ࡱ>  ebjbjss .]FFL\A~E< ~AAAAAAA$}DGVAAA###~A#~A##>FA n"?jAA0A?uGx#uG4FAuGFA$#AAx#AuGF O:  The Center for Excellence in Writing Tea Topic: Minimizing Academic Dishonesty Friday, February 16, 2007 How prevalent is academic dishonesty? Here are some alarming findings: A study by The Center for Academic Integrity found that almost 80% of college students admit to cheating at least once. A poll conducted by US News and World Reports found that 90% of students believe that cheaters are either never caught or have never been appropriately disciplined. The State of Americans: This Generation and the Next (Free Press, July 1996) states that 58.3% of high school students let someone else copy their work in 1969, and 97.5% did so in 1989. A study conducted by Ronald M. Aaron and Robert T. Georgia: Administrator Perceptions of Student Academic Dishonesty in Collegiate Institutions found that 257 chief student affairs officers across the country believe that colleges and universities have not addressed the cheating problem adequately. A national survey published in Education Week found that 54% of students admitted to plagiarizing from the internet; 74% of students admitted that at least once during the past school year they had engaged in "serious" cheating; and 47% of students believe their teachers sometimes choose to ignore students who are cheating. (above statistics compiled from Plagiarism.org) In a Dec., 2006 Penn State survey at all campuses, ~40% of students say that they know someone who's cheated on an exam. (source: John T. Harwood, PSU Senate Committee on Computing and Information Systems) Some faculty and administrator attitudes toward cheating: A study conducted by Donald L. McCabe titled Faculty Responses to Academic Dishonesty: The Influence of Honor Codes found that 55% of faculty "would not be willing to devote any real effort to documenting suspected incidents of student cheating". "With respect to cheating, I'm just in denial. I just don't want to deal with it because I know it is a huge problem." -- San Luis Obispo professor, as reported in Net Learning. "Who wants to sit around looking for websites trying to find out if a paper is plagiarized or not... pretty soon you're a private investigator." -- a Stanford University professor, from an article in TechWeb News. "[Plagiarism] is one of those areas in the academy that no one wants to talk about and is often rewarded for not addressing actively." -- an Associate VP of Student Life, as posted in The Chronicle of Higher Education's "Colloquy." "Too few universities are willing to back up their professors when they catch students cheating, according to academic observers. The schools are simply not willing to expend the effort required to get to the bottom of cheating cases" -- as stated by The National Center for Policy Analysis. (above quotes and statistics from Plagiarism.org) Handout from Turnitin.com Instructor Guidelines for Plagiarism Prevention Explain what plagiarism means Of course, most students will tell you they already know what plagiarism means. But do they really understand the difference between a legitimate paraphrase and a plagiarized one? Or between a proper citation and an improper one? Spending some time during the beginning of the course to explain plagiarism may go a long way toward preventing future problems. You may also wish to distribute examples of plagiarism and legitimate citation, and then go over the differences together. This will clarify some of the common misconceptions about plagiarism and reduce the likelihood of honest mistakes, while at the same time showing how serious you are about the issue. Finally, you can direct your students to our website, where they can take a quiz on the difference between plagiarism and legitimate citation. Explain whats Wrong about Plagiarism Without instruction, it may be hard for your students to understand the seriousness of plagiarism. Their response is often: How can copying some words actually hurt anyone? But the reality is that plagiarism is an act of fraud that involves both stealing (anothers intellectual property) and lying (implying that the work is ones own). This undermines the principles of trust and respect that make education possible. But when they plagiarize, students hurt more than just their instructors and the person from whom they steal. They also hurt themselves, because they fail to acquire the research, analytic, and writing skills that they would have learned by doing the assignment honestly. Finally, plagiarism also victimizes those classmates who have legitimately earned their grades and degrees, and who will be competing with the plagiarizer for school admissions and jobs. III. Make the Consequences Clear Students often do not know just what they risk when they plagiarize. Begin your course by establishing a clear policy on plagiarism. Give very specific information about the penalties involved. You may want to create a specific policy for your courses in addition to your institutions general policy. Try telling your students, for example, that any case of plagiarism will result in immediate failure of the paper, and that a second instance will result in failure of the course and possibly expulsion, will doubtless make them think twice about it. Be sure to cite your policy on any research assignments as a reminder. IV. Start off with Clear Expectations First, let your students know you expect them to produce thoughtful, original work. Students are often under the illusion that the goal of their assignments is to collect the best information possible. Explain to them that while good research is critical, you are even more interested in their ability to transform the information they find into an original and persuasive argument than in their ability to come up with the most or best sources. The skills they learn in working to further the ideas and arguments of others are a valuable part of what they will take away from their assignments. Knowing this may help them understand the value of original work. You may also want to establish some rules in advance: Should your students collaborate? Will you require separate works cited pages and bibliographies? How many sources will they be required to consult? How many sources will they have to include in their paper? Will online sources be sufficient, or would you like your students to find printed material as well? Starting off with clear guidelines will prevent most of the confusion that leads to unintentional plagiarism, and allow no excuses for the intentional kind. Assign Specific Questions or Topics Provide a list of topics or questions that you would like your students to address in their papers. The more particular the questions, the less likely that your students will find papers already written on them. If you worry that lists like this restrict your students creative freedom, you might want to add an option that allows your students to develop their own topics in consultation with you or a teaching assistant. Require Students to Submit Thesis Statements, Introductions, Outlines, or Drafts One of the best ways to ensure that your students work is original is to check it during the process of composition. Since rough drafts, etc., are not as readily available for copying as finished papers, the simple fact that they have to submit one will encourage most of your students to produce original work. It often takes more work to forge these materials than it does to produce them originally. Also, if you have time to comment on what they submit, you can monitor how they respond to your feedback and whether their papers show the flexibility of works-in-progress. Have your students Annotate their Bibliographies Ask your students to summarize the content and usefulness of their sources in a few sentences. Be sure to tell them that copying library abstracts or blurbs from the backs of books is not permissible. Emphasize that the annotation has to be in their own voice and words, and should specifically discuss the relevance of the source to their research. This exercise should take no time at all for students who have done their work honestly. Plagiarizers, however, will find it considerably more difficult. Assign Oral Presentations Have your students answer questions about the process of researching and developing their ideas. This is also an excellent opportunity to ask them specific questions about their papers, and to bring up passages that seem suspicious. Questions like This quotation here is a little unclear. Could you tell me a little more about the article from which you got it? can be very effective in determining how much work the student did without offending or seeming suspicious. Require Recent and Printed Sources Most papers from online paper mills and other cheating databases are already several years old at best. Having your students integrate at least one contemporary source in their paper will keep your students up to date on the issues and help ensure legitimate research and work. Assign a Paragraph on the Composition Process If you do not have your students give oral presentations or turn in drafts during the composition process, you may want to have them submit a paragraph explaining how they arrived at their topic, how they began researching it, what criteria they used for evaluating their sources, and what they learned from the research project. This will give you an idea of how well they have comprehended the material and the degree of fluency they have in speaking about it. XI Encourage Concision Students often try to fill space by borrowing material once they have finished with their own ideas. Tell your students that it is very obvious when they pad their papers to fill up page requirements. Encourage them to be as concise as possible, focusing on the substance of their claims rather than the length of their writing. Make sure they know the trick to writing a long research paper lies in coming up with a thesis or argument which requires the assigned number of pages to develop, and not in drawing out the points they make or citing multiple sources to prove a single idea. [http://plagiarism.org/research_site/e_home.html] Jessicas ideas for plagiarism prevention: XII Hold mandatory conferences before the papers due date. Talking with students about their paper prior to its due date can be incredibly useful in heading off plagiarism. First of all, students who intend to plagiarize may avoid these conferences. In some instances, their avoidance serves as a flag to their possible intentions. For students who do come to the conference with a suspected plagiarized draft, you can warn them off by asking pointed questions about source material or about the papers content in general. You will let them know that youve got your doubts about the papers originality and point them in the right direction in terms of proper citation practice. For those students who may plagiarize because they lack direction or ideas, conferences can provide that direction and encouragement these students might need to prevent their panicked last-minute cheating. XIII Make lots of sample drafts available for students to review Some students plagiarize because they dont know what they are supposed to do. Offering samples of successful assignments helps them to see how they might pattern their own responses to the assignment. It also shows them how a generic paper mill essay, article from the Internet, or paper borrowed from a peer is patently inappropriate, given the sample drafts tailored, pointed responses to the assignment prompt. XIV Be idiosyncratic This is not usually something to be lauded in an assignment or as a good teaching practice. Sometimes, though, you can build in certain style or formatting requirements that make plagiarizing more trouble than its worth. Some examples: ask students to develop an extended metaphor (maybe giving even more specific parameters); require them to provide certain ranges of reference; ask them to use a semicolon three times, etc. You might change these requirements semester to semester so that a paper might not be recycled. Asking for these idiosyncratic requirements can be tricky; you dont want to bog down the students with silly requirements, but rather challenge them to expand their writing capacities. XV Consider using online an plagiarism prevention/detection service. Penn State currently has a license with Turnitin.com, online plagiarism prevention and detection software that is integrated with ANGEL. While the Penn State faculty who have used Turnitin view the program favorably and the University clearly endorses this online plagiarism detection service (see report below), there are still some lingering questions about fair use and intellectual property that the service raises. For instance, is it appropriate for students work, which they are compelled to submit to Turnitin, to become part of a private companys product and profit stream, especially when the students are not compensated? Moreover, does the service disrupt the teacher-student relationship by overemphasizing detection and policing and focusing too much on the final product rather that the process of writing? The next few pages include additional information and resources on Turnitin. SENATE COMMITTEE ON COMPUTING AND INFORMATION SYSTEMS Turnitin: A Tool to Assess Student Plagiarism (Informational Report) Introduction Turnitin.com ( HYPERLINK "http://turnitin.com" http://turnitin.com) is a web-based plagiarism detection and prevention system developed and owned by Turnitin.com, Inc. Penn State licensed Turnitin ( HYPERLINK "http://www.turnitin.com" www.turnitin.com) in June 2005. Turnitin is available to all Penn State faculty members. The service is administered by Information Technology Services (ITS). As of November 2006, PSU faculty members have submitted for processing by Turnitin about 30,000 student papers written by 6,230 students. How Turnitin works Upon submission of a paper to the service, Turnitin compares a students paper with four databases: Proquest (a database of books and journals), the World Wide Web, a database of the papers already submitted to Turnitin by students at other universities, and a database of papers previously submitted to Turnitin by PSU students and faculty members. Turnitin generates an originality report for the instructor or student when the analysis is complete. The report indicates the percentage of unoriginal content. This is the percent of the text that was found elsewhere and is, hence, unoriginal. That is, if the originality report scores the paper as 100%, then the paper is 100% copied and there is 0% original content. It is the faculty members discretion whether or not a student is allowed access to the originality report generated from analysis of their paper. Turnitin stops searching for a match for a particular text segment when it finds the first match with content in one database. The match may or may not be that actual text source used by the student. In addition, Turnitin will identify segments as unoriginal when it matches a segment even though the source of the matched segment may be property cited in the paper. Thus, faculty members must take this into consideration in their determination of whether plagiarism has occurred. Results from Turnitin The following table illustrates the results of originality reports generated by submission of 29,878 papers by PSU faculty in the time period between the inception of the PSU system (June 2005) and November 2006. No matches0-24%25-49%50-74%75-100%Reports8,98815,9533,0335581,346Percent30%53%10%2%5% These data indicate that about 5% of the papers were markedly unoriginal, meaning that between 75% and 100% of the content was found elsewhere. About 2% of the papers were 50-74% unoriginal. In other words, about 7% of the papers had a significant portion of unoriginal content. About 30% of the papers were completely original, or at least no source was found for the students work. Faculty Survey In January 2006, ITS conducted a survey of faculty that had used Turnitin. There were 65 responses to the survey. The following table illustrates the results from this survey. QuestionResponseRespondents1. Will you use Turnitin.com again in your courses?No will not use1322.8%Yes will use4477.2%Total57100.0%2. Were you able to confirm any cases of plagiarism using Turnitin.com?No plagiarism detected2137.5%Some plagiarism detected2544.6%Major plagiarism detected1017.9%Total56100.0%3. Did you submit papers from all students or only those papers you viewed as suspicious?Submitted All4072.7%Submitted Suspicious1527.3%Total55100.0%4. Did you submit drafts of papers or only final versions?Final only3463.0%Drafts and finals1935.2%Drafts only11.9%Total54100.0%5. Did any of your students protest having their papers submitted to Turnitin.com?No objections4688.5%Yes few protested35.8%Yes most protested35.8%Total52100.0%6. Did you alert students of plagiarism problems found by Turnitin.com and allow them to make corrections? Alerted no corrections2144.7%Alerted allowed corrections1940.4%No alert no corrections714.9%Total47100.0%7. Did you allow students to access their originality reports?No, not see reports2953.7%Yes, see reports2546.3%Total54100.0%8. Did you consider the results of the originality report when calculating grades?Did not deduct points2343.4%Deducted points2954.7%N/A, Student self submitted11.9%Total53100.0%9. Did Turnitin.com make it easier to verify the originality of written works?Yes easier4273.7%Not easier1526.3%Total57100.0% Interpretation of data and best practices for use of Turnitin Overall, the survey indicates that faculty members were pleased with Turnitin. They found it made the task of verifying originality easier and they will use Turnitin again. Respondent comments were positive and included suggestions for new features and/or improvements in the program. The comments also indicate that PSU faculty use the tool in different ways and have different attitudes toward the relative importance of detection vs. remediation. It should be noted that faculty members use the Turnitin information in different ways (note the responses to question #8). A system such as Turnitin is only as good as the databases it searches and the algorithms it uses. Furthermore, the data contained in the databases used by Turnitin will always, to some extent, lag behind (in time) the data available through the Internet even though Turnitin claims to add 30,000 pages of web data to its database each day. As a result, false negatives (i.e., a low originality score when a paper contains significant plagiarism) are to be expected to occur much more frequently than false positives. Because of the possibility for false negatives, faculty members should use their best judgment when evaluating papers for incidences of plagiarism. Other popular string match tools, such as common Internet search engines (Google, Ask, etc.) can also be a valuable aid to complement the capabilities of Turnitin. In searching for unoriginal content, Turnitin uses only data available in its databases and, hence, it cannot detect plagiarism of unpublished work or other work that is not available to Turnitin. This essentially contributes to the occurrences of false negatives. The algorithms used by Turnitin search for text string matches and not numerical matches. It should be recognized that Turnitin is designed to detect plagiarism of text and not fraud or data falsification. Also, it does not have any ability to detect plagiarism of other data assets, such as images or other objects of graphical design. The syllabi for courses should indicate how Turnitin will be used. Some faculty may choose to submit all papers or only the papers that do not seem to be original. Analysis of accumulated originality reports indicates that there is a small but significant incidence of plagiarism at Penn State. Faculty members should take active measures to reduce these occurrences and they should consider using Turnitin as a tool to detect plagiarism. ITS plans to monitor the status of the accumulated originality reports on an annual basis to determine longitudinal trends at Penn State. Turnitin can be used as a means to teach students how to work with information sources and to raise awareness of paraphrasing and quoting skills to avoid plagiarism. Faculty members need to be proactive to ensure that students know the proper way to use others work, both in print and digital forms. Toward this end, ITS has an effective collection of resources ( HYPERLINK "http://tlt.its.psu.edu/suggestions/cyberplag/" http://tlt.its.psu.edu/suggestions/cyberplag/), for instance, and faculty members should be sure that all students have a chance to practice responsible research skills. Additional information on obtaining a Turnitin account can be submitted to  HYPERLINK "mailto:turnitin@psu.edu" turnitin@psu.edu. Accounts are limited to staff and faculty who are actually teaching a course and only "...psu.edu" e-mail addresses are acknowledged at this address. Respectfully submitted, Russell C. Scaduto (Chair) Jo Anne Carrick (Vice Chair) Yaw Agawu-Kakraba Thomas Benson Thomas Bruening Qiang Du Stephen Garguilo (Student Represenative) John T. Harwood Jeff Kuhns Willie Ofosu Eric Paterson Richard J. Simons How to set up Turnitin for your class: 1. Go to:  HYPERLINK "http://tlt.its.psu.edu/turnitin/Faculty.html" http://tlt.its.psu.edu/turnitin/Faculty.html This site has lots of useful information about how Turnitin works, what to put on your syllabus, how to set up your Turnitin account, and how to interpret Turnitin data reports. 2. Go to:  HYPERLINK "https://www.work.psu.edu/access/turnitin/TurnitinQuickStart.pdf" https://www.work.psu.edu/access/turnitin/TurnitinQuickStart.pdf You have to go to this page in order to get the account/class ID and the join password for PSU. These codes are found at the middle of the first page. Once you go to turnitin.psu.edu and type in these codes, youll be prompted to create accounts for your class(es) and will be given a code for each class. You will then need to set up your own course password, which you will share with your students. Be sure to write down both your course code and your password. 3. If you have any problems, contact  HYPERLINK "mailto:turnitin@psu.edu" turnitin@psu.edu . You will usually get a quick response to your question. Some additional resources on plagiarism and academic integrity:  HYPERLINK "http://ccccip.org/pds" http://ccccip.org/pds An annotated bibliography on Plagiarism detection services compiled by the Conference on College Composition and Communications Intellectual Property caucus. The articles listed in this bibliography will help to acquaint you with the debate about the ethics and efficacy of plagiarism detection services.  HYPERLINK "http://www.plagiarism.org" www.plagiarism.org Sponsored by turnitin.com, this site features lots of information and teaching materials to combat academic dishonesty. Many of the handouts are in downloadable Word format and can be easily printed for your students or placed on ANGEL.  HYPERLINK "http://www.Turnitin.com" www.Turnitin.com Provides more information for users of Turnitin.com. Explains the services features that go beyond plagiarism detection.  HYPERLINK "http://tlt.its.psu.edu/turnitin/PolicyResources.html" http://tlt.its.psu.edu/turnitin/PolicyResources.html Penn States Academic Integrity Policy Resources ` y ( 2  R &ac &'qrejع𩚍n]]!hhUd B*CJOJQJph hhUd CJOJQJ^JaJhhUd >*CJOJQJhhUd CJOJQJhhUd B*OJQJphhhUd >*CJ$OJQJaJ$ hhUd CJOJQJ_HaJhhUd 6CJOJQJhhUd CJOJQJhhUd OJQJhhUd 5OJQJhUd 8gL " R &ac] & FgdUd  & FgdUd " & F & 0` P@1$7$8$H$gdUd ^gdUd  & FgdUd  & FgdUd ^gdUd gdUd 'Brewdd-DM [$\$`gdUd -DM  & F-DM ^gdUd 8dd-DM [$\$^8 & Fdd-DM [$\$^gdUd $a$gdUd $a$^gdUd  & FgdUd jm+0E0t00324558888<<<<<<===ʽۮzlalTzTIhUd 5OJQJ^JhhUd OJQJ^JhUd >*OJQJ^JhhUd >*OJQJ^JhUd OJQJ^JhhUd 56CJOJQJhhUd 5OJQJhhUd 5CJOJQJhhUd CJOJQJaJhhUd CJOJQJ!hhUd B*CJOJQJph!hhUd B*CJOJQJph%hhUd B*CJOJQJaJph-!!##A&r&q((i**++--8^88dd-DM [$\$^8gdUd  & Fdd-DM [$\$^ 80dd-DM [$\$`08dd-DM [$\$^8----0E0F0G0t003245588<<<<<<<===$a$gdUd gdUd gdUd 0^0gdUd 8^8== =!=-=@=B=C=D=W=X=_=`========>>>>>>>?0?5?H????????#@@@%AIA٩٩zmmmmhshUd OJQJ^JhshUd 5OJQJ^J'jhhUd OJQJU^JhhUd OJQJ^JhLm~hUd 0JOJQJ^J'jhhUd OJQJU^JhhUd OJQJ^JjhUd OJQJU^JhUd OJQJ^JhhUd 5OJQJ^J*=4?5?H?BBDDDEEEEEEEE $$Ifa$gdUd gdUd IAAABBDDDDEEEEEEE FF G GtGxGGGGG9H:HYHHHHHHHHHII9I;I]I_IIIIIIJJ J&J1JhhUd OJQJ^J_HhhUd 5OJQJ^J_Hh!hUd 5OJQJ^JhJhUd OJQJ^JhhUd 5OJQJ\^JhhUd 5OJQJ^JhUd 5OJQJ^JhhUd OJQJ^JhUd OJQJ^J4EEEEEEEE^RRRRRR $$Ifa$gdUd kd:$$IfTlֈ8  !Tp   !44 laTEEEEEEEE^RRRRRR $$Ifa$gdUd kd$$IfTlֈ8  !Tp   !44 laTEEEwGxGG9H:H^YYYYYP hgdUd gdUd kd$$IfTlֈ8  !Tp   !44 laT:HCHLHXHYHHHHHueU$$If]a$gdUd $$If]a$gdUd tkdD$$IflF t" & & "    44 lap $IfgdUd $$Ifa$gdUd HHHHHHqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"`  &"44 lap(HHHHHHqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(HHI0I3I9IqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(9I:I;ITIWI]IqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"`  &"44 lap(]I^I_IyI|IIqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(IIIIIIqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(IIIIJJsjjZJ$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"   &"44 lap(JJJJ J&JqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"`  &"44 lap(&J'J(J.J1J8JqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"   &"44 lap(1J8J9JsJtJJJJJJJJJK K7K9KRKTKnKpKKKKK LL4L6LVLXLhLiLLLLLLLLLLLLLfMgMMMMMMMNNNN2N4NDNENFN`NzNNNNNNNNNOOKPcPkPhbhUd 5OJQJ^JhUd 5OJQJ^JhUd OJQJ^JhhUd OJQJ^J_HhhUd OJQJ^JL8J9JtJJJJqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"   &"44 lap(JJJJJJqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"`  &"44 lap(JJJJJJqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(JJJJJJqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(JJ K.K1K7KqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kdp$$Ifl4\ lt"   &"44 lap(7K8K9KKKMKRKqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kdl$$Ifl4\ lt"`  &"44 lap(RKSKTKgKiKnKqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kdh$$Ifl4\ lt"   &"44 lap(nKoKpKvKyKKqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kdV$$Ifl4\ lt"   &"44 lap(KKKLL LqbYI9$$If]a$gdUd $$If]a$gdUd $IfgdUd $ h$IfgdUd kdD$$Ifl4\ lt"   &"44 lap( LLL+L.L4LqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd@$$Ifl4\ lt"`  &"44 lap(4L5L6LNLPLVLqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd<$$Ifl4\ lt"   &"44 lap(VLWLXL^LaLhLqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd*$$Ifl4\ lt"   &"44 lap(hLiLLLLLqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(LLLLLLqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"`  &"44 lap(LLLLLLqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(LLGM]M`MfMqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(fMgMhMxM{MMqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"`  &"44 lap(MMMMMMqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(MMMMMMqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(MMNNNNsjjZJ$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"   &"44 lap(NNN)N,N2NqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd$$Ifl4\ lt"`  &"44 lap(2N3N4N:N=NDNqhhXH$$If]a$gdUd $$If]a$gdUd $IfgdUd kd $$Ifl4\ lt"   &"44 lap(DNENFNGNHNINNPPRRqhcccc[c[c & F gdUd gdUd L]LgdUd kd!$$Ifl4\ lt"   &"44 lap( kPsPPQ!Q$U.UrVW3W.XXXXYYcYxYYYYZ.Z/ZjZkZlZZZZZ[c[d[x[[[[[靱l'ja#hhUd OJQJU^JjhUd OJQJU^JhhUd 0JOJQJ^J'j"hhUd OJQJU^J!jhhUd OJQJU^JhhUd OJQJ^Jh=hUd OJQJ^JhshUd OJQJ^JhhUd OJQJ^JhUd OJQJ^J&RTTU UsVtVWWXXgYhY[[5\6\7\O\P\k\\\\\\\\]gdUd  & F gdUd [[[[\\\3\1]2]4]\]h]i]]]]]]]^^^̿ٿٲv_RvCjhhUd OJQJUhhUd 0JOJQJ,j$hhUd B*OJQJUphhhUd B*OJQJph&jhhUd B*OJQJUphhhUd 5CJOJQJhhUd OJQJhhUd OJQJ^JhJhUd OJQJ^JhshUd OJQJ^JhUd OJQJ^JjhUd OJQJU^JhzhUd 0JOJQJ^J]] ]2]3]4]5]]]g]]^^"_`aaaAcqd*eeegdUd gdUd ^^^ _!_aa?a@aAaQaRaaaaaaa b b@cAcBcicjckc}c~cqdrdddddd*e+eɽɫѽɟޔޔɽpѽɽ^ѽ#j)hT-hUd OJQJU#j4(hT-hUd OJQJU#jg'hT-hUd OJQJUhhUd OJQJhhUd 5OJQJ#j&hT-hUd OJQJUjhUd OJQJUhUd OJQJhT-hUd 0JOJQJjhhUd OJQJU#j+%hT-hUd OJQJU$+emeneoeeeehT-hUd 0JOJQJjhhUd OJQJU#j)hT-hUd OJQJUhhUd OJQJ,1h/ =!"#$% DyK yK (http://turnitin.comDyK yK 0http://www.turnitin.com$$If!vh55T5p5 5 5 #v#vT#vp#v :V l!,55T5p5 / T$$If!vh55T5p5 5 5 #v#vT#vp#v :V l!,55T5p5 / T$$If!vh55T5p5 5 5 #v#vT#vp#v :V l!,55T5p5 / T$$If!vh5 5 5 #v #v #v :V l"5 5 5 9/ /  ap$$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ / /  ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/ /  ap($$If!vh5 5 55#v #v #v#v:V l4"+5 5 559/  / / / ap(DyK yK \http://tlt.its.psu.edu/suggestions/cyberplag/DyK yK 0mailto:turnitin@psu.edu)DyK -http://tlt.its.psu.edu/turnitin/Faculty.htmlyK Zhttp://tlt.its.psu.edu/turnitin/Faculty.htmluDyK @https://www.work.psu.edu/access/turnitin/TurnitinQuickStart.pdfyK https://www.work.psu.edu/access/turnitin/TurnitinQuickStart.pdfDyK turnitin@psu.eduyK 0mailto:turnitin@psu.eduDyK http://ccccip.org/pdsyK ,http://ccccip.org/pdsDyK www.plagiarism.orgyK 4http://www.plagiarism.orgDyK www.Turnitin.comyK 0http://www.Turnitin.comIDyK 5http://tlt.its.psu.edu/turnitin/PolicyResources.htmlyK jhttp://tlt.its.psu.edu/turnitin/PolicyResources.html^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA`D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List B^@B  Normal (Web)dd[$\$6B@6  Body TextCJ$aJ$JC@J Body Text Indent$`a$VR@"V Body Text Indent 28h7$8$^8`h>2>  Main Text]^LBL  JTH Innocent]^OJQJ6U@Q6  Hyperlink >*B*ph4b4 Header  !4 r4 Footer  !.).  Page NumberFVF FollowedHyperlink >*B* phPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] ]j=IA1JkP[^+ee369;Iacef-=EEE:HHHH9I]IIIJ&J8JJJJJ7KRKnKK L4LVLhLLLLfMMMMN2NDNR]e4578:<=>?@ABCDEFGHJKLMNOPQRSTUVWXYZ[\]^_`bd 5C5W5566.RkRRcSSShUUUVV WY@YQYYY ZA[j[}[q\\\*]n]]]XXXXXXXXXXX8@0(  B S  ? _Hlt151789797 _Hlt151789798 _Hlt153183523 _Hlt153183524 _Hlt153962413 _Hlt153962414 _Hlt33074567 6 666{R{RS]@@@@@@@ 6 666|R|RS]efSFSSSSSSSS[TbTTTTTTTTTTTTU UUCUKUVVGVOVnVvVV!W"W%W&W*W'X)XYRYY ZZ'ZA[~[[[q\\\\*]]]]]#(q s H y dir'%'--00??RR!X'X\(]]33333333333333333 5X5Y5566cSSV!WYRYY ZA[~[q\\*]]] ~VH>*v`S*HB0=k*fEH|I{W>b&smF6,pZe+eDF0`0o(.hh^h`.8L8^8`L.^`.  ^ `. L ^ `L.xx^x`.HH^H`.L^`L.h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhdd^d`OJQJo(hHh44^4`OJQJo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHh^`OJQJo(hHohtt^t`OJQJo(hHhDD^D`OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJQJo(hH0`0o(.hh^h`.8L8^8`L.^`.  ^ `. L ^ `L.xx^x`.HH^H`.L^`L.htt^t`OJQJo(hHhDD^D`OJQJo(hHoh  ^ `OJQJo(hHh  ^ `OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHhTT^T`OJQJo(hHh$$^$`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHhpp^p`OJQJo(hHoh@ @ ^@ `OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHh^`OJQJo(hHhPP^P`OJQJo(hHoh  ^ `OJQJo(hHh^`OJQJo(hHh` ` ^` `OJQJo(hHoh0 0 ^0 `OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hHhpp^p`OJQJo(hHh@@^@`OJQJo(hHoh^`OJQJo(hHh00^0`OJQJo(hHh  ^ `OJQJo(hHoh  ^ `OJQJo(hHh^`OJQJo(hHhpp^p`OJQJo(hHoh@@^@`OJQJo(hHh^`OJQJo(hHh^`OJQJo(hHoh^`OJQJo(hH smEW>b+e,p`S*I ~VH>*=k* tPhi                                            F>                                             Ud ]]@Q]x@Unknown G* Times New Roman5Symbol3. * ArialA. Trebuchet MSYM TrebuchetMSTrebuchet MS5. *aTahoma7.  Verdana?= * Courier New;WingdingsA BCambria Math"1hffO /O /!24d]]C 2qHP ?2! xxFrom Plagiarismjohara 4         Oh+'0t  0 < HT\dlFrom Plagiarismjohara Normal.dotm 2Microsoft Office Word@F#@ n@ n O՜.+,D՜.+,@ hp  P.S.U./] From Plagiarism Title 8@ _PID_HLINKSA<BY5http://tlt.its.psu.edu/turnitin/PolicyResources.htmlt_Chttp://www.turnitin.com/t6!http://www.plagiarism.org/tUhttp://ccccip.org/pdst+mailto:turnitin@psu.edut ?@https://www.work.psu.edu/access/turnitin/TurnitinQuickStart.pdft[ -http://tlt.its.psu.edu/turnitin/Faculty.htmlt+ mailto:turnitin@psu.edutCE.http://tlt.its.psu.edu/suggestions/cyberplag/t_Chttp://www.turnitin.com/tChttp://turnitin.com/t  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgijklmnopqrstuvwxyz{|}Root Entry F nData h+1Table~GWordDocument.SummaryInformation(DocumentSummaryInformation8CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q