Para Phasing
Para Phasing
Para Phasing
PARAPHASING
SEMESTER 2018/2019
Paraphrase
Keck (2014) identifies 4 types:
i.Near copy
ii.Minimal revision
iii.Moderate revision
iv.Substantial revision
1
i. Near copy
Paraphrase
– 50% or more words are copied from the original text
– simplification through synonym substitution and deletion
– copied strings of 5 or more words
ii. Minimal revision
– 20 to 49% of words are copied from the original text
– copied strings of 3-4 words
– multiple synonyms substitution
iii. Moderate revision
– 1 to 19% of words are copied from the original text
– borrowing strings of 1-2 words
– synonym substitution + different clause structures
iv. Substantial revision
– no copy from the original text
– borrowing of individual words
– different clause structures
– synonymous construction – use noun phrase (page 015 / 027)
2
Example: Original excerpt
Children speak more like adults, dress more like adults and behave
more like adults than they used to.
i. Near copy
Nowadays, children’s behavior is more like adults than they used
to.
3
Paraphrasing and Summarizing:
Extract 1:
Today, teenagers spent most of their time on the internet, chatting, interacting and establishing
cordial and strong relationship with people sometimes thousands of kilometres away. While most
of them maintain regular contact with their far away internet family through the internet, their
interaction and personal communication level with their immediate family and friends are very
weak. A more alarming possibility is that youths avoid spending time with their parents and
instead prefer to surf the internet. Youths within the same location or the same apartment at
times prefer to communicate with one another through e-mail instead of meeting one another
face- to-face.
Adapted from:
Gapsiso, N. D. and Wilson, J. (2015). The Impact of the Internet on Teenagers’ Face-to-Face Communication
Journal of Studies in Social Sciences. Vol. 13 No. 2, Pages 202-220.
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Extract 2:
In addition to the potential risks of unnecessary calories in sports and energy drinks, concerns
have been raised about the potential risk of dental erosion from frequent contact with sports
beverages. Research has found that many sports drinks were erosive to tooth enamel when
compared with water and orange juice. To prevent any potential damage to teeth from these
drinks, the beverages should be consumed quickly and not held or swished around in the mouth.
Using a straw may minimize contact with dental enamel, and refrigeration may minimize the
erosive potential of the beverages.
4
Adapted from:
Meadows-Oliver, M. and Ryan-Krause, P. (2007). Powering Up With Sports and Energy Drinks.
Journal of Pediatric Health Care.Vol 21, No 6, Pages 413–416
Paraphrase the authors’ ideas on the potential risk of energy drinks on teeth and how to avoid the
risk.
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Extract 3:
Although online gaming is a relatively new area of activity, its success at engaging large groups
of remotely located users has meant that early research projects and military training
organisations have already begun to use multiplayer online role-play gaming approaches as a
means for engaging and retaining large remotely located learner groups, and for supporting
collaborative learning objectives and ‘communities of practice’. Online role-play games could be
used in engaging the school children in a more interactive approach to learning, which also
supported collaborative and team-building skills. Students using edu-gaming have reported they
had gained new skills in learning collaboratively online, while teachers found that they had
developed new ICT skills and enhanced teaching practices.
Adapted from:
Freitas, S.d. and Griffiths, M.( 2007). Online gaming as an educational tool in learning and training.
British Journal of Educational Technology. Vol 38, No 3, Pages 535–537
Paraphrase the authors’ ideas on the benefits of on-line gaming in teaching and training.
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
5
Extract 4:
Reading strategies are defined as a set of cognitive and purposeful actions that help readers
construct and maintain meanings and make sense of the texts when they are engaged in reading
tasks. Reading strategies are employed to help readers increase their comprehension of the texts
before, during and after they read and these strategies are vital skills for readers. Without
adequate reading skills, readers struggle and encounter a number of problems. Successful
readers adopt various reading strategies in order to comprehend texts. They also employ reading
strategies more actively and make use of a greater variety of strategies to assist their
comprehension. Successful readers are consciously aware of various reading strategies that they
are able to employ and learn to choose the appropriate strategies to construct meanings from
texts they are engaged in reading.
Adapted from:
Kasemsap, B. and Lee, H.Y. (2015). L2 Reading in Thailand: Vocational College Students’ Application of
Reading Strategies to their Reading of English TextsThe Reading Matrix: An International Online Journal.
Vol. 15 No. 2, Pages 101-116.
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------------
Extract 5:
Traditional bullying, or face-to-face bullying, can take any of the three forms:
1. verbal abuse;
6
2. work-related bullying, where critical information and other supports required to
carry out the job are withheld by the bully; and
3. physical abuse of the victim.
In cyber-bullying, the bully uses technology, such as the Internet or mobile telephone, to
psychologically harass the victim. It can take many forms, such as hacking someone’s account,
making defamatory remarks on someone’s social-networking site, sending intimidating e-mails,
threatening someone by sending instant messages and stalking.
In cyber-bullying, the bully may be anonymous and may not have any idea of the extent of
damage done to the victim. Thus, the bully may go up to any extent of torment on his or her
victim.
Cyber-bullying goes beyond the workplace. For example, if some malicious comments get
posted on the social networking site of the victim, instantly family members, friends, neighbors
and colleagues may get to know about it.
Adapted from:
Sarkar, Anita. "Step-by-step to stopping the cyber-bully: How organizations can help to tackle the menace."
Human Resource Management International Digest 23.7 (2015): 31-33.
Summarize the authors’ ideas on the differences between traditional and cyber bullying.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------