Ethics PDF

Title Ethics
Author Sankarsan Mohanty
Course Marketing Research
Institution 國立臺北科技大學
Pages 23
File Size 576.8 KB
File Type PDF
Total Downloads 108
Total Views 234

Summary

1.Which of the following statements on privacy and the right to privacy is incorrect? (1)Infringement of privacy does not necessarily infringe on the right to privacy. (2)Right to privacy is broader in scope than privacy. (3)People, things, and things that individuals do not want others to know are ...


Description

1. Which of the following statements on privacy and the right to privacy is incorrect? (1)Infringement of privacy does not necessarily infringe on the right to privacy. (2)Right to privacy is broader in scope than privacy. (3)People, things, and things that individuals do not want others to know are all considered to be private. (4)Privacy varies according to each person’s feelings or thoughts. 2. What is the difference between “Academic Ethics of Researchers” and “Key Points on Processing and Reviewing Academic Ethics Cases”? (1)The former is a code of conduct, and the latter is a hearing process. (2)The former is the focus of the review, and the latter is the code of conduct. (3)The former is the focus of the review, and the latter is an explanation of criminal liability. (4)The former is a code of conduct, and the latter is an explanation of criminal liability. 3. If a person who has a conflict of interest with an applicant serves as a member of the research ethics committee, and is responsible for reviewing this application case, which of the following situations will be more likely to occur? (1)Failure to follow research methods during the experimental process (2)Publishing false research results (3)Research participants or subjects assuming excessive or unnecessary risks (4)An increase in the research costs 4. Under which of the following circumstances is “quoting” not required? (1)When citing the original text of another writer’s work (2)When presenting the original response content of an interviewee (3)When interpreting one’s own viewpoint (4)When citing secondary data 5. Professor Chang discussed the topic of academic ethics with his freshmen in his course on “Research Methods in Pedagogy.” Many students expressed their viewpoints. Which two of the following statements are correct? Hsiao-Chi: The spirit of academic ethics includes fairness, honesty, and accountability. We should conduct research with these ethics in mind in to earn the trust of the public in the research results, as well as contribute to the long-term development of scientific research. Hsiao-Lun: Academic ethics is a code of conduct for professional researchers. Since graduate students are still learning, we can decide whether to follow them or not. There is no mandatory requirement for us. Fei Fei: The term “research” in the “Human Subjects Research Act” is limited to high-risk human medical research, such as injection of experimental drugs and clinical trials. The law does not apply to other research types. Ti Ti: According to the provisions defined in the Personal Information Protection Act in Taiwan, researchers must acquire participants’ consent prior to collecting, processing, and using their personal data. Hsiao-Ming: The Copyright Act protects the copyrights of verbal and textual works in academic research (such as dissertations, seminars, and journal articles). However, it has not been extended to cover other types of academic achievements, such as computer programs, drama creations, and industrially designed products. (1)Hsiao-Chi and Fei Fei (2)Hsiao-Lun and Hsiao-Ming (3)Hsiao-Chi and Ti Ti (4)Fei Fei and Ti Ti 6. Under which of the following circumstances is self-plagiarism less likely to occur? (1)After some content of an original paper is translated, edited, and cited, it is published in a foreign language journal. (2)Research results are separated into several different papers and published in different journals, but no annotations are made to indicate that some data has already been published or is currently being submitted for publication. (3)In order to increase the number of research publications, the same paper is submitted to different journals for publication without undergoing any substantial revisions. (4)Adding some new data to a previously published paper and republishing it as a new paper. 7. Which of the following is the purpose of the Personal Information Protection Act?

(1)To protect personal knowledge (2)To promote personal safety (3)To protect the healthy development of youth (4)To protect information privacy and promote the rational use of personal data 8. When collecting personal information from concerned parties, which of the following does not require legal notice? (1)Classification of personal information (2)Name of organization (3)Acquirable interest (4)Rights of concerned parties 9. Aming does not want his fingerprints, sex life, or medical records shared with others. Which of the above are protected by privacy law? (1)Fingerprints (2)Sex life (3)Medical records (4)All of the above 10. Some students are discussing “self-plagiarism.” Which of the following is the most correct statement on self-plagiarism? (1)Jake: Using part of last semester's class report for the current semester does not constitute self-plagiarism due to the different course content. (2)Alfred: Using the charts in journal articles published previously by the author himself but rewriting the text that explains the charts does not constitute self-plagiarism. (3)Mary: Since the new paper is based on the previous one written by the author, retrieving the content of the previous paper does not constitute self-plagiarism. (4)Betty: Revising the paper previously published by the author, adding it to the new research paper, submitting it to another journal, and indicating the source of information does not constitute self-plagiarism. 11. Which of the following does not constitute “tampering”? (1)The researcher deliberately modifies research results that are inconsistent with the study’s hypothesis. (2)The researcher falsifies non-existent data. (3)The researcher over-embellishes existing images in the research. (4)The researcher unreasonably manipulates the research data. 12. Meimei is a student in the performing arts department. In order to introduce the dance of the Dai ethnic group in a class, a clip is shown of a dance troupe performing a Dai dance in a public show. If we wish to consider whether this citation behavior is within reasonable limits, which of the following would not be an important factor to consider? (1)The purpose and nature of use (2)The nature of the work (3)The credibility of use (4)Potential market influence 13. Which of the following statements on paraphrasing is incorrect? (1)The contents of the source data are re-expressed. (2)Information from different articles is collated and merged. (3)The text must be very different from the original after paraphrasing. (4)The intended meaning of the original text is interpreted in your own words. 14. Chen graduated from a research institute that requires graduate students to publish at least one journal article before graduation. After Chen completed the journal article, he found that the expected timeframe for graduating was imminent. He was not sure whether his work would be successfully accepted by the journal before graduation. Therefore, he decided to submit the paper to three journals at the same time to increase his chance of getting it published. He also thought that if the paper was accepted by more than one journal, he could choose to withdraw the other submissions, leaving only one journal to publish his paper. Does Chen’s behavior constitute improper research behavior? (1)No, because he will only choose one publication in the end, and there will be no problem of repeated publication. (2)No, because multiple submissions of a paper’s draft can increase the acceptance rate and it is a common submission technique in academic research.

(3)Yes, because Chen should respect the decision of the journal to publish his article. Once the paper has been accepted by a journal, it should be published instead of being retracted. (4)Yes, because although Chen will eventually only choose one publication, he will submit the same paper to multiple journals, which raises the problem of multiple submissions. 15. Authors have “personality rights” and “property rights.” Which of the following does not belong within the protective scope of “property rights”? (1)Right of publicity (2)Public broadcast rights (3)Public dictation rights (4)Public performance rights 16. In principle, when do authors obtain copyrights? (1)Authors obtain copyrights when they register their work. (2)Authors obtain copyrights when they complete their work. (3)Authors obtain copyrights when the responsible government agencies have approved it. (4)Authors obtain copyrights when their work is available for reference. 17. There must be proper referencing to use the works of others in your own work. Which of the following is the most correct statement on proper referencing? (1)The original text will be clearly indicated as such by having it in italics, but it is not necessary to indicate its source. (2)Use quotation marks at the beginning and end of the quoted text and indicate its source. (3)The quoted text is in a separate paragraph, and quotation marks are at the beginning and end of the text. Even if the entire content of another paper is quoted, it must be within a reasonable scope. (4)The quoted text is in a separate paragraph and is indicated as such with a dash at the beginning and end. There is no need to indicate the source explicitly. 18. Director A of a research institute led a research team in conducting cell growth research. At the same time, he was supported by private company B. He used the products of B in the experiment, and he embellished the effects of the products. Researcher C of the team later discovered that the product did not perform as well as it was reported to and published these results. Which of the following statements is correct? (1)The case describes the “Conflicts of Interests of the Research Ethics Committee.” (2)Director A asked the research team to embellish the research results for personal gain. This is a systemic issue and has nothing to do with personal conflicts of interest. (3)Director A asked the research team to embellish the research results to ensure that they would have sufficient funds for the research, which means that this involves an institutional conflict of interest. (4)To keep working, Researcher C cooperated in embellishing the research results, which constitutes an institutional conflict of interest. 19. In academic writing, which of the following rights may be related to “citing” the works of others in one’s own paper? (1)Distribution rights (2)Reproduction rights (3)Adaptation rights (4)All of the above 20. Which of the following statements on “quoting” is incorrect? (KUNING SALAH !!!) (1)The purpose of citing the works of others is to give readers a better understanding of the relevant literature. (2)It is necessary to correctly cite the source of the quote to avoid plagiarizing the research of others. (3)Quotations have their own formatting, and the reference must be clearly indicated at the end of the text. (4)If the quotation is placed in the running text, quotation marks should not be used to avoid visual confusion. 21. The day before discussing their research progress with their advisor, Student Zheng finds that his experiment is behind schedule, and there are three sets of experimental data that he has not yet obtained. In order to catch up on his report progress, he randomly enters numbers into the three data result tables to show his advisor for the time being. Which of the following improper research behaviors has Student Zheng demonstrated? (1)Inappropriate research data collection procedures (2)Duplicate reporting and publication of research results (3)Plagiarism issues in the dissertation

(4)Fabrication of and tampering with research data 22. Bob and Mary are a married couple. Bob is required to travel abroad for work and is worried that Mary will be unsafe at home alone. Therefore, he installed a pinhole camera in the living room at home without the knowledge of Mary so that he can check on her from wherever he is. As per the provisions of criminal law, does the behavior of Bob constitute an infringement of Mary's right to privacy? (1)No, because Bob installed the pinhole camera in the living room of the house, which is a public premise, and his behavior is justified by the need for home security. (2)No, because this is Bob's home, and he can install pinhole cameras anywhere in his own home for any reason. (3)Yes, he has infringed on Mary's right to spatial privacy. (4)Yes, he has infringed on Mary's right to personal privacy. 23. Two years ago, Hsiao Hua was still a graduate student. She collected the data for one of her studies through an online questionnaire survey. The 535 participants that responded to the survey were asked to provide their real names, addresses, telephone numbers, and email addresses, so that she could send them a small gift as a reward. Prior to the collection of such information, Hsiao Hua had specified the purpose of the data collection as well as that they would be used only for sending the gift. In addition, the participants had the right to choose not to provide the information. Hsiao Hua only sent the gifts to the participants that signed the online consent form. Following the completion of her master’s degree, Hsiao Hua remained at the same institute to continue her studies as a doctoral student. To support an activity organized by the institute, she extracted the information of the participants collected for gift distribution and sent them an invitation to the event on behalf of the institute. Has Hsiao Hua’s behavior violated the Personal Information Protection Act of the R.O.C. (Taiwan)? (1)No, since she was sending an invitation for an academic event, which is considered usage of private information for educational purposes; thus, her behavior did not violate the law. (2)No. According to the Personal Information Protection Act, online consent is not valid. Therefore, the previous documents do not have a legal effect. (3)Yes. She should not send the invitation on behalf of the institute, as it not only violates the Personal Information Protection Act, but also misappropriates the name of her institute. (4)Yes. The participants only granted permission for their information to be used to receive the gift. Now that Hsiao Hua has changed the usage policy of their information; her behavior has violated the Personal Information Protection Act. 24. Based on the principle of beneficence as described in the Belmont Report, how does a researcher assess whether research can be carried out? (1)The researcher seeks to maximize benefits, minimize risks, and optimize compensation. (2)The researcher seeks to maximize benefits, maximize risks, and optimize compensation. (3)The researcher aims to cause no harm, maximize benefits, and minimize risks. (4)The researcher aims to cause no harm, minimize benefits, and minimize risks. 25. Which writing tip on “summarizing” is incorrect? (1)When to use: Shorten long texts such as an entire chapter or an entire book. (2)The text is longer than the original after summarizing and would have required more words to explain the original text. (3)The summarized text is shorter than the original. (4)It is similar to explaining ideas “in a nutshell,” where a small amount of text is used to convey the original content. 26. Which of the following does not imply interference with scientific research integrity? (1)Manipulating the research results (2)Designing the research methods (3)Publishing the article under another name (4)Participating in false promotion 27. Which of the following is an acceptable post-production method for an image used in a study? (1)Adjusting the clarity of the image to a reasonable extent (2)Deliberately deleting certain images that are inconsistent with the hypothesis of the study (3)Misappropriating images from other people’s work without proper referencing (4)Cropping and collaging multiple images and misleading readers into thinking that the collage is the original image 28.

Which of the following is a true description of research ethics standards? (KUNING SALAH) (1)Standards of research ethics may have slightly different principles of practice and operation in different fields. (2)Academic writing styles (e.g., APA) are standards of academic writing, and are not in the scope of research ethics. (3)Generally, biomedical field research ethics standards are more relaxed than those of other fields. (4)Research ethics standards are only the highest standards for research behavior, so researchers can follow them selectively. 29. According to the provisions of the Personal Information Protection Act, which method of obtaining personal data requires informing the parties about the source of the data? (1)An employee has engaged in dereliction of duty. The boss obtains the contact information of the employee to understand the cause. (2)A communications firm obtains the mobile numbers of members from an online shopping website. (3)The reporter obtained the name of the wanted criminal from the police department. (4)The program host obtains the list of participants from the research assistant to understand the distribution of participants. 30. Which of the following options is not a method of avoiding plagiarism in academic writing? (1)Understanding the correct form of writing in one’s own academic discipline (2)Avoiding doing one’s own writing as much as possible, and completely copying the works of others (3)Clearly quoting and annotating reference literature when citing data from others (4)Seeking permission from the original author when quoting an excessive amount of data 31. Publisher A has previously published the works of Writer B. If Publisher A wants to republish the works of Writer B, who passed away ten years previously, according to the Copyright Act, what is the most appropriate way for Publisher A to proceed? (1)Make a note in the book’s sources that this is the work of Writer B. (2)The protection period of Writer B’s property rights has already expired, and so Publisher A does not require authorization for publishing. (3)The property rights of Writer B expired upon their death. Publisher A can freely use their works. (4)Publisher A must obtain authorization from the heirs of Writer B. 32. Regarding the following descriptions of the writing format and specifications for submissions laid out by various research fields and academic journals, which of the following is incorrect? (1)Following the academic writing format and submission criteria can be regarded as meeting the requirements of research ethics. (2)The establishment of writing formats and submission specifications will stifle the freedom of speech of researchers and is a violation of research ethics. (3)The format and specifications may not be the same across fields and journals, but the core principles are usually the same. (4)The purpose of formatting submission specifications is to prevent improper citations or plagiarism and to ensure the quality of academic publications. 33. Xiaolu is a teacher at Kuaile Primary School, and a student at Kaixin University Graduate School. In order to conduct a study, Xiaolu’s advisor, Professor Huang, hopes that Xiaolu will allow him to observe the behavior of students in Xiaolu’s class from the back of the classroom; Professor Huang will of course obtain permission from the children and their parents. Is Professor Huang’s request fully in the spirit of “voluntary participation in research”? (1)Yes, Professor Huang did not compel Xiaolu to provide consent. (2)Yes, there is no stakeholder relationship between Professor Huang and the participants (students). (3)No, student willingness to participate may be affected by concerns for their grades. (4)No, the students are persons with limited capacity for conduct and do not have the right to decide. 34. Which of the following is the best way to avoid plagiarism? (1)Asking a senior student to modify the contents of the plagiarized text slightly (2)Using the correct academic writing format (3)Doing a simple order rearrangement when citing the original text (4)Not indicating the source of the data to avoid being caught 35.

Which of the following is not the fundamental principle that must be followed in the research process as described in the Belmont Report? (1)Respect for human dignity (2)Obeying the law (3)Beneficence (4)Justice 36. Researchers applied to the Ministry of Science and Technology for a special research project. The ...


Similar Free PDFs