Protect Yourself from Plagiarism - Fighting Plagiarism on Your Site
(Page 3 of 3 )
Want to know how to protect yourself, and your pages, from plagiarism? Learn a few ways you can potentially battle against plagiarizers, once discovered.
Direct confrontation. Finding your work on another Web site? First, try communicating directly with the person or site claiming credit for your content. Try sending an e-mail or using an on-site message system to communicate the matter directly.
For this first confrontation, itís best to remain polite. Donít immediately assume that plagiarism was committed intentionally; sometimes, people are genuinely innocent of their own wrongdoing. Often, youíll find that directly telling a site that you were not properly referenced for your work has an effect.
The second warning. Sometimes, the first message doesnít produce the desired effect. If several days go by after youíve sent an initial message and youíve seen no change, itís time to take the issue to the next level.
Write them again, perhaps this time using language thatís a bit stronger. Remind the Web site or individual in question that plagiarism is a serious offense, and that you did not give your consent for your materials to be used.
Time to act. Sadly, sometimes polite conversation canít resolve everything. Have you already confronted the plagiarizer, to no effect? There are many different ways which can you can actually report plagiarism when itís occurring.
First, notify Google (http://www.google.com/contact/spamreport.html) on this issue. By altering the search engines, you can keep other sites from stealing away traffic that rightfully belongs to you. You might also avail yourself of plagiarism forums and other Web sites which take reports of this offense very seriously. If a Web site starts to experience ill effects from their actions, it gives them a lot of strong reasons to re-think what theyíve been doing.
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |