Vous êtes sur la page 1sur 5

Referencing and Citation Exercises

Q1. Avoiding Plagiarism


Here is an original quote taken from The information: a history, a theory, a flood by
James Gleick (2011, p. 8):

We can see now that information is what our world runs on: the blood and the
fuel, the vital principle.

Which of the following are correctly referenced and which are plagiarized? State your
reason.

a) Gleick defines information as the blood and the fuel, the vital principle of our
world (2011).

b) Gleick defines information as the ‘blood and the fuel, the vital principle’ of our
world (2011, p. 8).

c) Information is the life blood and vital principle that fuels our world.

d) Information today is viewed by the business world as its very life blood and, when
harnessed correctly, can generate enormous profits.

Q 2. Correct the following Reference List entries:


1. Information Resources Management Association 2013, IT policy and ethics :
concepts, methodologies, tools, and applications, IGI Global, Hershey, USA.
http://www.igi-global.com.ezproxy.lib.uts.edu.au/gateway/book/70666.

2. Reichart, Manfred, & Weber, Barbara (2012). Enabling flexibility in process-aware


information systems: challenges, methods, technologies, Springer-Verlag New
York.

3. Luo-ke, H., De-hai, X. & Yong, C. 2010, ‘Multi-Agent Modeling On Scheduling of


Multi-Variety And Multi-Process Job-Shop’, IEEE 17Th International Conference
Industrial Engineering and Engineering Management (IE&EM), pp. 547-552.

4. Waluyo, A.B., Taniar, D., Rahayu, W., Aikebaier, A., Takizawa, M., Srinivasan, B.
2013, Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks,
Information Sciences volume 230, pages 3-20

1
Q3. Each of the following sentences contains at least one citation
error. Underline the errors and correct as many as you can.
a) According to Gupta, the introduction and widespread application of RFID is likely
to be associated more with a loss of privacy than with an increased sense of
security (Gupta 2010, p32).

b) Katina and McCathie suggest that one of the most attractive offerings of RFID is
its fundamental attribute of not requiring line-of-sight when reading RFID tags.

c) Meanwhile, it is argued that most outsourcing projects do not necessarily make a


profit. (Krishna 2012) points out that the main reasons are the legal and
communication problems that occur in off-shoring situations.

d) Research by Brown and Hu (2013 pp. 10) indicates that there are ‘multiple
possibilities and solutions for cloud-based data management’.

e) Smith & Rossi (2011) quote that it is a fundamental requirement of all


governments to respect the privacy of its citizens and at the same time guarantee
their security.

f) In a lengthy report on data mining in the health sector the authors discuss its
advantages and disadvantages in terms of privacy implications.

g) Holland (1975) pioneered genetic algorithms. The basic approach was further
developed by Goldberg (1989) and Mitchell (1999) and then branched into genetic
programming, Korza (1997) and real-valued genetic algorithms, Rechenberg,
(1973) and Schwefel (1981).

h) In Benoit’s quotation, he claims that ‘information available to the public is


increasing exponentially’ (2013, p. 89).

i) According to Thearling, he said that ‘the collisions between social networking and
privacy are just beginning’ (2010)

j) As Thearling notes that with the increasing collection of personal data by social
networking sites, privacy has become a significant issue (2010).

2
Q 4. Write the Reference List entry for the following:
a) Authors: Nguyen Chan, Walid Gaaloul, Samir Tata
Title: A recommender system based on historical usage data for web
service discovery
Year: 2012
Journal: Service Oriented Computing and Applications
Publisher: Springer London
Volume: 6
Issue: 1
Pages: 51-63

b) Authors: Guoyin Wang, Jun Hu, Qinghua Zhang, Xianquan Liu,


Jiaqing Jhou
Title: Granular computing based data mining in the views of rough
set and fuzzy set
Year: 2008
Conference: International Conference on Granular Computing
Publisher: IEEE
Pages: 67-77

Q5. Arrange the following in correct order for a Reference List


entry:
Marketing Intelligent ‘Dynamic price Dass, M., Jank, pp. 417-445. 2010
Systems using Soft forecasting in W. & Shmueli,
Computing, simultaneous G.
online art
auctions’,

I II III IV V

3
Q6. Create references for each of the articles you have found (i.e.,
10 articles for Ass. 2):
1.

2.

3.

4.

5.

6.

4
7.

8.

9.

10.

Vous aimerez peut-être aussi