Ethics 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

10/16/2020 臺灣學術倫理教育資源中⼼

ELSA CHAERUN NISA NULL(Account (/myaccount/), LOGOUT (/logout/)) | FeedBack

(http://www.edu.tw)

(/index_panel/)


HOME
(/index_panel/)
index (/) / Courses
NEWS
(/news/)

Exam
ABOUT
(/intro/)
COURSES
1. From the research ethics point of view, who is most qualified to be listed as a co-author
(/courses/my/)
aside from the primary author of the paper?
PORTFOLIO (1)The researchers who designed the experiment
(/panel/) (2)The members of the Institutional Review Board (IRB) who reviewed the study
RESOURCES (3)The interview respondents
(4)The assistants who collected and input the data
(/resource/)
HELP
(/newuser/)

https://ethics.moe.edu.tw/exam/ 1/11
10/16/2020 臺灣學術倫理教育資源中⼼

2. There are many reasons for self-plagiarism. Which of the following is not a common
reason for self-plagiarism?
(1)The number of papers is not enough for academic promotion.
(2)There is concern that the author will be reported for plagiarizing the work of
others.
(3)The author hopes to improve the contributions of the results of the paper.
(4)The author does not have enough time to write a thesis.

3. If Betty, a researcher, did not handle personal data according to the Personal
Information Protection Act, what kind of liabilities would arise?
(1)Criminal liability
(2)Civil liability for damages
(3)Administrative liability
(4)All of the above

4. A research project has conducted a series of human trials in a poor community in the
name of free treatment of syphilis. However, during the study, the research team did
not honestly inform the subjects that the purpose of the experiment was only to track
the progression of syphilis patients who did not receive any treatment. This incident
involves many research ethical issues. If we only look at it in light of informed consent,
which of the following elements of informed consent did the researchers fail to meet?
(1)The subjects should be made fully aware of the purpose and process of the
research.
(2)The willingness of participants to participate autonomously should be respected.
(3)Reasonable compensation should be provided.
(4)All of the above

5. Which of the following is the most important difference between “summarizing” and
“paraphrasing”?
(1)“Summarizing” is copying part of the text while “paraphrasing” is expressing
the content in a new manner.
(2)The text is usually more streamlined after "summarizing," while the length of the
text after "paraphrasing" may be similar to that of the original.
(3)The length of the text after "summarizing" may be similar to that of the original
while the result of "paraphrasing" is a partial copy of the original.
(4)The length of the text after "summarizing" is usually longer than that of the
original, while the length of the text after "paraphrasing" is more streamlined.

https://ethics.moe.edu.tw/exam/ 2/11
10/16/2020 臺灣學術倫理教育資源中⼼

6. From the perspective of research ethics, which of the following is a personal


responsibility that a researcher should fulfill?
(1)Even in high-pressure research situations, researchers should be able to review
their own research behavior according to high ethical standards.
(2)Learning individual skills of ethical judgment, decision-making, and problem-
solving
(3)Carefully considering the potential benefits and effects of a decision before making
the decision, and taking responsibility for the outcomes of the decision
(4)All of the above

7. Privacy can “release [people’s] tension and pressure, and enable them to be
themselves in their private space without interference or blame from others.” Which
value of privacy does this statement refer to?
(1)Protecting communication with others
(2)Self-evaluation
(3)Releasing emotions
(4)Respecting personal autonomy

8. Which of the following is not a reason for using “quotation marks” and “double
quotation marks”?
(1)To let the reader know that the sentence does not include the addition of the
opinion of the author.
(2)Using “quotation marks” and “double quotation marks” makes the text look
more academic.
(3)To distinguish the text from those written by the author.
(4)To let the reader know that the sentence is the original work of another author.

9. Which of the following is not a possible reason for self-plagiarism?


(1)When writing a thesis, it is inevitable that the results of the previous research will
be mentioned. To avoid plagiarism, the author should use his/her own published
work(s).
(2)To ensure the quality of the research paper and the accuracy of the research results
(3)The language skills shown in the text are limited, and the author is worried that the
text is not correctly worded, so he/she uses text that he/she has previously published.
(4)There is pressure to publish a certain number of papers within a certain period.

https://ethics.moe.edu.tw/exam/ 3/11
10/16/2020 臺灣學術倫理教育資源中⼼

10. Which of the following statements on the Taiwanese position on the management of
conflicts of interest is incorrect?
(1)Taiwan has regulations governing conflicts of interest.
(2)Many research institutions have internal conflicts of interest management
practices.
(3)The government must establish the Conflict of Interest Review Committee before it
becomes legitimate.
(4)The Public Officers Conflict of Interest Avoidance Act clearly defines interest.

11. Which of the following persons violated privacy rights?


(1)Hsiao Fang is a doctoral student. He wanted to conduct a sociological study of
parent-child relationships. In order to ensure the authenticity of the study, he took
the initiative to visit a relative who had long-standing parent-child problems. He
placed a recording pen in a plant pot in the relative’s living room, hoping to record
some dialogues between the parents and children. Although he understood that it
was not an ideal research method, he was convinced that it was a necessary means to
obtain valuable research data.
(2)Hsiao Sheng is a graduate student in student counseling. To complete his thesis, he
interviewed ten individuals that had suffered cyberbullying to explore the physical
and psychological impact of cyberbullying on the victims. When analyzing the
interview data in the research room, Hsiao Sheng casually discussed the contents of
the interviews with Fang Fang, a fellow student sitting next to him, and mentioned the
identity and background of one of the interviewees.
(3)Professor Liao was invited to give a lecture at the institute of medical engineering
where Professor Chang was teaching. After the lecture, he and Professor Chang
returned to the office to catch up. While they were chatting, Professor Chang had to
leave the office to answer some students’ questions. Professor Liao, bored of
waiting, went through the papers that Professor Chang kept on his table.
Unexpectedly, he discovered that Professor Chang was drafting a letter of resignation
to the institute, stating that he had obtained an offer from an American technology
company as an in-house researcher and he intended to develop his career abroad.
Upon returning to his own university, Professor Liao told the postdoctoral researcher
of his department to pay attention to a potential opening at a position at the institute
of medical engineering.
(4)None of the above behaviors were appropriate and all of them violated privacy
rights.

https://ethics.moe.edu.tw/exam/ 4/11
10/16/2020 臺灣學術倫理教育資源中⼼

12. Medical institution A intends to conduct a human trial on 16-year-old subject B for the
study of a certain disease. Who is responsible for providing written consent?
(1)B must provide written consent.
(2)The legal guardians of B must provide written consent.
(3)B or one of his/her legal guardians must provide consent.
(4)B and one of his/her legal guardians must provide consent.

13. Professor Chang discussed the topic of academic ethics with his freshmen in his course
on “Research Methods in Pedagogy.” Many students expressed their viewpoints.
Which two of the following statements are correct? Hsiao-Chi: The spirit of academic
ethics includes fairness, honesty, and accountability. We should conduct research with
these ethics in mind in to earn the trust of the public in the research results, as well as
contribute to the long-term development of scientific research. Hsiao-Lun: Academic
ethics is a code of conduct for professional researchers. Since graduate students are
still learning, we can decide whether to follow them or not. There is no mandatory
requirement for us. Fei Fei: The term “research” in the “Human Subjects Research
Act” is limited to high-risk human medical research, such as injection of experimental
drugs and clinical trials. The law does not apply to other research types. Ti Ti: According
to the provisions defined in the Personal Information Protection Act in Taiwan,
researchers must acquire participants’ consent prior to collecting, processing, and
using their personal data. Hsiao-Ming: The Copyright Act protects the copyrights of
verbal and textual works in academic research (such as dissertations, seminars, and
journal articles). However, it has not been extended to cover other types of academic
achievements, such as computer programs, drama creations, and industrially designed
products.
(1)Hsiao-Chi and Fei Fei
(2)Hsiao-Lun and Hsiao-Ming
(3)Hsiao-Chi and Ti Ti
(4)Fei Fei and Ti Ti

14. As per the provisions of the Personal Information Protection Act, the parties have
several rights toward the entities that collect their personal data. Which of the following
statements is incorrect?
(1)They can ask for access to another person’s profile.
(2)They can request to see your personal data.
(3)They can request to supplement their personal data.
(4)They can request to delete their personal data.

https://ethics.moe.edu.tw/exam/ 5/11
10/16/2020 臺灣學術倫理教育資源中⼼

15. Plagiarism violates the criteria for judging in copyright law. Aside from complying with
Articles 44 to 65 of Taiwan’s copyright law on the judgment criteria for reasonable
use, what are the other criteria for reasonable use?
(1)The requirement of “contact.”
(2)The requirement of “substantial similarity.”
(3)“Contact” and “substantial similarity” are both considered.
(4)“Contact” and “substantial similarity” are both not considered.

16. Which of the following is an example of information fabrication?


(1)The professor copied the content of a postgraduate study without indicating the
source.
(2)The professor changed the color of the images in the experiment records.
(3)The professor applied for a research project of the Ministry of Science and
Technology.
(4)The professor helped his/her graduate students change the original research data.

17. The study led by Lin involved the contributions and aid of many people. When
considering who is qualified to be a co-author of the paper, which of the following
people should be excluded?
(1)The research assistant: He provided much needed administrative support.
(2)Another experiment facilitator: He agreed to lend special experiment instruments
to Lin.
(3)A senior student from the Foreign Language Institute: She provided English editing
services to Lin.
(4)Head of the doctoral class: He assisted Lin in organizing and designing the
experiment along with guiding her as she wrote the journal article.

18. Which of the following is not something that should be noted when “summarizing”?
(1)The tone of the words used should be as neutral as possible, and the meaning of
the words must be precise.
(2)Avoid using too many words from the original text.
(3)When summarizing, the order of the original sentences must be changed.
(4)If the original sentence of the author is to be used, then “summarizing” should
be done.

https://ethics.moe.edu.tw/exam/ 6/11
10/16/2020 臺灣學術倫理教育資源中⼼

19. According to the style guide of the American Psychological Association, which of the
following is the correct way to present the original responses of those interviewed?
(1)If the number of words quoted is 45 words, it must be presented in a separate
paragraph.
(2)If the number of quoted words is 20 words, it must be presented in a separate
paragraph using quotation marks and a different font.
(3)If the number of quoted words is 100 words, the original text must be presented
using quotation marks and a qualitative manuscript.
(4)If the number of quoted words is less than 10 words, quotation marks are not
required.

20. Which of the following acts may constitute academic plagiarism but may not
necessarily violate the relevant provisions of Taiwan’s copyright law?
(1)Copying the national exam analysis published by a cram school but not indicating
the source.
(2)Copying the draft press release of a government agency but not indicating the
source.
(3)Copying the foreword of a classmate's report without consent but translating it
entirely into English.
(4)Overhearing the ideas of other students and writing their ideas into a report.

21. Happy Elementary School sent Jane her admission notice. Upon receiving it, her mother
immediately opened the letter. Did Jane's mother violate her privacy?
(1)No, Jane’s mother did not violate her privacy.
(2)Yes, Jane’s mother violated her privacy.
(3)If Jane’s mother opened the letter in front of her, then she did not violate Jane’s
privacy.
(4)If Jane was upset from learning about this, then Jane’s mother violated her
privacy.

22. Which of the following statements on the requirements of proper referencing is


correct?
(1)The purpose of citations is to quote information when writing a dissertation.
(2)If the reference cannot be clearly noted as such, it may result in plagiarism.
(3)The quoted text must be the same as the original, otherwise it constitutes a
revision.
(4)If the cited work cannot be dictated, it is easy to miscommunicate the idea.

https://ethics.moe.edu.tw/exam/ 7/11
10/16/2020 臺灣學術倫理教育資源中⼼

23. Which of the following statements on privacy is correct?


(1)If the subject is a public figure, his/her right to privacy is not protected by law.
(2)The Constitution does not protect student privacy.
(3)The right to privacy is a fundamental right guaranteed by the Constitution.
(4)Without providing her consent, an individual intentionally uploaded a woman’s
nude photos to the Internet without infringing on her right to privacy.

24. As per academic conventions, when there are multiple co-authors of a paper, what
sorting principle is most commonly used?
(1)Order the names by surname
(2)Put the leading author’s name first
(3)Order the names by academic field
(4)Order the names by work contribution

25. Which of the following describes the proper way of using quotation marks when
writing a thesis?
(1)When writing a person’s name, use quotation marks to emphasize his/her
research contributions.
(2)When referring to important ideas put forward by others, use quotation marks to
present the text clearly; there is no need to mention the source.
(3)If more than 80 words are to be quoted, quotation marks must be added, and the
cited text should be in its own paragraph. If this is done, there is no need to indicate
the source.
(4)If 33 words are to be quoted, quotation marks should be used to distinguish it from
other text, and the source should be indicated.

26. Regarding research ethics, which of the following is not a general condition that
academic authors must comply with?
(1)Providing funding for the research
(2)Establishing the research hypothesis and experiment design
(3)Planning and executing experiments
(4)Writing an academic paper describing the research

https://ethics.moe.edu.tw/exam/ 8/11
10/16/2020 臺灣學術倫理教育資源中⼼

27. As a member of academia, which of the following actions are effective ways to avoid
self-plagiarism? A. Do not repeat the publication of the same research data; B. once
new information has been added, write it as a new research paper; C. avoid rewriting
the original paper as a new one after including additional data; (d) make good use of
quotations, paraphrasing, summarizing, and other such writing skills to reprocess text
that has been written and clearly indicates the sources; or (e) take diagrams or tables
that have been published and reuse them in another paper.
(1)A, C, and D
(2)A, B, and E
(3)A, B, and C
(4) A, B, and D

28. Wang is a good friend who is studying at a different school and wants to borrow your
school ID number and password to log on to an academic database that your school
has purchased, so that he can download a large volume of electronic documents. How
should you respond to him in order to avoid issues of research ethics and copyright
violations?
(1)Agree to his request because he has legitimate and reasonable usage intentions
related to academic research
(2)Agree to his request because the digital database that your school purchased is
open to the public for use
(3)Refuse his request and ask him to use a service like the “Nationwide Document
Delivery Service” and acquire necessary data through more legitimate methods
(4)Refuse his request and first ask your tutor; if he/she agrees, then you can lend him
your ID and password

29. Medical institution A wants to conduct a human trial on B (an adult with full awareness)
but does not explicitly inform B about the test. However, B has provided written
consent for A to perform the human trial. Which research ethic did A violate?
(1)Violation of the explicit communication of obligations of the researchers and the
principle of informed consent of the subjects.
(2)Violation of the explicit communication obligations of the researchers but no
violation of the principle of informed consent of the subjects.
(3)No violation of the explicit communication obligations of the researchers and
violation of the principle of informed consent of the subjects.
(4)No violation of the explicit communication obligations of the researchers or
principle of informed consent of the subjects.

https://ethics.moe.edu.tw/exam/ 9/11
10/16/2020 臺灣學術倫理教育資源中⼼

30. Postgraduate student A writes a note every time he does an experiment, which includes
his experience with the experiment, areas for improvement, and the experimental
results. However, the information is only for his reference and has not been made
public. One day, A lent his notes to classmate B with whom he had a good relationship.
When lending the notes, A told B that the note was for B’s reference only and that it
should not be lent to others and that the content should not be shared. On the other
hand, B has the habit of blogging as a way of noting things. After reading the notebook
of A, B extracted some of the contents and posted them on his blog for future reference
(the blog is available to the public, but aside from B's friends, nobody else was reading
it).
(1)B’s blog is for personal use, and there are no advertisements on the blog and no
profits. Therefore, B’s behavior did not infringe on any of A’s rights.
(2)If the blog post of B is one day discovered by A, it will be immediately deleted. If no
one sees the blog post, B did not infringe on A’s rights.
(3)If B demonstrates that the source and extraction of the content was reasonable,
then reasonable use can be claimed.
(4)If B demonstrates that the source and the extraction of the content was reasonable,
reasonable use could not be claimed.

31. When a researcher’s personal professional judgment of primary interest is arbitrarily


influenced by secondary interests, there is often a conflict of interest. Which of the
following is not a common secondary interest in scientific research?
(1)The researcher's income
(2)Scientific knowledge
(3)Academic reputation
(4)Academic achievement

32. Which of the following pairings made in reference to the Belmont Report is incorrect?
(1)Origins - Events that began in human studies
(2)Belmont Report - Principle of subject protection
(3)Vulnerable Groups - Completing the process of informed consent
(4)Systematic assessment of risks and expected benefits - Exercising the principle of
justice

33. Which personal data is not allowed to be collected, processed, or used under Article 6,
Paragraph 1 of the Personal Information Protection Act?
(1)National ID number
(2)Medical information
(3)Family information
(4)Fingerprints

https://ethics.moe.edu.tw/exam/ 10/11
10/16/2020 臺灣學術倫理教育資源中⼼

34. Which of the following situations involves the management of conflicts of interest?
(1)Wang is a member of the Human Subjects Committee. She discovered that a
recent application was delegated by a biotechnology company that was funded by
her mother, so she disclosed the relationship to the committee.
(2)Hsu is a researcher for a pharmaceutical company. She was also stationed at V
Hospital, which cooperated with said pharmaceutical company in recruiting subjects
and conducting clinical trials. She was wearing a white lab coat and introduced herself
to the subjects as a pharmacist.
(3)Chen is an assistant professor at a chemical engineering research institute. She
accepted research funding from T Corporation. At the same time, she instructed
students to participate in research projects in which she collaborated with T
Corporation and used those projects for the thesis topics of her students.
(4)A research doctor serves as the clinical trial host in the hospital. As the trial
progresses smoothly, she begins buying shares of the drug company.

35. Which research ethics does the statement “researchers should be treated and selected
equally” refer to?
(1)That the researchers clearly stated their obligations
(2)The Researchers' informed consent principle
(3)The principle of fair treatment
(4)Protecting researchers’ privacy

If you can’t submit your answers, please memorize your answers in order,
then send your answers, account, exam time to AREE email.
To avoid unexpected system failure,
please do not re-take the exam before AREE contact you.

Submit

Program of Research Ethics Education

https://ethics.moe.edu.tw/exam/ 11/11

You might also like