Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Cheating
    1. Examples of cheating include but are not limited to:
      • Copying from another person's work including from online resources.
      • Allowing another person to copy your work, including posting your work to online resources.
      • Using unauthorized materials such as a textbook or notebook during an examination or using technology or online resources to illicitly access unauthorized materials.
      • Using specifically prepared materials such as notes written on clothing or other unauthorized notes, formula lists, etc., during an examination.
      • Collaborating with another person during an examination by giving or receiving information without permission.
  2. Plagiarism
    1. Examples of plagiarism include but are not limited to:
      • Quoting, paraphrasing or even borrowing the syntax of another's words without acknowledging the source.
      • Using another's ideas, opinions or theories even if they have been completely paraphrased in one's own words without acknowledging the source.
      • Incorporating facts, statistics or other illustrative material taken from a source, without acknowledging the source, unless the information is common knowledge.
      • Submitting a computer program as original work that duplicates, in whole or in part, without citation, the work of another.
  3. Fabrication
    1. Examples of fabrication include but are not limited to:
      • Citation of information not taken from the source indicated.
      • Listing of sources in a bibliography or other report not used in that project.
      • Fabricating data or source information in experiments, research project or other academic exercises.
      • Misrepresenting oneself or providing misleading and false information in an attempt to access another user's computer account.
  4. Academic Misconduct
    1. Examples of academic misconduct include but are not limited to:
      • Intentional deceptive action to gain an academic advantage.
      • Submitting written work to fulfill the requirements of more than one course without the explicit permission of both instructors.
      • Changing, altering, falsifying or being accessory to the changing, altering or falsifying of a grade report or form , or other University university forms or entering any university office, building or accessing a computer for that purpose.
      • Stealing, buying, selling, giving away or otherwise obtaining all or part of any unadministered test/examination or entering any university office or building for the purpose of obtaining an unadministered test/examination.
      • Coercing any other person to obtain an unadministered test.
      • Substituting for another student or permitting any other person to substitute for oneself to take a test or examination.
      • Altering test answers and then claiming instructor inappropriately graded the examination.
      • Violating the Network and Computer Use Policy, also known as the "Acceptable Use Policy, Network and System Services" established by Information Resources. Currently available at: http://www.rowan.edu/toolbox/policies/network/.
    2. Below are some examples of violations listed in the policy. Students should refer to the policy for the full list of violations.
      • Each user is solely responsible for all functions performed from his/her account(s) on any system.
      • No user may violate Federal Copyright Law. This means he/she may not alter, copy, translate, transmit, or receive software, music, images, text, or any other information licensed to or copyrighted by another party unless the license or copyright explicitly permits he/she to do so.
      • No user may attempt to monitor another individual's data communications, nor may he/she read, copy, change, or delete another individual's files or software, without the prior permission of the owner.
      • No user may send messages that are likely to result in the loss of the recipient's work, system downtime, or otherwise compromise a remote user's system. This includes, but is not limited to, redistribution of computer viruses or trojan horses.

...