Peer response 3 | GEN 103 Information Literacy | Ashford University

Your response to your classmates must be substantive. Share ideas, explore differences, and think critically about your classmates’ posts. Bring in information from your textbook, classroom resources or other credible sources that you find to contribute to the discussion. You are invited to share relevant audio, video, or images in your responses. You must cite and reference any sources you use, even in your responses to your classmates.
PEER RESPONSE:
The second source by Jay Hancock is a popular source since it offers a report of the issue in question: employees’ privacy in relation to the wellness program (UC Santa Cruz University, n.d.). In addition, it features public opinion on the topic of discussion. For instance, the report’s author includes Ray Hunt’s view, president of the Houston police department, about giving their information to healthcare providers (Hancock, 2015). Furthermore, the article is not peer-reviewed, like in a scholarly paper, since it is just edited by its editor and published.
Both the articles have their specific audiences. The first article by Ajunwa et al. (2016) is a scholarly article is written, targeting scholars. The report is written mainly for academic purposes and for academicians who mostly find the results helpful to further their research on the same topic or in a related field. The audiences are the specialists and researchers who are peers to the research’s contributors (Morehead State University, 2015). With this audience, the language in the articles is topic-specific, such that it only reflects the topic under discussion, utilizing vocabulary related. The organization of the article is formal and orderly, with the subtopics arranged in chronological order. Images may be present, but only if they represent something about the topic. As a popular article, the second article targets the general audience and readers since they usually entertain, inform, and persuade individuals about a particular matter (Morehead State University, 2015). The audience, in most cases, is not specialized, but the general public is looking to be informed about the current events and issues, which may include sports, politics, and culture. The article’s organization lacks order since the author is not guided. The language is not formal but chosen to suit the reader and the writer. Images are primarily used with no direct connection to the topic.
The two articles have different levels of credibility. The first article, which is a scholarly source, is more credible because they have been through a review process that is rigorous and comprehensive by scholars and specialists who have the knowledge and expertise on the topic under discussion (Elmhurst University, 2020). Features making it credible include past literature about the subject and supporting documents cited and forming the reference section of the article. An example of the cited source is in use where Ajunwa et al. says that it is not yet defined if the wellness program providers meet the HIPAA regulations, applicable to hospitals and doctors, and goes ahead to state its contents (Ajunwa et al., 2016). On the contrary, the second article by Hancock is not credible since it is not reviewed, instead edited and published by the publishing bodies, magazines, and news blogs. It lacks features like citations and references to support the presented information and offers unsubstantial information with no facts or proof. An example is where the author, Hancock, says that millions of people find themselves in the situation as Houston cops, who are unwilling to give their information to healthcare providers (Hancock, 2015). There is no supporting evidence from research that could substantiate the claim.
The first article by Ajunwa et al., a scholarly source, can support academic research in the same field of study by scholars and researchers. The source would be significant in research situations in employee medical information and information privacy at the workplace. My concern while using these sources is little information present; hence I will need to have additional research to beef it up in the long run. The second article, a popular source, could address gaps in the current initiatives about employee healthcare and related trends. In situations where people need to understand what is going in the employment sector as far as healthcare is concerned, the source might come in handy. My concern, however, when using the source remains the unsubstantial information presented by the author. There is a lack of proof and facts accompanying the article.
References
Ajunwa, I., Crawford, K., & Ford, J. S. (2016). Health and big data: An ethical framework for health information collection by corporate wellness programs. The Journal of Law, Medicine & Ethics, 44(3), 474-480. https://doi.org/10.1177/1073110516667943 (Links to an external site.)
Elmhurst University. (2020, Aug 13). Source evaluation and credibility: Journals and
Magazines.
https://library.elmhurst.edu/credibility (Links to an external site.)
Hancock, J. (2015, Oct 2). Workplace wellness programs put employee privacy at risk. CNN.
https://edition.cnn.com/2015/09/28/health/workplace-wellness-privacy-risk-exclusive/index.html (Links to an external site.)
Morehead State University. (2015, Dec 8). Distinctions among types of periodicals: Intended
audience.
https://research.moreheadstate.edu/c.php?g=106978&p=694271#acaud (Links to an external site.)
UC Santa Cruz University. (n.d.). Distinguish between Popular and Scholarly Journals.
https://guides.library.ucsc.edu/distinguish-between-popular-and-scholarly-journals

Peer response 3 | GEN 103 Information Literacy | Ashford University

 Your responses to your classmates must be substantive. Share ideas, explore differences, and think critically about your classmates’ posts. Bring in information from your textbook, classroom resources or other credible sources that you find to contribute to the discussion. You are invited to share relevant audio, video, or images in your responses. You must cite and reference any sources you use, even in your responses to your classmates. It must be at least 100 words.

PEER RESPONSE:

 Academic integrity is the students’ dedication even in difficult times to follow the five fundamental education values. The values include trust, responsibility, honesty, respect, and fairness (Eaton, 2017). These values are crucial to me as a scholar and professional because they guide the academic community to interpret principles into actions. Ahmed (2018) believes academic integrity can be incorporated into the orientation program of new college students. Providing students with enough information before they are affected by an existing culture of cheating, for instance, is essential in maintaining and restoring academic honesty.

Some of the elements of academic dishonesty include plagiarism and cheating. Eaton (2017) describes plagiarism as literary theft, a sin, or a violation. The online writing article chosen has elements of plagiarism and cheating. Plagiarism can be considered the act of borrowing another academician’s texts or inappropriate citation. The author does not cite information from where he obtained them. Guest writing and ghostwriting are sometimes considered part of the plagiarism group. In medical sciences, guest writing is frequent because it allows the real author to use another author to write their paper to get credibility (Eaton, 2017). Cheating is an academic violation that entails using study guides in examinations, using unauthorized materials or using other students’ information during an academic exercise. The fact that the author uses material without citing can also be considered cheating because unauthorized content from another article.

The strategy I will use to avoid plagiarism and cheating mainly acknowledging that some information from my work is borrowed by citing the authors. Information borrowed from other academicians can be paraphrased and cited or used as a direct quote and cited. I can avoid cheating by sticking to academically qualified sources and reducing the pressure from factors that might force me to cheat in exams. For instance, working part-time can be stressful during the exam period. I can therefore increase my study hours by taking a break from work to concentrate on preparing for the examination. As a scholar, I owe my readers accurate information generated from critical evaluation of authorized material and acknowledging other academicians’ work.

References

Ahmed, S. S. (2018). Impact of cheating university examination on quality of education in Kenya: a case of Umma University, Kenya. European Journal of Education Studies, 5(1), 272-287. https://oapub.org/edu/index.php/ejes/article/viewFile/1939/4576

Eaton, S. E. (2017). Comparative analysis of institutional policy definitions of plagiarism: A pan-Canadian university study. Interchange48(3), 271-281. https://prism.ucalgary.ca/bitstream/handle/1880/106472/Eaton-2017.pdf?sequence=2