000938557 000__ 02718cam\a2200445Ia\4500 000938557 001__ 938557 000938557 005__ 20230306151947.0 000938557 006__ m\\\\\o\\d\\\\\\\\ 000938557 007__ cr\un\nnnunnun 000938557 008__ 200729s2020\\\\sz\\\\\\ob\\\\001\0\eng\d 000938557 019__ $$a1175914348$$a1178998068$$a1182452620$$a1182920136$$a1183937864 000938557 020__ $$a9783030467111$$q(electronic book) 000938557 020__ $$a3030467112$$q(electronic book) 000938557 020__ $$z3030467104 000938557 020__ $$z9783030467104 000938557 0247_ $$a10.1007/978-3-030-46 000938557 035__ $$aSP(OCoLC)on1178714043 000938557 035__ $$aSP(OCoLC)1178714043$$z(OCoLC)1175914348$$z(OCoLC)1178998068$$z(OCoLC)1182452620$$z(OCoLC)1182920136$$z(OCoLC)1183937864 000938557 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP$$dLQU 000938557 049__ $$aISEA 000938557 050_4 $$aPN167 000938557 08204 $$a808.02/5$$223 000938557 1001_ $$aDougherty, M. V. 000938557 24510 $$aDisguised academic plagiarism :$$ba typology and case studies for researchers and editors /$$cM.V. Dougherty. 000938557 260__ $$aCham, Switzerland :$$bSpringer,$$c2020. 000938557 300__ $$a1 online resource 000938557 336__ $$atext$$btxt$$2rdacontent 000938557 337__ $$acomputer$$bc$$2rdamedia 000938557 338__ $$aonline resource$$bcr$$2rdacarrier 000938557 4901_ $$aResearch ethics forum,$$x2212-9529 ;$$vv. 8 000938557 504__ $$aIncludes bibliographical references and index. 000938557 506__ $$aAccess limited to authorized users. 000938557 520__ $$aThis volume is the first book-length study of disguised forms of plagiarism that mar the body of published research in humanities disciplines. As a contribution to applied research ethics, this practical guide offers a typology of the principal forms of disguised plagiarism. It provides detailed analyses, in-depth case studies, and useful flow charts to assist researchers, editors, and publishers in protecting the integrity of the body of published research literature. Disguised plagiarism is more subtle than copy-and-paste plagiarism; all its varieties involve some additional concealment that creates further distance between the plagiarizing text and its source. These disguised forms are the most difficult forms of plagiarism to detect. Readers of the volume will become acquainted with the subtler forms of plagiarism that corrupt the production and dissemination of knowledge in humanities fields. The book is valuable not only to those interested in research ethics, but also to those in humanities fields including philosophy, theology, and history. 000938557 650_0 $$aPlagiarism. 000938557 77608 $$iPrint version: $$z3030467104$$z9783030467104$$w(OCoLC)1147285128 000938557 830_0 $$aResearch ethics forum ;$$vv. 8. 000938557 852__ $$bebk 000938557 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-46711-1$$zOnline Access$$91397441.1 000938557 909CO $$ooai:library.usi.edu:938557$$pGLOBAL_SET 000938557 980__ $$aEBOOK 000938557 980__ $$aBIB 000938557 982__ $$aEbook 000938557 983__ $$aOnline 000938557 994__ $$a92$$bISE