1. Trang chủ
  2. » Luận Văn - Báo Cáo

Một số câu trong nội dung tham khảo kiểm tra đạo đức học thuật tại Đài Loan

29 24 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 29
Dung lượng 918,42 KB
File đính kèm ethics answer 1.rar (854 KB)

Nội dung

Đạo đức học thuật là một phần quan trọng trong hệ thống giáo dục tại Đài Loan. Các câu hỏi trong bộ tham khảo này nhằm đánh giá kiến thức và nhận thức của học sinh về nguyên tắc và chuẩn mực đạo đức trong nghiên cứu và học tập. Nội dung tập trung vào việc nhận biết sao chép, đạo văn, gian lận trong nghiên cứu, cũng như tầm quan trọng của việc trích dẫn nguồn gốc một cách chính xác. Đồng thời, câu hỏi cũng giúp học sinh nhận thức được trách nhiệm của mình trong việc bảo vệ quyền sở hữu trí tuệ và tôn trọng công sức nghiên cứu của người khác. Qua đó, mục tiêu chính của bộ tham khảo này là tạo ra một lực lượng lao động trí thức có đạo đức và tự trọng trong lĩnh vực học thuật và nghiên cứu.

lOMoARcPSD| 17583165 ethics answer 1 Which of the following statements on privacy and the right to privacy is incorrect? (1)Infringement of privacy does not necessarily infringe on the right to privacy (2)Right to privacy is broader in scope than privacy (3)People, things, and things that individuals not want others to know are all considered to be private (4)Privacy varies according to each person’s feelings or thoughts What is the difference between “Academic Ethics of Researchers” and “Key Points on Processing and Reviewing Academic Ethics Cases”? (1)The former is a code of conduct, and the latter is a hearing process (2)The former is the focus of the review, and the latter is the code of conduct (3)The former is the focus of the review, and the latter is an explanation of criminal liability (4)The former is a code of conduct, and the latter is an explanation of criminal liability If a person who has a conflict of interest with an applicant serves as a member of the research ethics committee, and is responsible for reviewing this application case, which of the following situations will be more likely to occur? (1)Failure to follow research methods during the experimental process (2)Publishing false research results (3)Research participants or subjects assuming excessive or unnecessary risks (4)An increase in the research costs Under which of the following circumstances is “quoting” not required? (1)When citing the original text of another writer’s work (2)When presenting the original response content of an interviewee (3)When interpreting one’s own viewpoint (4)When citing secondary data Professor Chang discussed the topic of academic ethics with his freshmen in his course on “Research Methods in Pedagogy.” Many students expressed their viewpoints Which two of the following statements are correct? Hsiao-Chi: The spirit of academic ethics includes fairness, honesty, and accountability We should conduct research with these ethics in mind in to earn the trust of the public in the research results, as well as contribute to the long-term development of scientific research Hsiao-Lun: Academic ethics is a code of conduct for professional researchers Since graduate students are still learning, we can decide whether to follow them or not There is no mandatory requirement for us Fei Fei: The term “research” in the “Human Subjects Research Act” is limited to high-risk human medical research, such as injection of experimental drugs and clinical trials The law does not apply to other research types Ti Ti: According to the provisions defined in the Personal Information Protection Act in Taiwan, researchers must acquire participants’ consent prior to collecting, processing, and using their personal data Hsiao-Ming: The Copyright Act protects the copyrights of verbal and textual works in academic research (such as dissertations, seminars, and journal articles) However, it has not been extended to cover other types of academic achievements, such as computer programs, drama creations, and industrially designed products (1)Hsiao-Chi and Fei Fei (2)Hsiao-Lun and Hsiao-Ming (3)Hsiao-Chi and Ti Ti (4)Fei Fei and Ti Ti Under which of the following circumstances is self-plagiarism less likely to occur? lOMoARcPSD| 17583165 (1)After some content of an original paper is translated, edited, and cited, it is published in a foreign language journal (2)Research results are separated into several different papers and published in different journals, but no annotations are made to indicate that some data has already been published or is currently being submitted for publication (3)In order to increase the number of research publications, the same paper is submitted to different journals for publication without undergoing any substantial revisions (4)Adding some new data to a previously published paper and republishing it as a new paper Which of the following is the purpose of the Personal Information Protection Act? (1)To protect personal knowledge (2)To promote personal safety (3)To protect the healthy development of youth (4)To protect information privacy and promote the rational use of personal data When collecting personal information from concerned parties, which of the following does not require legal notice? (1)Classification of personal information (2)Name of organization (3)Acquirable interest (4)Rights of concerned parties Aming does not want his fingerprints, sex life, or medical records shared with others Which of the above are protected by privacy law? (1)Fingerprints (2)Sex life (3)Medical records (4)All of the above 10 Some students are discussing “self-plagiarism.” Which of the following is the most correct statement on selfplagiarism? (1)Jake: Using part of last semester's class report for the current semester does not constitute self-plagiarism due to the different course content (2)Alfred: Using the charts in journal articles published previously by the author himself but rewriting the text that explains the charts does not constitute self-plagiarism (3)Mary: Since the new paper is based on the previous one written by the author, retrieving the content of the previous paper does not constitute self-plagiarism (4)Betty: Revising the paper previously published by the author, adding it to the new research paper, submitting it to another journal, and indicating the source of information does not constitute self-plagiarism 11 Which of the following does not constitute “tampering”? (1)The researcher deliberately modifies research results that are inconsistent with the study’s hypothesis (2)The researcher falsifies non-existent data (3)The researcher over-embellishes existing images in the research (4)The researcher unreasonably manipulates the research data 12 Meimei is a student in the performing arts department In order to introduce the dance of the Dai ethnic group in a class, a clip is shown of a dance troupe performing a Dai dance in a public show If we wish to consider whether this citation behavior is within reasonable limits, which of the following would not be an important factor to consider? lOMoARcPSD| 17583165 (1)The purpose and nature of use (2)The nature of the work (3)The credibility of use (4)Potential market influence 13 Which of the following statements on paraphrasing is incorrect? (1)The contents of the source data are re-expressed (2)Information from different articles is collated and merged (3)The text must be very different from the original after paraphrasing (4)The intended meaning of the original text is interpreted in your own words 14 Chen graduated from a research institute that requires graduate students to publish at least one journal article before graduation After Chen completed the journal article, he found that the expected timeframe for graduating was imminent He was not sure whether his work would be successfully accepted by the journal before graduation Therefore, he decided to submit the paper to three journals at the same time to increase his chance of getting it published He also thought that if the paper was accepted by more than one journal, he could choose to withdraw the other submissions, leaving only one journal to publish his paper Does Chen’s behavior constitute improper research behavior? (1)No, because he will only choose one publication in the end, and there will be no problem of repeated publication (2)No, because multiple submissions of a paper’s draft can increase the acceptance rate and it is a common submission technique in academic research (3)Yes, because Chen should respect the decision of the journal to publish his article Once the paper has been accepted by a journal, it should be published instead of being retracted (4)Yes, because although Chen will eventually only choose one publication, he will submit the same paper to multiple journals, which raises the problem of multiple submissions 15 Authors have “personality rights” and “property rights.” Which of the following does not belong within the protective scope of “property rights”? (1)Right of publicity (2)Public broadcast rights (3)Public dictation rights (4)Public performance rights 16 In principle, when authors obtain copyrights? (1)Authors obtain copyrights when they register their work (2)Authors obtain copyrights when they complete their work (3)Authors obtain copyrights when the responsible government agencies have approved it (4)Authors obtain copyrights when their work is available for reference 17 There must be proper referencing to use the works of others in your own work Which of the following is the most correct statement on proper referencing? (1)The original text will be clearly indicated as such by having it in italics, but it is not necessary to indicate its source (2)Use quotation marks at the beginning and end of the quoted text and indicate its source (3)The quoted text is in a separate paragraph, and quotation marks are at the beginning and end of the text Even if the entire content of another paper is quoted, it must be within a reasonable scope (4)The quoted text is in a separate paragraph and is indicated as such with a dash at the beginning and end There is no need to indicate the source explicitly 18 Director A of a research institute led a research team in conducting cell growth research At the same time, he was supported by private company B He used the products of B in the experiment, and he embellished the lOMoARcPSD| 17583165 effects of the products Researcher C of the team later discovered that the product did not perform as well as it was reported to and published these results Which of the following statements is correct? (1)The case describes the “Conflicts of Interests of the Research Ethics Committee.” (2)Director A asked the research team to embellish the research results for personal gain This is a systemic issue and has nothing to with personal conflicts of interest (3)Director A asked the research team to embellish the research results to ensure that they would have sufficient funds for the research, which means that this involves an institutional conflict of interest (4)To keep working, Researcher C cooperated in embellishing the research results, which constitutes an institutional conflict of interest 19 In academic writing, which of the following rights may be related to “citing” the works of others in one’s own paper? (1)Distribution rights (2)Reproduction rights (3)Adaptation rights (4)All of the above 20 Which of the following statements on “quoting” isKUNING !!!) incorrect? ( SALAH (1)The purpose of citing the works of others is to give readers a better understanding of the relevant literature (2)It is necessary to correctly cite the source of the quote to avoid plagiarizing the research of others (3)Quotations have their own formatting, and the reference must be clearly indicated at the end of the text (4)If the quotation is placed in the running text, quotation marks should not be used to avoid visual confusion 21 The day before discussing their research progress with their advisor, Student Zheng finds that his experiment is behind schedule, and there are three sets of experimental data that he has not yet obtained In order to catch up on his report progress, he randomly enters numbers into the three data result tables to show his advisor for the time being Which of the following improper research behaviors has Student Zheng demonstrated? (1)Inappropriate research data collection procedures (2)Duplicate reporting and publication of research results (3)Plagiarism issues in the dissertation (4)Fabrication of and tampering with research data 22 Bob and Mary are a married couple Bob is required to travel abroad for work and is worried that Mary will be unsafe at home alone Therefore, he installed a pinhole camera in the living room at home without the knowledge of Mary so that he can check on her from wherever he is As per the provisions of criminal law, does the behavior of Bob constitute an infringement of Mary's right to privacy? (1)No, because Bob installed the pinhole camera in the living room of the house, which is a public premise, and his behavior is justified by the need for home security (2)No, because this is Bob's home, and he can install pinhole cameras anywhere in his own home for any reason (3)Yes, he has infringed on Mary's right to spatial privacy (4)Yes, he has infringed on Mary's right to personal privacy 23 lOMoARcPSD| 17583165 Two years ago, Hsiao Hua was still a graduate student She collected the data for one of her studies through an online questionnaire survey The 535 participants that responded to the survey were asked to provide their real names, addresses, telephone numbers, and email addresses, so that she could send them a small gift as a reward Prior to the collection of such information, Hsiao Hua had specified the purpose of the data collection as well as that they would be used only for sending the gift In addition, the participants had the right to choose not to provide the information Hsiao Hua only sent the gifts to the participants that signed the online consent form Following the completion of her master’s degree, Hsiao Hua remained at the same institute to continue her studies as a doctoral student To support an activity organized by the institute, she extracted the information of the participants collected for gift distribution and sent them an invitation to the event on behalf of the institute Has Hsiao Hua’s behavior violated the Personal Information Protection Act of the R.O.C (Taiwan)? (1)No, since she was sending an invitation for an academic event, which is considered usage of private information for educational purposes; thus, her behavior did not violate the law (2)No According to the Personal Information Protection Act, online consent is not valid Therefore, the previous documents not have a legal effect (3)Yes She should not send the invitation on behalf of the institute, as it not only violates the Personal Information Protection Act, but also misappropriates the name of her institute (4)Yes The participants only granted permission for their information to be used to receive the gift Now that Hsiao Hua has changed the usage policy of their information; her behavior has violated the Personal Information Protection Act 24 Based on the principle of beneficence as described in the Belmont Report, how does a researcher assess whether research can be carried out? (1)The researcher seeks to maximize benefits, minimize risks, and optimize compensation (2)The researcher seeks to maximize benefits, maximize risks, and optimize compensation (3)The researcher aims to cause no harm, maximize benefits, and minimize risks (4)The researcher aims to cause no harm, minimize benefits, and minimize risks 25 Which writing tip on “summarizing” is incorrect? (1)When to use: Shorten long texts such as an entire chapter or an entire book (2)The text is longer than the original after summarizing and would have required more words to explain the original text (3)The summarized text is shorter than the original (4)It is similar to explaining ideas “in a nutshell,” where a small amount of text is used to convey the original content 26 Which of the following does not imply interference with scientific research integrity? (1)Manipulating the research results (2)Designing the research methods (3)Publishing the article under another name (4)Participating in false promotion 27 Which of the following is an acceptable post-production method for an image used in a study? (1)Adjusting the clarity of the image to a reasonable extent (2)Deliberately deleting certain images that are inconsistent with the hypothesis of the study (3)Misappropriating images from other people’s work without proper referencing (4)Cropping and collaging multiple images and misleading readers into thinking that the collage is the original image lOMoARcPSD| 17583165 28 Which of the following is a true description of research ethicsKUNING standards? ( SALAH ) (1)Standards of research ethics may have slightly different principles of practice and operation in different fields (2)Academic writing styles (e.g., APA) are standards of academic writing, and are not in the scope of research ethics (3)Generally, biomedical field research ethics standards are more relaxed than those of other fields (4)Research ethics standards are only the highest standards for research behavior, so researchers can follow them selectively 29 According to the provisions of the Personal Information Protection Act, which method of obtaining personal data requires informing the parties about the source of the data? (1)An employee has engaged in dereliction of duty The boss obtains the contact information of the employee to understand the cause (2)A communications firm obtains the mobile numbers of members from an online shopping website (3)The reporter obtained the name of the wanted criminal from the police department (4)The program host obtains the list of participants from the research assistant to understand the distribution of participants 30 Which of the following options is not a method of avoiding plagiarism in academic writing? (1)Understanding the correct form of writing in one’s own academic discipline (2)Avoiding doing one’s own writing as much as possible, and completely copying the works of others (3)Clearly quoting and annotating reference literature when citing data from others (4)Seeking permission from the original author when quoting an excessive amount of data 31 Publisher A has previously published the works of Writer B If Publisher A wants to republish the works of Writer B, who passed away ten years previously, according to the Copyright Act, what is the most appropriate way for Publisher A to proceed? (1)Make a note in the book’s sources that this is the work of Writer B (2)The protection period of Writer B’s property rights has already expired, and so Publisher A does not require authorization for publishing (3)The property rights of Writer B expired upon their death Publisher A can freely use their works (4)Publisher A must obtain authorization from the heirs of Writer B 32 Regarding the following descriptions of the writing format and specifications for submissions laid out by various research fields and academic journals, which of the following is incorrect? (1)Following the academic writing format and submission criteria can be regarded as meeting the requirements of research ethics (2)The establishment of writing formats and submission specifications will stifle the freedom of speech of researchers and is a violation of research ethics (3)The format and specifications may not be the same across fields and journals, but the core principles are usually the same (4)The purpose of formatting submission specifications is to prevent improper citations or plagiarism and to ensure the quality of academic publications 33 lOMoARcPSD| 17583165 Xiaolu is a teacher at Kuaile Primary School, and a student at Kaixin University Graduate School In order to conduct a study, Xiaolu’s advisor, Professor Huang, hopes that Xiaolu will allow him to observe the behavior of students in Xiaolu’s class from the back of the classroom; Professor Huang will of course obtain permission from the children and their parents Is Professor Huang’s request fully in the spirit of “voluntary participation in research”? (1)Yes, Professor Huang did not compel Xiaolu to provide consent (2)Yes, there is no stakeholder relationship between Professor Huang and the participants (students) (3)No, student willingness to participate may be affected by concerns for their grades (4)No, the students are persons with limited capacity for conduct and not have the right to decide 34 Which of the following is the best way to avoid plagiarism? (1)Asking a senior student to modify the contents of the plagiarized text slightly (2)Using the correct academic writing format (3)Doing a simple order rearrangement when citing the original text (4)Not indicating the source of the data to avoid being caught 35 Which of the following is not the fundamental principle that must be followed in the research process as described in the Belmont Report? (1)Respect for human dignity (2)Obeying the law (3)Beneficence (4)Justi ce 36 Researchers applied to the Ministry of Science and Technology for a special research project The ministry required the researchers to behave according to academic ethical norms What is the academic ethical norm set by the Ministry of Science and Technology? (1)Human research ethics policy guidelines (2)Researchers' academic ethics (3)Precautions for collecting and using human bodies (4)Human trial management method 37 Wang is a good friend who is studying at a different school and wants to borrow your school ID number and password to log on to an academic database that your school has purchased, so that he can download a large volume of electronic documents How should you respond to him in order to avoid issues of research ethics and copyright violations? (1)Agree to his request because he has legitimate and reasonable usage intentions related to academic research (2)Agree to his request because the digital database that your school purchased is open to the public for use (3)Refuse his request and ask him to use a service like the “Nationwide Document Delivery Service” and acquire necessary data through more legitimate methods (4)Refuse his request and first ask your tutor; if he/she agrees, then you can lend him your ID and password 38 The study led by Lin involved the contributions and aid of many people When considering who is qualified to be a coauthor of the paper, which of the following people should be excluded? (1)The research assistant: He provided much needed administrative support (2)Another experiment facilitator: He agreed to lend special experiment instruments to Lin (3)A senior student from the Foreign Language Institute: She provided English editing services to Lin (4)Head of the doctoral class: He assisted Lin in organizing and designing the experiment along with guiding her as she wrote the journal article lOMoARcPSD| 17583165 39 What is wrong with the following descriptions of “fabrication” and “tampering”? (1)Data that was not generated from the research process constitutes “fabrication.” (2)Deleting real data, images, and results is “tampering.” (3)Fabrication and tampering can be used to hide contradictory research results (4)When applying for a research project, nonexistent information is not written in the application materials 40 Which of the following is not a possible reason for self-plagiarism? (1)When writing a thesis, it is inevitable that the results of the previous research will be mentioned To avoid plagiarism, the author should use his/her own published work(s) (2)To ensure the quality of the research paper and the accuracy of the research results (3)The language skills shown in the text are limited, and the author is worried that the text is not correctly worded, so he/she uses text that he/she has previously published (4)There is pressure to publish a certain number of papers within a certain period 41 Which of the following describes the proper way of using quotation marks when writing a thesis? (1)When writing a person’s name, use quotation marks to emphasize his/her research contributions (2)When referring to important ideas put forward by others, use quotation marks to present the text clearly; there is no need to mention the source (3)If more than 80 words are to be quoted, quotation marks must be added, and the cited text should be in its own paragraph If this is done, there is no need to indicate the source (4)If 33 words are to be quoted, quotation marks should be used to distinguish it from other text, and the source should be indicated 42 Which of the following is an example of information fabrication? (1)The professor copied the content of a postgraduate study without indicating the source (2)The professor changed the color of the images in the experiment records (3)The professor applied for a research project of the Ministry of Science and Technology (4)The professor helped his/her graduate students change the original research data 43 Are news reports that solely report facts that are being used in language books protected by copyright law? (1)Yes (2)No (3)Copyright law does not apply (4)It depends on whether copyright law protects the content of the report 44 Which of the following statements on the Taiwanese position on the management of conflicts of interest is incorrect? (1)Taiwan has regulations governing conflicts of interest (2)Many research institutions have internal conflicts of interest management practices (3)The government must establish the Conflict of Interest Review Committee before it becomes legitimate (4)The Public Officers Conflict of Interest Avoidance Act clearly defines interest 45 Which of the following statements on conflicts of interest in scientific research is incorrect? (1)It is difficult to avoid situations involving conflicts of interest (2)Conflict of interest means that secondary interests improperly influence the primary interest (3)Conflicts of interest require both possibility and severity (4)Secondary interests in a case of conflicts of interest must be illegal lOMoARcPSD| 17583165 46 Privacy can “release [people’s] tension and pressure, and enable them to be themselves in their private space without interference or blame from others.” Which value of privacy does this statement refer to? (1)Protecting communication with others (2)Self-evaluation (3)Releasing emotions (4)Respecting personal autonomy 47 Which personal data is not allowed to be collected, processed, or used under Article 6, Paragraph of the Personal Information Protection Act? (1)National ID number (2)Medical information (3)Family information (4)Fingerpri nts 48 Which of the following four types of personal information is not protected by the Personal Information Protection Act? (1)Non-anonymous job satisfaction questionnaires completed by employees (2)The personal profile of a deceased person (3)An employee address book arranged by the staff (4)Health records of the cleaning staff 49 Hsiao-Hua is a graduate student of business management The following paragraph describes how he wrote his master’s thesis Please read through and determine which type of misconduct was involved during the process: In the early stage of the research, Hsiao Hua used a questionnaire to collect the information he needed and analyzed the collected data using professional statistical software However, the results were not ideal and did not support his research hypothesis Therefore, he deleted and modified some of the data that may have affected the results from the final table to ensure the data supported his hypothesis At the end of the school year, he successfully completed the master’s thesis and passed the oral defense of the thesis After another half a year, referring to the suggestions given by the thesis defense committee, he applied a more sophisticated statistical method to analyze the same raw data This time, he did not modify any data and wrote a new paper based on the actual analysis results The paper was successfully published as a proceedings paper at a domestic academic seminar (1)This is data fabrication (2)This is data falsification (3)This is data fabrication and duplicate publication (4)This is data falsification and plagiarism 50 “The Chinese New Year is approaching so we must our spring cleaning This Sunday morning, Mother will mop the floor, Father will sweep the floor, Sister will wipe the windows, Brother will clear the spider webs, and I will wash the pots.” If the above content is to be “summarized,” which of the following would be the most appropriate summary? (1)Because Chinese New Year is approaching, we must clean up to replace the old with the new Our family will work together This Sunday morning, Mother will mop the floor, Father will sweep the floor, Sister will wipe the windows, Brother will clear the spider webs, and I will wash the pots (2)The Chinese New Year is approaching We must our spring cleaning This Sunday morning, Mother will mop the floor, Father will sweep the floor, Sister will wipe the windows, Brother will clear the spider webs, and I will wash the pots lOMoARcPSD| 17583165 (3)The Chinese New Year is approaching Our family will spring cleaning together this Sunday (4)The Chinese New Year is approaching It is this Sunday morning 51 Which of the following statements on “improper author indication or naming” is incorrect? (1)An unfair naming sequence of the authors is one possible cause of this (2)A “ghostwriter” is an improperly indicated or named author (3)As long as the other co-authors agree, it can be considered as reasonable naming (4)It is an instance of an author name being falsely recorded 52 Postgraduate student A writes a note every time he does an experiment, which includes his experience with the experiment, areas for improvement, and the experimental results However, the information is only for his reference and has not been made public One day, A lent his notes to classmate B with whom he had a good relationship When lending the notes, A told B that the note was for B’s reference only and that it should not be lent to others and that the content should not be shared On the other hand, B has the habit of blogging as a way of noting things After reading the notebook of A, B extracted some of the contents and posted them on his blog for future reference (the blog is available to the public, but aside from B's friends, nobody else was reading it) (1)B’s blog is for personal use, and there are no advertisements on the blog and no profits Therefore, B’s behavior did not infringe on any of A’s rights (2)If the blog post of B is one day discovered by A, it will be immediately deleted If no one sees the blog post, B did not infringe on A’s rights (3)If B demonstrates that the source and extraction of the content was reasonable, then reasonable use can be claimed (4)If B demonstrates that the source and the extraction of the content was reasonable, reasonable use could not be claimed 53 Medical institution A intends to conduct a human trial on 16-year-old subject B for the study of a certain disease Who is responsible for providing written consent? (1)B must provide written consent (2)The legal guardians of B must provide written consent (3)B or one of his/her legal guardians must provide consent (4)B and one of his/her legal guardians must provide consent 54 It is common to see authors cite the work of others Which of the following is not a reason why authors would cite the work of others? (1)To increase research novelty (2)To strengthen their own dissertation (3)To clarify the research topic (4)To make the research more in-depth 55 Which of the following is not one of the three fundamental principles of the Belmont Report? (1)Beneficence (2)Justice (3)Loyalty (4)Respect for human dignity 56 Regarding research ethics, which of the following is not a general condition that academic authors must comply with? (1)Providing funding for the research lOMoARcPSD| 17583165 80 Which of the following pairings made in reference to the Belmont Report is incorrect? (1)Origins - Events that began in human studies (2)Belmont Report - Principle of subject protection (3)Vulnerable Groups - Completing the process of informed consent (4)Systematic assessment of risks and expected benefits - Exercising the principle of justice 81 Which of the following acts may constitute academic plagiarism but may not necessarily violate the relevant provisions of Taiwan’s copyright law? (1)Copying the national exam analysis published by a cram school but not indicating the source (2)Copying the draft press release of a government agency but not indicating the source (3)Copying the foreword of a classmate's report without consent but translating it entirely into English (4)Overhearing the ideas of other students and writing their ideas into a report 82 In order to complete her end of term written report on her philosophy of education, Xiaomei collects data from five websites and assembles the data into a complete report Is Xiaomei’s behavior plagiarism? Please select the most appropriate response (1)Yes, because she did not first inform her teacher (2)Yes, because she made excessive use of other people’s work and did not attach sources and data related to the cited material (3)No, because she did not copy complete articles (4)No, because this is only a classroom report, not a formally published thesis 83 Which of the following is not an attitude that an author should possess? (1)An author should provide concrete and substantial academic contributions to the paper (2)The paper to be submitted should be reviewed, and the correctness of the content should be ensured (3)The author should share the academic credit with the other authors while also sharing the responsibilities (4)All relevant persons involved in the research should be named authors to maximize the benefits 84 “Miyazaki emphasizes ‘I am still very enthusiastic about animation and will continue to work until I die.’” Is the sentence within the quotation marks a correct quotation? (1)Yes, only those within the quotation marks are quotes (2)Yes, as long as it identifies who the respondent is, it is called a quotation (3)No, if single quotation marks are used in the text, and double quotation marks (“”) are added, the source must be indicated (4)No Because the quoted sentence does not have research value, it is not a correct quote 85 Which of the following statements about “plagiarism” and “self-plagiarism” is wrong? (1)Compared to plagiarism, which may violate copyright law, self-plagiarism does not raise the possibility of a lawsuit from the original author (2)The judgment criteria for plagiarism are vague while the judgment criteria for self-plagiarism are more specific (3)Plagiarism can mislead readers regarding the source of the material Self-plagiarism can mislead readers about the source of innovation (4)Making good use of writing skills and clearly indicating the sources of information can help to avoid these two behaviors generally 86 Which basic principles of research ethics can be summarized from the Nuremberg Declaration, Declaration of Helsinki, and Belmont Report? lOMoARcPSD| 17583165 (1)The principles of fair treatment, explicit communication of the obligations of the researchers, informed consent of the participants, and protection of the participants’ privacy (2)The principles of equality of opportunity, peaceful communication, rational negotiation, and confidentiality (3)The principles of efficiency, equal treatment, universality, and the precise definition of rights and obligations (4)The principles of confidentiality, protection of the privacy of researchers and participants, equal treatment, and efficiency 87 Hsiao-Ming is a graduate student of clinical psychology He recently wrote his master’s thesis proposal in Chinese and encountered a problem in the process He intended to define some theories of psychology and experimental variables in the “terminology” section However, he felt that since he is not a theoretical expert or a master in psychology, it was difficult for him to propose a definition and interpret the corresponding terms Therefore, he consulted his classmates, hoping to find the most appropriate wording Which of the following suggestions is the most appropriate? (1)Hsiao-Mei: Hsiao-Ming is a student; hence, he is not qualified to define the theory or terms In order to ensure accuracy, he should refer to related Chinese journal articles, and use the exact terminology and definitions proposed by the authors of corresponding theories and terms Since in academic writing it is usually not necessary to include citations in the “terminology” section, he does not need to specify the source of the definition (2)Hsiao Hua: Hsiao-Ming should read related articles as much as possible, understand them, and use his own words to summarize and interpret each theory and term, as well as include proper citations of the source article (3)Hsiao-Tien: According to Taiwan Copyright Act, Hsiao-Ming should find the author that first proposed these theories and terms and ask for their consent to use their proposed definition Then, he should quote the exact words in the “terminology” section with quotation marks Since quotations marks indicate that the quoted parts are not originally proposed by the author, Hsiao-Ming does not need to include additional information about the source (4)Any of the above suggestions are acceptable 88 What is the most significant difference between “paraphrasing” and “summarizing”? (1)Paraphrasing is only adding or removing a few words from the original text Summarizing requires the addition of subjective awareness (2)Paraphrasing results in a length similar to the original text while summarizing results in a shorter body of text (3)After paraphrasing, the length is shortened, and source text is simplified After summarizing, the length of the text is slightly longer than the original (4)All of the above 89 The precondition for effective treatment of conflicts of interest is that the researcher must first recognize the secondary benefits that he or she may receive In the context of a conflict of interest, the principle for managing conflicts of interest should include which of the following: A disclosure, B consent, C review and authorization, D prohibition, or E protection? (1)A, B, C, D, and E (2)A, B, C, and D (3)A, C, and D (4)C, D, and E 90 Teacher Wang confiscated the diary that Alvin and Jason were exchanging and read the content out loud during class Which aspect of Alvin and Jason’s privacy did Teacher Wang violate? lOMoARcPSD| 17583165 (1)Privacy of the body (2)Personal privacy (3)Spatial privacy (4)Secret communication privacy 91 From the perspective of research ethics, regarding data collection procedures, which of the following is not a required data collection procedure? (1)Researchers must use ethical procedures to collect, analyze, and save data (2)If the results of data analysis are not as expected, other statistical analysis methods can be used to remedy it, but the original data should never be tampered with (3)Researchers should choose different methods to protect the experimental subjects during the study according to different research subjects (4)At present, the academic community has requested that research plans in all fields pass the ethical review of the Institutional Review Board (IRB) before the study officially begins 92 Which of the following is consistent with the principle of “justice” in research behavior, as stated in the Belmont Report? (1)Because of personal factors, a person who does not meet the conditions for recruitment is included in a human trial that may be beneficial to him (2)It is not because of the necessary research considerations, but because of the convenience of sampling and the high degree of cooperation, that certain disadvantaged groups have been targeted (3)Material benefits were used to induce disadvantaged groups to participate in the study (4)Ensure that the participants benefit from the research results 93 From the start of writing a research paper to its successful submission, which of the following statements does not describe a behavior that a responsible researcher should exhibit during the publication process? (1)Learning about academic writing formats in their own professional field (2)Following the writing format for proper citations and creating charts as well as properly organizing references (3)Reading the submission rules for academic research journals in detail and avoiding situations such as multiple submissions, plagiarism, and infringement of copyrights (4)Overexplaining the content of charts in the expectation that the article will more likely be published 94 Which of the following methods is more inappropriate in quoting the arguments or work of others? (1)For quoted text within 40 words, single quotation marks should be placed before and after the text and sources should be correctly indicated (2)If some words in the quoted text are changed, such as “also” to “at the same time,” there is no need to indicate the source (3)The length of the quoted text should not exceed 500 words If it exceeds this length, the original author’s consent should be obtained first (4)If the quoted text is more than 40 words, it must be placed in a separate paragraph, and formatting adjustments and citations should be made in accordance with academic writing rules 95 As per the provisions of the Personal Information Protection Act, the parties have several rights toward the entities that collect their personal data Which of the following statements is incorrect? (1)They can ask for access to another person’s profile (2)They can request to see your personal data (3)They can request to supplement their personal data (4)They can request to delete their personal data 96 lOMoARcPSD| 17583165 According to the style guide of the American Psychological Association, which of the following is the correct way to present the original responses of those interviewed? (1)If the number of words quoted is 45 words, it must be presented in a separate paragraph (2)If the number of quoted words is 20 words, it must be presented in a separate paragraph using quotation marks and a different font (3)If the number of quoted words is 100 words, the original text must be presented using quotation marks and a qualitative manuscript (4)If the number of quoted words is less than 10 words, quotation marks are not required 97 According to Article 19, Section of the Personal Data Privacy Act, when non-government agencies collect or process personal data, with the exception of sensitive data, they should have a specific purpose and meet which of the following conditions? (1)Legal regulations (2)Written permission of the concerned party (3)Necessities related to the public interest (4)All of the above 98 What kind of experimental research is related to the origin of the Belmont Report? (1)Field survey research (2)Human experiment research (3)Observational research (4)Case studies 99 As per academic conventions, when there are multiple co-authors of a paper, what sorting principle is most commonly used? (1)Order the names by surname (2)Put the leading author’s name first (3)Order the names by academic field (4)Order the names by work contribution 100 Which of the following situations involves the management of conflicts of interest? (1)Wang is a member of the Human Subjects Committee She discovered that a recent application was delegated by a biotechnology company that was funded by her mother, so she disclosed the relationship to the committee (2)Hsu is a researcher for a pharmaceutical company She was also stationed at V Hospital, which cooperated with said pharmaceutical company in recruiting subjects and conducting clinical trials She was wearing a white lab coat and introduced herself to the subjects as a pharmacist (3)Chen is an assistant professor at a chemical engineering research institute She accepted research funding from T Corporation At the same time, she instructed students to participate in research projects in which she collaborated with T Corporation and used those projects for the thesis topics of her students (4)A research doctor serves as the clinical trial host in the hospital As the trial progresses smoothly, she begins buying shares of the drug company 101 From the research ethics point of view, who is most qualified to be listed as a co-author aside from the primary author of the paper? (1)The researchers who designed the experiment (2)The members of the Institutional Review Board (IRB) who reviewed the study (3)The interview respondents (4)The assistants who collected and input the data 102 lOMoARcPSD| 17583165 Happy Elementary School sent Jane her admission notice Upon receiving it, her mother immediately opened the letter Did Jane's mother violate her privacy? (1)No, Jane’s mother did not violate her privacy (2)Yes, Jane’s mother violated her privacy (3)If Jane’s mother opened the letter in front of her, then she did not violate Jane’s privacy (4)If Jane was upset from learning about this, then Jane’s mother violated her privacy 103 As a member of academia, which of the following actions are effective ways to avoid self-plagiarism? A Do not repeat the publication of the same research data; B once new information has been added, write it as a new research paper; C avoid rewriting the original paper as a new one after including additional data; (d) make good use of quotations, paraphrasing, summarizing, and other such writing skills to reprocess text that has been written and clearly indicates the sources; or (e) take diagrams or tables that have been published and reuse them in another paper (1)A, C, and D (2)A, B, and E (3)A, B, and C (4) A, B, and D 104 Professor Ye wants to make a submission to a journal in the near future While writing for this journal, he refers to his previous journal articles Which of the following behaviors does not raise concerns about selfplagiarism? (1)Copying text from his previous journal article and only rewriting the conclusion, but clearly noting the source of information (2)Expanding and collecting new data for a previously published data set, conducting new analysis and writing a new article, but using paragraphs from the introduction and literature review sections of the original paper (3)Using an idea from his previously published journal article, planning new experiments and collecting new data, and rewriting the paper (4)Reusing charts and graphs from a previously formally published paper, but not copying any textual content 105 Which of the following is the most important difference between “summarizing” and “paraphrasing”? (1)“Summarizing” is copying part of the text while “paraphrasing” is expressing the content in a new manner (2)The text is usually more streamlined after "summarizing," while the length of the text after "paraphrasing" may be similar to that of the original (3)The length of the text after "summarizing" may be similar to that of the original while the result of "paraphrasing" is a partial copy of the original (4)The length of the text after "summarizing" is usually longer than that of the original, while the length of the text after "paraphrasing" is more streamlined 106 Ping Ping is a doctoral student of business management She recently completed a study and plans to submit the English version of the paper, which is mainly written by herself, to a foreign management journal According to the following description, in addition to Ping Ping, who is eligible to become the co-author of the paper? The supervising professor: He inspired Ping Ping’s research topic, helped her design the research, and helped her solve problems during the research process He also reviewed Ping Ping’s thesis draft several times and helped her revise the interpretation and deduction of the research results He was also a sponsor of her research Professor Williams: He was a professor at an American University who proposed the management theory adopted by Ping Ping in the thesis He and Ping Ping did not know each other and had no cooperative relationship with one another However, Ping Ping cited Professor Williams’ work several times in her thesis Professor Wang: He assisted Ping Ping in solving the difficulties related to statistical analysis, discussed the lOMoARcPSD| 17583165 inference of statistical results with her several times, and provided many viewpoints in terms of the interpretation of the research results, most of which were adopted by Ping Ping Assistant Professor Huang: He allowed Ping Ping to conduct questionnaire surveys with four of his groups As per the requirements of the research, each group was asked to complete the survey three times, at different stages of the study Ping Ping was very grateful to Assistant Professor Huang’s assistance in the recruitment of research participants (1)The supervising professor and Professor Wang (2)The supervising professor and Professor Williams (3)The supervising professor, Professor Wang, and Professor Williams (4)Professor Wang and Professor Huang 107 When quoting the works of others, which of the following is an incorrect quotation method that is not recommended for general academic practice? (1)When quoting a text verbatim, this should be clearly indicated by placing quotation marks before and after the quoted text (2)When quoting a text longer than 40 English characters, the original text should be placed alone in a separate paragraph (3)When quoting Chinese text longer than one line, the original text should be placed alone in a separate paragraph (4)Following the academic conventions of each field, or the recommended writing format of the submission journal when quoting literature 108 Which of the following situations is consistent with the principle of “justice” in the Belmont Report? (1)Allow long-term research participants to obtain benefits from the research free of charge (2)Everyone, regardless of who they are, must pay the same cost for research benefits (3)Taking advantage of vulnerable people’s trust in researchers so that they participate in a variety of longterm experimental studies (4)Allowing good friends to participate in the research with significant expected benefits 109 When Huahua was writing her assignment, she changed some words in a section of the text when citing an online journal in order to avoid plagiarism For example, she changed “teacher” to “professor” and “Taiwan” to “this country,” but did not change the original meaning Is Huahua’s behavior appropriate? (1)Yes, because if she changes several words, this is not plagiarism (2)Yes, because she did not copy and paste the entire text (3)No, because she only changed unimportant words (4)No, because web journals are of questionable credibility 110 Which research ethics does the statement “researchers should be treated and selected equally” refer to? (1)That the researchers clearly stated their obligations (2)The Researchers' informed consent principle (3)The principle of fair treatment (4)Protecting researchers’ privacy 111 Which of the following behaviors does not raise concerns of self-plagiarism? (1)Copying graphs or text from previously informally published reports (2)Deconstructing the results of one of the researcher’s studies and publishing them in different papers (3)Cases where the copied portions of text are not part of the core focus of the researcher’s papers (4)Integrating old and new data and submitting them in a new research paper 112 Which of the following is not an example of research ethics violation? lOMoARcPSD| 17583165 (1)Before citing the works of others, consent should be obtained and sources should be properly cited in the text (2)Rearranging a table used in another person’s thesis, and using the new table in the researcher’s own thesis without properly citing the source (3)Discussing the questionnaire content and personal privacy of participants with a third party who is not conducting related research (4)Intentionally deleting or overlooking some data so that the research results support the researcher’s hypotheses 113 From the perspective of research ethics, which of the following is a personal responsibility that a researcher should fulfill? (1)Even in high-pressure research situations, researchers should be able to review their own research behavior according to high ethical standards (2)Learning individual skills of ethical judgment, decision-making, and problem-solving (3)Carefully considering the potential benefits and effects of a decision before making the decision, and taking responsibility for the outcomes of the decision (4)All of the above 114 A research project has conducted a series of human trials in a poor community in the name of free treatment of syphilis However, during the study, the research team did not honestly inform the subjects that the purpose of the experiment was only to track the progression of syphilis patients who did not receive any treatment This incident involves many research ethical issues If we only look at it in light of informed consent, which of the following elements of informed consent did the researchers fail to meet? (1)The subjects should be made fully aware of the purpose and process of the research (2)The willingness of participants to participate autonomously should be respected (3)Reasonable compensation should be provided (4)All of the above 115 Which of the following is not an important aspect of conflict of interest management? (1)Protecting the rights and interests of participants (2)Protecting the integrity of research (3)Eliminating financial relationships from research (4)Assuring that major interests are not improperly affected by minority interests 116 Which of the following is the most important standard for judging “self-plagiarism”? (1)Structural source (2)Research basis (3)Originalit y (4)Reliabilit y 117 According to the Copyright Act, at what time does the creator of a work begin to receive copyrights? (1)When the work’s application process is completed (2)When the work’s registration process is completed (3)When the work is first publicly published (4)When the work is completed 118 The basic principles for the proper protection of the rights and interests of the subjects include the principle of “fair treatment.” Which of the following describes the principle of “fair treatment”? (1)Researchers treat all the research information they receive equally (2)People, things, and objects related to the subject's private life are not disclosed lOMoARcPSD| 17583165 (3)Researchers and subjects should all understand the research purposes (4)The subject decides independently whether to participate in the study 119 For the purpose of personnel management, privately-owned airlines require each new employee to fill out a basic data form In the basic data form, the name, ID number, criminal history, contact number, and other details are listed Which piece of information requested violates the provisions of the Personal Information Protection Act on the collection of personal data? (1)Name (2)ID number (3)Previous status (4)Contact number 120 Naomi wants to write her own research results in a journal article Which of the following is an effective way to avoid self-plagiarism? (1)It is acceptable for Naomi to use her own previously published work if the sources of information are clearly indicated (2)If Naomi’s own published papers are used, all the text must be rewritten to avoid plagiarism Drawings and tables can be used as they are (3)The content of the previously published seminar paper can be included word-for-word in the journal article (4)The data obtained in the pilot study should be excluded from the new paper and data should be collected again for a separate analysis 121 Which of the following is not a common type of general research ethics professional standard? (1)Universal declaration and report (2)Intuitive judgement based on personal experience (3)Research ethics norms established by a professional academic association (4)Research submission criteria stipulated by academic journals or publishing bodies 122 Different areas of expertise often have different academic referencing format specifications Which of the following reference formats is the least comprehensive? (1)A Study of Taiwan’s Move toward Learning Social Policy Formulation - Formation of Policy Issues, Policy Planning, and the Legalization of Policies (unpublished doctoral thesis) National Taiwan Normal University, Taipei City (2)Chang Fangfang (1995) Discussion on the Model of Professional Practice of Teaching Training Professional Development Symposium, Taipei City Teachers College (3)Wu Chingsan, Lin Tianyou, Huang Sanji (2000) Evaluation of the Professional Ability of Teachers and Teacher Selection in National Elementary and Secondary Schools Report on the Special Research of the National Science Council of the Executive Yuan, unpublished (4)Lin Wenda (1992) Educational Administration Taipei City: Sanmin 123 Which of the following individuals did not engage in appropriate conflict of interest management? (1)Professor Chang is a member of the Human Subjects Committee He does not participate in review meetings involving student research projects (2)Chen is a researcher at A Pharmaceuticals She is working on the preparation of a new pharmaceutical seminar article for the drugs that have been successfully tested in the factory recently (3)Wang is a research fellow in the field of chemical engineering In his contribution to the journal, he stated that his research funding came from a pharmaceutical company lOMoARcPSD| 17583165 (4)Professor Lin published a study on the effectiveness of A System The funding came from a grant from the Ministry of Science and Technology At the same time, he served as an advisor to the company that developed A System 124 Based on academic conventions, which of the following researchers is qualified to act as the author of a thesis? Student A: helped with data collection and statistical analysis; Student B: was responsible for writing the research plans, creating the experiment design, and analyzing research data; Student C: was responsible for writing the research paper; Student D: helped create the research figures (1)Only Student B (2)Both Student A and B (3)Students A, B, and C (4)Students A, B, C, and D 125 Which writing tip on quoting is incorrect? (1)The purpose is to clearly indicate the information referenced in the article to avoid plagiarizing the research of others and to allow the reader to learn more about the relevant literature (2)It is not necessary to clearly indicate references or complete bibliographic information in the text (3)Usually, quotations of more than 40 words require independent citations and that the quoted text be in a separate paragraph (4)Usually, quotations of more than 40 words are required to be included in the body and separated by quotation marks 126 Which writing tip on paraphrasing is incorrect? (1)Paraphrasing should be used when the reiteration and connotation of the articles are repeated, or the contents of multiple articles are combined in the same paragraph (2)The viewpoints of the original author should be kept and the opinions of the writer should be added in due course to re-express the information (3)The length of the rewritten text must be very different from the original (4)It is similar to the idea of “rewording”; other words and expressions are used to convey the meaning of the original text 127 Which of the following descriptions of “fabricated” data is wrong? (1)Fabricated data refers to researchers forging materials that were not included in the research process (2)Fabricated data refers to research findings that the researcher fabricated (3)In order to support their hypothesis, the researcher adjusted values that failed to reach the required level of statistical significance This behavior is called “fabrication.” (4)The deadline of the seminar is approaching but the data has just been obtained without sufficient time to undergo a thorough statistical analysis Therefore, some values must be entered and analyzed at random to complete the paper quickly This behavior is called “fabrication.” 128 Which of the following academic research behaviors constitutes “plagiarism”? A The entire portion was copied from the works of others without indicating the sources B The statistical results of their own research data were not satisfactory, so the data was tampered with to meet the expected results C The work of others was reorganized without annotating the source to make it look like it was the researcher’s own work D Different passages of different articles were copied separately, and the sources were not clearly annotated (1)A and C (2)A, C, and D (3)A, B, and C (4) A, B, C, and D 129 lOMoARcPSD| 17583165 As per the unit “Definition of Improper Research Conduct,” which of the following does not constitute improper research conduct? (1)Over-embellishing images used in the paper (2)Improper operation of the research equipment that enabled the research results to support the hypotheses (3)Truthfully reporting the results of hypothesis verification failure in the paper (4)Excessively splitting the research results into multiple publishing units 130 John is a researcher at a pharmaceutical factory and has been developing new drugs recently, and some are currently in the human clinical trial phase Which of the following research code of ethics has the most direct impact on John? (1)The Animal Protection Act (2)The Seven-Point Explanation of the National Science Council on Academic Ethics (3)The Human Research Act (4)Key Points on Processing and Reviewing Academic Ethics Cases 131 Alfred is currently writing a paper related to online teaching To avoid plagiarism, he uses both “paraphrasing” and “summarizing” to use sentences from the works of others To which of the following can the writing skill “summarizing” be applied? (1)Wang (2006) believes that learners use the Internet as a tool to conduct cultural exchanges with foreigners so that students can have more opportunities for contact with the rest of the world At the same time, the attitudes of the students toward different cultures will also become more favorable (2)The teachers interviewed in this study also expressed the idea that “the Internet is very convenient and can help students of different nationalities reduce cultural differences This is a very good phenomenon and more people will use the Internet for learning in the future.” (Teacher 1) (3)The above is an example of the writing skill “paraphrasing.” (4)The above is an example of the writing skill “summarizing.” 132 Chen is preparing to conduct an animal experiment According to the 4R principles, which research codes should he pay attention to? (1)Substitution, reduction, refinement, and responsibility (2)Substitution, reduction, organization, and responsibility (3)Pragmatism, objectivity, responsibility, and courage (4)Truth, objectivity, responsibility, and beneficence 133 Which of the following persons violated privacy rights? (1)Hsiao Fang is a doctoral student He wanted to conduct a sociological study of parent-child relationships In order to ensure the authenticity of the study, he took the initiative to visit a relative who had long-standing parent-child problems He placed a recording pen in a plant pot in the relative’s living room, hoping to record some dialogues between the parents and children Although he understood that it was not an ideal research method, he was convinced that it was a necessary means to obtain valuable research data (2)Hsiao Sheng is a graduate student in student counseling To complete his thesis, he interviewed ten individuals that had suffered cyberbullying to explore the physical and psychological impact of cyberbullying on the victims When analyzing the interview data in the research room, Hsiao Sheng casually discussed the contents of the interviews with Fang Fang, a fellow student sitting next to him, and mentioned the identity and background of one of the interviewees (3)Professor Liao was invited to give a lecture at the institute of medical engineering where Professor Chang was teaching After the lecture, he and Professor Chang returned to the office to catch up While they were chatting, Professor Chang had to leave the office to answer some students’ questions Professor Liao, bored of waiting, went through the papers that Professor Chang kept on his table Unexpectedly, he discovered that Professor Chang was drafting a letter of resignation lOMoARcPSD| 17583165 to the institute, stating that he had obtained an offer from an American technology company as an in-house researcher and he intended to develop his career abroad Upon returning to his own university, Professor Liao told the postdoctoral researcher of his department to pay attention to a potential opening at a position at the institute of medical engineering (4)None of the above behaviors were appropriate and all of them violated privacy rights 134 Which of the following statements on managing conflicts of interest is incorrect? (1)Researchers are obliged to avoid secondary interests having undue influence on primary interests (2)Researchers absolutely cannot accept funding from companies (3)IRB members should honestly disclose their relationship with the applicant (4)The Conflicts of Interest Commission has the authority to review the management of conflicts of interest in research 135 Mary’s mother waited for Mary to go to school before going into her daughter’s room for cleaning Did Mary’s mother violate her privacy? (1)It is up to Mary to decide whether her privacy has been violated (2)If Mary feels troubled, then her privacy has been violated (3)Mary’s mother entered Mary’s room without permission, so Mary’s privacy has been violated (4)If Mary’s mother did not move items around, including Mary’s personal items, then Mary’s privacy has not been violated 136 Which of the following descriptions of “tampering” with data is incorrect? (1)The researcher changes or deletes research data, results, or images (2)The researcher manipulates research materials or equipment to verify their own set of research hypotheses (3)To support their hypothesis, the researcher adjusts values that failed to reach the required level of statistical significance to the required level of statistical significance This behavior is called “tampering.” (4)The deadline of the seminar is approaching but the data just received would not have enough time to undergo statistical analysis Therefore, some values should be entered and analyzed at random to complete the paper quickly This behavior is called “tampering.” 137 Based on the principle of “beneficence” described in the Belmont Report, what kind of risk and expected benefit assessment must researchers conduct? (1)Minimize risks and maximize expected benefits (2)Maximize risks and minimize expected benefits (3)Minimize both risks and expected benefits (4)Maximize both risks and expected benefits 138 Based on academic conventions, which of the following statements on the principle guiding the naming sequence of instructors and students is incorrect? (1)The instructing professor is a frequent and corresponding author who assists in communicating with readers and solving problems (2)The instructing professor must be listed as a co-author in the student’s journal article (3)At the stage of preparation of the dissertation, teachers and students should thoroughly discuss the issue of publication and naming sequence, and reach a consensus (4)Teachers and students should respect each other’s contributions in research and dissertation writing, and assign the authors’ names in the appropriate sequence 139 lOMoARcPSD| 17583165 Alfred is currently writing a paper related to online teaching Which of the following sentences demonstrates Alfred using the writing skill(Kok koyoke kuning salah ya? Mbuh “quoting”? sih) (1)Wang (2006) believes that learners use the Internet as a tool to conduct cultural exchanges with foreigners so that students can have more opportunities for contact with the rest of the world At the same time, the attitudes of the students toward different cultures will also become more favorable (2)The teachers interviewed in this study also expressed the idea that “the Internet is very convenient and can help students of different nationalities reduce cultural differences This is a very good phenomenon and more people will use the Internet for learning in the future.” (Teacher 1) (3)The researchers believe that the immediacy of the Internet and its lack of borders can help students of different nationalities shorten the distances between themselves and reduce cultural differences (4)The above is an example of the writing skill “quoting.” 140 What kinds of behavior does the Personal Information Protection Act regulate: A use, B process, C collection, D translation, or E editing? (1)A and C (2)A, B, and C (3)B, D, and E (4)B, C, and E 141 Hsiao Mei is a doctoral student in medical engineering Her supervising professor asked her to assist three graduate students in the research for their theses Six months ago, one of the student’s experiments failed Therefore, he came to seek help from Hsiao Mei Hsiao Mei discovered that the failure was caused by the fact that the student did not calibrate an important experimental instrument properly Therefore, she spent some time and manually calibrated the instrument and prevented the problem from reoccurring Recently, the student not only passed the oral defense of his paper, but also modified the paper into a seminar essay to be published at a foreign seminar He wrote to ask Hsiao Mei’s permission to list her as the third author, apart from the supervising professor and himself, in gratitude for her assistance in the instrument calibration Should Hsiao Mei accept the offer, from the perspective of academic ethics? (1)She should, as long as she made contributions to the research; regardless of the content and scope of the contribution, she is qualified to be listed as co-author of the paper (2)She should, if all co-authors agree; they have the right to determine the authorship of the paper Therefore, since the master’s student believed that Hsiao Mei is qualified to be the author, she can be listed as a co-author if the supervising professor has no objection (3)She should not The master’s student does not have the right to determine the authorship of the paper, as his position in the academic community is not high enough Therefore, Hsiao Mei should reject the student’s offer and submit the proposal to the supervising professor to request his permission (4)She should not According to the norms of academic ethics, the author of a paper should make a substantial intellectual contribution to the research Hsiao Mei only helped with the calibration of the instrument rather than provide any substantial contribution; hence, she is not qualified to be listed as a co-author The master’s student could include her contribution in the acknowledgment section 142 A researcher used elementary and middle school aged students as his research subjects, and included Zhuyin phonetic symbols to clarify the Chinese characters in the questionnaire content for young readers This shows that the researcher considered which element of informed consent? ANSWER = Understanding 147 Which of the following is the subject of the Personal Data Privacy Act? ANSWER = All of the above lOMoARcPSD| 17583165 148 Which of the following cannot lead to circumstances of self-plagiarism? ANSWER = Embellishing research results and research graphs149 In order to conduct research, Xiaoming collects netizen comments from a BBS discussion board and directly quotes some text (verbatim) in his article Xiaoming did not explain the source of this text (the speaker’s real or online name), but if the reader conducts an online search for these texts, they can find out which netizen wrote them Has Xiaoming violated the privacy of netizens? ANSWER = Xiaoming probably did not violate the privacy of netizens, but he should pay attention to the scope of reasonable use when using online information 150 Which is not a possible outcome of plagiarism? ANSWER = If a school regulation clearly prohibiting plagiarism cannot be found, then there is no problem and no punishment will be given 151 Chen is a teacher at a school While viewing surveillance camera footage, he observes Xiaonan’s activities in the gaming room Did Chen commit a criminal offense? ANSWER = No, the gaming room is a public space 152 What kind of experimental research is related to the origin of the Belmont Report? ANSWER = Human experiment research 153 Who among the following is suitable to serve as a member of a research ethics committee? (1)The graduate school advisor of the applicant (2)A student who has received guidance from the applicant, or a university professor (3)An academic in the same field as the applicant (4)An academic who is conducting a research project similar to that of the applicant 154 Seals at an aquarium use watercolor to paint paintings, which are publicly displayed Are the seals’ paintings protected by the Copyright Act? (1)Yes, they comply with the definition of works in the Copyright Act: “creations in the fields of literature, science, art, or other academic areas.” (2)Yes, they are imbued with the intelligence of the seals, and can be referred to as “works” regardless of the quality or content (3)No, seals have lower intelligence than humans, and their works cannot be understood by humans (4)No, the Copyright Act only protects works whose creators are natural persons or legal persons; seals are neither natural persons nor legal persons lOMoARcPSD| 17583165 155 Which of the following explanations of self-plagiarism is correct? (1)Researchers can never reuse text that they have written previously (2)Copying the text describing research tools from the researcher’s previous work, but without citing the source of information (3)Submitting the same academic report to different classes or teachers does not constitute self-plagiarism (4)Self-plagiarism generally plays a small role in academic research, and can easily be said to be a waste of academic resources 156 The thesis of a student in the Chinese language department explores word use in the writing of song lyrics In the thesis citations, all of the lyrics of Vincent Fang’s songs are listed Are the student’s quotations within the scope of fair use? ANSWER = No, the type of use is unreasonable 157 If a new student at a research institute wants to understand important ethical standards before commencing his studies, how can he obtain information relevant to these standards? A Searching the “Academic Ethics” section of the Ministry of Science and Technology’s website B Searching the “Laws and Regulations Database of the Republic of China” to understand laws about implementing human research C Browsing the websites of professional academic organizations to obtain the latest information on ethical standards D All of the above 158 According to the Copyright Act, requirements must be met for citations of the works of others to constitute fair use Which of the following is not one of these “requirements”? (1)The behavior is for legitimate purposes (2)The work is already publicly published (3)The use is within reasonable scope (4)The source is in a similar field 159 Which of the following are protected by the Copyright Act? a dance works; b love letters; c ideas; d primary school textbooks; e punctuation marks; f orders issued by the Taichung Municipal Government (1) a and e (2) a, c, and d (3) a, b, and d (4)a, b, c, d, e, and f 160 There are many types of works protected by the Copyright Act; which of the following is different from the other three? A A sketch of Taipei 101 B Taipei 101 lOMoARcPSD| 17583165 C An architectural model of Taipei 101 D The architectural design blueprint of Taipei 101 161 Which of the following is a relatively appropriate method of conflict of interest management? A Researchers receive research funding from a company, and clearly note the source of funding in their journal article B Researchers predict that a study will have good future development, and so they ask their close friends and relatives to invest in the stocks of an industrial-academic cooperation company C In order to complete a research paper on their new drug, the R&D department of a pharmaceutical company invites authoritative professors from the pharmaceutical industry to participate, and professors ask their research assistants to review the content, and then sign a co-authorship consent form D A medical school accepts funding from a biotechnology company, and the company regularly conducts training courses on new medical information under the name of the medical school

Ngày đăng: 17/08/2023, 14:32

TỪ KHÓA LIÊN QUAN