research concepts part 2 w29

12

Click here to load reader

Upload: shavone

Post on 08-Jul-2015

115 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Research concepts part 2 w29

Instructions: Please go through these slides as if you were in class. Do your best to answer each question as it comes up and write down the answer in your WN. After you’ve done that, move on to the next slide (which has the answers). If you do not follow this process, you will not see the mistakes in your previous thinking, and most likely won’t retain much information.

Page 2: Research concepts part 2 w29

Imagine that you are the author of the paper on internet monitoring in the workplace. Read the following passage from Chris Gonsalves’s article (Works Cited entry below). In your WN, construct a summary or paraphrase of the passage. Include an in-text citation (if necessary).

“While bosses can easily detect and interrupt water-cooler chatter, the employee who is shopping at Lands’ End or IMing with fellow fantasy baseball managers may actually appear to be working.”

Gonsalves, Chris. “Wasting Away on the Web.” eWeek.com. Ziff Davis Enterprise Holdings, 8 Aug. 2005. Web. 16 Feb. 2009.

Page 3: Research concepts part 2 w29

In-text citation rules: • True global summaries (i.e. a summary of an entire work) that

reference the author do not need in-text citations. (Because the source is included in the Works Cited.) Summaries of specific sections of a work, paraphrases, quotations, and specific facts must be cited (because these come from a specific place in the work, so if someone wants to follow-up on that work, they need to know where, specifically, it came from). Summaries that do not mention the author’s name should be cited.

• Short version: – True summary that names author in a signal phrase = no in-text

citation.– Author named in a signal phrase = page number only. – Author not named = author & page number. – No page numbers = author only. – No author = title & page number– No author & no pages = title only. – Other variations on these rules, see section 33a of your PSM.

Page 4: Research concepts part 2 w29

How did you do?Was an in-text citation necessary? • If your sentence names the author in a signal phrase, no

(because, as you can see from the Works Cited entry, there are no page numbers).

• If your sentence does not name the author in a signal phrase, yes (because this is the only way to know where your information came from).

If my sentence requires an in-text citation, what should it look like? (Gonsalves).

If you are confused, return to the previous slide and review the rules for in-text citations.

Page 5: Research concepts part 2 w29

Copy the following passage word-for-word (including quotation marks) in your WN.

“In earlier times, surveillance was limited to the information that a supervisor could observe and record firsthand and to primitive counting devices. In the computer age, surveillance can be instantaneous, unblinking, cheap, and, maybe most importantly, easy”

From page 126 of “What Do Employees Think About Electronic Surveillance At Work?”

Page 6: Research concepts part 2 w29

The selections below are both student attempts to paraphrase the passage you just copied down. One is an example of

plagiarism, and one is an acceptable paraphrase. Which is which? & how do you know? (Write down your answer)

A.

Scholars Carl Botan and MihaelaVorvoreanu argue that in earlier times monitoring of employees was restricted to the information that a supervisor could observe and record firsthand. In the modern era, monitoring can be instantaneous, inexpensive, and, most importantly, easy (126).

B.

Scholars Carl Botan and MihaelaVorvoraneu claim that the nature of workplace surveillance has changed over time. Before the arrival of computers, managers could collect only small amounts of information about their employees based on what they saw or heard. However, because computers are now standard workplace technology, employers can monitor employees efficiently (126).

Page 7: Research concepts part 2 w29

Answer: A is plagiarized. B is an acceptable paraphrase.

A. (Similarities between original & student’s attempt are underlined and colored red)

Scholars Carl Botan and Mihaela Vorvoreanu argue that in earlier timesmonitoring of employees was restricted to the information that a supervisor could observe and record firsthand. In the modern era, monitoring can be instantaneous, inexpensive, and, most importantly, easy (126).

The structure of the sentence is also exactly the same. Only certain words have changed.

B. This passage shows that the student first took the time to think through and understand what the original selection was saying, and then incorporated the main ideas. Even though the student didn’t use the authors’ exact words or sentence structure, she still gave the authors credit for their ideas in her in-text citation.

Page 8: Research concepts part 2 w29

Plagiarism is easy to avoid. It simply requires that you engage with & seek to understand your sources. Not just pull quotes or facts from them.

The double-entry note-taking method discussed in Chapter 3 of The Curious Researcher is a great tool for helping you do this.

See Section 30 of your PSM and Chapter 14 of JTC for more information about avoiding plagiarism.

Remember to use quotations (and be careful!) when borrowing an author’s words. When summarizing or paraphrasing, don’t just try to change some words (copying sentence structures is also plagiarism).

Page 9: Research concepts part 2 w29

The following passage is an example of which problem (record & explain your answer in your WN):

A-Engfish

B-Incorrect citation

C-Dropped quotation

D-Plagiarism

1. Some experts have argued that a wide range of legitimate concerns justifies employer monitoring of employee Internet usage. “Employees could accidentally (or deliberately) spill confidential corporate information…or allow worms to spread throughout a corporate network” (Tynan).

Page 10: Research concepts part 2 w29

2. Some experts have argued that employer monitoring of employees’ Internet usage is justified by a range of legitimate concerns. As PC World columnist Daniel Tynan points out, many companies store important information on their networks. Because of this, those companies that fail to monitor their employees’ internet usage risk the release of “confidential corporate information,” data loss or corruption, and even network failure (Tynan).

As a reader, describe the difference between the passage you just looked at and this one (bottom). Is the change for better or worse? Record & explain your answer in your WN. (Go back to the previous slide to review the previous passage if you need to)

Page 11: Research concepts part 2 w29

Answer: Selection #2 explains the source material and incorporates it as evidence in the student’s larger argument. it is an improvement.

Correct answer for previous question: C– Dropped quotation. In selection #1, there’s no clear reason for the quote to be there. The student just put it in and assumed that it would speak for itself. It doesn’t.

Turn to page 113 of your PSM to view another version of this improvement. Review chapter 3 of The Curious Researcher as well as sections 30 & 31 of your PSM to learn more about integrating (and citing) sources.

Page 12: Research concepts part 2 w29

Review your notes from class and this powerpoint about citation, summary, paraphrase, and quotation and consider how it applies to your annotated bibliography.

Be sure to write down the changes you’ll need to make to your annotated bibliography in your WN (or write them directly on a printed copy of your annotated bibliography).