1
Plagiarism: Definition and Types, Consequences, and How to Avoid It
Introduction
Plagiarism is a form of academic dishonesty that has serious consequences for those who partake
in it. Plagiarism can be defined as the act of taking someone else’s words or ideas and claiming
them as one's own. It is considered a form of intellectual theft and is highly unethical. Plagiarism
can take many forms, including direct copying, paraphrasing, self-plagiarism, and patchwriting.
It is important to understand the different types of plagiarism and how to avoid them in order to
produce original, ethical work. In this paper, we will discuss the definition and types of
plagiarism, consequences, and how to avoid it. Additionally, methods of citation, rules for using
quotations, and plagiarism detection tools will be discussed.
Definition and Types of Plagiarism
Plagiarism is defined as the act of using another’s words or ideas as one’s own without giving
credit to the original author (Nelson-Becker & Walker, 2018). It is considered a form of
2
intellectual theft and is highly unethical. There are several types of plagiarism, including direct
copying, paraphrasing, self-plagiarism, and patchwriting.
Direct Copying
Direct copying is the most obvious form of plagiarism. This occurs when someone takes another
person’s words or ideas and uses them as their own without giving any credit to the original
author (Nelson-Becker & Walker, 2018). This can include copying a sentence or paragraph from
a book, article, or website without citing the source. It can also involve copying someone else’s
paper or assignment.
Paraphrasing
Paraphrasing is another form of plagiarism. This occurs when a person rewrites someone else’s
words or ideas in their own words without giving credit to the original author (Nelson-Becker &
Walker, 2018). In order for it to not be considered plagiarism, the author must acknowledge the
source and provide a citation in the text.
3
Self-Plagiarism
Self-plagiarism is a type of plagiarism that occurs when an author reuses material from one of
their own works without citation (Nelson-Becker & Walker, 2018). This can include reusing text,
data, or images from a previous paper or assignment. In order to avoid self-plagiarism, authors
must provide proper citations when reusing their own work.
Patchwriting
Patchwriting is a form of plagiarism that occurs when an author takes words or phrases from a
source and rearranges them without changing the meaning (Nelson-Becker & Walker, 2018). In
order to avoid patchwriting, authors must ensure that the words are their own and that the source
is properly cited.
Consequences of Plagiarism
Plagiarism is a serious form of academic dishonesty and can have serious consequences for those
who partake in it. The consequences of plagiarism depending on the severity of the violation,. For
example, in academic settings, plagiarism can lead to loss of credit, suspension, or even
expulsion (Nelson-Becker & Walker, 2018). In professional settings, plagiarism can lead to loss
of job opportunities, damage to one’s reputation, or even legal action.
4
How to Avoid Plagiarism
In order to avoid plagiarism, it is important to understand what it is and to remember to give
credit to other authors when using their words or ideas. The best way to avoid plagiarism is to
always cite sources when using another person’s words or ideas. Additionally, it is important to
be aware of the different types of plagiarism and to ensure that one’s work is original and not
copied from other sources.
Citation Methods
When citing sources, it is important to use a consistent style. The most commonly used citation
style is the American Psychological Association (APA) style. This style requires authors to
include in-text citations and a references section at the end of the paper.
In-text citations should include the author’s last name, year of publication, and page number if
applicable (APA, 2020). For example: (Smith, 2020, p. 5).
5
The reference section should include all sources that were cited in the paper in alphabetical
order. Each entry should include the author’s last name, year of publication, title, and publisher.
For example:
Smith, J. (2020). The importance of citing sources. Publisher Name.
Rules for Using Quotations
When using quotations, it is important to follow the rules of the citation style that is being used.
In APA style, short quotations (less than 40 words) should be included in the text of the paper
and enclosed in quotation marks (APA, 2020). Long quotations (more than 40 words) should be
indented and not enclosed in quotation marks (APA, 2020).
Plagiarism Detection Tools
There are several tools available to help detect plagiarism. The most common tool is Turnitin,
which is an online plagiarism detection program. Turnitin is used by universities and other
educational institutions to detect plagiarism in student work. Additionally, there are several other
free tools available online, including Plagiarism Checker and Dupli Checker.
6
Conclusion
In conclusion, plagiarism is a form of academic dishonesty that has serious consequences for
those who partake in it. It is important to understand the different types of plagiarism and how to
avoid them in order to produce original, ethical work. To avoid plagiarism, it is important to cite
sources properly and to be aware of the rules for using quotations. Additionally, there are several
tools available to help detect plagiarism.
Word Count: 938
References
American Psychological Association. (2020). Publication manual of the American Psychological
Association (7th ed.). https://doi.org/10.1037/0000165-000
7
Nelson-Becker, H., & Walker, J. (2018). Plagiarism: What it is and how to recognize and avoid
it. Reference Services Review, 46(4), 567-580. https://doi.org/10.1108/RSR-03-2018-0017
HW2: Formulation of a research problem (exercise 1)
Guidance:
a. Write your answers in this word document. Format your document name:
FirstName_HW_2
b. Answer all the questions. If a question is not applicable, write N/A
c. For any clarification, refer to the textbook exercise 1
d. Chapter 4 of the textbook will help you to work through this exercise.
Objective: Formulate your research problem by raising questions and issues that will guide
you to critically examine various facets and implications of what you are proposing to study.
1. Name a broad area of study in information security:
Network Security
2. Divide the broad area selected into five subareas
a. Firewalls
b. Intrusion Detection/Prevention Systems
c. Network Access Control
d. Secure Protocols
e. Data Loss Prevention
3. What subarea above would you like to select as your research study?
I would like to select Firewalls as my research study.
4. What research questions do you hope to answer in your study? (Questions are
worded in question form)
1. What are the best practices for implementing firewalls?
2. What security threats can firewalls help to mitigate?
3. What are the most common misconceptions about firewalls?
4. What are the benefits and drawbacks of different firewall configurations?
5. How can firewalls be monitored to ensure optimal performance?
5. What is the main objective of your study? (Use ACTION-ORIENTED WORDS)
1|Page
The main objective of my study is to identify effective methods for protecting a network from
unauthorized access and malicious activity.
6. What are the sub-objectives of your research? (use ACTION-ORIENTED WORDS)
1. To analyze existing firewall technologies and security protocols.
2. To evaluate the effectiveness of different firewall configurations.
3. To identify the most common misconceptions about firewalls.
4. To develop best practices for implementing and monitoring firewalls.
5. To determine the potential risks associated with using firewalls.
7. Complete the following table. (use text format if needed)
Task
What is
involved
Literature review
Researching and
4-6
analyzing relevant weeks
literature on the
topic.
Instrument
construction
Designing and
creating a survey
instrument to
assess knowledge
and attitudes
related to firewall
implementation.
Administering the
survey to a sample
population.
Analyzing the
collected data
using appropriate
statistical
methods.
Writing a draft of
the research
report including
the results and
analysis.
Editing, revising,
and finalizing the
report.
Data collection
Data analysis
Draft report
Final report
Time
Approx.
needed cost
Technical
expertise
needed
Gaps in
knowledge and
skills
No Cost
Knowledge of the
field of network
security and
understanding of
research
methods.
1-2
weeks
No cost
Knowledge of
survey design
and data
collection
methods.
Understanding of
the implications of
different firewall
configurations and
the potential risks
associated with
them.
Ability to create
effective survey
questions.
2-4
weeks
No Cost
Knowledge of
survey
administration and
data collection
methods.
Ability to identify a
representative
sample population
and collect accurate
data.
2-4
weeks
No cost
Knowledge of
statistical
analysis and data
interpretation.
1-2
weeks
No cost
Knowledge of
research writing
and report
structure.
Ability to identify
the most relevant
statistical methods
and interpret the
results.
Ability to
effectively
communicate
research results.
1-2
weeks
No cost
Knowledge of
research writing
and report
Gaps in knowledge
of report writing
and formatting
2|Page
structure.
8. What is the relevance of this study to theory?
This study will contribute to the existing body of knowledge about firewall implementation and security
protocols by providing evidence-based findings about the effectiveness of different firewall
configurations. This will allow for further refinement of existing theories and contribute to the
development of new theories about best practices for network security.
9. What is the relevance of this study to practice?
The findings of this study will provide valuable insight into best practices for firewall
implementation, as well as potential risks associated with different configurations. This information
can be used by security professionals to ensure that their networks are as secure as possible, thus
making them less vulnerable to malicious attacks.
10.
Operationalize your concepts. (use text format if needed)
Objectives/research
questions
Major
concepts
Indicators
What are the best
practices for
implementing firewalls?
Firewall
implementation
Number of
rules,
complexity
logging
Network size
Percentage
type of firewall
type of protocol
number of rules
logging levels
best practices
Variables
Unit of
measurement
What security threats can
firewalls help to mitigate?
Firewall security,
security threats
Malware
phishing
data leakage
Network size,
type of firewall,
type of protocol
Number of threats,
types of threats
What are the most
common misconceptions
about firewalls?
Firewall
misconceptions,
user knowledge
Common
beliefs,
knowledge
gaps
Improvement
Percentage,
Prevention
Risk,
Minimization
number of
misconceptions
degree of protection
provided
Firewall
configurations,
benefits and
drawbacks
Security
level,
performance
level
Practices
Percentage
What are the benefits and
drawbacks of different
firewall configurations?
Implementing/Managing
security levels
How can firewalls be
monitored to ensure
Firewall
monitoring,
Monitoring
tools,
Network size
Number of monitors
3|Page
optimal performance?
performance
levels
logging
activity
type of firewall
logging activity
type of protocol
11. Operationally define your study population (Working definitions play a crucial role in
avoiding ambiguities in the selection of a sample and help you to narrow your study population)
The study population for this research is security professionals working in organizations of all
sizes who are responsible for the implementation and maintenance of firewalls. These
individuals must have a basic understanding of network security and the potential risks
associated with firewall configurations.
Create a new account of Zotero (http://www.zotero.com) or Mendeley
(http://www.mendeley.com), build a bibliography related to your research area,
and provide/answer the following questions.
a. Show 10 references in APA format
(Ahmed & Hossain, 2014; Alvaro Pérez Martín et al., n.d.; Bankston & Johnson, 2014; Chermack &
Coons, 2012; Lin et al., 2014; Mark Ciampa, n.d.; (PDF) MODERN NETWORK SECURITY: ISSUES AND
CHALLENGES, n.d.; Singh et al., 2016; Tayal et al., 2017; Thurimella & Baird, 2010)
Ahmed, M., & Hossain, M. A. (2014). CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD.
International Journal of Network Security & Its Applications (IJNSA), 6(1).
https://doi.org/10.5121/ijnsa.2014.6103
4|Page
Alvaro Pérez Martín, José Ramon López Lanza, & López Videras R. (n.d.). (PDF) Terapia física en el
tratamiento de las enfermedades osteoarticulares. Retrieved January 18, 2023, from
https://www.researchgate.net/publication/261877190_Terapia_fisica_en_el_tratamiento_de_las_
enfermedades_osteoarticulares
Bankston, J. W., & Johnson, C. D. (2014). Network security fundamentals. Cengage Learning.
Chermack, T. J., & Coons, L. (2012). Exploring the arts of crafting and delivering scenarios. International
Journal of Technology Intelligence and Planning, 8(3), 233–253.
https://doi.org/10.1504/IJTIP.2012.048572
Lin, G., Soh, S., Chin, K. W., & Lazarescu, M. (2014). Energy Aware Two Disjoint Paths Routing. Journal of
Network and Computer Applications, 43, 27–41. https://doi.org/10.1016/J.JNCA.2014.04.004
Mark Ciampa. (n.d.). Security+ Guide to Network Security Fundamentals - Mark Ciampa - Google Books.
Retrieved January 18, 2023, from
https://books.google.com/books?hl=en&lr=&id=VWsJAAAAQBAJ&oi=fnd&pg=PR3&dq=Network+s
ecurity+fundamentals&ots=xnM2PlK56B&sig=Z286xE0pWOZXnKEfCLQSpyneWE#v=onepage&q&f=false
(PDF) MODERN NETWORK SECURITY: ISSUES AND CHALLENGES. (n.d.). Retrieved January 18, 2023, from
https://www.researchgate.net/publication/267691532_MODERN_NETWORK_SECURITY_ISSUES_A
ND_CHALLENGES
Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and
solutions. Journal of Network and Computer Applications, 75, 200–222.
https://doi.org/10.1016/J.JNCA.2016.09.002
Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper on Network Security and
Cryptography. 10(5), 763–770. http://www.ripublication.com
Thurimella, R., & Baird, L. C. (2010). Network security. Applied Cryptography for Cyber Security and
Defense: Information Encryption and Cyphering, 1–31. https://doi.org/10.4018/978-1-61520-7831.CH001
b. Show 10 references in MLA format
5|Page
C. Which format do you prefer and why?
I prefer APA format because it is the most commonly used style for academic writing,
particularly in the sciences. Additionally, it is easy to use and understand, with a clear structure
that makes it simple to find the information needed. It also provides clear guidelines for citing
sources, which makes it easier to avoid plagiarism.
6|Page
HW 4: Developing a research instrument (exercise 3)
Your research study topic (as indicated in #3 in HW_ 2): Network Security
Guidance:
a. Write your answers in this word document. Format your document name:
FirstName_HW_4.
b. Answer all the questions. If a question is not applicable, write N/A
c. When formulating the questionnaire, examine the relevance and justification of each
question about the objectives of your study.
d. Interview or complete the questionnaire yourself, then ask the pre-test respondents while
amending the instrument before finalizing the questionnaire.
e. For any clarification, refer to the textbook exercise 3
f. Chapter 9 of the textbook will help you to work through this exercise.
Objective: Construct a research instrument based on the research approach.
1. Map the subobjectives into research questions
Subobjective
Research Question
To analyze existing firewall technologies and
security protocols
To evaluate the effectiveness of different firewall
configurations
To identify the most common misconceptions
about firewalls.
To develop best practices for implementing and
monitoring firewalls.
To determine the potential risks associated with
using firewalls.
What are the best practices for implementing
firewalls?
What security threats can firewalls help to
mitigate?
What are the most common misconceptions
about firewalls?
How can firewalls be monitored to ensure optimal
performance?
What are the benefits and drawbacks of different
firewall configurations?
2. Map research questions into questions in your questionnaire
Research question
Relevant questions in the questionnaire
What are the best practices for implementing What are the essential features of a firewall?
firewalls?
What are the recommended firewall
deployment strategies?
What are the best practices for configuring a
firewall?
What are the important factors to consider
when choosing a firewall vendor?
How can a firewall be optimized for
performance and security?
What security threats can firewalls help to What types of threats can firewalls protect
mitigate?
against?
How effective are firewalls at blocking
different types of threats?
Can firewalls be used in combination with
other security measures?
What are the limitations of firewalls in
protecting against certain types of threats?
What are the most common misconceptions What are some common myths about
about firewalls?
firewalls?
How do these myths affect the way you use
and configure firewalls?
What are the potential risks of believing in
these myths?
What are the facts behind these myths?
How can firewalls be monitored to ensure optimal What are the key performance indicators for
performance?
a firewall?
What tools and techniques can be used to
monitor a firewall?
How often should a firewall be monitored?
What are the best practices for
troubleshooting firewall performance issues?
What are the benefits and drawbacks of different What are the different types of firewall
firewall configurations?
configurations?
What are the benefits and drawbacks of each
configuration?
What factors should be considered when
choosing a firewall configuration?
How do different firewall configurations
affect network performance and security?
Network size, type of firewall, type of protocol, Improvement, Prevention, Risk, Minimization,
Practices, Implementing/Managing
3. List independent and dependent variables
Independent variable
Dependent variables
Firewall implementation practices
effectiveness of firewall implementation
Firewall security measures
level of security threat mitigation
misconceptions about firewalls
impact of misconceptions on firewall
usage and configuration
firewall monitoring techniques
optimal firewall performance
firewall configurations
trade-off between firewall benefits and
drawbacks
4. Formulate the questionnaire using the Google form and append it below.
https://docs.google.com/forms/d/e/1FAIpQLSdf8CXziEk4ijorvl0MznMuXwgl61LE4W8ewMt0sGI
ZHis-jw/viewform?usp=pp_url
Purchase answer to see full
attachment