Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
Division of Biñan City

BIÑAN INTEGRATED NATIONAL HIGH SCHOOL


Science & Technology, Engineering and Mathematics

KNOWING THE RIGHTFUL ACTION IN SETTING PHOTOGRAPHS: A CASE STUDY ON


THE ASYMPTOTIC LEVEL OF ETHICS AND STANDARD AESTHETIC
VALUE CRITERION ON SUPPRESSING PLAGIARISM IN THE
3RD WORLD INDUSTRY OF PHOTOGRAPHY
AMONG LEARNERS.

In Partial Fulfilment of the Requirements in

Media and Information Literacy

Audea, Ashlin Joy

Agodo, Mark Angelo

Almendra, Monica

Asuncion, John Vincent Miguel

Barboco, Regelyn

Callejo, Eugene Bert

Erejer, Edwin jr

Javier, Richmond Lloyd

Mandapat, John Carlo

Setenta, Antonette

Silva, Princess

Tiaba, Sandra

12 STEM BERNERS-LEE

February, 2020
INTRODUCTION

As the world unite with the prestigious competition in the recent era of

modernization, there is still insist of copying someone’s idea without citation or giving a

credit to the owner. Rightful manner are design to see the real ethics of things for both

entry and fruit of criterion. This is significant in terms of knowing someone and take

handle the situation and digging deeper about the scenario to give a further emphasis to

the matter to be considered. One of the society’s problems in 3 rd world generation of

industry in photography is plagiarism; it causes lot damage for both the name and

integrity of the rightful owner. Plagiarism is the act of stealing another person's words or

writing and not properly citing the quotes or paraphrase. Plagiarism can happen without

realizing what you have done. There are ways around plagiarizing with the most

important way is to always cite quotations and borrowed material. Another form of

copying is Copyright Infringement as being the copying or use of copyrighted material

without consent from the copyright owner. Plagiarism and Copyright Infringement both

deal with taking something that isn't yours without permission and using it as your own,

but they also are pretty different from one another. Plagiarism is centralized around

taking a sentence or how paper of someone's and calling it yours while Copyright

infringement is centralized around using a piece of work that has been copyrighted such

as someone using the idea or work done by the other owner.

One of the greatest attempt in stealing someone photographs lead in a vigorous

and exaggerated discourse publicity. Taking someone’s work and passing it off as one’s

own does not exclusively refer to the most obvious case: somebody uses a photograph

you have taken and claims to have taken it themselves.


This is obviously a case of plagiarism and despite how unsophisticated and

easily detected it is, still overwhelmingly common. This is exacerbated dramatically by

both the transition of photographs to digital as its primary medium and storage, and the

internet. That is to say, a photographer with only physical work and no online presence

is far less likely to be plagiarized. However, the perks of the digital age far outweigh the

cons as the owner would argue is obvious. Direct theft of an image is not the only way

in which a photographer is vulnerable to plagiarism as the ethics demonstrates. Some

personal experience listed in the entries is an example of visual plagiarism and pertains

to the theft of an idea or concept.

The photography industry, just like any creative industry, has always had a

plagiarism problem. Just like authors have lifted from each other to pad their portfolios,

musicians have “borrowed” from their peers to write their songs and designers have

copied one another’s work, photographers have also plagiarized from their colleagues.

Plagiarism in photography is also starting to move beyond the contents of the image

and into other types of media.

This has been highlighted by a pair of recent scandals have put the focus on the

written word rather than photo. It’s no longer enough for a photographer to be good at

their job and advertise themselves well. Most are expected to blog, maintain a regularly-

updated photography site, participate in social media, write large amounts of marketing

content and even create video OR audio content.


This is especially daunting for new photographers, most of whom don’t have a

huge archive of content, text, photo or otherwise, and are starting out with a blank slate.

Still, the big problem is that we’re seeing increased competition in the photography field

and that is forcing photographers to do more with less. As we’ve seen in other fields,

from journalism to scientific research, the more pressure you put on creators to perform,

especially in areas they are not comfortable in, the more likely they are going to turn to

plagiarism and other unethical behavior.

OBJECTIVES

The aim of this case study is to supervise the ethical value of photographs

among learners and how it affects their integrity as a rightful owner into two aspects.

The study also aims to tackle the literacy of learners about the pros and cons of

photography in a public.

The case study also aim to determine the factors affecting the aesthetic standard

of a photo depends on the manner of the photographer to insist it a public condition

without knowing the disadvantage of showcasing it. It also shows the effectiveness of

name, watermark, and pen name to secure the capacity of the owner to protect his

intellectual property without damaging it.

It aims to determine the setting and action plan in giving citation to both of the

photographer and photo in dealing or posting it through poster or online. It gives

advantage in the industry of photography especially in the generation today in knowing

the real world by means of photographs.


STATEMENT OF THE PROBLEM

The case study aim to evaluate the moral condition of the learners in the 3 rd world

generation of photography and assessing them in the ethical standards of criterion. The

study took place on a learner from grade 11 and he is 16 years old who was entering

photography competition for almost 3 years. This man named Gellian due to the privacy

act and confidentiality reasons. The following are the problems to be answered and be

looked up on the case study.

1. What are the criterions and standards sets that affect the moral of the

photographer in setting in a certain photography competition?

2. In what way does the Aesthetic value affect the citation of the owner in

showcasing his masterpiece publicly?

3. Is there a probable significant way to reduce the plagiarism of intellectual

property in photography especially in visual or context?

4. How does the integrity of Gellian as a photographer affects the 3 rd world

industry of photography in knowing its ethics and standard value especially to a learner.

METHODOLOGY

Citation-based plagiarism detection (CbPD) relies on citation analysis, and is the

only approach to plagiarism detection that does not rely on the textual similarity. CbPD

examines the citation and reference information in texts to identify similar patterns in the

citation sequences. As such, this approach is suitable for scientific texts, or other

academic documents that contain citations. Citation analysis to detect plagiarism is a


relatively young concept. It has not been adopted by commercial software, but a first

prototype of a citation-based plagiarism detection system exists. Similar order and

proximity of citations in the examined documents are the main criteria used to compute

citation pattern similarities. Citation patterns represent subsequences non-exclusively

containing citations shared by the documents compared. Factors, including the absolute

number or relative fraction of shared citations in the pattern, as well as the probability

that citations co-occur in a document are also considered to quantify the patterns’

degree of similarity.

String matching is a prevalent approach used in computer science. When applied

to the problem of plagiarism detection, documents are compared for verbatim text

overlaps. Numerous methods have been proposed to tackle this task, of which some

have been adapted to external plagiarism detection. Checking a suspicious document in

this setting requires the computation and storage of efficiently comparable

representations for all documents in the reference collection to compare them pairwise.

Generally, suffix document models, such as suffix trees or suffix vectors, have been

used for this task. Nonetheless, substring matching remains computationally expensive,

which makes it a non-viable solution for checking large collections of documents.

(Ambiguity, Criterion, Aesthetic, publicity and Citation). The following questions to

evaluate were the following.

1. Ambiguity “Did you set a caption in each of the photographs you’ve captured?”

2. Criterion “As a photographer did you set your standard in photography when it

comes to policies and guidelines in a certain competition?”


3. Aesthetic “Do you nurture your capacity as an editor of your own masterpiece

when it comes to photography?”

4. Publicity “Do you often you reveal your photographs in crowd without knowing

its consequences of copying it by someone intentionally or unintentionally?

5. Citation “Did you embossed your name, watermark or pen name in your

photographs?”

Every item was followed by a series of questions depends on its categories by

statement form “During the photography analysis how often…” the respondent

answered all. Following the questions above, which constructed Gellian’s integrity in

knowing the ethical and aesthetic standard value of photography in the modern era of

its industry, she completed a one projective questioning during the general

identification of her morality towards ambiguity in plagiarism. The following methods

used to asses and evaluate her consciousness in tackling the rightful action against

plagiarism of her photographs.

Literal copies, aka copy and paste (c&p) plagiarism, or modestly disguised

plagiarism cases can be detected with high accuracy by current external PDS if the

source is accessible to the software. Especially substring matching procedures achieve

a good performance for c&p plagiarism, since they commonly use lossless document

models, such as suffix trees. The performance of systems using fingerprinting or bag of

words analysis in detecting copies depends on the information loss incurred by the

document model used.


By applying flexible chunking and selection strategies, they are better capable of

detecting moderate forms of disguised plagiarism when compared to substring matching

procedures. Intrinsic plagiarism detection using stylometry can overcome the

boundaries of textual similarity to some extent by comparing linguistic similarity. Given

that the stylistic differences between plagiarized and original segments are significant

and can be identified reliably, stylometry can help in identifying disguised

and paraphrased plagiarism. Stylometric comparisons are likely to fail in cases where

segments are strongly paraphrased to the point where they more closely resemble the

personal writing style of the plagiarist or if a text was compiled by multiple authors.

An increasing amount of research is performed on methods and systems capable

of detecting translated plagiarisms. Currently, cross-language plagiarism detection

(CLPD) is not viewed as a mature technology and respective systems have not been

able to achieve satisfying detection results in practice.

Citation-based plagiarism detection using citation pattern analysis is capable of

identifying stronger paraphrases and translations with higher success rates when

compared to other detection approaches, because it is independent of textual

characteristics. However, since citation-pattern analysis depends on the availability of

sufficient citation information, it is limited to academic texts. It remains inferior to text-

based approaches in detecting shorter plagiarized passages, which are typical for cases

of copy-and-paste or shake-and-paste plagiarism; the latter refers to mixing slightly

altered fragments from different sources.


  Distinctive aspect of source-code plagiarism is that there are no essay mills, such

as can be found in traditional plagiarism. Since most programming assignments expect

students to write programs with very specific requirements, it is very difficult to find

existing programs that already meet them. Since integrating external code is often

harder than writing it from scratch, most plagiarizing students choose to do so from their

peers.

According to Roy and Cordy, source-code similarity detection algorithms in intellectual

property can be classified as based on either

 Strings – look for exact textual matches of segments, for instance five-word runs.

Fast, but can be confused by renaming identifiers.

 Tokens – as with strings, but using a lexer to convert the program

into tokens first. This discards whitespace, comments, and identifier names,

making the system more robust to simple text replacements. Most academic

plagiarism detection systems work at this level, using different algorithms to

measure the similarity between token sequences.

 Parse Trees – build and compare parse trees. This allows higher-level similarities

to be detected. For instance, tree comparison can normalize conditional

statements, and detect equivalent constructs as similar to each other.

 Program Dependency Graphs (PDGs) – a PDG captures the actual flow of

control in a program, and allows much higher-level equivalences to be located, at

a greater expense in complexity and calculation time.


 Metrics – metrics capture 'scores' of code segments according to certain criteria;

for instance, "the number of loops and conditionals", or "the number of different

variables used". Metrics are simple to calculate and can be compared quickly,

but can also lead to false positives: two fragments with the same scores on a set

of metrics may do entirely different things.

 Hybrid approaches – for instance, parse trees + suffix trees can combine the

detection capability of parse trees with the speed afforded by suffix trees, a type

of string-matching data structure.

The previous classification was developed for code refactoring, and not for academic

plagiarism detection, an important goal of refactoring is to avoid duplicate code, referred

to as code clones in the literature. The above approaches are effective against different

levels of similarity; low-level similarity refers to identical text, while high-level similarity

can be due to similar specifications. In an academic setting, when all students are

expected to code to the same specifications, functionally equivalent code, with high-

level similarity is entirely expected, and only low-level similarity is considered as proof of

cheating.

VISUAL PLAGIARISM DETECTION IN CATEGORIES

Nearest neighbor search (NNS), as a form of proximity search, is the optimization

problem of finding the point in a given set that is closest (or most similar) to a given

point. Closeness is typically expressed in terms of a dissimilarity function in terms of

context and visual representations.


 Linear Visual Detection- The simplest solution to the NNS problem is to

compute the distance from the query point to every other point in the database,

keeping track of the in context and visual. This algorithm, sometimes referred to

as the naive approach, has a running time of O(dN), where N is the cardinality of

S and d is the dimensionality of M. There are no search data structures to

maintain, so linear search has no space complexity beyond the storage of the

database. Naive search can, on average, outperform space partitioning

approaches on higher dimensional spaces.

 Space Partitioning- Using a set of points taken from a 3-dimensional space and

put into a BSP tree, and given a query point taken from the same space, a

possible solution to the problem of finding the nearest point-cloud point to the

query point is given in the following description of an algorithm. Strictly speaking,

no such point may exist, because it may not be unique. But in practice, usually

we only care about finding any one of the subset of all point-cloud points that

exist at the shortest distance to a given query point. The idea is, for each

branching of the tree, guess that the closest point in the cloud resides in the half-

space containing the query point. This may not be the case, but it is a good

heuristic. After having recursively gone through all the trouble of solving the

problem for the guessed half-space, now compare the distance returned by this

result with the shortest distance from the query point to the partitioning plane.

This latter distance is that between the query point and the closest possible point

that could exist in the half-space not searched


 Approximation Visual Analysis- An approximate nearest neighbor search

algorithm is allowed to return points, whose distance from the query is at most

times the distance from the query to its nearest points. The appeal of this

approach is that, in many cases, an approximate nearest neighbor is almost as

good as the exact one. In particular, if the distance measure accurately captures

the notion of user quality, then small differences in the distance should not

matter.

 Projected Visual Radial Detector- In the special case where the data is a

dense 3D map of geometric points, the projection geometry of the sensing

technique can be used to dramatically simplify the search problem. This

approach requires that the 3D data is organized by a projection to a two-

dimensional grid and assumes that the data is spatially smooth across

neighboring grid cells with the exception of object boundaries. These

assumptions are valid when dealing with 3D sensor data in applications such as

surveying, robotics and stereo vision but may not hold for unorganized data in

general. In practice this technique has an average search time of O(1) or O(K) for

the k-nearest neighbor problem when applied to real world stereo vision data.

 Vector Visual Approximation File ( VVAF Method )- In high-dimensional

spaces, tree indexing structures become useless because an increasing

percentage of the nodes need to be examined anyway. To speed up linear

search, a compressed version of the feature vectors stored in RAM is used to

prefilter the datasets in a first run calculation within a specific photographs.


RESULTS AND DISCUSSION

The number of images captured and shared each day today is increasing rapidly.

There are cameras everywhere. However, with the increasing number of photographers

and photographs, there is also a rise in the ethical issues in photography. The images

we see today on the internet and other sources are becoming harder to trust as they are

being staged, faked, altered, or copied at an alarming rate. While ethics in media is a

huge topic, and photography is just a small part of it, let us talk about the ill practices in

this field that should avoid among learners.


28
%

37
%

Setting a Plagiarism action among learners ( ages 16-17 )

Figure 1: Pie chart showing the relativeness of setting a plan to reduce

plagiarism in visual among learners

The chart above shows the preventive setting plan in reducing plagiarism among

learners, in addition to visual as a common unethical practice on the rise these days in
the world of photography. its simplest terms means stealing the idea of someone else to

create your own work, without giving any credit to the original source. Photo plagiarism

is on the rise these days. It shows that 28% of the learners leaving a watermark on the

photo when it is needed to copy and paste to not assume the copyright of the owner, in

the other hand the intended plagiarism got the percentage of 37% in actualization of

learners when it comes of direct copying to the source of the image. And last 35% of the

leaners are always set through the ethical standard of photography.

Aesthetic Standard Value


( Learners actualization in Photography)

30
%

20
%

Figure 2: Pie chart showing the Aesthetic Standard value that assess the moral

of the visual among learners

While it is ok to take inspiration from other artists, but copying their work from

every angle, perspective, color, subject, and even the composition, that it looks exactly

like the one from the source is not inspiration but copying and plagiarism.
This has become a norm in the modern world, especially after the advent of

social media. Photographs are plagiarized every single day and many times, the

plagiarized photos become more famous than the original ones. This is highly unethical .

All too often students make careless mistakes that lead to accusations of plagiarism. 

Without intent to cheat, they lose track of citations in the course of research or may not

understand that simply copying a few images from an article or pasting in an uncited

image found through Google Images constitutes plagiarism. Learners form an aesthetic

accusation among photographs that leads to near or asymptotic editing that

accumulates 30% of overall actualization in photography, in addition 20% are setting in

the natural faces of their photographs. Contrary in the primary concern of plagiarism

acts among Visual editing in light room to near possible outline that have 50% in

unbalance of the image.

Visual Property and Image Security


( Reducing plagiarism of intellectual property among learners)

15%
35%

Figure 3: Pie chart showing the significant way to reduce the plagiarism of intellectual

property in photography.
Image theft is loud and clear in some cases, while in others, there are other

means used to take someone else’s image, like altering or manipulating it a little before

using it. No matter how you do it, it is image theft, which is strictly against ethics and the

law. Stealing the photos captured by others or the ones that are the copyright of others.

It is thus very important to be vigilant about citing sources and, in the case of images,

knowing what the creator requires when reusing their work in the academic setting or

the private sector.  Sometimes there is a fine line between plagiarism and fair use of

images so take care to determine any copyright restrictions associated with images you

wish to reproduce. Learners reduce the plagiarism in visual through citation or proper

credit to the owner, 35% of the respondents hold for keeping or storing their photos for

the sake of privacy. 15% are more rely on editorial in approach of the actual image

without narrowing its visual context, on the other hand 50% are including the watermark

of the image when it is intended to use.

Ethics and Standard Value in Photography


( Integrity of the respondent )

5%

45%
50%

Figure 4: Pie chart showing the integrity of the respondent in the 3 rd world

generation of Photography Industry


Another area of ethics in photography to talk about is photo manipulation. While

some protagonists of photography are of the belief that photographs should never be

manipulated, even cropping should not be allowed. At the same time, there are people

who manipulate photos in such a way that the whole meaning of the image changes,

and so does the impact. A number of photography genres are affected by photo

manipulation. Another genre of photography where excessive photo manipulation is

used is fashion photography. From necessary retouching to changing the entire

physique of the models, everything is done seamlessly these days. This breeds

complexes and insecurities in people who follow these stars closely. They put these

heavily photo shopped celebrities on a pedestal, who actually don’t even look like that in

real life. As the ethics proposed the guidelines in photography it sets the value and

standards among young photographers including the learners, 45% are showing their

rightfulness by citing the image and 5% are edited. It is considered to be own by

capturing yours it got 50% in overall percentage.

CONCLUSION

Sometimes taking a step forward is the beginning of the success. Yet another

effect that is related to these steps that takes us to success is unwillingness to take

responsibility. Plagiarism seems like an easy way to passing our courses. As long as we

don’t get caught, we can use what’s already done to get rid of some extra study or a

project. Collaboration is an easy way to advance through our academic life, however

when we won’t be able to find someone to do our work, we do not have a single clue on

where to start. This occurs because we don’t have the experience for doing such works.

The main reason for this lack of experience is not taking any responsibility.
When we take responsibility for completing a work, we dedicate ourselves to

complete it in the best way we can. If we keep on paying attention to what’re we doing,

we’ll get more experience and we’ll know what to do when we confront with difficult

problems. So far, we know that plagiarism has some effects on the committer; also it

has some effects on the people that surround the plagiarizer. In addition to lack of

personal skills, we might lose the respect of the department or workplace that we’re

studying. Plagiarism keeps you from learning, which is the reason you are in college.

Cheating gives you an unfair advantage over other students who are doing their own

work. Being punished for plagiarism can damage your reputation and undermine an

instructor's trust and confidence in you. Peers may lose respect for you and chose not

to work with you on group projects. Even if you are not caught, your self-esteem can be

impacted knowing that you didn't deserve the grade you received. To insert the

photograph into your text with your own explanatory text or the text taken from the

original source beneath it but with no acknowledgment of the original source would be

plagiarism. Even if you have taken a photograph yourself it is wise to cite yourself as the

creator. This will make the source clear to any reader.

Photography copyright laws are there for good reason. If a photographer puts

their time, effort and financial resources into taking that perfect picture, they should be

able to control how the image they create is used. Some photographers might never

want their work to be published anywhere other than their own website. Some sell their

images directly to businesses to use. Others make their images available for purchase

en-masse on sites like Shutterstock. Some photographers allow their images to be used

for free under Creative Commons licensing, which you will learn more about shortly.
RECOMMENDATION

 To Department of Education- Add to the manuals of the learners about the

advantage and disadvantage of Plagiarizing someone works, in addition it may

be informative in a way of having a graphical representation about the under

consequences of photographers when citation doesn’t include when it needed to

copy.

 To Learners- Apply the Ethic and Aesthetic standard value of setting a rightful

action when it comes to photography, rely more on the set of guidelines in

editing, natural captured images, and light room visualization.

 To Photographers- Set a watermark, name, or pen name when the image is

posted through poster or online to prevent copyright infringement .


REFERENCES

 Patrzek, J.; Sattler, S.; van Veen, F.; Grunschel, C.; Fries, S. (2014). "Investigating the Effect of

Academic Procrastination on the Frequency and Variety of Academic Misconduct: A Panel

Study". Studies in Higher Education. 40 (6): 1–16. 

  Leung, C. H., & Cheng, S. C. L. (2017). An instructional approach to practical solutions for

plagiarism. Universal Journal of Educational Research, 5(9), 1646-1652. 

 Sebastian Sattler, Peter Graeff, Sebastian Willen: Explaining the Decision to Plagiarize: An Empirical

Test of the Interplay Between Rationality, Norms, and Opportunity. In: Deviant Behavior. 34, 2013,

S. 444–463

  Roig, M. (2010). Plagiarism and self-plagiarism: What every author should know.  Biochemia Medica,

20(3), 295-300. Retrieved from http://www.biochemia-medica.com/content/plagiarism-and-self-

plagiarism-what-every-author-should-know

 Roig, M. (2005). "Re-Using Text from One's Own Previously Published Papers: An Exploratory Study

of Potential Self-Plagiarism". Psychological Reports. 97 (1): 43–49. 

 Ireland, Chris; Huddersfield, University of; UK; English, John; Huddersfield, University of; UK (1

October 2011). "Let Them Plagiarise: Developing Academic Writing in a Safe Environment". Journal of

Academic Writing. 1 (1): 165–172.

 Colella-Sandercock, J. A.; Alahmadi, H. W. (2015). "Plagiarism education: Strategies for

instructors". International Journal of Learning, Teaching and Educational Research. 13(1): 76–84.

  ‘Plagiarism, Norms, and the Limits of Theft Law: Some Observations on the Use of Criminal Sanctions

in Enforcing Intellectual Property Rights’ (2002-3) 54 Hastings Law Journal 167, 180

 Colella-Sandercock, J. A.; Alahmadi, H. W. (2015). "Plagiarism education: Strategies for

instructors". International Journal of Learning, Teaching and Educational Research. 13(1): 76–84.

 Derrida [1959] quotation: (p.40) "The boundaries between permissible and impermissible, imitation,

stylistic plagiarism, copy, replica and forgery remain nebulous."

 Gabriel, Trip (1 August 2010). "Plagiarism Lines Blur for Students in Digital Age". The New York

Times.

You might also like