing

Discussion#4Discussion#4

Wenbing ZhaoWenbing ZhaoDepartment of Electrical and Computer EngineeringDepartment of Electrical and Computer Engineering

Cleveland State UniversityCleveland State University

[email protected]@ieee.org

Page 2: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Outline

Reminder: Final exam, next Tuesday 11/10 11/24 no class Project presentation (oral exam):

11/17, 11/19, 12/1, 12/3, 12/10 Final Project due: Dec 10 midnight

Topic and list of papers must have my approval Typed project report Must be uploaded to turnitin.com

Discussion

Page 3: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

3

Final Result Session 1

High 100, low 47, mean 85.6

Session 2 High 95, low 55 Mean 79.5

Page 4: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

04/21/2304/21/23 Wenbing ZhaoWenbing Zhao

Project Presentation &Project Presentation &Project Report Project Report RequirementRequirement Presentation: up to 15 minutes Report format: IEEE Transactions format. 4-10 pages

http://www.ieee.org/publications_standards/publications/authors/author_templates.html

MS Word Template http://www.ieee.org/documents/trans_jour.docx

Turnitin.com Class ID: 11115647 Enrollment password:

Dissecting a scientific paper

EEC688/788 Secure and Dependable EEC688/788 Secure and Dependable ComputingComputing

Page 5: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism

Plagiarism: Using someone else’s words or thoughts without proper referencing

Why not plagiarize? Plagiarism is lazy Plagiarism is stealing Plagiarism is lying Plagiarism is cheating You will get caught … eventually

5

Page 6: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism

Two types of plagiarism Word-for-word: Quoting directly from another

work without enclosing the quote in a “quotation marks” and providing a reference

Paraphrasing: Using a source without providing a reference

The ECE Department’s ethics policy is available on its web site: https://www.csuohio.edu/engineering/sites/csuohio.e

du.engineering/files/Ethics%20Policy.pdf

6

Page 7: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Quotations require “quotation marks” and a reference to the original source

Even if you change the words, you must still provide a reference

It does not matter if the original source has given you permission – you still need to follow the rules for proper acknowledgment of your sources

7

Page 8: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Paraphrasing

Paraphrase by doing the following: Read the material Set the material aside Rewrite it in your own words DO NOT CUT AND PASTE!

Paraphrasing needs a reference, or else it is plagiarism

8

Page 9: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Practice & Test

This plagiarism test is adapted from Indiana University Bloomington https://www.indiana.edu/~istd/practice.html https://www.indiana.edu/~istd/test.html

Specify if the writing on the following pages is plagiarism. If so, is it word-for-word plagiarism or paraphrasing plagiarism?

9

Page 10: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Question 1

Original Source Material: The concept of systems is really quite simple. The basic idea is that a system has parts that fit together to make a whole.

Student Version: Systems, including both business systems, and educational systems, are actually very simple. The main idea is that a system has parts that fit together to make a whole.

10

Page 11: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Answer 1: Word-for-Word Original Source Material: The concept of systems is

really quite simple. The basic idea is that a system has parts that fit together to make a whole.

Student Version: Systems, including both business systems, and educational systems, are actually very simple. The main idea is that a system has parts that fit together to make a whole.

11

Page 12: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Question 2

Original Source Material: Given similarities between software design and instructional design, we argue that rapid prototyping is a viable method for instructional design, especially for computer-based instruction.

Student Version: Rapid prototyping could be an advantageous methodology for developing innovative computer-based instruction (Tripp & Bichelmeyer, 1990).

12

Page 13: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Answer 2: Not Plagiarism Original Source Material: Given similarities between

software design and instructional design, we argue that rapid prototyping is a viable method for instructional design, especially for computer-based instruction.

Student Version: Rapid prototyping could be an advantageous methodology for developing innovative computer-based instruction (Tripp & Bichelmeyer, 1990).

This is not plagiarism because the student paraphrased and included a proper reference.

13

Page 14: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Question 3

Original Source Material: The study of learning derives from essentially two sources. Because learning involves the acquisition of knowledge, the first concerns the nature of knowledge and how we come to know things.

Student Version: The study of learning derives from essentially two sources. The first concerns the nature of knowledge and how we come to know things [23].

14

Page 15: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Answer 3: Word-for-Word Original Source Material: The study of learning derives

from essentially two sources. Because learning involves the acquisition of knowledge, the first concerns the nature of knowledge and how we come to know things.

Student Version: The study of learning derives from essentially two sources. The first concerns the nature of knowledge and how we come to know things [23].

The student is correct to give a reference, but still plagiarizes due to the lack of quotation marks.

15

Page 16: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Question 4

Original Source Material: The tools available today for creating learning materials are much more powerful than those of a few years ago. Soon teachers will be able to use computer technology to produce their own materials.

Student Version: Computers are so powerful that educators and students are now able to produce their own multimedia learning materials. 

16

Page 17: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Answer 4: Paraphrasing

Original Source Material: The tools available today for creating learning materials are much more powerful than those of a few years ago. Soon teachers will be able to use computer technology to produce their own materials. All it takes is time, know-how, and some funds.

Student Version: Computers are so powerful that educators and students are now able to produce their own multimedia learning materials. They just need to take the time to learn to use the related technologies.

The student did not properly reference the source.

17

Page 18: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Question 5

Original Source Material: Major changes are usually initiated by those in power. There is often the assumption that training will “solve the problem.” The result is that potentially effective innovations suffer misuse, or even no use, in the hands of uncommitted users.

Student Version: When major changes are initiated in organizations, “... [t]here is often the implicit assumption that training will ‘solve the problem’ ” (Dormant, 1986, p. 238).

18

Page 19: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism Answer 5: Not Plagiarism Original Source Material: Major changes are usually

initiated by those in power. There is often the assumption that training will “solve the problem.” The result is that potentially effective innovations suffer misuse, or even no use, in the hands of uncommitted users.

Student Version: When major changes are initiated in organizations, “... [t]here is often the implicit assumption that training will ‘solve the problem’ ” (Dormant, 1986, p. 238).

The student properly quoted and referenced the source.

19

Page 20: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Plagiarism

When in doubt, err on the side of too many references rather than too few

When in doubt, check with your professor or the CSU Writing Center:http://www.csuohio.edu/writingcenter/

www.turnitin.com identifies plagiarism

20

Page 21: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Quotations must be not only technically correct, they must also convey the author’s original intent

Misquote from the 2000 Bush campaign: “His conservative hometown paper warned, ‘It's time the rest of the nation learns about the McCain we know.’ ”

21

Page 22: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Quotations must be not only technically correct, they must also convey the author’s original intent

Misquote from the 2000 Bush campaign: “His conservative hometown paper warned, ‘It's time the rest of the nation learns about the McCain we know.’ ”

Original Source Material from John McCain’s hometown newspaper: “It's time the rest of the nation learns about the McCain we know. There is much there to admire. After all, we have supported McCain in his past runs for office.”

22

Page 23: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Misquote from a promoter of a theater show: The Times reports that the show is an impressive display of “energy, razzmatazz, and technical wizardry.”

23

Page 24: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Misquote from a promoter of a theater show: The Times reports that the show is an impressive display of “energy, razzmatazz, and technical wizardry.”

Original Source Material from a theater critic: “I couldn’t help feeling that, for all the energy, razzmatazz and technical wizardry, the audience had been shortchanged.”

24

Page 25: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

25

US Rep. Betty Sutton newsletter

Cash For Clunkers A Win/Win/WinCNBC, March 18, 2009

Actual CNBC headline:Cash For Clunkers A Win/Win/Win?

Page 26: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Misquote from a dishonest researcher: We do not compare our method with QFLG because it has been reported that “the QFLG algorithm … performs worse than the state-of-the-art … by orders of magnitude” [94].

26

Page 27: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Quotations

Misquote from a dishonest researcher: We do not compare our method with QFLG because it has been reported that “the QFLG algorithm … performs worse than the state-of-the-art … by orders of magnitude” [94].

Original Source Material from a technical paper: “The QFLG algorithm rarely performs worse than the previous state-of-the-art and usually performs better by orders of magnitude.”

27

Page 28: EEC 688/788 Secure and Dependable Computing Discussion#4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org

Conclusion

Use the resources that are available to you Avoid plagiarism as if your career depends

on it When in doubt, err on the side of too many

references rather than too few When in doubt, check with your professor or

the CSU Writing Center:http://www.csuohio.edu/writingcenter/

www.turnitin.com identifies plagiarism

28