首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Academic dishonesty and its consequences have become increasingly complex. Highly accessible electronic media, profound consequences for misconduct and reporting, and lack of standard practice intensify the issues. We surveyed 270 faculty members to determine whether they had been confronted with plagiarism and if they felt prepared to deal with it. Using case studies, we examined faculty characterizations of the severity of students' uncited use of another's work, and their suggested actions, reports, and sanctions, by source, use, and amount of material. In addition to multiple interactions, we found that faculty members' perceptions of severity strongly mediate the consequences they recommend. However, within-case, recommended consequences (e.g., course actions, reports and sanctions) vary widely. Implications for development of guidelines based on level of plagiarism are discussed. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   

2.
Unconscious plagiarism occurs when people try to generate new ideas or when they try to recall their own ideas from among a set generated by a group. In this study, the factors that independently influence these two forms of plagiarism error were examined. Participants initially generated solutions to real-world problems in 2 domains of knowledge in collaboration with a confederate presented as an expert in 1 domain. Subsequently, the participant generated improvements to half of the ideas from each person. Participants returned 1 day later to recall either their own ideas or their partner's ideas and to complete a generate-new task. A double dissociation was observed. Generate-new plagiarism was driven by partner expertise but not by idea improvement, whereas recall plagiarism was driven by improvement but not expertise. This improvement effect on recall plagiarism was seen for the recall-own but not the recall-partner task, suggesting that the increase in recall-own plagiarism is due to mistaken idea ownership, not source confusion. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

3.
Participants engaged in a creative idea-generation task that required them to monitor source to devise ideas not offered previously by others. In Experiment 1, inadvertent plagiarism (cryptomnesia) occurred more often when participants were generating ideas than when they were taking a recognition test. In Experiment 2, focusing participants on the origin of their ideas during generation resembled the focusing that occurs in recognition performance and reduced plagiarism. In Experiment 3, a speeded-response condition increased inadvertent plagiarism by mimicking conditions in which people cannot or do not adequately monitor source. In Experiment 4, plagiarism was reduced both when participants offered their new ideas in a one-on-one context as compared with a more anonymous group setting and when participants were specifically instructed to avoid plagiarism. The results are discussed in terms of source-monitoring decision criteria and the conscious and unconscious processes that support that monitoring. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

4.
Regulations recently enacted by the Public Health Service and the National Science Foundation to address misconduct in scientific research were designed primarily to curtail deliberate forms of misconduct, such as fabrication or falsification of findings; however, researchers may also be held accountable for inadvertent deficiencies in data management. This article examines some of the problems in data quality control, documentation, and data retention that can occur when computers are used in scientific research. It focuses on deficiencies that could make it difficult to verify the integrity of research data or to reproduce statistical analyses. Strategies for prevention of data management problems are recommended. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

5.
Investigated cryptomnesia (unconscious plagiarism) and source memory using a word-search puzzle task in 3 experiments. Ss first alternated with a "computer partner" in locating words from 4 puzzles. They then attempted to recall their previously generated items as well as to locate additional new words. Substantially more plagiarism was committed in these tasks than was observed in a study by A. S. Brown and D. R. Murphy (1989), in which Ss generated category exemplars. Manipulations of retention interval (Exp 1) and degree of encoding (Exps 2a and 2b) reliably influenced plagiarism rates. Source confusions from a modified recognition memory task (Exp 3) were used as the basis for a unitary relative strength model to explain both source and occurrence (item) forgetting. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

6.
Many instances of alleged ethical misconduct relating to plagiarism, credit assignment in publications, and ownership of research data involve complexities of kinds not fully envisioned in past years. Cases are described to illustrate (a) new forms of incompatibility among the ethical systems of different professions, (b) diffusion or loss of protective control over confidential research data, and (c) use of credit assignments for purposes other than fair identification of contributors. (1 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

7.
Three experiments explored the assumptions underlying the relative strength model used by R. L. Marsh and G. H. Bower (see record 1993-32215-001) to account for laboratory-induced cryptomnesia (unconscious plagiarism). That model accounted for source and occurrence forgetting in unconscious plagiarism paradigms by assuming that items from different sources possess different strengths. That assumption had never been explicitly tested. In Experiment 1, results from a lexical-decision task supported the strength model using a word-search puzzle paradigm. In Experiment 2, which used a category generation paradigm, similar results demonstrated that later plagiarized items were indeed more available compared with items that were not later plagiarized. In Experiment 3, the strength of self- versus other-generated items was independently manipulated, resulting in large amounts of cryptomnesia that differed in ways specifically predicted by the model. These results are discussed in light of current models of source attributions and memory. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

8.
Cryptomnesia, or inadvertent plagiarism, was experimentally examined in three investigations. Subjects were required to generate category exemplars, alternating with 3 other subjects in Experiments 1 and 2 or with a standardized, written list in Experiment 3. After this generation stage, subjects attempted to recall those items which they had just generated and an equal number of completely new items from each category. Plagiarism of others' generated responses occurred in all three tasks (generation, recall own, and recall new) in each experiment, despite instructions to avoid such intrusions. The amount of plagiarism was greater under more complex generation sequences and for items produced from orthorgraphic relative to semantic categories. The most likely source of plagiarized responses was the person who had responded just before the subject in the generation sequence. Directions for future research are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

9.
The clinical and demographic data of 664 youth (M age = 13.92, SD = 2.58) were used to identify factors associated with frequent use of psychiatric hospitalization. Clinical data included scores on the Self-Report of Personality (SRP) and Parent Rating Scales (PRS) of the Behavior Assessment System for Children, Second Edition (BASC-2). Demographic data included age, race/ethnicity, gender, and the presence or absence of surrogate care. Results indicated that those youth with frequent admissions to the hospital were generally between 13 and 18 years old (p = .01), African American (p = .03), and in surrogate care (p = .04). Relative to the other youth in our sample they were more aggressive (p p p p = .003). The implications of these findings and the recommended interventions for youth with disruptive behaviors are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

10.
Improvements in design, achieved through a better understanding of fabrication costs, may cause an overall cost reduction for steel structures. Multiple Linear Regression (MLR) provides the mechanism for transformation of data collected by an information system to data which is used in the evaluation of structural steel fabrication costs. The integration of fabrication control and analysis provided by this system permits its implementation in existing fabrication environments, and presents a desperately needed technological gain for the fabrication process. Traditional design approaches which have relied heavily on experience can now be evaluated and improved in terms of cost competitiveness, prior to or during fabrication by the proposed MLR strategy.  相似文献   

11.
报道了退火温度和冷却条件对轿车同步器齿环用HMn59-2-1-0.5合金挤管的金相组织及力学性能的影响。为材料加工及产品性能控制提供理论依据。  相似文献   

12.
Professional psychologists have recently been encouraged to sensitively address religious/spiritual issues in psychotherapy. But how frequently do practitioners make religiously/spiritually informed interventions with their clients, and how important do they think it is to do so? Based on the existing literature, the authors identified 29 recommended religious/spiritual psychotherapy behaviors and surveyed 96 psychologists regarding perceived importance and use of these behaviors. The most and least frequently endorsed behaviors were identified. The greater the practitioners' religious/spiritual self-identification, the more likely they were to report using these behaviors in psychotherapy. However, overall, and for 90% of the individual items, clinicians engaged in these religious/spiritual psychotherapy behaviors less frequently than their importance ratings suggested they should. Practice implications and suggestions for educators are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

13.
The supersonic laser deposition (SLD) is a new fabrication process which combines the supersonic powder stream found in cold spray with laser heating of the deposition zone. Because of the instantaneity of particles impact, the deformation behaviors and the adhesion behaviors of particles impacted on the substrate by SLD cannot be well investigated through experiments. Therefore, a finite element model was developed to solve the problems above. Meanwhile, the heat effect of the substrate heated by laser was discussed. The effective plastic strain and the effective stress between the particle and substrate at different laser preheat temperatures were studied. The results show that laser depositing temperatures of 1000 and 1100 °C on substrate would be the optimized for the bonding of particles and substrate. In addition, the simulation results conformed to experimental results.  相似文献   

14.
Recently, H. G. Hoffman (1997) has proposed that reality-monitoring judgments can be made using average differences in the strength of 2 classes of studied items. The support for this claim was that the inferred recognition hit rate differed for the 2 classes of items. Hoffman argued that misattributions of new items to an old source were more frequent to the source that was weaker in memory strength. The authors of the present study have demonstrated that source misattribution biases of this sort can arise when the inferred recognition hit rate does not differ between classes of items. Their argument is that different source-monitoring situations may require different weightings of source-monitoring decision criteria and that these can provide a valid account of both their own and Hoffman's data. Arguments concerning when strength might and might not be used in tasks involving source monitoring versus unconscious plagiarism are clarified. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

15.
Adult attachment conceptualizations are recommended with severely disordered, traumatized women at risk of suicide. Attachment anxiety and attachment avoidance suggest individual differences in behavior, and empirical work relating psychopathological behaviors to each orientation is presented. Attachment theoretical practice helps alter negative expectations of relationships, including psychotherapy relationships. Enhanced expectations of self or others can improve readiness for treatment and reduce suicide risk. Adult attachment theory offers positive conceptualizations of self-destructive behaviors useful with such clients, including those diagnosed with borderline personality disorder. Interventions that foster working alliances and improve affect regulation are illustrated with 2 case examples. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

16.
This study investigated rural and urban adolescents' perceptions of mental health. A questionnaire containing nine vignettes (involving child abuse and adult and adolescent mental health issues) was devised based on a tool developed by Flaskerud (1980). Analysis of responses to the questionnaire indicated that there was general agreement among the students about unhealthy behaviors. However, there were some significant differences related to rural/urban setting, gender, and ethnic background. The findings provide insight into rural and urban students' perceptions of problematic behaviors, who should intervene, and how. It is recommended that health care providers assist adolescents in expanding their range of coping behaviors, especially in regard to alcohol abuse and violence.  相似文献   

17.
18.
Reviews the book, Helping the noncompliant child: Family-based treatment for oppositional behavior (2nd ed.) by R. J. McMahon and R. L. Forehand (see record 2004-00004-000). Positive outcomes of parent training programs have been well documented in the literature (Lonigan, Elbert, & Johnson, 1998). These programs are often recommended for young children exhibiting disruptive behaviors (Kazdin, 1997). The efficacy of parent training programs for families who are able to complete treatment is documented for both short-term and long-term goals (Brestan & Eyberg, 1998; Lonigan et al., 1998). Helping the Noncompliant Child: Family-Based Treatment for Oppositional Behavior is the second edition of a successful parent training program that promises to deliver results similar to those of the earlier program. In their book, McMahon and Forehand present an intervention treatment program designed for children ages 3 to 8 years who present as "excessively noncompliant." The treatment program is based on the premise that "the child's noncompliant, inappropriate behavior is shaped and maintained through maladaptive patterns of family interaction, which reinforce coercive behaviors" (p. 28). McMahon and Forehand's HNC program provides parents with a specific and practical way to get out of the coercive cycle of negative interactions by using attention and rewards, ignoring negative behaviors, and giving clear instructions. The program falls short when it uses essentially the same time-out procedure for noncompliance for children between the ages of 3 and 8 and regardless of the function or reason for the noncompliance. To intervene effectively with a child, all of the issues at hand must be taken into consideration. In severe cases, the time-out procedure recommended could actually increase conflict between the parent and the child should the child not comply, resulting in family drop out or the need to modify the adjunctive individual therapies. Preparing parents for these exceptions and possible need for modifying the program by clarifying the populations who have been successful and unsuccessful in parent training programs would be a good addition to the book. This book can only be recommended for use with families for whom a thorough evaluation has determined that the child's noncompliant behaviors are a function of coercive family interactions consisting of unclear parenting messages. The child must evidence the ability to participate effectively in the time-out procedure. The child and family must clearly fit into the population shown to benefit from parent training programs. For these families, the HNC program may decrease noncompliant behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

19.
Health is identified as a value, and therefore techniques aimed at changing preventive health behavior (PHB) inevitably involve values. PHB includes both reducing the frequency of behaviors that put one at risk of illness and increasing preventive behaviors that may reduce one's chances of disease. Caution is suggested when undertaking such interventions, and it is recommended that the issue of health value be discussed, especially when health is not the presenting problem. It is concluded that presenting clients with the relevant facts, openly discussing health value, and heightening clients' awareness of the interrelation between physical and mental health will likely enhance commitment to participation in PHB. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

20.
Lever-pressing behavior of multihandicapped severely or moderately retarded 6–18 yr olds was reinforced by the contingent application of visual stimulation for each response. With visual stimulation available for 20 min/day, 6 Ss maintained relatively high frequencies of responding over a 5-wk period. Exploration of the complexity, duration, and intensity of visual reinforcers, and of other behaviors that can be maintained through visual reinforcement is recommended. (9 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号