g Text Version
Beauty & Self
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies

Bored? Games!
Take a Quiz
Rate My Photo

Natural Living
Folklore and Mythology
Distance Learning

All times in EST

Clairvoyance: 08:00 PM

Full Schedule
g Computer Careers Site

BellaOnline's Computer Careers Editor


Plagiarism In The Computer Field

Guest Author - Julie L Baumler

As computer professionals, our progress is strongly based on the contributions and prior art of others. We build new applications and tools on top of existing operating systems, libraries, and standards. Even when we start from scratch, we build on prior lessons learned about producing computer software and hardware. This type of borrowing is normal and even expected. Sometimes the use of the contributions of others goes way beyond borrowing to theft of work or plagiarism. This can range from the stereotypical boss who takes all the credit and none of the blame for his or her employees work and ideas to outright passing other people's work as your own. While the former is probably only unethical, the later is likely to be illegal. I've been seeing a lot of the later lately in our field and it's disheartening.

The really sad part about people passing off others' work as their own is that it is so unnecessary. I took a class recently where a distressingly high number of students plagiarized the writing assignment. Given the nature of the assignment, I honestly think that it would have taken more work to find appropriate content to steal than to actually write it. A recent scandal in the Information Security field involves an already poorly respected (but well-known) security professional who published a security book that turned out to be almost entirely copied from various websites (he blamed this on poorly supervised ghostwriters, but nonetheless, it was his name on the cover.) An anthology of the best of the web on each important security topic would probably have sold better (even had the plagiarism and/or ghostwriting not been discovered) and garnered as much or more fame and positive acclaim than actually writing yet another introductory computer security book while allowing the editor to build solid relationships with the contributors. I've caught people stealing my articles to use for web content and in most cases if they had asked I likely would have allowed them to use it and possibly even promoted their site. Plagiarism is getting easier and easier to detect, to the point where getting caught is becoming inevitable. And when you are caught, you lose more than you gained from stealing in the first place. If you cheat your way through school, you are only going to be stuck later when you can't actually produce in the work place.

As computer professionals, our reputation is extremely valuable. While there are some notable exceptions, having a reputation as being dishonest or committing illegal acts is likely to be very detrimental for your employability. Even if you find people willing to hire you, you may not be welcomed or accepted by your peers. From a purely pragmatic viewpoint, plagiarism is a stupid career move. More importantly, as computer professionals, we affect systems that people trust with their innermost thoughts, their business data, even their life. It is up to us to live up to that trust by being personally and professionally trustworthy. If you are unable to do so, I recommend you find a different career.
This site needs an editor - click to learn more!

Add Plagiarism+In+The+Computer+Field to Twitter Add Plagiarism+In+The+Computer+Field to Facebook Add Plagiarism+In+The+Computer+Field to MySpace Add Plagiarism+In+The+Computer+Field to Del.icio.us Digg Plagiarism+In+The+Computer+Field Add Plagiarism+In+The+Computer+Field to Yahoo My Web Add Plagiarism+In+The+Computer+Field to Google Bookmarks Add Plagiarism+In+The+Computer+Field to Stumbleupon Add Plagiarism+In+The+Computer+Field to Reddit

Professional Ethics Resources
Related Articles
Editor's Picks Articles
Top Ten Articles
Previous Features
Site Map

For FREE email updates, subscribe to the Computer Careers Newsletter

Past Issues

Printer Friendly
tell friend
Tell a Friend
Email Editor

Content copyright © 2015 by Julie L Baumler. All rights reserved.
This content was written by Julie L Baumler. If you wish to use this content in any manner, you need written permission. Contact BellaOnline Administration for details.


g features
Becoming A Marketing Technologist and CMTO

What Is Cloud Computing

Technical Writing Makes Information Easy To Digest

Archives | Site Map


Past Issues

Less than Monthly

BellaOnline on Facebook

| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2016 Minerva WebWorks LLC. All rights reserved.

BellaOnline Editor