'Cloning' Most Common and Severe Form of Plagiarism, Survey Finds

Turnitin, a company that develops plagiarism detection and prevention tools, has released the results of a survey that identifies 10 types of plagiarism and ranks them according to frequency and severity. The survey included educators at the middle and high school and post-secondary levels.

Turnitin assigns a clever name to each of the 10 types of plagiarism to make them easier to understand and discuss. Blatant plagiarism, or the act of copying somebody else's work word-for-word, is called cloning, and according to the educators surveyed, it is both the most common and problematic form of plagiarism.

Two other common and problematic forms of plagiarism are called ctrl-c, work that copies significant portions from a single source without alteration or attribution, and mashup, work that copies material from multiple sources without alteration or attribution.

The survey found the least common forms of plagiarism to be the 404 error, work that includes inaccurate or fictitious citations, and the hybrid, work that includes copied passages with and without citation.

The least problematic forms of plagiarism were found to be the remix, work that paraphrases multiple sources, and the re-tweet, work that uses proper citation but follows the source's original wording and structure too closely.

The report offers educators a number of recommendations for dealing with plagiarism. According to Turnitin, "academic policies too often take the approach of adopting a one size fits all response to plagiarism." The company suggests that severe forms of blatant plagiarism, such as cloning and ctrl-c, may warrant extreme responses, but lesser forms may simply require better education. In some cases, students may be plagiarising unintentionally simply because they aren't aware of the different forms of plagiarism.

Turnitin software provides originality reports that identify problems such as blatant copying, improper paraphrasing, and insufficient citation in student work. The company recommends sharing those reports with the students and using them as a learning tool.

"Nearly every school has an academic integrity policy, yet instructors tell us that blatant, intentional plagiarism is still frequently encountered," said Chris Harrick, vice president of marketing at Turnitin, in a prepared statement. "This study helps educators identify the nuances between the various forms of plagiarism and gives them some insights to effectively address plagiarism with their students."

The complete study is available at turnitin.com.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • interconnected blocks of data

    Rubrik Intros Immutable Backup for Okta Environments

    Rubrik has announced Okta Recovery, extending its identity resilience platform to Okta with immutable backups and in-place recovery, while separately detailing its integration with Okta Identity Threat Protection for automated remediation.

  • digital book with circuit patterns

    Turnitin and ACUE Partner on AI Training for Educators

    Turnitin is teaming up with the Association of College and University Educators to create a series of courses on AI and academic integrity designed to help faculty navigate the responsible use of AI in learning and assessment.

  • stylized figures, resumes, a graduation cap, and a laptop interconnected with geometric shapes

    OpenAI to Launch AI-Powered Jobs Platform

    OpenAI announced it will launch an AI-powered hiring platform by mid-2026, directly competing with LinkedIn and Indeed in the professional networking and recruitment space. The company announced the initiative alongside an expanded certification program designed to verify AI skills for job seekers.

  • Cyber threat vectors illuminate global map

    Cyber Espionage Campaign Exploits Claude Code Tool to Infiltrate Global Targets

    Anthropic recently reported that attackers linked to China leveraged its Claude Code AI to carry out intrusions against about 30 global organizations.