(Answered) ENGL 147 Week 5 Discussion 2: Source Incorporation & Academic Integrity

Initial Post Instructions
Part 1: Research & Review
Pay particular attention to the following as you review the Required Resources for this
activity:
 Week 3 Lesson: Building Body Paragraphs section
 Week 4 Lesson: Signal Phrases section
 Website links
Then, choose one of the sources you have collected so far this term.
Part 2: Application
Draft a body paragraph for the upcoming pro/con position paper, incorporating one
paraphrase and one quote.
 The paragraph should contain a topic sentence, evidence, and conclusion/connection.
Strive for a minimum of 5 complete sentences.
 The paraphrase should be introduced with a signal phrase.
 The quote should be introduced and explained.
 Both the paraphrase and quote should be cited in-text and on a reference page.
Then, answer the following prompts:
 Explain your approach to paraphrasing vs quoting.
 What made the quote stand out?

 Based on the information from the Turnitin plagiarism link, how did you ensure both the
paraphrase and quote were not plagiarized?
 How did reviewing the Turnitin plagiarism link impact how you incorporated your
resources?
 Do you prefer to paraphrase or quote? Why is that the case?
Click on the following Writing Tip link for a review of citations:

Solution:

Sources Incorporation and Academic Integrity

An associate professor and Director at Almaty Management University, Gulzhanat Tayauova points out that although outsourcing has significant advantages to the contemporary business, it has potential limitations that may lead to undesired outcomes. In her article, the author says, “ The main disadvantages of outsourcing are loss of managerial control over outsourced operations, a threat to security and confidentiality, quality problems, hidden costs and reallocation of existing teams,” (Tayauova,2012). The author describes every disadvantage associated with outsourcing. For instance, the outsourcing company may end up losing control over its primary operations since dealing with external vendors require a variety of skills and changes to accommodate them. Secondly, the author highlights the risks of breaching the organization’s confidential data through the exposure of systems to third parties. Please click the icon below to purchase the full solution at $5