You are on page 1of 2
> Referring words | Bu 4,p137 Unit 91 issues 6.3 Here is an extract from the essay that Matteo wrote on computer hacking, Complete the essay using the referring words in the box. it ones other some some the the the the the the these thelr their they they they this this Computer crackers are often less of a problem for private individuals than 1 Urey are for companies and organisations. In2 _ ._.. past 20 years, thare have been Numerous examples of crackers breaking into 3 ___ networks of large companies and government organisations. Sometimes crackers try to steal information from companies, but at 4____ times 5 only want to show that 6 are alle to break through 7 .___. security that institutions have put in place. 8 ___ means ‘9 ____ organisations have to replace 10 ____ existing computer network firewalls with 11 that are even more difficult to get through. 12 also shows that 13 ____ crackers, but not all, see hacking as a kind of sport ar game to be won. In 1994, 14 ___ US introduced a new law called 15 —___ Computer Amendments ‘Abuse Act that meant 16 ____ criminal justice system could prosecute illegal crackers far more easily (Long and Long, 2005). 17 .___ law change has meant that 18 ____ crackers have been sent to prison as a result of 19 activities. 7 in-text referencing © in section 6, we looked at the way you can refer to language within texts. I this section we look at @ ifferent kind of reference: the way you can refer to information from books and articles thet you read ia your essay, 7.4 Look at the paragraph in 6.3 that Matteo wrote and underline the reference to a book that he tread for his ossay. 7.2, Look at the following three examples of referoncing information in the text. Match these three difforont ways of referencing to descriptions 1-3. A Crackers are not always individuals trying to harm @ company, Long and Long (2005) point out that they are often someone working for a competitor company who wants to find out what secret ideas or plans the first company has. 8 Crackers are not always individuals trying to harm a company, but they are often someone acting as a spy for a competitor whose ‘objective is to gain access to a target company’s system’ (Long and Long 2005: 301). ce Long and Long (2005) point out that @ large amount of hacking is motivated by industrial espionage’ .. the typical corporate computer has everything corporate spies would want, so their objective is to gain ‘access to a target company’s system, look around, and take whatever useftl information they can, (Lone and Long 2008: 301) 7 TA 72 Unit 10 - Culture shock Creating a bibliography @ Konrad has begun compiling a bibliography. Read the following extract from it and ider which reference Is a book, which is an article from a book and which Is a paper from a journal. Caligiuri, PM, Hylond, MM, Joshi, A etal, (1990), Testing a theoretical mode far examining the relationship ‘between family adjustment and expatriates’ work adjustment. Journal of Applied Psychology BS), 588-614 Deresky, I. (2008). International Management: Managing Across Borders and Cultures (Sth edn). Upper fiver Saddle: Pearson Prentice Hall sland, JS. & Bird, A. (2003). Beyond Sophisticated Stereotyping: Cultural Sensemaking in Context In Thomas, 1.6 (4) Readings and Case Studles in International Management: A Cross-cultural Approach (pp. $810) ‘Thousand Oaks: Sage Publications. b Look at the three references in 7.2a and decide if the following statements are true (T) of false (F). Ifa statement is false, correct it. Reterences in bibliographies should be in alphabetical order, 7 ‘The full name of each author is given, ‘The date of publication is given in brackets after the name(s) of the authors. Book references should include the page numbers that you referred to. The place of publication of a book is followed by @ colon and the name of the publisher. 6 When you see the term et al it means there are more authors, but too many to mention. 7 The name of a journal is given before the title of the paper. 8 The first number given after the name of a journal is the volume andl the second number in| brackets is the specific issue number. | 9 [tis not necessary to include page numbers with journal papers. 10 The name qf the editor of # book from which an article Is taken Is given first. 11. The title of the article is given in italics. 12. The abbreviation Ea. stands for editor. 13. The preposition In introduces a book, not an article. Here are some notes Konrad has written that list more material he has read for the essay. Complete Konrad's bibliography using these notes. Follow the conventions focused on in 7.4b. = Arvind V Phatak, Robi 5. Bhagat bt Roger J. Kashlak pages HA-4SO. Unternational Manage ment Pergig tna Dit and Dypmte lal Error rd. Hs York. pb: Her Hl rin in 2004

You might also like