Introduction to Research Ethics PDF

Title Introduction to Research Ethics
Author Xavira Lope
Course Ethics
Institution Chang Gung University
Pages 40
File Size 433 KB
File Type PDF
Total Downloads 438
Total Views 1,012

Summary

 Introduction to Research Ethics: Definition and Content1. What is the most critical core value during the research process? (1) Thrift: To reduce research costs as much as possible. (2) Timeliness: To complete the experimental procedures on schedule. (3) Honesty: To practice the value of scientifi...


Description



Introduction to Research Ethics: Definition and Content 1. What is the most critical core value during the research process? (1) Thrift: To reduce research costs as much as possible. (2) Timeliness: To complete the experimental procedures on schedule. (3) Honesty: To practice the value of scientific integrity. (4) Warm-heartedness: To be fully committed to one’s social relationships with one’s teachers and peers

2. Who should be the main practitioners of research ethics and its relevant norms? (1) College and graduate students. (2) Researchers with public and private research institutions. (3) College professors and post-doctoral researchers. (4) All of the above.

3. Which of the following conduct conforms to general research ethics? (1) Embellish research diagrams or over-interpret research findings to increase the persuasiveness of the paper’s contents. (2) Present and report research information honestly and accurately when writing papers. (3) Consume many research resources and incur social costs due to poorly planned research designs. (4) Include even those who have not made substantial contribution to the research as the paper’s co-authors.

4. Before embarking on postgraduate studies in a research institution, where can one obtain information to understand the relevant ethical norms to which one should pay special attention? (1) Search the “Academic Ethics” section of the MOST’s website. (2) Understand the relevant norms and courses related to the institution’s academic ethics.

(3) Browse the websites of professional societies to obtain the latest contents on ethical norms. (4) All of the above.

5. Which of the following is not a consequence if a researcher deliberately ignores research ethics? (1) Use his/her personal academic prestige to convince the public to ignore the violation of research ethics. (2) Cause physical and psychological damages to the research participants. (3) Accept the relevant punishments associated with violations of professional norms or policies. (4) Have one’s reputation in scientific research affected due to damaging the public’s trust in scientific research.

Professional Norms and Personal Responsibility in Research Ethics 1. Which of the following is/are the main type(s) of common professional norms pertaining to research ethics? (1) Universal declarations and reports. (2) Codes on research ethics established by professional associations. (3) Norms for submission of research works specified by academic journals or publishers. (4) All of the above.

2. In the process of writing a research paper and until its successful submission, which of the following is not the conduct of a responsible researcher? (1) Understanding the academic writing format adopted by one’s professional field. (2) Following the proper format for citations and preparation of figures, and organizing the references properly. (3) Over-interpreting the contents of research diagrams in the hopes of securing a higher chance at being published. (4) Reading the norms for submission specified by academic and research journals carefully, avoiding submission of one manuscript to various publishers, and ensuring the absence of plagiarism or copyright infringement of other people’s works.

3.What are the common norms for research ethics with which a researcher should be familiar before the official launch of an experiment, to simultaneously protect the rights and obligations of research participants and subjects?

(1) Legal norms for research involving human subjects. (2) Requirements for the protection of human subjects stipulated by the professional association to which one belongs. (3) Academic journals’ policies on research involving human subjects. (4) All of the above.

4. During the research process, which of the following conduct best protects the rights of research participants/subjects while ensuring their safety? (1) Provide them with compensation and entice them with incentives to prevent them from dropping out halfway. (2) Obtain their informed consent and carefully assess the risks that may arise from the research. (3) Avoid using those who are underage or from vulnerable groups (e.g. the sickly or pregnant women) as research subjects. (4) Simplify descriptions of research risks for adult participants/subjects to reduce their psychological stress.

5. From an ethical perspective, what are the personal responsibilities that a researcher should bear? (1) Review one’s research conduct with high ethical standards even under highpressure research situations. (2) Learn personal skills on ethical criticism, decision making, and problem solving. (3) Consider all potential benefits and impacts carefully before making a decision and bear the consequences accordingly. (4) All of the above.



Government Regulations and Policies in Research Ethics 1.Medical Institution A wanted to conduct human trials on B (an adult with conscious abilities), but did not explicitly inform B about the details of the experiment. However, B had already given written consent for A to conduct human trials. What type of research ethics has A violated? (1) Violated the principles that the researcher has the obligation to inform the subject and obtain his or her informed consent. (2) Violated the principle that the researcher has the obligation to inform, but not that of obtaining the subject’s informed consent. (3) Violated the principle that the researcher must obtain the subject’s informed consent, but did not violate the obligation to inform. (4) Did not violate either the principle that the researcher has the obligation to inform or that of obtaining the subject’s informed consent.

2. Medical Institution A wanted to conduct human trials on B (an adult with conscious abilities), but did not explicitly inform B about the details of the experiment. However, B had already given written consent for A to conduct human trials. What laws has A violated? (1) Social Order Maintenance Act (2) Private International Law (3) Law of Negotiable Instruments (4) Medical Care Act

3. Hwang Chao-Mei, an HIV/AIDS researcher, conducted an in-depth interview with Lee Lan-Hua. Lee requested that Hwang not reveal her

medical condition. However, when Hwang published her research findings, Lee’s HIV status was leaked. What type of research ethics has Hwang’s conduct violated? (1) Violated the researcher’s obligation to inform. (2) Violated the principle of obtaining informed consent from the research subject. (3) Violated the principle of protecting the privacy of the research subject. (4) Violated the principle of fair treatment.

4. Hwang Chao-Mei, an HIV/AIDS researcher, conducted an in-depth interview with Lee Lan-Hua. Lee requested that Hwang not reveal her medical condition. However, when Hwang published her research findings, Lee’s HIV status was leaked. What law(s) has Hwang’s conduct violated? (1) Administrative Procedure Act (2) Personal Information Protection Act (3) Fair Trade Act (4) Insurance Act

5. Medical Institution A conducts research on unique diseases and wishes to conduct a human trial on B, who is 16 years old. Who is the most appropriate party to give written consent for B’s participation in the trial? (1) B himself/herself.

(2) B’s legal representative. (3) Either B himself/herself or his/her legal representative. (4) Both B himself/herself and his/her legal representative.

6. What type of research ethics is revealed when fair treatment and the selection of research subjects are expected? (1) Researchers’ obligation to inform. (2) Principle of informed consent by the research subjects. (3) Principle of fair treatment. (4) Principle of protecting the privacy of the research subjects.

7. Which of the following are norms of academic ethics stipulated by the MOST for the conduct of researchers who apply for its grant for special research projects? (1) Policy Guidelines on Ethics for Human Research (2) Academic Code of Ethics for Researchers (3) Guidelines for the Collection and Use of Human Specimens for Research (4) Regulations on Human Trials



Research Misconduct: Definition and Types 1. Based on the explanations in the module “Definition of Inappropriate Research Conduct,” which of the following is not an inappropriate research behavior? (1) Over-embellishment of research data. (2) Improper operation of research equipment. (3) Deliberate non-publication of research findings. (4) Excessive separation of research findings into several portions for publication.

2.Both Hsiao Yan and her guidance professor are listed as co-authors of an academic paper that they have jointly completed, and they intend to submit the paper to a foreign academic journal. On the eve of the submission, Hsiao Yan’s senior female schoolmate, who had assisted her with revising the sentence construction and grammar of the paper, requests to be listed as a co-author as well. Should Hsiao Yan accede to her senior’s request? Why? (1) Yes. Hsiao Yan should help the senior since the latter is graduating soon. (2) Yes. Hsiao Yan should obey her senior’s instructions. (3) No. Revising sentence construction and grammar alone does not constitute substantial contributions to the research. (4) Either is fine as long as Hsian Yan is happy.

3.In the academic and research community, which of the following is a reasonable and generally accepted approach for listing a paper’s authors? (1) Depends on who made more contributions to the research. (2) Depends on who bought more laboratory mice for experiments. (3) Depends on who has a higher administrative position. (4) Depends on who provided more research funding.

4.Hsiao Sheng has designed an online questionnaire system. In order to collect sufficient sample materials in the shortest time so that he can graduate, he used a lucky draw as the incentive. He stated in the questionnaire that “each person can only complete the questionnaire once daily. The more times one completes it, the higher the chances of winning the prize.” In other words, his research subjects can complete the questionnaire repeatedly/several times. What type of inappropriate research conduct has Hsiao Sheng committed? (1) Inappropriate procedures for data collection. (2) Fabrication/falsification of research data. (3) Plagiarism/pilfering. (4) Repeat release/publication of research findings; repeat application using the same research plan.

5.A guidance professor suddenly needed information on the experimental results. Hsiao Jiu, the graduate student responsible for

helping the professor to perform the experiment, found that three sets of data were still outstanding. In order to accede to the professor’s request and deliver the experimental results for the time being, he filled in the fields of the outstanding data with random numbers. What type of inappropriate research conduct has Hsiao Jiu committed? (1) Inappropriate procedures for data collection. (2) Fabrication/falsification of research data. (3) Plagiarism/pilfering. (4) Repeat release/publication of research findings; repeat application using the same research plan.

6.Hsiao Kwang has to submit several end-of-semester assignments. In order to meet the deadlines, he borrowed from works completed during his senior year for use as reference/model answers. However, he did not have sufficient time to make the appropriate rewrites. Instead, he directly copied the work into his new report. Eventually, he was able to complete all his assignments on time. What type of inappropriate research conduct has Hsiao Kwang committed? (1) Inappropriate procedures for data collection. (2) Fabrication/falsification of research data. (3) Plagiarism/pilfering. (4) Repeat release/publication of research findings; repeat application using the same research plan.

7.The research institution in which Hsiao Kwang is studying requires that graduate students publish at least one journal article before graduation. However, he is rushing to complete his Master’s thesis and really does not have time to write a separate journal article. So, he consulted online forums commonly used by graduate students to seek assistance and hopefully find another graduate student writing a journal article to list him as the second author. What type of inappropriate research conduct has Hsiao Kwang committed? (1) Inappropriate procedures for data collection. (2) Fabrication/falsification of research data. (3) Inappropriate claims of authorship. (4) Repeat release/publication of research findings; repeat application using the same research plan.

8.The research institution in which Hsiao Kwang is studying requires that graduate students publish at least one journal article before graduation. After completing the article, he is unsure whether his article will be published in time for the imminent graduation deadline. He decides to submit his article to three journals at the same time to increase his chances of being published. He also tells himself that if the article is accepted more than once, he will allow only one journal to

publish it and will retract his submission from the other journals. Is Hsiao Kwan’s research conduct inappropriate? (1)No. His conduct is reasonable because he will only select one journal in which his article will be published. (2) No. Multiple submissions is a common conduct in the academic and research community and can increase the paper’s exposure. (3) Yes. Although it is not wrong for him to submit the same article to multiple journals at once, it is a waste of resources if his article is accepted by several journals and he has to make retractions. The reasonable practice is to allow all journals to publish his article if they choose to do so. (4) Yes. Even if he eventually selects one journal for his article’s publication, his conduct still involves repeat publication and he has violated research ethics.



Research Misconduct: Fabrication and Falsification 1. Which of the following are incorrect descriptions of fabrication? (1) Refers to researchers creating nonexistent data. (2) Refers to research findings that the researcher fabricated. (3) In order to support the hypothesis of research, the researcher adjusted values that failed to reach a level of statistical significance to reach the said level of statistical significance. This behavior is called “fabrication.“ (4) The deadline of the seminar is approaching but the data just received would not have enough time to undergo statistical analysis. Therefore, some values should be entered and analyzed at random to complete the paper quickly. This behavior is called “fabrication.”

2. Which of the following are incorrect descriptions of falsification? (1) Refers to the researcher changing or deleting research data, results, or images. (2) Refers to the researcher manipulating research materials or equipment to verify their own set of research hypotheses. (3) In order to support the hypothesis of research, the researcher adjusted values that failed to reach a level of statistical significance so as to reach the level of statistical significance. This behavior is called “falsification.” (4) The deadline of the seminar is approaching but the data just received would not have enough time to undergo statistical analysis. Therefore, some values should be entered and analyzed at random to complete the paper quickly. This behavior is called “falsification.”

3. Most publishers or periodicals have rules for the processing of research images. Which of the following is the less permissible image processing method? (1) Adjusting the clarity of the image within a reasonable scope so that the readers can easily see the image.

(2) Deliberately blurring the image so that the reader cannot easily see the details. (3) Cropping out the blank area around the picture. (4) Retaining the original images after concluding the research.

4. Which of the following principles can help researchers avoid improper data processing? (1) Record all the experiment data and confirm the correctness of the data. (2) Do not fabricate or falsify research data or results because they did not meet expectations. (3) Consult experts or professors if there are questions about the processing of research data. (4) All of the above.

5. Which of the following are the main reasons findings should be presented faithfully? (1) To act in good faith and prevent false results from affecting personal credibility and career development. (2) False research results may infringe on the correctness of research performed by others and could cause physical and psychological harm to others. (3) If the results of false research are published, the researcher’s degree may be withdrawn by the Ministry of Education according to the Degree Conferral Act. (4) All of the above.



Research Misconduct: Plagiarism 1. Which of the following academic research behaviors may constitute “plagiarism”? A. The entire portion was copied from the work of others without indicating the source. B. The statistical results of one’s research data were not satisfactory, so the data was tampered with to meet the expected results. C. The works of others were reorganized without citing the source to make it looks like it was the researcher’s own work. D. Different passages of different articles were copied separately, and the sources were not clearly cited. (1) AC (2) ACD (3) ABC (4) ABCD

2. Which of the following is not a consequence of plagiarism? (1) Possible damage to one’s academic reputation. (2) The degree may be revoked. (3) The original author may appreciate your effort to copy his/her work. (4) The original author may file a lawsuit.

3. Which of the following is not a way to avoid plagiarism in academic writing?

(1) Understand the appropriate writing format for your academic field. (2) Try to copy from others instead of writing on your own. (3) Reference all quotes and cite the sources clearly. (4) Seek the permission of the original author if too much information is to be quoted.



Research Misconduct: Self-Plagiarism 1.Which of the following is "not" a possible scenario of self-plagiarism? (1)Duplicate publication on augmented research data (2)Text recycling of an article (3)Enhancing research results, figures, and tables (4)Research data fragmentation / salami slicing 2.Shelly wants to submit an article she wrote based on her research results. Which of the following is an effective method to avoid selfplagiarism? (1)Massive usage of my own published content is fine, as long as the source of information is cited. (2)If I want to use my own published text, I have to paraphrase everything to avoid textual self-plagiarism, but I can use the figures or tables directly. (3)Put all the published seminar article content into the journal article. (4)Exclude the data used in the pilot study from the new article, and collect data for analysis separately. 3.Which of the following is "not" a possible cause of self-plagiarism? (1)Mention of previous research results is inevitable, so I should use my own published text to avoid plagiarizing others. (2)To ensure the quality of one's article and the accuracy of research results (3)Limited language ability- fear of inaccurate expressions in the article, thus using one's published texts. (4)The pressure of publishing a certain number of papers within a certain period of time 4.As a member of academia, which of the following behaviors is an effective method to avoid self-plagiarism? (a)Avoiding duplicate publication with the same result. (b)Incorporating new data into existing data and rewriting it as a new research article for submission. (c)Avoiding reinterpretation of the same data for research submission. (d)Taking advantage of methods such as quoting, paraphrasing, and summarizing to deal with previously written text; moreover, sources should be clearly indicated. (e)Using one's own published figure...


Similar Free PDFs