Para Phasing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

NOTES

PARAPHASING

SEMESTER 2018/2019
Paraphrase
Keck (2014) identifies 4 types:
i.Near copy
ii.Minimal revision
iii.Moderate revision
iv.Substantial revision

1
i. Near copy
Paraphrase
– 50% or more words are copied from the original text
– simplification through synonym substitution and deletion
– copied strings of 5 or more words
ii. Minimal revision
– 20 to 49% of words are copied from the original text
– copied strings of 3-4 words
– multiple synonyms substitution
iii. Moderate revision
– 1 to 19% of words are copied from the original text
– borrowing strings of 1-2 words
– synonym substitution + different clause structures
iv. Substantial revision
– no copy from the original text
– borrowing of individual words
– different clause structures
– synonymous construction – use noun phrase (page 015 / 027)

2
Example: Original excerpt
Children speak more like adults, dress more like adults and behave
more like adults than they used to.
i. Near copy
Nowadays, children’s behavior is more like adults than they used
to.

ii. Minimal revision


Children are acting more and more like adults everyday.

iii. Moderate revision


Modern children seem to be behaving, through dress and
speech, like adults at an alarmingly young age.

iv. Substantial revision


It seems like the things that children do and even the clothes
that they wear are more adult-like than ever before.

3
Paraphrasing and Summarizing:

Extract 1:

Today, teenagers spent most of their time on the internet, chatting, interacting and establishing
cordial and strong relationship with people sometimes thousands of kilometres away. While most
of them maintain regular contact with their far away internet family through the internet, their
interaction and personal communication level with their immediate family and friends are very
weak. A more alarming possibility is that youths avoid spending time with their parents and
instead prefer to surf the internet. Youths within the same location or the same apartment at
times prefer to communicate with one another through e-mail instead of meeting one another
face- to-face.
Adapted from:
Gapsiso, N. D. and Wilson, J. (2015). The Impact of the Internet on Teenagers’ Face-to-Face Communication
Journal of Studies in Social Sciences. Vol. 13 No. 2, Pages 202-220.

Paraphrase the authors’ ideas on the effects of internet of teenagers.

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

Extract 2:

In addition to the potential risks of unnecessary calories in sports and energy drinks, concerns
have been raised about the potential risk of dental erosion from frequent contact with sports
beverages. Research has found that many sports drinks were erosive to tooth enamel when
compared with water and orange juice. To prevent any potential damage to teeth from these
drinks, the beverages should be consumed quickly and not held or swished around in the mouth.
Using a straw may minimize contact with dental enamel, and refrigeration may minimize the
erosive potential of the beverages.
4
Adapted from:
Meadows-Oliver, M. and Ryan-Krause, P. (2007). Powering Up With Sports and Energy Drinks.
Journal of Pediatric Health Care.Vol 21, No 6, Pages 413–416

Paraphrase the authors’ ideas on the potential risk of energy drinks on teeth and how to avoid the
risk.

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

Extract 3:

Although online gaming is a relatively new area of activity, its success at engaging large groups
of remotely located users has meant that early research projects and military training
organisations have already begun to use multiplayer online role-play gaming approaches as a
means for engaging and retaining large remotely located learner groups, and for supporting
collaborative learning objectives and ‘communities of practice’. Online role-play games could be
used in engaging the school children in a more interactive approach to learning, which also
supported collaborative and team-building skills. Students using edu-gaming have reported they
had gained new skills in learning collaboratively online, while teachers found that they had
developed new ICT skills and enhanced teaching practices.
Adapted from:
Freitas, S.d. and Griffiths, M.( 2007). Online gaming as an educational tool in learning and training.
British Journal of Educational Technology. Vol 38, No 3, Pages 535–537

Paraphrase the authors’ ideas on the benefits of on-line gaming in teaching and training.

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------
5
Extract 4:
Reading strategies are defined as a set of cognitive and purposeful actions that help readers
construct and maintain meanings and make sense of the texts when they are engaged in reading
tasks. Reading strategies are employed to help readers increase their comprehension of the texts
before, during and after they read and these strategies are vital skills for readers. Without
adequate reading skills, readers struggle and encounter a number of problems. Successful
readers adopt various reading strategies in order to comprehend texts. They also employ reading
strategies more actively and make use of a greater variety of strategies to assist their
comprehension. Successful readers are consciously aware of various reading strategies that they
are able to employ and learn to choose the appropriate strategies to construct meanings from
texts they are engaged in reading.

Adapted from:
Kasemsap, B. and Lee, H.Y. (2015). L2 Reading in Thailand: Vocational College Students’ Application of
Reading Strategies to their Reading of English TextsThe Reading Matrix: An International Online Journal.
Vol. 15 No. 2, Pages 101-116.

Paraphrase the authors’ ideas on the characteristics of effective readers.

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------

Extract 5:

Traditional bullying, or face-to-face bullying, can take any of the three forms:

1. verbal abuse;

6
2. work-related bullying, where critical information and other supports required to
carry out the job are withheld by the bully; and
3. physical abuse of the victim.

In cyber-bullying, the bully uses technology, such as the Internet or mobile telephone, to
psychologically harass the victim. It can take many forms, such as hacking someone’s account,
making defamatory remarks on someone’s social-networking site, sending intimidating e-mails,
threatening someone by sending instant messages and stalking.

Today’s proliferation of electronic communication has made cyber-bullying rampant in the


workplace. The damage done by cyber-bullying can potentially be greater than traditional
bullying. In traditional bullying, the bully and bystanders equally get affected when they inflict
pain on the victim.

In cyber-bullying, the bully may be anonymous and may not have any idea of the extent of
damage done to the victim. Thus, the bully may go up to any extent of torment on his or her
victim.

Cyber-bullying goes beyond the workplace. For example, if some malicious comments get
posted on the social networking site of the victim, instantly family members, friends, neighbors
and colleagues may get to know about it.
Adapted from:
Sarkar, Anita. "Step-by-step to stopping the cyber-bully: How organizations can help to tackle the menace."
Human Resource Management International Digest 23.7 (2015): 31-33.

Summarize the authors’ ideas on the differences between traditional and cyber bullying.

----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------

----------------------------------------------------------------------------------------------------------------

Notes and exercises by courtesy of the ULAB2122 Panel (2015/2016-2016/2017)

You might also like