research concepts part 2 w29

Download Research concepts part 2 w29

Post on 26-May-2015




0 download

Embed Size (px)


  • 1. Instructions: Please go through theseslides as if you were in class. Do yourbest to answer each question as itcomes up and write down the answer inyour WN. After youve done that, moveon to the next slide (which has theanswers). If you do not follow thisprocess, you will not see the mistakes inyour previous thinking, and most likelywont retain much information.

2. Imagine that you are the author of the paper on internetmonitoring in the workplace. Read the followingpassage from Chris Gonsalvess article (Works Citedentry below). In your WN, construct a summary orparaphrase of the passage. Include an in-text citation(if necessary).While bosses can easily detect and interrupt water-cooler chatter, the employee who is shopping at LandsEnd or IMing with fellow fantasy baseball managersmay actually appear to be working.Gonsalves, Chris. Wasting Away on the Ziff Davis Enterprise Holdings, 8 Aug.2005. Web. 16 Feb. 2009. 3. In-text citation rules: True global summaries (i.e. a summary of an entire work) thatreference the author do not need in-text citations. (Because thesource is included in the Works Cited.) Summaries of specificsections of a work, paraphrases, quotations, and specific facts mustbe cited (because these come from a specific place in the work, so ifsomeone wants to follow-up on that work, they need to knowwhere, specifically, it came from). Summaries that do not mentionthe authors name should be cited. Short version: True summary that names author in a signal phrase = no in-textcitation. Author named in a signal phrase = page number only. Author not named = author & page number. No page numbers = author only. No author = title & page number No author & no pages = title only. Other variations on these rules, see section 33a of your PSM. 4. How did you do?Was an in-text citation necessary? If your sentence names the author in a signal phrase, no(because, as you can see from the Works Cited entry, thereare no page numbers). If your sentence does not name the author in a signalphrase, yes (because this is the only way to know whereyour information came from).If my sentence requires an in-text citation, what should it looklike? (Gonsalves).If you are confused, return to the previous slide and reviewthe rules for in-text citations. 5. Copy the following passage word-for-word (includingquotation marks) in your WN.In earlier times, surveillance was limited to theinformation that a supervisor could observe andrecord firsthand and to primitive counting devices. Inthe computer age, surveillance can be instantaneous,unblinking, cheap, and, maybe most importantly,easyFrom page 126 of What Do Employees Think AboutElectronic Surveillance At Work? 6. The selections below are both student attempts to paraphrase the passage you just copied down. One is an example ofplagiarism, and one is an acceptable paraphrase. Which is which? & how do you know? (Write down your answer) A.B.Scholars Carl Botan and Mihaela Scholars Carl Botan and MihaelaVorvoreanu argue that in earlierVorvoraneu claim that the naturetimes monitoring of employees of workplace surveillance haswas restricted to the information changed over time. Before thethat a supervisor could observe arrival of computers, managersand record firsthand. In thecould collect only small amountsmodern era, monitoring can be of information about theirinstantaneous, inexpensive, and,employees based on what theymost importantly, easy (126). saw or heard. However, becausecomputers are now standardworkplace technology, employerscan monitor employees efficiently(126). 7. Answer: A is plagiarized. B is anacceptable paraphrase.A.(Similarities between original & students attempt are underlinedand colored red)Scholars Carl Botan and Mihaela Vorvoreanu argue that in earlier timesmonitoring of employees was restricted to the information that asupervisor could observe and record firsthand. In the modern era,monitoring can be instantaneous, inexpensive, and, most importantly,easy (126).The structure of the sentence is also exactly the same. Only certainwords have changed.B. This passage shows that the student first took the time to thinkthrough and understand what the original selection was saying, andthen incorporated the main ideas. Even though the student didnt usethe authors exact words or sentence structure, she still gave theauthors credit for their ideas in her in-text citation. 8. Plagiarism is easy to avoid. It simply requires that youengage with & seek to understand your sources. Not justpull quotes or facts from them.The double-entry note-taking method discussed inChapter 3 of The Curious Researcher is a great tool forhelping you do this.See Section 30 of your PSM and Chapter 14 of JTC formore information about avoiding plagiarism.Remember to use quotations (and be careful!) whenborrowing an authors words. When summarizing orparaphrasing, dont just try to change some words(copying sentence structures is also plagiarism). 9. Now that you know what plagiarism is, why it happens, and how to avoid it, review your summary or paraphrase of the Gonsalves passage.Do you notice any problems?If so, take a moment to try again. 10. The following passage is an example of which problem (record & explain your answer in your WN):A-EngfishB-Incorrect citationC-Dropped quotationD-Plagiarism1. Some experts have argued that a wide range of legitimate concerns justifies employer monitoring of employee Internet usage. Employees could accidentally (or deliberately) spill confidential corporate informationor allow worms to spread throughout a corporate network (Tynan). 11. As a reader, describe the difference between the passageyou just looked at and this one (bottom). Is the change forbetter or worse? Record & explain your answer in your WN.(Go back to the previous slide to review the previouspassage if you need to)2. Some experts have argued that employer monitoring of employees Internet usage is justified by a range of legitimate concerns. As PC World columnist Daniel Tynan points out, many companies store important information on their networks. Because of this, those companies that fail to monitor their employees internet usage risk the release of confidential corporate information, data loss or corruption, and even network failure (Tynan). 12. Answer: Selection #2 explains the source material andincorporates it as evidence in the students largerargument. it is an improvement.Correct answer for previous question: C Droppedquotation. In selection #1, theres no clear reason for thequote to be there. The student just put it in and assumedthat it would speak for itself. It doesnt.Turn to page 113 of your PSM to view another version ofthis improvement. Review chapter 3 of The CuriousResearcher as well as sections 30 & 31 of your PSM tolearn more about integrating (and citing) sources. 13. Review your notes from class and thispowerpoint about citation, summary,paraphrase, and quotation and consider howit applies to your annotated bibliography.Be sure to write down the changes youll needto make to your annotated bibliography inyour WN (or write them directly on a printedcopy of your annotated bibliography).