Tải bản đầy đủ (.pdf) (36 trang)

Update1_60% Taiwan ethics course solutions Đáp án đạo đức nghiên cứu của Đài Loan

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (243.23 KB, 36 trang )

Note: only for foreign students
PLEASE SELECT THESE COURSES (18 COURSES~6 HOURS):
0101_Introduction to Research Ethics: Definition and Content}
0102_Professional Norms and Personal Responsibility in Research Ethics}
0103_Government Regulations and Policies in Research Ethics}
0104_Research Misconduct: Definition and Types}
0105_Research Misconduct: Fabrication and Falsification}
0106_Research Misconduct: Plagiarism}
0107_Research Misconduct: Self-Plagiarism}
0108_Academic Writing Skills: Quoting}
0109_Academic Writing Skills: Paraphrasing and Summarizing}
0112_Basic Concepts of Copyright}
0110_Academic Writing Skills: Referencing}
0113_Basic Concepts of the Personal Information Protection Act}
0114_Basic Concepts of Privacy}
0115_Principles and Practice of Human Subject Protection}
0111_Definition and Principles of Authorship}
0207_The Scientist as a Responsible Member of Society}
0116_An Overview of Research Data Management}
0201_Conflict of Interest in Research}


SOLUTIONS (Ctrl+F and paste 5 words to find answer):
Which of the following is not the researcher’s responsibility when conducting
animal-based experiments?
(3)Maximize interest and knowledge and avoid the use of medicament

Which of the following persons violated privacy rights?
(4)None of the above behaviors were appropriate and all of them violated privacy
rights
Research misconduct is defined as “fabrication, falsification, or plagiarism (FFP)


when presenting, executing, or reviewing a research project or reporting research
results.” Which unit proposed this definition?
(2)Office of Science and Technology Policy (OSTP)
Falsification (also known as fiddling) refers to the manipulation of research data,
equipment, or processes or changes in or deletion of real data, images, and results.
Which of the following reflects the act of falsification?
(2)Hua hid research results that were not ideal or contradicting and deliberately
made the results consistent with his predictions
Chang, a researcher at a medical institution, is accused of the improper treatment of
patients in a persistent vegetative state who Chang involved in brain wave research
and is severely punished. Which principle in the Belmont Report is the improper
treatment of the vulnerable against?
(1)Respect for persons
Authors are entitled to which rights without having to register with the Intellectual
Property Office?
(1)Patent rights
(2)Copyrights
Which of the following is not the main reference for ethical professional norms
when conducting research?
(4)Content of public speeches delivered by scholars
Xiang is a research student at a university; when writing her graduate thesis, she
wants to quote the following four types of information. Which type of information
may not conform with proper citation requirements stipulated by copyright laws?
(3)A photographer’s complete collection of East Taiwan photography not yet
released to the public


Guang is writing a literature review for a conference in which he will compile a
dozen
articles and analyze them. What academic writing skill should he use to achieve this

goal?
(3)Paraphrasing and indicating the source
Xiao-lin, an international student in Taiwan, is facing pressure to meet the
publication requirements for graduation. It suddenly occurs to him that he has
published an English article abroad, so he directly translates the article into Chinese
and submits it to a Chinese journal without specifying that the article is a
translation.
Which code of academic ethics announced by the Ministry of Education is this
against?
(1)Use of translated works and theoretical works without providing appropriate
specifications
David is a graduate student. One of his essays was published in a well-known
scholarly journal. However, Caesar, who is one year David’s senior, accuses him of
plagiarism. In accordance with the Copyright Act, what measures should Caesar take
in order to prove that his copyright was infringed? A. He is older than David, so he
can prove the infringement simply by producing his own work. B. He needs to
prove that David had access to (the ability to read, reference, or download) his
work.
C. His copyright took effect at the completion of his work, so he can simply file a
claim to prove the infringement. D. He needs to produce his work and identify the
similarities between David’s essay and his own.
(2)BD
For research purposes, Hsiao-pao collected articles on parenting shared by netizens
for a thesis related to online parenting. Which of the following statements is correct?
(3)Capturing pictures and videos outside the window of a netizen’s house to
observe real-life childcare in their home may infringe on spatial privacy
Xiao-wen and her advising professor are co-publishing a journal article. Although
Wen’s boyfriend has no idea what the article is about, he asks Wen to list him as an
author, and states that she can make the decision without consulting her advisor. Is
Wen’s boyfriend eligible to be listed as an author of the article?

(4)No, because he did not make actual contributions to the article
Joe is learning the various writing techniques for his master’s thesis. Please choose
the option in which the skill he uses matches the description
(4)Joe uses three short sentences in his own article to recap the main ideas of one
of Flora’s published papers → summarizing and indicating the source


Which of the following statements does not describe the background and
connotation of the Belmont Report?
(4)Even researchers outside medical fields can gain insight into the nature and
methods of protecting subjects in the Belmont Report
Which of the following statements accurately describes the value of the Belmont
Report?
(1)It lays down the ethical principles and standards for the US government
formulating policies for human trials, as well as necessary literature for countries
around the world to consult when enacting such regulations
Which of the following are types of privacy that are recognized by the Constitutional
Court? (A) Information privacy, such as personal data; (B) Spatial privacy, such as
private homes; (C) Privacy of correspondence, such as the content of a private
phone call between two parties; (D) Media privacy, such as television programs that
an individual watches; (E) Life privacy, such as intimate actions in private life.
(2)ABCE
Which of the following statements about avoiding self-plagiarism is incorrect?
(2)Authors may purchase plagiarism detection services provided by academic
ghostwriting companies and request them to help detect and modify parts that
are too similar to previously published papers
(4)Authors may inform readers of previously published content to prevent biased
evaluation of the innovation of the present study
Which of the following is a correct description of scientific research?
(1)The purpose of scientific research includes discovering new knowledge,

explaining phenomena, and finding new evidence to improve theories.
Plagiarism can be divided into plagiarism of ideas and plagiarism of words. Which of
the following is incorrect?
(3)Plagiarism of words: I imitated the research project structure and research topics
of the thesis of a former student.
(4)Plagiarism of words: I copied the programming work of a peer, modified the
variable names, and submitted the work
Which of the following options is the least likely reason for a student to decide to
plagiarize others’ homework?
(1)The student cannot adjust to the instruction style of a certain course.


Professor Chang discussed the topic of academic ethics with his freshmen in his
course on “Research Methods in Pedagogy.” Many students expressed their
viewpoints. Which two of the following statements are correct? Hsiao-Chi: The spirit
of academic ethics includes fairness, honesty, and accountability. We should conduct
research with these ethics in mind in to earn the trust of the public in the research
results, as well as contribute to the long-term development of scientific research.
Hsiao-Lun: Academic ethics is a code of conduct for professional researchers. Since
graduate students are still learning, we can decide whether to follow them or not.
There is no mandatory requirement for us. Fei Fei: The term “research” in the
“Human Subjects Research Act” is limited to high-risk human medical research,
such as injection of experimental drugs and clinical trials. The law does not apply to
other research types. Ti Ti: According to the provisions defined in the Personal
Information Protection Act in Taiwan, researchers must acquire participants’
consent prior to collecting, processing, and using their personal data. Hsiao-Ming:
The Copyright Act protects the copyrights of verbal and textual works in academic
research (such as dissertations, seminars, and journal articles). However, it has not
been extended to cover other types of academic achievements, such as computer
programs, drama creations, and industrially designed products.

(3)Hsiao-Chi and Ti Ti
What are the advantages of quoting in one’s own work? (A) It can assist in
explaining the research results of studies; (B) It allows readers to identify the
complete bibliography in the reference list of an article; (C) It can copy a large
amount of work by others, without limit; (D) It can emphasize that texts or
arguments are those of others and thus avoid plagiarism.
(3)ABD
Which of the following statements about conflicts of interest is true?
(2)Conflicts of interest in the research community may lead to the general public
questioning the objectivity of researchers and research institutions.
(3)An institutional conflict of interest arises when a researcher’s professional
judgment regarding the primary interests of a research is influenced by secondary
interests such as fame and commercial benefits.
(4)A conflict of interest may arise if an IRB committee member collaborated with
the applicant under review several years previously
In order to effectively manage conflicts of interest, researchers must acknowledge
the fact that they are susceptible to secondary interests, and that these interests can
undermine the credibility of their research and destroy the trust of the general
public. Researchers may submit their research to an REC or IRB for review and
approval to minimize interference from secondary interests. Alternatively, through
full disclosure of potential secondary interests, their negative impact on the primary
interests may be mitigated or prevented altogether. The principles for managing


conflicts of interest include a) disclosure, b) review and authorization, and c)
prohibition. Which of the following descriptions of these basic principles is FALSE?
(1)Disclosure means communicating the purpose and potential risks of a research
to participants.
Which of the following materials require quoting? (A) To use the original text of a
verse in classic literature; (B) To present an interviewee’s speech word for word;

(C)To copy the interview content of a journalist; (D) To present key statements of a
political figure at a press conference word for word.
(4)ABCD
Which of the following is an act of fabrication?
(1)An immunology expert asked 10 subjects to be tested for a vaccine response;
but, as many as 100 subjects were listed in the research report.
(3)Xiao Ming divided the collected samples into two analyses and then, wrote two
papers and submitted them to different journals.
(4)Xiao Ming used post-production to emphasize and increase the sharpness of
the edges of the research images.
In addition to protecting personal data, the Personal Data Protection Act
emphasizes the legitimate and reasonable collection, processing, and use of
personal data. Which of the following forms of personal data collection is
inappropriate and may violate the Act?
(3)Requiring research participants to provide medical records, genetic information,
and health examination reports to ensure research consistency
Which of the following basic principles of the so-called “responsible conduct of
research” is incorrect?
(3)Efficiency: select research subjects who/that can offer maximum data during
collection
Which of the following violate Personal Data Protect Act regulations on collecting
personal data?
(3)Schools, when requesting that overseas students studying in Taiwan provide
their personal data on their student information card, do not need to notify the
students on the relevant provisions in accordance with the Personal Data Protect
Act.
Which of the following statements about the Copyright Act is FALSE?
(1)The prerequisite for copyright protection is originality. Works of minimal
creativity are not protected by the Copyright Act.



(2)Copyrights take effect when a work is completed, so ideas in one’s mind are
not protected under the Copyright Act
When A-su, an engineer in a company, was working on systems development, he
discovered flaws in the login interface of a company-related website. The personal
data of users may be stolen during login. He then suggested that concerned units
solve the problem. Which of the following code of ethics proposed by the Institute
of Electrical and Electronics Engineers (IEEE) did A-su’s approach comply with?
(4)Members of a research team should make decisions that take responsibility for
maintaining the public’s welfare and safety and immediately notify concerned
units when harmful factors are identified
Which of the following is not personal data, as defined in Article 2, Item 1 of the
Personal Data Protection Act?
(3)College entrance examination rules
Which of the following acts of using the works of others is most likely to infringe on
the privacy of others?
(2)To study mobile phone use and addiction among female college students, Hua
hua secretly filmed the daily routines of roommates in her dormitory, but she
promised herself that the video would not leak out
Which of the following circumstances may have infringed upon the research
participants’ right to privacy?
(3)After the publication of the thesis, all recordings of the research participants
may be directly released to the public
Which of the following statements on plagiarism and self-plagiarism is true?
(1)If a writer copies from his own published work word-for-word without proper
citation, he is guilty of self-plagiarism regardless of whether he holds the rights to
the copied material.
(2)Plagiarism is an act of deception, but self-plagiarism is an act of theft.
(4)Publications with self-plagiarized content still have academic value, so such
behavior is generally accepted by academia

Which of the following acts of using the works of others is most likely to infringe on
the privacy of others?
(2)To study mobile phone use and addiction among female college students, Hua
hua secretly filmed the daily routines of roommates in her dormitory, but she
promised herself that the video would not leak out.


Which of the following citations is a legally proper citation of other people’s work
within the scope of reason?
(3)Teachers using other people’s works in class for teaching purposes and cites
the source.
Which of the following is something that you as an academic writer should do to
achieve effective paraphrasing?
(2)Read the passage thoroughly and take note of the main ideas and the author’s
viewpoints. Then, rephrase the passage in a neutral tone.
Which of the following statements about privacy is incorrect?
(1)Privacy is respecting the right to individual autonomy and is a basic human right
guaranteed by the constitution.
(2)Privacy is the same as the right to privacy, with a high degree of personal
subjectivity, and the law protects personal privacy.
(4)Even if for academic research purposes, researchers are not allowed to violate
the privacy or disclose the private information of others without prior
authorization.
Which of the following examples regarding the application of the subject protection
principle in the Belmont Report is correct?
(4)All of the above
In addition to protecting personal data, the Personal Data Protection Act
emphasizes the legitimate and reasonable collection, processing, and use of
personal data. Which of the following forms of personal data collection is
inappropriate and may violate the Act?

(3)Requiring research participants to provide medical records, genetic information,
and health examination reports to ensure research consistency.
Guang is writing a literature review for a conference in which he will compile a
dozen articles and analyze them. What academic writing skill should he use to
achieve this goal?
(3)Paraphrasing and indicating the source
A research institution recently obtained considerable funding from a major
manufacturer to develop a gambling abstention electronic device that promotes
behavioral change. However, although accidents with electric shock injuries
repeatedly occur, the institution insists that the device is absolutely safe and refuses
to disclose further details to the public. Which type of conflict of interest is this?
(2)Conflict of interest at the institutional review board
(3)Conflict of interest in scientific beliefs
(4)Institutional conflict of interest


Xiao-lin, an international student in Taiwan, is facing pressure to meet the
publication requirements for graduation. It suddenly occurs to him that he has
published an English article abroad, so he directly translates the article into Chinese
and submits it to a Chinese journal without specifying that the article is a
translation.
Which code of academic ethics announced by the Ministry of Education is this
against?
(1)Use of translated works and theoretical works without providing appropriate
specifications
Which of the following statements about conflicts of interest is FALSE?
(3)“Secondary interests” refers specifically to financial gains.
Falsification (also known as fiddling) refers to the manipulation of research data,
equipment, or processes or changes in or deletion of real data, images, and results.
Which of the following reflects the act of falsification?

(2)Hua hid research results that were not ideal or contradicting and deliberately
made the results consistent with his predictions.
It is necessary to confirm that the citing behavior is legitimate and reasonable when
citing the works of others. Which factor is least crucial to consider?
(3)The cited works must be marketable.
Which of the following statements about author accountability in academic writing
and publishing is FALSE?
(2)Founders of a research lab should always be listed as co-authors as they ensure
the smooth operation of the research despite having little direct input into the
actual research.
Which of the following statements about plagiarism is true?
(2)Traditionally, plagiarism is defined as “copying another person’s ideas, words,
or work and pretending that they are your own.”
Da-yeh, a graduate student, has written many articles. Much of the content in the
noncore sections, such as the introduction and research methods, is similar.
Therefore, he copies the content and directly pastes it into new articles. Which
research misconduct is Da-yeh involved in?
(1)Self-plagiarism


The submission rules set by academic research journals or publishers can be
divided
into two types: writing specifications and submission rules. Which of the following
related statements is incorrect?
(1)The writing format used in the field of research should be clearly understood
and followed. For example, research including animal experiments mainly follows
the APA format and electrical engineering information papers mainly follow the
IEEE format.
Which of the following is not the researcher’s responsibility when conducting
animal-based experiments?

(3)Maximize interest and knowledge and avoid the use of medicament
Which of the following is personal data that under Article 6, Item 1 of the Personal
Data Protection Act, may not be collected, processed or used?
(1)Criminal history
Dr. Fang is studying the correlation between sole size and penile length. However,
he
included the actual names of participants and unmodified photos of their genitals in
a presentation at a seminar. Which of the following codes of academic ethics did Dr.
Fang violate?
(3)The researcher’s responsibility to protect participant privacy
Which three of the following statements about quoting are true? A. Quoting is the
best way to reflect the original intention of the cited author. B. Quotation marks are
used to indicate other people’s words and distinguish them from the author’s
own ideas. C. In-text quotations must be matched with end-of-text references that
indicate the source. D. In-text quotations are used to preserve the original intention
of the cited author, so end-of-text citations are redundant.
(1)ABC
To apply for funds from the Ministry of Science and Technology, Prof. Wen, a newly
promoted assistant professor, puts effort into submitting articles. However, he frets
that he does not have enough publications to be granted funding, and he lists
nonexistent publications on his application form. Which research misconduct is
Prof.
Wen involved in?
(2)Fabrication
Jade brought her cellphone to school. However, as the school has a rule against
students carrying cellphones, Jade’s phone was confiscated by the teacher. The


teacher then read Jade’s text messages without Jade’s approval. This behavior
may have violated Jade’s multiple rights to privacy. Which of the following rights to

privacy did the teacher not violate?
(2)The right to privacy in personal spaces
When vulnerable groups (such as minors) are designated as research subjects,
which of the following points must be considered?
(4)In addition to diligently executing the informed consent process, if there are
other regulations for protecting the subjects’ rights, researchers must fulfill the
duties required by those regulations.
Chang, a researcher at a medical institution, is accused of the improper treatment of
patients in a persistent vegetative state who Chang involved in brain wave research
and is severely punished. Which principle in the Belmont Report is the improper
treatment of the vulnerable against?
(1)Respect for persons
Xiao-ting, a graduate student, is conducting research on the mental health
outcomes of severe infectious diseases. After interviewing the participants, he feels
that they do not meet the requirements of his research, but he is unwilling to give up
the effort. He adds content to the transcriptions. Which research misconduct is Xiao
ting involved in?
(3)Falsification
Flora is working on her master’s degree in arts and humanities. She plans to submit
a paper that she co-wrote with her thesis advisor to an international journal.
Besides
Flora herself, who conceptualized and designed the research, which of the following
individuals may be listed as an author based on their contributions? A. Her thesis
advisor, who gave Flora invaluable suggestions and guidance B. The research
assistant who printed, distributed, and collected the questionnaires C. The
classmate who helped design the survey D. The classmate who helped run
statistical analyses and contributed to the conclusion section E. The copy editor at
the university’s language center who proofread the final draft of the paper
(2)ACD
Xiao-wen and her advising professor are co-publishing a journal article. Although

Wen’s boyfriend has no idea what the article is about, he asks Wen to list him as an
author, and states that she can make the decision without consulting her advisor. Is
Wen’s boyfriend eligible to be listed as an author of the article?
(4)No, because he did not make actual contributions to the article.


The Declaration of Helsinki includes six main principles. Which of the following
statements aligns with the principles?
(3)Researchers must follow the principle of informed consent for all subjects
What are the advantages of quoting in one’s own work? (A) It can assist in
explaining the research results of studies; (B) It allows readers to identify the
complete bibliography in the reference list of an article; (C) It can copy a large
amount of work by others, without limit; (D) It can emphasize that texts or
arguments are those of others and thus avoid plagiarism.
(3)ABD
Which of the following acts of using the works of others is most likely to be
considered copyright infringement?
(3)Broadcasting a live and pay-to-view concert in the personal real-time post that
will disappear after 24 hours.
Which of the following is a correct description of scientific research?
(1)The purpose of scientific research includes discovering new knowledge,
explaining phenomena, and finding new evidence to improve theories.
Which of the following is not an entity stipulated in personal data protection laws?
(2)Public, online fan pages of government officials.
Prof. Wang is promoting a policy that all research projects should reveal the interest
relationships involved in detail. Which of the following principles for managing
conflict of interest is Prof. Wang’s policy in compliance with?
(1)Principle of openness
(4)Review and authorization
Which of the following statements about conflicts of interest is true?

(1)In human subject research, the primary interests are the rights of the
participants and the integrity of the research.
(2)Researchers do not have to worry about conflicts of interest when they assume
a dual role, such as that of a physician-scientist who takes on the responsibilities of
both attending physician and principal investigator.
(4)Secondary interests refer specifically to the financial incentives researchers and
research institutions may receive
Which of the following statements about quoting secondary sources is incorrect?
(1)If the original work is out of print or is undefined, one must not use it as a


secondary source in the thesis.
(4)All of the above are incorrect
The Nuremberg Code, the Declaration of Helsinki, and the Belmont Report offer the
most fundamental research ethics principles. Which of the following statements
related to the protection of subjects’ rights is incorrect?
(1)Researchers should explain the possible risks of participation and the
processing of follow-up data to subjects prior to conducting the research
(2)Researchers should ensure the subjects’ privacy is not violated
(4)Researchers should avoid selecting vulnerable groups (e.g., indigenous persons,
pregnant women, the elderly, and children) for data collection to reduce risks in
the research
According to the International Committee of Medical Journal Editors (ICMJE), which
of the following definitions of authorship is INCORRECT?
(3)The ranking of the listed authors must be made by a unanimous decision of all
of the individuals involved.
The final assignments of Hsiao-hua and Chia-chia for liberal education are identical.
Which of the following statements is most likely to be used to ascertain Chia-chia’s
infringement of Hsiao-hua’s copyright?
(1)Chia-chia: We just happened to have the same topic and similar ideas.

(2)Hsiao-hua: Chia-chia said that she did not know how to format the report, so I
sent her the file as a reference 2 days ago.
(4)Ta-tung: I saw Hsiao-hsiang, Chia-chia, and Hsiao-hua discussing the final
assignment 2 days ago.
Based on the principle of Beneficence laid out in the Belmont Report, researchers
should immediately consider suspending the research in which of the following
situations?
(2)In the process of a human experiment, the researchers found the test subjects
were at risk for serious injuries outside their expectations.
Which of the following statements about conflicts of interest is FALSE?
(3)“Secondary interests” refers specifically to financial gains.
Hsiao Mei is a doctoral student in medical engineering. Her supervising professor
asked her to assist three graduate students in the research for their theses. Six
months ago, one of the student’s experiments failed. Therefore, he came to seek
help from Hsiao Mei. Hsiao Mei discovered that the failure was caused by the fact
that the student did not calibrate an important experimental instrument properly.


Therefore, she spent some time and manually calibrated the instrument and
prevented the problem from reoccurring. Recently, the student not only passed the
oral defense of his paper, but also modified the paper into a seminar essay to be
published at a foreign seminar. He wrote to ask Hsiao Mei’s permission to list her
as the third author, apart from the supervising professor and himself, in gratitude
for
her assistance in the instrument calibration. Should Hsiao Mei accept the offer, from
the perspective of academic ethics?
(1)She should, as long as she made contributions to the research; regardless of the
content and scope of the contribution, she is qualified to be listed as co-author of
the paper.
(2)She should, if all co-authors agree; they have the right to determine the

authorship of the paper. Therefore, since the master’s student believed that Hsiao
Mei is qualified to be the author, she can be listed as a co-author if the supervising
professor has no objection.
(4)She should not. According to the norms of academic ethics, the author of a
paper should make a substantial intellectual contribution to the research. Hsiao
Mei only helped with the calibration of the instrument rather than provide any
substantial contribution; hence, she is not qualified to be listed as a co-author. The
master’s student could include her contribution in the acknowledgment section.
Da-yeh, a graduate student, has written many articles. Much of the content in the
noncore sections, such as the introduction and research methods, is similar.
Therefore, he copies the content and directly pastes it into new articles. Which
research misconduct is Da-yeh involved in?
(1)Self-plagiarism
Xiao-cha is about to graduate. However, he frets that he cannot meet the graduation
threshold for journal publication. To ensure his article is published by the deadline,
he submits the same article to several journals but does not inform the reviewers of
this. Which research misconduct is Cha involved in?
(1)Duplicate publication
(2)Separate publication
(4)Textual reuse
In accordance with copyright laws, quoting other people’s works must comply with
behavior for legitimate purposes; if one were to argue for reasonable use, which of
the following purposes would be difficult to justify? (a) Advertisement copywriting
on Taiwanese dairy vendors’ websites were quoted to analyze the vendors’
marketing strategy, (b) An English graduation performance that charged admissions
used the theme song from a cinematic movie, (c) An education strategy designed to
prevent campus bullying cited and used excerpts from overseas journals and
papers,
and (d) overseas information on how to plant and sell marijuana in a paper



exploring
the legality of marijuana.
(1)A, B, and D
(2)B and D
(4)A, B, C, and D
Which three of the following statements about citations are true? A. Citations must
be used when quoting other people’s work. B. They are only placed at the end of
an article and not in the main body of the text. D. They are used to give credit to the
original author and avoid plagiarism. C. They are used to indicate other people’s
work and help readers find the original source.
(1)ABC
(2)ACD
(4)ABD
Which of the following is not an entity stipulated in personal data protection laws?
(2)Public, online fan pages of government officials.
Which three of the following statements about quoting are true? A. Quoting is the
best way to reflect the original intention of the cited author. B. Quotation marks are
used to indicate other people’s words and distinguish them from the author’s
own ideas. C. In-text quotations must be matched with end-of-text references that
indicate the source. D. In-text quotations are used to preserve the original intention
of the cited author, so end-of-text citations are redundant.
(1)ABC
What of the following is not a primary purpose for conducting research data
management?
(3)To prevent or expose malpractice
Dr. Fang is studying the correlation between sole size and penile length. However,
he
included the actual names of participants and unmodified photos of their genitals in
a presentation at a seminar. Which of the following codes of academic ethics did Dr.

Fang violate?
(3)The researcher’s responsibility to protect participant privacy
The criminal code has many provisions on the right to privacy; which of the
following
pairings are correct? A. Opening or hiding sealed letters or other sealed
documents belong to another without reason or looks into the content through
other means—Offenses against document secrets. B. Using instruments or
equipment to eavesdrop on other people’s nonpublic activities, speeches, or talks,


such as using listening devices to eavesdrop on other people’s conversations that
they do not want disclosed publicly—Offense of peeping and eavesdropping. C.
Disclosing secrets of another without reason that one knows or possesses because
of one’s occupation—Offense of disclosing commercial secrets obtained by
occupation. D. Disclosing information or privacy of another person without reason
that one possesses because of one’s occupation (such as medical doctor,
pharmacist, lawyer, or mental therapist)—Offense of disclosing the secrets of
another obtained due to occupation. E. Disclosing without reason the secrets of
another which one knows or possesses through the use of a computer or other
relating equipment –Offense of disclosing secrets of others obtained by use of a
computer
(3)A, B, D, and E
The American Psychological Association, known for defining writing formats for
academic research papers, has established the Ethical Principles of Psychologists
and Code of Conduct. The principles specify ethical guidelines that psychologists
must follow during research and teaching. Which of the following is not a principle?
(3)Conduct academic research that benefits the society
Xiao-ting, a graduate student, is conducting research on the mental health
outcomes of severe infectious diseases. After interviewing the participants, he feels
that they do not meet the requirements of his research, but he is unwilling to give up

the effort. He adds content to the transcriptions. Which research misconduct is Xiao
ting involved in?
(3)Falsification
Hsiao-Hua is a graduate student of business management. The following paragraph
describes how he wrote his master’s thesis. Please read through and determine
which type of misconduct was involved during the process: In the early stage of the
research, Hsiao Hua used a questionnaire to collect the information he needed and
analyzed the collected data using professional statistical software. However, the
results were not ideal and did not support his research hypothesis. Therefore, he
deleted and modified some of the data that may have affected the results from the
final table to ensure the data supported his hypothesis. At the end of the school
year, he successfully completed the master’s thesis and passed the oral defense of
the thesis. After another half a year, referring to the suggestions given by the thesis
defense committee, he applied a more sophisticated statistical method to analyze
the same raw data. This time, he did not modify any data and wrote a new paper
based on the actual analysis results. The paper was successfully published as a
proceedings paper at a domestic academic seminar.
(1)This is data fabrication.
(2)This is data falsification.
(4)This is data falsification and plagiarism.


Ming privately sold his company’s internal personnel information to a headhunter
company. Which type of the company employees’ right to privacy did Ming
violate?
(1)The right to information privacy
(2)The right to privacy in personal spaces
(4)The right to privacy in personal life
Jade brought her cellphone to school. However, as the school has a rule against
students carrying cellphones, Jade’s phone was confiscated by the teacher. The

teacher then read Jade’s text messages without Jade’s approval. This behavior
may have violated Jade’s multiple rights to privacy. Which of the following rights to
privacy did the teacher not violate?
(2)The right to privacy in personal spaces
Which of the following works may be protected under the Copyright Act? A. An
original song composed by a musicology major B. Laws and regulations such as the
Constitution, Copyright Act, Personal Data Protection Act, etc. C. Mother’s oral
recipe for sweet and sour spare ribs D. A painting by a third-grader submitted as
homework for art class E. Punctuation marks such as commas, periods, and
semicolons
(1)AB
(2)AD
(4)ABDE
Xiao-fu, a researcher, is conducting a study that requires in-depth interviews. He is
accused by the participants of asking many questions that are obviously unrelated
to the research and adding activities that they did not know of in advance. Which of
the following academic ethics principles is such conduct against?
(2)The principle of informed consent
Regarding inappropriate definitions and claims of authorship, which of the
following
statements is correct?
(3)The responsibilities of the first or corresponding author are ensuring the quality
of the paper, checking for negligence in writing, communicating with the journal
editor, responding to readers’ questions, and saving information for others to
review
According to Article 3 of the Personal Data Protection Act, which of the following is
not a right that can be exercised by the data subject?
(1)Request to delete the information.
(4)Request to disseminate the information.



Flora is working on her master’s degree in arts and humanities. She plans to submit
a paper that she co-wrote with her thesis advisor to an international journal.
Besides
Flora herself, who conceptualized and designed the research, which of the following
individuals may be listed as an author based on their contributions? A. Her thesis
advisor, who gave Flora invaluable suggestions and guidance B. The research
assistant who printed, distributed, and collected the questionnaires C. The
classmate who helped design the survey D. The classmate who helped run
statistical analyses and contributed to the conclusion section E. The copy editor at
the university’s language center who proofread the final draft of the paper
(2)ACD
Prof. Weng is training his research team to recruit participants. He believes that a
research team must clearly explain the content of the research plan and provide
sufficient consulting services to participants. Which element of informed consent is
this?
(1)Disclosure of information
(2)Comprehension of information
(4)Fairness
It is necessary to confirm that the citing behavior is legitimate and reasonable when
citing the works of others. Which factor is least crucial to consider?
(3)The cited works must be marketable

Which of the following is something that you as an academic writer should do to
achieve effective paraphrasing?
(1)Include personal opinions to make the paraphrased passage uniquely your own.
(2)Replace words with their synonyms but do not change the original sentence
structure or punctuation.
(4)Read the passage thoroughly and take note of the sentence structure and the
main viewpoints. Then, rephrase the author’s ideas in a neutral tone.

The Declaration of Helsinki includes six main principles. Which of the following
statements aligns with the principles?
(3)Researchers must follow the principle of informed consent for all subjects
Hua-hua is writing her graduation thesis. In the literature review section, she wants
to use the paraphrasing technique to cite other scholars’ materials. Which of the
following points about paraphrasing is incorrect?
(2)The paraphrased text should be as neutral as possible and use the fewest words
possible to convey a concept.


Which of the following statements about author accountability in academic writing
and publishing is FALSE?
(2)Founders of a research lab should always be listed as co-authors as they ensure
the smooth operation of the research despite having little direct input into the
actual research.
Which of the following situations does the Personal Data Protection Act not apply
to?
(1)The painter Pei-Pei is getting married and collects the addresses of her friends in
order to mail them the wedding invitation.
(2)The gym requests customers to provide their personal information in the
membership application.
(4)The doctor writes down patients’ medical information during medical visits.
Chen, the chairperson of an institutional review board (IRB), pays special attention
to
whether the members of the research ethics committee (REC) or IRB have an
interest
relationship with the principal investigator of a research project. If so, the members
of the REC or IRB should avoid and withdraw from relevant discussions on the
project. Which of the following principles for managing conflict of interest guides
Chen’s approach?

(4)Review and authorization
Which of the following statements about referencing the work of others is true
according to the Copyright Act?
(1)Using others’ copyrighted materials is an act of reproduction and may result in
civil liabilities and criminal charges.
(2)Citing the work of others and publishing it is a violation of the Copyright Act as
it infringes on the original author’s rights to reproduction and distribution.
(3)Using copyrighted materials for legitimate purposes (such as reporting,
critiquing, teaching, and research) within a reasonable scope is considered fair use.
Regarding image processing and preservation, which of the following statements is
incorrect?
(4)Researchers may sharpen, blur, move, delete, or add specific features of an
image to satisfy their expectations
Which of the following rights is not one for the four privacy rights in the
Constitutional Court’s interpretation?
(1)Right to freedom and privacy in schooling


Which of the following statements on plagiarism and self-plagiarism is true?
(4)The severity of self-plagiarism is determined by whether the plagiarized passage
is a core part of the new research and whether the researcher intends to
exaggerate their contributions or mislead readers
Two years ago, Hsiao Hua was still a graduate student. She collected the data for
one of her studies through an online questionnaire survey. The 535 participants that
responded to the survey were asked to provide their real names, addresses,
telephone numbers, and email addresses, so that she could send them a small gift as
a reward. Prior to the collection of such information, Hsiao Hua had specified the
purpose of the data collection as well as that they would be used only for sending
the gift. In addition, the participants had the right to choose not to provide the
information. Hsiao Hua only sent the gifts to the participants that signed the online

consent form. Following the completion of her master’s degree, Hsiao Hua
remained at the same institute to continue her studies as a doctoral student. To
support an activity organized by the institute, she extracted the information of the
participants collected for gift distribution and sent them an invitation to the event
on behalf of the institute. Has Hsiao Hua’s behavior violated the Personal
Information Protection Act of the R.O.C. (Taiwan)?
(4)Yes. The participants only granted permission for their information to be used to
receive the gift. Now that Hsiao Hua has changed the usage policy of their
information; her behavior has violated the Personal Information Protection Act.
What of the following is not a primary purpose for conducting research data
management?
(3)To prevent or expose malpractice
To ensure that data owners have the right to self-determination regarding their
personal data, Article 3 of the Personal Data Protection Act stipulates that data
owners can exercise which of the following rights with respect to their personal
data? (A) Request the researcher who collected the data an opportunity to read,
copy, supplement, or correct personal data; (B) Request that the researcher stop
collecting, processing, or using personal data; (C) Request deletion of the data; (D)
Researchers may not ask the owner of personal data to abandon or restrict their
right to exercise control of the data; (E) Researchers can be requested to provide an
indefinite number of data copies without charge or restrictions.
(3)ABCD
In order to effectively manage conflicts of interest, researchers must acknowledge
the fact that they are susceptible to secondary interests, and that these interests can
undermine the credibility of their research and destroy the trust of the general
public. Researchers may submit their research to an REC or IRB for review and
approval to minimize interference from secondary interests. Alternatively, through


full disclosure of potential secondary interests, their negative impact on the primary

interests may be mitigated or prevented altogether. The principles for managing
conflicts of interest include a) disclosure, b) review and authorization, and c)
prohibition. Which of the following descriptions of these basic principles is FALSE?
(1)Disclosure means communicating the purpose and potential risks of a research
to participants.
(4)REC/IRB members should recuse themselves if they have a preexisting
relationship of common benefit with the principal investigator of the research
under review.
Xiao-Yu is a college freshman. A class she takes requires that she submit a film
critique as a term paper. Which of her following actions constitutes copyright
infringement?
(3)Copying paragraphs from different reviews posted by others on IMDb and
combining them into her own report.
Fabrication refers to a researcher’s falsification and fictionalization of material that
does not exist in the research process (e.g., images, data, procedures, or results) and
the use of fictional data as research results or even in the literature review. Which of
the following is an act of fabrication?
(3)Xiao Jiu still was yet to obtain three data results. However, to deliver the interim
experiment data, Xiao filled in random numbers in the three incomplete fields.
Which of the following are types of privacy that are recognized by the Constitutional
Court? (A) Information privacy, such as personal data; (B) Spatial privacy, such as
private homes; (C) Privacy of correspondence, such as the content of a private
phone
call between two parties; (D) Media privacy, such as television programs that an
individual watches; (E) Life privacy, such as intimate actions in private life.
(2)ABCE
Which of the following persons violated privacy rights?
(4)None of the above behaviors were appropriate and all of them violated privacy
rights
Xiang is a research student at a university; when writing her graduate thesis, she

wants to quote the following four types of information. Which type of information
may not conform with proper citation requirements stipulated by copyright laws?
3)A photographer’s complete collection of East Taiwan photography not yet
released to the public


For research purposes, Hsiao-pao collected articles on parenting shared by netizens
for a thesis related to online parenting. Which of the following statements is correct?
(3)Capturing pictures and videos outside the window of a netizen’s house to
observe real-life childcare in their home may infringe on spatial privacy.
Which of the following is not personal data, as defined in Article 2, Item 1 of the
Personal Data Protection Act?
(3)College entrance examination rules
Which of the following statements accurately describes the value of the Belmont
Report?
(1)It lays down the ethical principles and standards for the US government
formulating policies for human trials, as well as necessary literature for countries
around the world to consult when enacting such regulations.
Authors are entitled to which rights without having to register with the Intellectual
Property Office?
(1)Patent rights
(2)Copyrights
The criminal code has many provisions on the right to privacy; which of the
following
pairings are correct? A. Opening or hiding sealed letters or other sealed
documents belong to another without reason or looks into the content through
other means—Offenses against document secrets. B. Using instruments or
equipment to eavesdrop on other people’s nonpublic activities, speeches, or talks,
such as using listening devices to eavesdrop on other people’s conversations that
they do not want disclosed publicly—Offense of peeping and eavesdropping. C.

Disclosing secrets of another without reason that one knows or possesses because
of one’s occupation—Offense of disclosing commercial secrets obtained by
occupation. D. Disclosing information or privacy of another person without reason
that one possesses because of one’s occupation (such as medical doctor,
pharmacist, lawyer, or mental therapist)—Offense of disclosing the secrets of
another obtained due to occupation. E. Disclosing without reason the secrets of
another which one knows or possesses through the use of a computer or other
relating equipment –Offense of disclosing secrets of others obtained by use of a
computer
(3)A, B, D, and E
Based on the principle of Beneficence laid out in the Belmont Report, researchers
should immediately consider suspending the research in which of the following
situations?


(2)In the process of a human experiment, the researchers found the test subjects
were at risk for serious injuries outside their expectations.
The American Psychological Association, known for defining writing formats for
academic research papers, has established the Ethical Principles of Psychologists
and Code of Conduct. The principles specify ethical guidelines that psychologists
must follow during research and teaching. Which of the following is not a principle?
(3)Conduct academic research that benefits the society
Which of the following statements about avoiding self-plagiarism is incorrect?
(2)Authors may purchase plagiarism detection services provided by academic
ghostwriting companies and request them to help detect and modify parts that
are too similar to previously published papers
(4)Authors may inform readers of previously published content to prevent biased
evaluation of the innovation of the present study
Which of the following statements about the Copyright Act is FALSE?
(1)The prerequisite for copyright protection is originality. Works of minimal

creativity are not protected by the Copyright Act.
(2)Copyrights take effect when a work is completed, so ideas in one’s mind are
not protected under the Copyright Act.
A research team is conducting a questionnaire survey for students in grades 4–9.
Since a questionnaire is not a human experiment, the research team will conduct the
research immediately after briefing the subjects so that the research proceeds
smoothly. What research ethics is the team possibly violating?
(2)The team did not violate the explicit notification obligation but violated the
informed consent principle
According to Article 3 of the Personal Data Protection Act, which of the following is
not a right that can be exercised by the data subject?
(1)Request to delete the information.
(4)Request to disseminate the information.
Which of the following statements about quoting secondary sources is incorrect?
(1)If the original work is out of print or is undefined, one must not use it as a
secondary source in the thesis.
(4)All of the above are incorrect.
According to the International Committee of Medical Journal Editors (ICMJE), which
of the following definitions of authorship is INCORRECT?
(3)The ranking of the listed authors must be made by a unanimous decision of all
of the individuals involved.


Ta-tung is writing a final assignment. The lecturer requires students to summarize
the works of others. Which of the following points about summarizing are correct?
(A) Reduce the length of long paragraphs, and the summary is shorter than the
original; (B) Retain the original author’s viewpoint, and the length after
summarizing is similar to that of the original text; (C) Avoid excessive repetition of
original sentences, and the rewritten text must be precisely worded; (D)
Summarizing simplifies information; (E) Summarizing changes information.

(2)ACD

Regarding inappropriate definitions and claims of authorship, which of the
following
statements is correct?
(3)The responsibilities of the first or corresponding author are ensuring the quality
of the paper, checking for negligence in writing, communicating with the journal
editor, responding to readers’ questions, and saving information for others to
review
Xiao-fu, a researcher, is conducting a study that requires in-depth interviews. He is
accused by the participants of asking many questions that are obviously unrelated
to the research and adding activities that they did not know of in advance. Which of
the following academic ethics principles is such conduct against?
(1)The researcher’s obligation to inform
(3)The researcher’s responsibility to protect participant privacy
(4)The principle of equal treatment
Which of the following basic principles of the so-called “responsible conduct of
research” is incorrect?
(3)Efficiency: select research subjects who/that can offer maximum data during
collection
Which of the following statements about scientific research is correct?
(1)Nowadays, scientific researchers enjoy special rights that exempt them from
national taxes and all manual labor.
(2)Scientific research is a paid professional job.
(3)The organizing of research societies is led by the government because scientific
researchers are given special rights, including being exempted from administrative
work.


Hua-hua is currently writing a thesis, and she often needs to cite the works of

others. Which of the following requirements should she consider to avoid infringing
the copyright of others? (A) Actions with legitimate purposes, such as research; (B)
the works of others must be clearly quoted; (C) The scope of reasonable use must be
considered in accordance with the materials cited; (D) The cited work must be
published; (E) The cited work must not be published so as not to infringe upon the
economic rights of the author.
(1)ABC
(3)ABCD
(4)ABCE

In accordance with copyright laws, quoting other people’s works must comply with
behavior for legitimate purposes; if one were to argue for reasonable use, which of
the following purposes would be difficult to justify? (a) Advertisement copywriting
on Taiwanese dairy vendors’ websites were quoted to analyze the vendors’
marketing strategy, (b) An English graduation performance that charged admissions
used the theme song from a cinematic movie, (c) An education strategy designed to
prevent campus bullying cited and used excerpts from overseas journals and
papers, and (d) overseas information on how to plant and sell marijuana in a paper
exploring the legality of marijuana.

(2)B and D
(3)A and C
(4)A, B, C, and D

Prof. Peng is conducting educational action research with elementary, primarygrade students. She worries that the children cannot understand the related matters
of the research project, so she asks for their parents’ assistance. She also provides a
Chinese phonetic version of the research proposal and simplifies the language to
match the proposal with children’s reading level. Which element of informed
consent is this?


(1)Disclosure of information
(2)Comprehension of information


×