Vous êtes sur la page 1sur 22

Pedagogy: Critical Approaches to Teaching Literature, Language, Composition, and Culture

Volume 5, Number 2, 2005 Duke University Press


275
Calling Off the Hounds:
Technology and the Visibility
of Plagiarism
James P. Purdy
Harvards much publicized decision in summer 2003 to deny admission to
Blair Hornstine because of allegations of plagiarism (Green and Russell 2003;
Kantrowitz and Scelfo 2003) reminds those of us in English studies not only
of the negative social stigma accompanying accusations of plagiarism, but also
of the drastic actions academic institutions will take to avoid being labeled
as tolerating plagiarismor any behavior closely akin to it. Hornstine, who
had already been accepted to Harvard, was accused of having information
from sources that was not properly attributed in fve articles published
in Cherry Hill, New Jerseys Courier-Post, including sections copied from
President Bill Clinton and Supreme Court justices William Brennan and
Potter Stewart (Osenenko 2003: n.p.). Harvard revoked admission because
Hornstines actions were viewed as behavior that brings into question . . .
honesty, maturity, or moral character (Green and Russell 2003).
1
Without a
doubt, plagiarism continues to be fraught with concerns ethical and moral.
Now we must add technological. New technologies, such as the Inter-
net, heralded simultaneously as promoting (e.g., see Kitalong 1998; DeVoss
and Rosati 2002; Laird 2003) and thwarting (e.g., see Culwin and Lancaster
2000; Braumoeller and Gaines 2001) plagiarism, continue to keep concerns
surrounding plagiarism in the forefront of the collective academic psyche.
While plagiarism has arguably always been a function of technologythat
276 Pedagogy
is, plagiarizers could plagiarize only in ways the available technologies per-
mittedthese new technologies increase the visibility of plagiarism, allow-
ing interested parties to quickly and easily trace documents to those using
similar language. As a result, writing teachers are more aware of plagiarism.
In other words, if plagiarism is easier to commit because of the Internet, it
is also easier to catch because of the Internet. We in English studies must,
therefore, now think about plagiarism in light of technology. Just as Lisa
Gitelman (1999: 119) argues that the phonograph and associated record-
ing technology troubled nineteenth-century visual norms of intellectual
property, so too do new media technologies trouble the existing standards
of plagiarism and intellectual property that rely on visual evidence. Treat-
ment of intellectual property and plagiarism, however, does not necessarily
evolve with this changing technology. As Gitelman notes, typing and related
nineteenth-century literacy practices facilitated by new technologies, such
as the typewriter and phonograph, were characterized by anxiety about
visuality and textual evidence (211). Typewriters were thought to make
writingand error, because typewriters did not initially allow for mistakes
to be correctedmore visible. They substantiated the presence of error and
their own status as writing machines through the text they produced, that is,
what people could see (211). New-media technology is still surrounded by
this anxietylargely because our standards of evidence still depend on visual
proof. Little seems to have changed.
Plagiarism detection services that rely on the Internet allow instruc-
tors to search for this visual proof, to test their students papers to determine
if they include language copied directly from other sources. As Rebecca
Moore Howard (forthcoming: 5) explains, the logic of these services is if
unethical writers have access to text online and plagiarize from it, then gate-
keeping teachers can also access the plagiarized text and catch the ofenders.
Undoubtedly, many diferent services exist for instructors to tailor to their
individual needs. In his 2001 report for Britains Joint Information Systems
Committee (JISC), Gill Chester (2003) identifes three types of plagiarism
tested by detection services: cut and paste, paper mills, and collusion. Pla-
giarism detection services, in other words, can test if students copied text
from Web sites, purchased papers from online paper mills, or copied text
from other students. These services test for the frst two types of plagiarism
by comparing submitted papers against texts available via the Internet and
test for the latter by comparing submitted papers against a database of student
papers established by the instructor. Examples of the former services include
EduTie,
2
Essay Verifcation Engine (EVE2), and Turnitin. Examples of the
Purdy Calling Of the Hounds 277
latter services include CopyCatch, Glatt, and WordCHECK. Some services,
such as EVE2 and CopyCatch, download onto the users computer, while
others, such as EduTie and Turnitin, operate from remote servers. This
distinction becomes signifcant when considering the accessibility of student
papers submitted to be tested.
These technologies arguably have increased the fervor to eradicate
plagiarismor at least to capture and punish those who plagiarize. A 29 April
2004 Primetime Thursday special (Cheaters Amok) largely devoted to the
use of plagiarism detection services, specifcally TurnItIn, to stop plagiarism
serves as a case in point. The ability to detect plagiarism remains a priority
for academic institutions, and the advent of plagiarism detection software
seemingly provides the solution that many are seeking.
Sleuthing and Hunting: Caught in the Discourse of Plagiarism
The lead article in the University of Illinois at Urbana-Champaigns College
of Liberal Arts and Sciences newsletter (LAS News, Spring 2003) exempli-
fes this heightened desire to apprehend plagiarists. The article, by Andrea
Lynn, advances the importance of combating plagiarism in the classroom
and advocates the use of plagiarism detection software, specifcally EVE2, as
one of the new weapons to parry plagiarism (1). At the outset the articles
discussion of plagiarism is couched in terms of violence and struggle, and the
work of the instructor is framed as combative and aggressive.
Such discourse about plagiarism, considered along with that mobi-
lized by plagiarism detection software, makes it unclear whether the classroom
is a United Nations summit or a nineteenth-century crime novel. EVE2, for
instance, has a settable search function named Call of the hounds when. . . .
The word choice here conjures images of the classic fox huntmobs of hunt-
ers on horseback galloping after dogs hot on the trail of their next kill. The
use of plagiarism detection software, in other words, becomes a hunt for prey.
This phrasing also positions the student as a wily and cunning trickster (the
mythological image of the fox) and the instructor as a hunter out for the kill.
While the former sadly may be true, we hope the latter never is. Moreover,
this word choice also suggests an elite class chasing after lower creatures for
sport. The pursuit of plagiarism becomes a game in which instructors seek
to entrap students with a triumphant Aha! Ive got you! As in the classic
presentation of the private investigator or police of cer at work, the criminal
is caught red-handed in the glare of a fashlight. Instructors using plagiarism
detection technology likewise seek to make visible students acts of transgres-
sion. The goal here is far from pedagogical. Instructors, of course, often do
278 Pedagogy
not use these services with malicious intent, but the services as marketed do
not lend themselves to efective pedagogy.
The aforementioned LAS News article, which ofers recommenda-
tions based on Bear Braumoeller and Brian Gainess 2001 study comparing
simply warning students not to plagiarize with telling them their papers
will be run through a plagiarism detection service, prompted action by the
College of Liberal Arts and Sciences (LAS) at the University of Illinois at
Urbana-Champaign (UIUC). LAS administration asked the Center for Writ-
ing Studies (the center), a cross-disciplinary academic unit devoted to the
research and teaching of composition and rhetoric, to recommend a plagia-
rism detection service for use by instructors in identifying plagiarized work.
The results of the investigation to determine which service would be most
suitable reveal that these fee-based services appear to cause more problems
than they solve. They raise not only ethical concerns, but also questions
about their efectiveness as compared to free and readily available online
search engines. Furthermore, plagiarism detection services direct our atten-
tion to the larger concerns of the role of the instructor and the defnition of
plagiarism in an academic environment where available technology both
changes the writing practices of students and makes some of these practices,
particularly those associated with plagiarism, more visible. In what follows,
I detail the study and its results within the context of plagiarism scholarship
to explore how new technologies afect our understanding of plagiarism and
writing instruction.
Testing the Testers: Evaluating the Performance of Plagiarism
Detection Software
Charged by LAS with the task of studying plagiarism detection services, with
primary concern centering on Internet plagiarism, the center frst established
minimum requirements for any service suggested: the service had to search
Internet sites and paper mills and the service could not maintain submitted
papers in an internal database. Keeping such papers is a violation of students
intellectual property rights because students neither agree that their course
papers be accessible to anyone on the Internet nor, even more disturbing,
consent that their papers be used for proft. (While the former problem might
be resolved by having students sign a waiver granting permission that their
papers be submitted to the Web, the second problem is more complicated
and not so easily solved.) Moreover, in their study of plagiarism detection
services, Braumoeller and Gaines (2001) indicate that UIUC would not allow
Purdy Calling Of the Hounds 279
them to test services that kept copies of papers precisely because students
essays are their own property. In this way, the university itself has taken a
stand against services that retain student papers.
Elsewhere Andrea L. Foster (2002) and Rebecca Moore Howard
(1995, 2000) discuss at greater length these ethical and moral concerns, as
they apply to the use of plagiarism detection services and to the defnition
of plagiarism itself, respectively. Foster (2002: A37) addresses how some
college lawyers now advise institutions that plagiarism detection services
that maintain copies of submitted student papers, specifcally Turnitin, not
only potentially violate students copyrights on their written work, but also
violate their privacy since students often do not grant consent that their work
be copied. She cites Howard as arguing that students can also protest the
submission of their papers to plagiarism detection services under the Family
Educational Rights and Privacy Act because it prohibits institutions of higher
education from disclosing personal information about students without stu-
dents prior consent.
Howard (1995: 793), carrying these concerns to defnitions of pla-
giarism itself, explores how writing studies often construct plagiarism as
immoral or criminal (see also Howard 2000). She contends, however, that
morality is not a necessary component of plagiarism as students may pla-
giarize for positive reasons (79697). She addresses how when students do
what she calls patchwritingwriting passages that are not copied exactly
but that have nevertheless been borrowed from another source, with some
changes, a behavior closely allied with plagiarismthey can come to under-
stand what was previously unfamiliar material (799). In other words, students
who patchwrite do not plagiarize to cheat; they plagiarize because they lack
confdence that they understand the material with which they are working.
She ultimately argues that student writing be treated with the same respect
as professional writing (796). Howard asks us, above all, to regard and value
students as writers.
A 2003 case at McGill University illustrates such concerns regarding
student copyright and privacy as well as another perspective on this issue of
respect. Jesse Rosenfeld, a student at McGill, successfully argued his right
to decline to submit his assignments to Turnitin. Initially, after refusing to
submit his papers to the service for testing, Rosenfeld received zeros for the
assignments. After two months of appeals, however, the professor who origi-
nally failed the papers agreed to grade them without requiring that they be
submitted. Rosenfelds objections to submitting to Turnitin were precisely
280 Pedagogy
how such a process views students and student work. He asserted, frankly
Im ofended that the university is violating students rights by using a device
that presumes students are guilty of plagiarism until proven innocent and is
sponsoring a service that uses students work to boost the companys prof-
its (Brown 2004). Rosenfelds case and his eventual success at having the
original decision of the university reversed underscore the validity and weight
of these objections. It is of note here that these ethical concerns continue to
circulate and invalidated the use of several plagiarism detection services for
the purposes of my study.
For the study, I researched eight plagiarism detection services follow-
ing the requirements established by the center and compared them based on
the following criteria: type of testing, method of testing, treatment of papers,
cost, and timeliness of reports. Only two services from this list, EduTie
3
and
EVE2, met the aforementioned requirements; thus, they were selected to be
tested for how efectively they traced plagiarized documents to their original
sources. (Identifying the tested documents as plagiarized simply indicates
that these documents were copied from online sources to mimic the process
of plagiarizing online. This designation does not necessarily indicate that the
original documents themselves were plagiarized. In fact, only one document
tested was known to have been plagiarized.) Also selected for the study was
the search engine Google to test whether the fee-based services performed
more efectively than a free online search engine. Though Google is not
marketed as a plagiarism detection service, its comprehensive Web search
capabilities allow it to function as one. Other search engines might serve the
same function.
In June 2003 I ran fve documents through each plagiarism detection
service, as well as segments of these documents through Google. These doc-
uments comprise a variety of subject areas and document types to represent
the range of sources from which writers might plagiarize. To test the types of
documents students might hand in as part of their academic course work, the
frst two documents include examples of texts representative of the various
discourse communities in the university environment. Documents for tests
3, 4, and 5 are examples of texts published by professionals to test how the
plagiarism detection services and Google respond to such documents. The
tested documents are described in table 1.
The methodology used for testing each of these documents difered
slightly with each service, based on the services diferent technical capabili-
ties. The procedures followed are summarized in table 2.
The following discussion of results centers on whether the tested ser-
Purdy Calling Of the Hounds 281
vices traced the submitted documents to their online sources and, for EVE2
and EduTie, to what extent (i.e., what percentage of ) these documents were
considered plagiarizednoting that all, except the student paper in test 2 that
had only slight variations from its online source, were exact copies of online
sources. In what follows I also address what online sources the submitted
documents were traced to and consider the time required for each test. The
report submitted to LAS not only outlined the performance of each service
and compared the results across services, but also included an annotated list
of resources on plagiarism for instructors interested in learning more about
plagiarism.
Table 1. Tested Documents
Test Document Description
1 Plagiarized document A document, created specifcally for the purposes of this
compilation study, with four sections, each copied from an online
document in a diferent subject area:
section 1, the social sciences: a paper from the
Electronic References online paper mill about the
relationship between media and violence
section 2, the biological sciences: a scientifc report on
the relationship between hypothyroidism and prolactin
levels
section 3, engineering: an article published in the
International Journal of Applied Electromagnetics
section 4, literature: an analysis of book 1 of Homers
The Iliad provided by GradeSaver
2 Sexual harassment The frst paragraph of a paper on sexual harassment
paper from online turned in by a student in a frst-year composition course.
paper mill The student presumably bought the paper from the
Electronic References online paper mill. The student
version used for the test difers slightly from the Electronic
References version (i.e., the student added and deleted a
few words).
3 President letter A letter from the president of the University of Illinois
4 Braumoeller and The introduction, background, and conclusions sections
Gaines article from Braumoeller and Gainess article Actions Do Speak
Louder than Words: Deterring Plagiarism with the Use of
Plagiarism-Detection Software
5 UIUC plagiarism policy UIUCs Academic Integrity Policy for All Students,
the universitys of cial policy on plagiarism (without
endnotes)
282 Pedagogy
Free versus Fee: Googles Capabilities as a Plagiarism Detection Service
Based on the results of the tests, I suggested the center not recommend that
LAS advocate the purchase of EduTie, EVE2, or any such plagiarism detec-
tion service. While EduTie performed the best of all services tested, neither
it nor EVE2 performed appreciably better than Google. Because Google, a
free service for end users, generally performed on par with these fee-based
services, there is no obvious advantage in purchasing them. Moreover, these
fee-based services appear to cause more problems than they solve. The results
of the tests are summarized in table 3.
Table 2. Test Methodology
Service Procedure Reason
EduTie Each document was run once. Searches are not customizable.
EVE2 Each document was run twice: In EVE2 there are several user options.
For the frst run, the default Users can set the search type to quick,
options were used: search medium, or full strength and can set the
type was set as medium option Call of the hounds when . . . to any
and Call of the hounds whole number from 0100 percent. The
when . . . was set at 80 former determines the rigor of the test; that
percent.
4
is, how many Web sites are examined and in
For the second run, what depth, and the latter determines at what
documents for tests 1, 2, 3, percentage of plagiarism the search stops;
and 5 were rerun (EVE2 that is, when the selected percentage of a
traced the document for submitted document is determined to be
test 4 directly to its online plagiarized, the search ceases.
source and designated it as
100 percent plagiarized on
medium), upgrading the
search type to full strength
to check whether EVE2
would determine the
documents to be 100
percent plagiarized on a
stronger setting.
Google The frst ten words of a section of Google allows a user to type in only ten
a plagiarized document were words for a search; thus, the entire
entered for a search. For tests 1, 4, documents were not searched.
and 5, the frst ten words of the
multiple sections of each of the
documents were tested.
Purdy Calling Of the Hounds 283
When Google found source sites, it found them within its frst ten
results fve out of seven times, challenging the notion that using an online
search engine is necessarily a more time-consuming endeavor than using pla-
giarism detection software. For the other two, section 4 of the test 1 document
and the test 4 document, Google found the sources on the thirtieth and ff-
teenth entries, respectively. Although these results indicate that users would
have to read through many search results before fnding the correct source, it
is worth noting that results from the medium-strength test and full-strength
test runs on EVE2 were available after approximately ffty minutes and two
hours and ffteen minutes, respectively, and results for EduTie were available
after approximately twenty-four hours. Searches on Google provide nearly
instantaneous results; thus, using Google can ultimately yield faster results,
as instructors can begin checking sites within seconds. For this study Google
traced plagiarized documents to their online sources more quickly for the
tests, even counting the time it took to read through the search result entries.
In the end, all services require instructors to check the Web sites provided as
results to ensure they match the paper submitted for the test.
Especially notable in considering the results of this study is that
other studies of plagiarism detection services do not consider online search
engines. Sources that argue for the value of plagiarism detection software
Table 3. Comparison of Results across Services
Test EduTie EVE2 Google
1 Sources found for Sources found for Sources found for sections 1,
sections 1, 2, and 4, not sections 1, 2, and 4, not 2, and 4, not for section 3
for section 3; plagiarism for section 3; plagiarism
score 100 percent score 100 percent
2 Source found; plagiarism Paper found at paper Source found
score 84 percent mills other than the
source suspected to be
copied from; plagiarism
score 18.85 percent
3 Source found; plagiarism Source not found Source found
score 100 percent
4 Source found; plagiarism Source found; plagiarism Source found on search of
score 100 percent score 100 percent conclusions section
5 Source found; plagiarism Closely related sites Closely related sites found,
score 100 percent found, but not the but not the original source
original source
284 Pedagogy
(e.g., Culwin and Lancaster 2000; Braumoeller and Gaines 2001; Gillis and
Rockwell-Kincanon 2002) typically do not consider the potential of free
search engines to provide comparable benefts to plagiarism detection soft-
ware. Based on this study, such search engines, namely Google, yield benefts
similar to the fee-based services. Even Braumoeller and Gaines (2001) turned
to an Internet search engine to track down an article that was particularly
dif cult to fnd in their study of EVE2, suggesting that the Internet search
engine proved more efective than EVE2 in this instance. Why, then, has
scholarship advocating the use of plagiarism detection services not addressed
free search engines?
Serving the Hand that Feeds You: A Potential Link between Plagiarism
Detection Services and Online Paper Mills
After completing the tests I discovered that EduTie maintains copies of
submitted papers on their server, whichthough they claim these papers
are accessible only to the submitting institutionis an intellectual property
concern. An even greater concern, however, is elaborated in Jefrey Youngs
March 2002 Chronicle of Higher Education article, which raises questions
about EduTies relationship with online paper mills. Young alleges that Edu-
Tie and PlagiServe, at the time a less comprehensive version of EduTie with
the same parent company, have a business relationship with some online
paper mills, which he suggests indicates these services are secretly selling
the very papers that they claim to check (2002). Young traced the name of
Oleksiy Shevchenko, a prominent of cial with EduTie and PlagiServe, to
Cyber Breeze Networks, a company that operates several online paper mills:
www.mightystudents.com, www.essaymill.com, and www.essaysonfle.com.
While EduTie vehemently denies the charge that it is connected to any online
paper mills, the possibility of such a connection is still troubling. This alle-
gation raises additional questions about the appropriateness of EduTie as
a plagiarism detection service, reinforcing that an endorsement of such a
service would potentially risk, even if indirectly, supporting the existence of
such paper-selling services.
The Weakness of Full Strength: Concerns over Consistency and
Functionality of Multiple Runs of EVE2
While EVE2 does not raise the same ethical concerns as EduTie, EVE2s
performance raises other functional concerns. EVE2s performance across
multiple runs, though consistent overall, still shows disconcerting inconsis-
tencies in the Web sites identifed as potential sources. Although the results
Purdy Calling Of the Hounds 285
of the medium- and full-strength runs of EVE2 were not markedly difer-
ent, the program nevertheless computed difering percentages of plagiarism
and referenced additional and/or diferent Web sites. For the frst two tests,
the percentages of the documents determined to be plagiarized on the full-
strength test are lower than those from the medium test (92.18 percent and
15.78 percent versus 100 percent and 18.85 percent, respectively); thus, when
run at full strength EVE2 found a lesser percentage of these documents to be
plagiarized, even though all (except the test 2 document) were copied word
for word from their online sources. In other words, they were 100 percent pla-
giarized. So on full strength, EVE2 became less accurate in its determination
of the amount of the documents that was plagiarized. The 100-percent value
returned on the medium test, however, is also problematic. EVE2 (like Edu-
Tie) labeled the document from test 1 as 100 percent plagiarized, though it
did not trace the third section to any Web sites. The amount of the document
labeled as plagiarized, therefore, does not refect the actual results provided
by EVE2. EVE2 did not fnd the third section to be plagiarized: it did not
trace this section to its online source, so its designation of the document as
100 percent plagiarized does not coincide with EVE2s actual performance.
The Web sites EVE2 returned as results were also sometimes quite
diferent on multiple runs, particularly for the test 5 document. On full
strength EVE2 traced the UIUC plagiarism policy to seven Web sites, only
one the same as on the medium test (see below for more details). Addition-
ally, on full strength EVE2 traced the test 2 document to one of the same Web
sites as on medium, but to only that source, while medium traced it to three
potential sources. What remained consistent, however, was that EVE2 was
still unable to trace to their online sources section 3 of the test 1 document
(the section on electromagnetics) and the University of Illinois president letter
for test 3. More surprising, on the full-strength test EVE2 actually performed
worse than on the medium test. On full strength EVE2 did not trace section
1 of the test 1 document to any Web site, whereas it did trace this section to
the Academic Library online paper mill on medium. For the purposes of this
study, then, increasing EVE2s testing strength did not yield more accurate
results.
Also of particular note, both in terms of difering performance on
multiple tests and in terms of the content of the test 5 document, on the full-
strength test EVE2 traced UIUCs plagiarism policy to the plagiarism or
academic integrity policies of several other universities, including Elmhurst
College; California State University at Northridge; and Rutgers University at
New Brunswick, which acknowledges that some of its material is drawn from
286 Pedagogy
Northwestern University. On the medium test, EVE2 traced UIUCs plagia-
rism policy to Rogers State University in Oklahoma. Even more fascinating,
EVE2 determined the amount of UIUCs plagiarism policy to be plagiarized
as 100 percent, which means that, according to EVE2, this document on
plagiarism is itself 100 percent plagiarized. In his May 2003 Chronicle of
Higher Education article, Dan Carnevale addresses a similarly provocative
discovery: an article from Syllabus magazine written about online plagia-
rism appears to have been plagiarized from an online journal article, even if
inadvertently. I am not arguing that UIUCs plagiarism policy is plagiarized.
Instead I wish to point out that EVE2 suggests this possibility, which both
draws attention to the potential for unintentional and perhaps inevitable
borrowing of language,
6
especially at the institutional level, and, even more
important, calls into question the veracity of the results of plagiarism detec-
tion services.
7
Before we advocate the use of plagiarism detection technology to
check if our students papers are plagiarized, we should consider how these
services treat the very policies that compel some people to use them. Their
results should not be considered ironclad proof for accusation. We must pay
careful attention to what these services designate as plagiarized because the
technology is fallible. As with any technology, plagiarism detection technol-
ogy requires human application and interpretation. As Gail E. Hawisher
and Cynthia L. Selfe (1991: 64) remind us, positive change in the classroom
requires human efort, not new technology. Plagiarism detection technology
is not the solution to eradicating plagiarism. Thoughtful pedagogy address-
ing plagiarism is.
Implications for Dening Plagiarism and the Role of the Instructor
While blatant and intentional cheating should certainly be prevented and
punished, the above results illustrate a need to revise our notions of plagia-
rism. Concerns of plagiarism are often disproportionately focused on stu-
dents, positing that they are the only group (or at least the group most) guilty
of plagiarism. Brian Martin (1994: 3840) challenges such a view, exploring
how current conceptions of plagiarism ignore what he calls institutionalized
plagiarism, which includes ghostwriting, honorary authorship, and attribu-
tion of authorship to higher of cials in bureaucracies rather than the more
novice workers who actually do the writing. He addresses how discussions
of plagiarism nearly always focus on what he calls competitive plagiarism,
which includes word-for-word plagiarism, paraphrasing plagiarism, plagia-
rism of secondary sources, plagiarism of the form of a source, and plagiarism
Purdy Calling Of the Hounds 287
of authorship (3738)that is, the types of plagiarism of which students
are accused. For Martin such plagiarism is often inadvertent and ultimately
less serious than institutionalized plagiarism, which he argues is pervasive
and accepted (38), even though it is more objectionable since it reinforces
existing problematic power structures and reduces the accountability of sub-
ordinates who actually do the work because their work goes unrecognized
(4042). Andrea Abernethy Lunsford (1999: 532) extends Martins claim here
to address the problems of corporate entities now assum[ing] the mantle
of the author. She expresses alarm that large corporations now claim the
rights of single authorsnot only for the reasons Martin addresses, but also
because such corporations come to reap the fnancial rewards that are due
individuals and this trend has resulted in a kind of gold-rush mentality to
copyright and patent everything under the sun.
The coverage of Blair Hornstines case illustrates Martins point.
Though Hornstine is accused of plagiarizing President Bill Clintons 17
November 2000 Thanksgiving Proclamation, for example, nowhere in arti-
cles covering this allegation is it addressed that Clinton likely did not write
his own Thanksgiving Proclamation; speechwriters prepared it. In Martins
terms, Hornstines commission of competitive plagiarism is seen as more
egregious than Clintons commission of institutionalized plagiarism. For
Martin plagiarism is seemingly above all a hierarchical issue: plagiarism is
acceptable when it harms subordinates or benefts superiors but unaccept-
able when it benefts subordinates or hurts superiors. From this perspective
there exists a double standard surrounding plagiarism, one imbricated in
a hierarchical society that situates students as a subordinate lower class.
Ultimately, Martin proposes less attention be paid to competitive plagiarism
and more attention be paid to institutionalized plagiarism, thus reminding
us that accusations of plagiarism leveled at students might sometimes refect
writing practices espoused by professionals and, therefore, should be cause
for refection.
Gitelmans (1999: 74) rhetorical analysis of what she calls Thomas
Edisons idea letters, letters sent to Edison to ofer suggestions and/or ask
for help in developing an idea into an invention, provides further insight into
current conceptualizations of plagiarism around which students are pun-
ished. She focuses on how authors of these letters treat an idea as a possess-
able entity, something one has or owns: Writers perceived ideas as property,
private and personal, with little sense of collectivity (81). The same might
be said of higher educations treatment of ideas today. This denial of collec-
tivity still exists within academia (especially the humanities), where written
288 Pedagogy
papersparticularly those with the most signifcance (e.g., tenure publica-
tions, dissertations, theses)must have single authors, refecting a belief
that only one person can lay claim to and own the ideas in a paper.
8
Ideas are
framed as necessarily private and personal, the possession of a sole author.
This perspective seems somewhat ironic, if not disjunctive, given that many
of us in our composition and literature classes require students to complete
peer reviews for their papers to help them further develop their ideas. Lisa
Ede and Andrea Lunsford (1990) explore at length the role of collabora-
tive authorship in academia (and elsewhere) in their Singular Texts/Plural
Authors. They conclude their preface by declaring, Our ability to author
anything at all is anchored in our experiences with others (xii). This conclu-
sion is seemingly lost in prominent conceptions of plagiarism.
Such a view of the singular ownership of ideas is clearly illustrated in
the response displayed by clicking on one of the Web sites EduTie returned
as a result for the test 2 document, the plagiarized student paper. EduTie
returned the address lugovkyys@lakeland.edu (though this looks like an
e-mail address, it was returned as a Web link, perhaps another problematic
quirk of the program) as the source for the third sentence of the test 2 docu-
ment, but access to this source was denied. Clicking on this link brought a
page displaying the message You do NOT own this paper! Belief in the
individual ownership of ideas as recorded in written documents clearly con-
tinues to predominate.
Yet the documents advancing and enforcing this belief are themselves
collaboratively authored. Gitelman (1999: 111) addresses the somewhat ironic
fact that a patent document, a foundational document in establishing current
conceptions of plagiarism, does not have just one author. Rather, the inventor,
his or her attorney, and the patent of ce itself all author the patent document.
The actual authorship of the patent document belies the very logic of singular
authorship on which it is based. Plagiarism detection software operates in
much the same way. While purportedly seeking to combat collaborative
authorship, plagiarism detection software itself depends on such collabora-
tive authorship. In fact, for those services that maintain submitted student
papers on a remote server, the very textual foundation that allows these ser-
vices to operate has multiple authors. Thus, in practice, these services engage
in a version of the very behavior they claim to abhor and combat.
For Karla Saari Kitalong (1998: 255) the uncritical application of
the print-oriented construct of plagiarism to online spaces is particularly
problematic. Following Pierre Bourdieu, she conceptualizes plagiarism as
symbolic violence because it involves the perpetrator falsely appropriating
Purdy Calling Of the Hounds 289
someone elses linguistic capital, which may in turn lead to social and/or cul-
tural capital (25657) (in the example she cites, a journalism student named
Dave copies the home page of Craig to turn in for a course assignmentthat
is, to achieve a certain form of cultural capital: a grade). At the same time,
she stresses that the standard academic notion of plagiarism clashes (253)
with online writing spaces that must allow for uncertainty and change in
conceptions of writing (262). Dnielle DeVoss and Annette C. Rosati (2002:
196) further develop this point that online writing spaces change the defni-
tion of text by emphasizing how online texts include sound and integrate
visuals in ways that allow for more complex and fragmented presentation
of connections, topics, and representations within richly layered systems.
So while new technologies are changing what constitutes text, some people
are employing these new technologies to hold texts to intellectual property
standards that rely on print-based defnitions of text. This changing defni-
tion of textuality does not mean that attributing authorship no longer mat-
ters and that multimedia texts are plunderable at will, but it does mean that
notions of plagiarism and intellectual property need to evolve along with this
technology.
Kitalong (1998: 260) cautions against responding to the violence
of plagiarism with more violence. For her, the unquestioned application of
print-based plagiarism doxa to online spaces (260) and use of the Internet
to quickly, invisibly, and oppressively identify and punish suspected plagia-
rizers (259) enact such violence, as both reinforce polarized student/teacher
relationships that cast teachers as uncoverers and punishers of plagiarism and
place students on the defensive (260). The use of online plagiarism detec-
tion services would seem to be an instance of the latter case. Thus, we might
carry Kitalongs application of symbolic violence not only to plagiarism, but
also to the use of plagiarism detection software.
Such refection on the use of plagiarism detection software to combat
certain constructs of plagiarism should also address how the use of pla-
giarism detection software changes the role of the instructor. To return to
the EVE2 function title Call of the hounds, the instructor becomes a
hunter or, in friendlier terms, a sleuth or private investigator. In their study,
Braumoeller and Gaines (2001) even thank a colleague for her impressive
sleuthing skills in tracking down an article on the Internet to determine that
a student had copied from sources listed in his or her bibliography. In this
way, the instructors goal becomes to fnd the elusive smoking gun. While
the role of sleuth might be appealing when applied to archival research, the
position is not appealing when applied to grading. In this role, instructors
290 Pedagogy
devote their time to fnding what is wrong with students papers, or, if you
will, to fnding the scene of the crime, rather than providing substantive,
constructive feedback. Focus shifts from the writing process to the investiga-
tion of the crime. Howard (2001) cogently addresses this issue in greater
detail. She advocates structuring classes and assignments to prevent plagia-
rism rather than spending time trying to catch it. For her the latter creates a
criminal-police relationship, where students are labeled as either criminals
or not and the complex and multiple meanings of plagiarism are ignored. She
insists the role of a teacher is to be a mentor, not a cop. I agree and would add
that neither is the role of a teacher aristocratic hunter or super sleuthunless
perhaps it is to hunt down the most efective pedagogical approach to issues
of plagiarism.
Clearly, instructors sometimes consult plagiarism detection services
with the best of intentions. They rightly want to make students responsible
writers by discouraging them from improperly using the work of others.
Those who market these fee-based services present them as easy solutions to
a dif cult problem, so it is understandable that teachers might be interested
in using them. As illustrated above, however, these plagiarism detection ser-
vices, when used uncritically and as often marketed, are ultimately damaging
to teaching and learning. Technology, of course, need not be detrimental to
writing instruction. Google and similar Internet search engines can be used
for productive pedagogical purposesfor example, to provide students with
rapid access to a large variety of sources on a particular topic. The number
and type of results Google searches return can also help students work to
narrow or broaden a research topic. Perhaps most germane to the discussion
here, such technology can assist students in learning how to incorporate
source material. For example, search services that provide brief abstracts
of results can provide models of efective (or inefective) summaries against
which students can compare their own summaries.
Conclusion: The (In)Visibility of Technology in Issues of Plagiarism
Hornstines response to the allegations against her is particularly instruc-
tive in emphasizing the now undeniable role of technology in plagiarism.
In responding to the Courier-Post editors note that she had not attributed
others language included in her articles, she explains: When fnalizing
my thoughts, I, like most every teenager who has use of a computer, cut and
pasted my ideas together. I erroneously thought the way I had submitted the
articles was appropriate. I now realize that I was mistaken. I was incorrect
in also thinking that news articles didnt require as strict citation scrutiny
Purdy Calling Of the Hounds 291
as most school assignments because there was no place for footnotes or end
notes (2003). While clearly primary here are issues of genre and appropriate
citation conventions, equally prevalent, I would argue, is the role of technol-
ogy. Hornstine connects her writing practices directly to her use of computer
technology, which allowed her to cut and paste her ideas together. How she
used the available technology played a crucial role in how she prepared her
articles and how she came to use outside sources. In this way, she illuminates
how plagiarism is a problem of technology. And she emphasizes that this
practice is followed by most every teenager who has use of a computer.
Hornstine is not alone in cutting and pasting from source to textprecisely
because word processing and Internet technologies facilitate or, as Hornstine
intimates, encourage this practice.
Computer technology has clearly become an integral part of the writ-
ing process, shaping how students compose and integrate sources. Because
of this foundational role, we must be careful, as Bertram C. Bruce and Mau-
reen P. Hogan (1998: 272) urge, that such technologies do not become so
enmeshed in daily experience that they disappear. Bruce and Hogan further
argue that teachers of literacy must consider how new technologies help to
reconstruct reading and writing processes for their students (271)including,
I would add, how such technologies make visible the practices associated
with plagiarism. So rather than panic that students are now rampantly plagia-
rizing at numbers never known before, we must take a step back to consider
the role the writing technologies they use play in their writing processes
and consider how we as teachersrather than hunters, police of cers, or
super sleuthscan pedagogically address these technologies. After all, isnt
our time better spent in the classroom discussing ways to integrate sources
beyond simply cutting and pasting from them and investigating the reasons
for academic citation conventions, rather than at the computer testing stu-
dent papers for unattributed language? Directing our attentions this way, of
course, is not a magic solution to end plagiarism, but doing so keeps us from
responding to plagiarism as an out-of-control plague
9
and keeps us focused
on its connection to technologyand on our role as teachers.
The Hornstine case once again exemplifes how responses to plagia-
rism rely on ways in which technology makes plagiaristic practices visible.
Hornstines reputed plagiarism was made visible by media coverage of her
lawsuit to protect her status as sole valedictorian of her high school. Thus
she, rather than the potentially many other teenagers who engage in the same
cut-and-paste writing practices and were admitted to Harvard, was punished.
A recent article in the New York Times indicates that 38 percent of undergrad-
292 Pedagogy
uate students from a survey of 18,000 students admitted to engaging in these
same cut-and-paste practices, taking material directly from Internet sources
(Rimer 2003). This statistic reminds us that Hornstine is likely not the only
student admitted to Harvard who cuts and pastes from the Internet. This
is not at all to say that intentional plagiarism should go unpunished or that
students now plagiarize more than in the past; as I am suggesting, available
technology, such as plagiarism detection services, now simply makes cases
of plagiarism more easily traceable and detectable. The larger, more crucial
issue is understanding what writing practices available technology enables
and considering what this technology makes visible so that we in English
studies can frame writing instruction around those practicesnot simply
engage in a quest to use existing technology to punish plagiarizers. We need
to be mindful of why we are unleashing the hounds in the frst place.
Notes
I am grateful to Debra Hawhee, Gail E. Hawisher, Peter Mortensen, and Paul Prior for their
invaluable feedback on the study and drafts of this article. I also wish to thank Amy Wan
and Jody Shipka for pointing me to sources that proved important for this article. Finally, I
am thankful to two anonymous reviewers for their insightful comments and suggestions.
1. It is particularly telling that this issue of plagiarism comes up at all in articles that are
really about a student suing to defend her position as sole valedictorian of her high
school. As Rebecca Moore Howard (2000: 47585) suggests in her discussion of
how plagiarism is constructed as a distinctly female violation, the fact that Hornstine
is a woman undoubtedly played a signifcant role in the media blitz surrounding
Hornstines reputed plagiarism and Harvards reaction to it. Furthermore, the shift
in coverage of Hornstine to accusations of plagiarism speaks to the tabloid appeal of
plagiarism and illustrates how plagiarism is often more about publicity than pedagogy.
Articles about the allegations of plagiarism against Hornstine even appeared in
international newspapers, including Londons Guardian (Sutherland 2003). Would
the story have been this popular had it just been about the valedictorian lawsuit?
2. EduTie no longer exists under this name. The services previously ofered by EduTie
are now (as of summer 2004) ofered by a service titled MyDropBox. Little appears
to have changed other than the name. This change in name is particularly interesting
given the allegations surrounding EduTies connection with online paper mills.
3. At the time the tests were run, it was unclear from its promotional materials whether
EduTie maintains students papers in any internal database. Assuming that it did
not, I tested this service. Correspondence received from EduTie dated 28 June 2003,
however, indicates that papers submitted to the service are maintained, albeit with
reputed limited accessibility: Submitted papers are maintained on the server, but
they are accessible only for the institution (or individual user) that submitted them.
Purdy Calling Of the Hounds 293
Also, documents submitted by an institution are checked against all prior submissions
of this institution (Lytvyn 2003, e-mail correspondence). Given this treatment
of submitted documents, which makes student papers accessible not only to the
submitting institution but also to computer systems administrators and company
personnel, the appropriateness of using EduTie as a plagiarism detection service is
questionable.
4. In practice, selecting this Call of the hounds when . . . value seemed to have no
noticeable efect on the search process. Some documents were still determined to be
100 percent plagiarized.
5. The results provided in table 3 are for the medium-strength test of EVE2 because they
represent the services best performance.
6. After all, Mikhail Bakhtin (1986: 8994) stresses that all utterancesincluding texts
are infuenced by all previous utterances that an author has encountered (and future
utterances that the author anticipates). From this perspective, repetition in future texts
of language from texts previously read is, to a certain extent, inevitable.
7. With all of its results, EVE2 appropriately provides the notice, You should always
check EVEs results carefully to make sure they are accurate. For results where the
amount of the document detected to be plagiarized is below 15 percent, the caveat
is even more emphatic: Because plagiarism on this paper is below 15 percent,
please check these results carefully to make sure plagiarism has in fact occurred.
Particularly interesting, though, is that the threshold for greater concern that a
document has actually been plagiarized is only 15 percent.
8. Andrea Lunsford (Lunsford et al. 1996) eloquently summarizes this issue when she
declares that in the academy, individual ownership of intellectual property is the key
to advancement.
9. See Howards Sexuality, Textuality: The Cultural Work of Plagiarism (2000) for
more on the connection between plagiarism and disease.
Works Cited
Bakhtin, Mikhail. 1986. The Problem of Speech Genres. In Speech Genres and Other Late
Essays, ed. Caryl Emerson and Michael Holquist, trans. Vern W. McGee, 60103.
Austin: University of Texas Press.
Braumoeller, Bear, and Brian Gaines. 2001. Actions Do Speak Louder than Words:
Deterring Plagiarism with the Use of Plagiarism-Detection Software. Political Science
Online, APSANet, December. www.apsanet.org/PS/dec01/braumoeller.cfm (accessed
11 June 2003).
Brown, Louise. 2004. McGill Teen Wins Battle over Online Cheat Check. Toronto Star,
13 February. www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/
Layout/Article_Type1&c=Article&cid=1074208210446&call_pageid=968332188492
&col=96 (accessed 13 February 2004).
Bruce, Bertram C., and Maureen P. Hogan. 1998. The Disappearance of Technology:
Toward an Ecological Model of Literacy. In Handbook of Literacy and Technology:
Transformations in a Post-Typographic World, ed. David Reinking, Michael C.
294 Pedagogy
McKenna, Linda D. Labbo, and Ronald D. Kifer, 26981. Mahwah, NJ: Lawrence
Erlbaum.
Carnevale, Dan. 2003. Magazines Essay on Plagiarism Appears to Have Copied Parts
of Another. Chronicle of Higher Education, 28 May. chronicle.com/daily/2003/05/
2003052801t.htm (accessed 1 July 2003).
Cheaters Amok: A Crisis in Americas SchoolsHow Its Done and Why Its Happening.
2004. Primetime Thursday, 29 April. Narr. Charles Gibson, dir. George Paul, prod.
Shelley Ross, writ. Charles Gibson and Chris Whipple. ABC, WAND. Champaign,
IL.
Chester, Gill. 2003. Detection Technology. Joint Information Systems Committee. online
.northumbria.ac.uk/faculties/art/information_studies/Imri/JISCPAS/site/pubs_
detect_pilot.asp (accessed 10 June 2003).
Culwin, Fintan, and Thomas Lancaster. 2000. A Review of Electronic Services for
Plagiarism Detection in Student Submissions. www.ics.ltsn.ac.uk/pub/conf2000/
Papers/culwin.htm (accessed 11 June 2003).
DeVoss, Dnielle, and Annette C. Rosati. 2002. It Wasnt Me, Was It? Plagiarism and the
Web. Computers and Composition 19: 191203.
Ede, Lisa, and Andrea Lunsford. 1990. Singular Texts/Plural Authors: Perspectives on
Collaborative Writing. Carbondale: Southern Illinois University Press.
Foster, Andrea L. 2002. Plagiarism-Detection Tool Creates Legal Quandary: When
Professors Send Students Papers to a Database, Are Copyrights Violated? Chronicle
of Higher Education, 17 May, A37.
Gillis, Theresa, and Janeanne Rockwell-Kincanon. 2002. From Download Your Workload
to the Evil House of Cheat: Cybercheating, Plagiarism, and Intellectual Property
Theft. Cybercheating: Online Northwest: Comparison of Detection Services, 29
August. www.wou.edu/provost/library/staf/kincanon/plagiarism/chart.htm (accessed
11 June 2003).
Gitelman, Lisa. 1999. Scripts, Grooves, and Writing Machines: Representing Technology in
the Edison Era. Stanford, CA: Stanford University Press.
Green, Elizabeth W., and J. Hale Russell. 2003. Harvard Takes Back Hornstine Admission
Ofer: Decision Follows Allegations of Plagiarism by Controversial Admit. Harvard
Crimson Online, 11 July. www.thecrimson.com/article.aspx?ref=348498 (accessed 29
August 2003).
Hawisher, Gail E., and Cynthia L. Selfe. 1991. The Rhetoric of Technology and the
Electronic Writing Class. College Composition and Communication 42: 5565.
Hornstine, Blair. 2003. [Untitled.] Courier-Post, 3 June. www.courierpostonline.com/
static/st060303g.html (accessed 29 August 2003).
Howard, Rebecca Moore. 1995. Plagiarisms, Authorships, and the Academic Death
Penalty. College English 57: 788806.
. 2000. Sexuality, Textuality: The Cultural Work of Plagiarism. College English 62:
47391.
. 2001. Forget about Policing Plagiarism. Just Teach. Chronicle of Higher Education,
16 November. chronicle.com/weekly/v48/i12/12b02401.htm (accessed 1 July 2003).
. Forthcoming. Understanding Internet Plagiarism. Computers and Composition.
Purdy Calling Of the Hounds 295
Kantrowitz, Barbara, and Julie Scelfo. 2003. Harvard to Hornstine: No Way. Newsweek,
21 July, 50.
Kitalong, Karla Saari. 1998. A Web of Symbolic Violence. Computers and Composition 15:
25364.
Laird, Ellen. 2001. Internet Plagiarism: We All Pay the Price. Chronicle of Higher
Education, 13 July. chronicle.com/weekly/v47/i44/44b00501.htm (accessed 1 July
2003).
Lunsford, Andrea Abernethy. 1999. Rhetoric, Feminism, and the Politics of Textual
Ownership. College English 61: 52944.
Lunsford, Andrea, Rebecca Rickly, Michael J. Salvo, and Susan West. 1996. What Matters
Who Writes? What Matters Who Responds? Issues of Ownership in the Writing
Classroom. Kairos: A Journal for Teachers of Writing in Webbed Environments 1.1.
english.tta.edu/kairos/1.1/features/lunsford.html (accessed 12 July 2004).
Lynn, Andrea. 2003. Parrying Plagiarism: Professors Show How New Weapons Can
Curb Cheating. LAS News (Spring): 1.
Lytvyn, Max. 2003. RE: question. E-mail to the author, 28 June.
Martin, Brian. 1994. Plagiarism: A Misplaced Emphasis. Journal of Information Ethics
3.2: 3647.
Osenenko, Derek. 2003. Stories, Essays Lacked Attribution. Courier-Post, 3 June. www
.courierpostonline.com/static/st060303g.html (accessed 29 August 2003).
Rimer, Sara. 2003. A Campus Fad Thats Being Copied: Internet Plagiarism. New York
Times, 3 Sept. nytimes.com/2003/09/03/education/03CHEA.html (accessed 3
September 2003).
Sutherland, John. 2003. Clever Girl Destroyed: Blair Hornstine Was the Pride of
Moorestown HighBut Her Brilliant Career Was Too Good to Be True. Guardian,
21 July. www.guardian.co.uk/g2/story/0,,1002231,00.html (accessed 29 August 2003).
Young, Jefrey R. 2002. Anti-Plagiarism Experts Raise Questions about Services with
Links to Sites Selling Papers. Chronicle of Higher Education, 12 March. chronicle
.com/free/2002/03/2002031201t.htm (accessed 28 June 2003).

Vous aimerez peut-être aussi