Professional Documents
Culture Documents
Ethics
Ethics
Concentrating
Concentratingon on
1. Philosophy and religion
guidelines
guidelinesfor
for
Based on material by Peter Eades, Alan Fekete, Judy Kay 2. The law ethical research
ethical research
3. Professional guidelines
Aside:
• Discussion of research ethics without considering
these sources is pointless.
• Amateur ethicists are dangerous
• Research ethics is a not a private belief system
1 2
Professional guidelines
The law
Professional guidelines
3 4
1. Philosophy and religion Philosophy and religion: Utilitarianism
7 8
The law
The main laws relevant to computer science
2. The law
researchers are Intellectual Property laws
These laws are very important for industrial research.
• PREVIOUS TALK BY CRAIG SYMES
9 10
The law
11 12
Sources:
Australian Vice Chancellor’s Committee (AVCC) The main issues for research students in IT
http://www.nhmrc.gov.au/_files_nhmrc/file/publications/synopses/r39.pdf
¾ Research oriented Three top ethical issues:
¾ Common to all Australian Universities a) Authorship: who should be the author of a paper?
b) Recirculation, or self-plagiarism: writing the same paper twice.
Association for Computing Machinery (ACM) c) Omission: failing to say something relevant.
http://www.acm.org/about/code-of-ethics
¾ Relatively general All three are discussed in AVCC and University policies, procedures,
and guidelines.
Australian Computer Society (ACS)
http://www.acs.org.au/documents/codes/CodeofProfConductPractice.pdf
¾ Oriented toward the IT profession
Professional guidelines relevant to Computer Science research students: Professional guidelines relevant to Computer Science research students:
1. Guidelines 1. Guidelines
¾ Summary of University guidelines ¾ Summary of University guidelines
2. University processes for dealing with scientific misconduct 2. University processes for dealing with scientific misconduct
¾ Mostly a summary of University of Sydney procedures ¾ Mostly a summary of University of Sydney procedures
4. Advice (from Alan Fekete et al.) 4. Advice (from Alan Fekete et al.)
15 16
General
Data storage
General principles Data used in experiments must be stored
Must be preserve privacy as defined by an Australian
Researchers must maintain: Standard
High Standards Minimum 5 years
Discipline-specific ethics Should be stored in the institution as well as with the
Workplace safety researcher
Confidentiality (e.g., in questionnaires from humans) If you publish a paper based on some data, then you
should make the data available to other researchers on
demand
Research results should be open to scrutiny by peer review.
(Secrecy is possible, but only for a limited time)
17 18
Authorship Authorship
19 20
Authorship
Authorship
Co-authors
• Early in the project, discuss who will be an author
All people qualified to be authors should be authors
• One of the co-authors should be assigned to keep records
• Everyone who is allowed to be an author should be (of experiments etc), and formally accept responsibility for
an author, as long as he/she agrees. the entire paper.
• Authors should sign an authorship statement
• This statement should be kept on file in the institute
• All authors should agree to being an author
21 22
23 24
Supervision
Omission
You should not omit to say something significant Your supervisors should
¾ Obvious example: suppose that your algorithm is • Be well qualified
derived from an algorithm by person X. Then you • Have a reasonable staff/student ratio
should say so in your paper.
• Give you ethics guidance
¾ There are many more subtle examples.
• Ensure (as far as possible) the validity of the data
25 26
Refereeing
Conflict of interest (USyd guidelines)
You cannot referee a paper if you have a conflict of interest with one
Money of the authors.
If you will gain financially from some research, then you
should say so in the publications etc. A conflict of interest defined for ACM/IEEE conferences as any
situation where you don't feel that you can make an objective
assessment, including:
you are a co-author
one of your current or former students is a co-author
your supervisor / former supervisor is a co-author
a colleague from your current institution is a co-author
a colleague who you have worked with on a research project
in the past 5 years is a co-author
27 28
Professional guidelines relevant to Computer Science research students:
University processes for dealing with research misconduct
1. Guidelines
¾ Summary of University guidelines
Scientific misconduct = “fabrication, falsification, plagiarism, or
other unacceptable practices” (USyd procedures)
2. University processes for dealing with scientific misconduct
¾ Mostly a summary of University of Sydney procedures For example:
¾ misleading ascription of authorship:
3. What happens in practice? • listing of authors without their permission
¾ Some of my observations and advice • attributing work to others who have not in fact contributed
to the research
4. Advice (from Alan Fekete et al.) • lack of appropriate acknowledgment of work primarily
produced by someone else
5. Some scenarios
It does not include honest errors or honest differences in
interpretation
29 30
31 32
Misconduct #3: Misrepresentation
What happens if someone breaks the
guidelines / code of ethical behaviour?
You should not:
Tell lies
33 34
5. Some scenarios
How does it work in practice? … … … Æ
35 36
Observations Conduct correct research
Research is competitive
37 38
39 40
Authorship and acknowledgement
Multiple submission/ recirculation/ self plagiarism
Advice:
It is a difficult issue
¾ Multiple submission is bad
¾ Always ensure that every author on the paper explicitly ¾ But two papers can be close to each other, as long as each
agrees to be an author has a distinct contribution, and you explain what that is
• Eg one paper describes system architecture, another
¾ Always be generous in inviting authorship from those who presents network optimisation, another shows innovative
have contributed UI
• conceiving, executing or interpreting part of the research
Cross-reference all the other work in each publication
¾ Don’t be insulted if someone declines to be an author
Rule of thumb: “Introduction” may be assisted by copy-paste, but
no other part of the paper should be created by copy-paste
¾ Always acknowledge generously
• Funding sources Ask your supervisor if in doubt
• People with whom you have had significant discussions
• Generously reference as many relevant papers as Multiple submission makes people mistrust you; trust between
possible researchers is very important
41 42
Omission
Plagiarism
43 44
Protect yourself
Protect yourself
Issues with referees, acquaintances, web surfers
Conflict with supervisor
Can occur during thesis (eg over funding, co-authorship, Not everyone is ethical
commercialisation, etc) ¾ People who see your work before publication might
¾ Best if issues discussed before work starts publish it themselves, or improve on it
¾ If necessary, approach School research director (Dr ¾ This can restrict your recognition
Masa Takatsuka)
Best protection is time-stamped publication (eg School
Tech Report)
¾ Before putting on web or submitting or sending out for
comment
¾ Remember that it is not peer reviewed at this stage
45 46
47 48
Scenario: Millicent and Mutter, with Dingle Scenario: Millicent and Mutter, with Dingle (cont.)
1. An honours student, Millicent, writes a brilliant thesis on simplifying 6. Mutter checks Millicent’s thesis against Dingle’s paper and finds that
agent-oriented concept design (AOCD). large sections have been copied, word for word; Mutter apologizes to
2. His supervisor, Professor Mutter, sees that it is brilliant and turns it Dingle.
into a joint paper, which is accepted to the rank A conference 7. Mutter writes to his dean and asks that Millicent’s honours degree be
AOS2011. rescinded.
3. Millicent gets first class honours and goes to work in SAAB in 8. The dean accuses Mutter of plagiarism.
Sweden. 9. The case works its way up the University disciplinary system.
4. Professor Mutter presents the joint paper at AOS2011 in Tokyo. 10. The university offers Mutter a choice: accept a demotion to Associate
5. Professor Dingle from Ohio State University sends an email to Professor, or resign.
Professor Mutter pointing out that the brilliant simplification of AOCD 11. Mutter resigns.
was all in a paper that Dingle published in 2005. She accuses Mutter
of plagiarism.
49 50
Scenario: Robbie and the Rapid Router Scenario: Bertie, Bogie and his wife
1. Robbie has a new routing algorithm RR that he thinks is faster than 1. Bertie, the departmental director of research, does not like Associate
previous algorithms. Professor Bogie.
2. There are some published benchmark data sets for this kind of 2. Bertie notes that Bogie has written a joint paper with his wife, who is
routing. a student at a different University.
3. RR is a randomised algorithm (eg, genetic algorithm) that gives a
3. Bertie begins to look through Bogie’s many papers and finds three
different result every time you run it.
papers which are almost the same. They are published at three
4. Robbie runs RR on the benchmark 1000 times, and finds that the
different conferences.
average runtime is 231.1ms; while the maximum runtime is 1451.7ms
and the minimum is 62.1 ms. 4. In the meantime, Bogie accepts a job as Professor at a different
5. The best previous result on this benchmark used 81.3ms. University.
6. Robbie submits a paper reporting that his new algorithm is better 5. Bertie writes to the director of research at Bertie’s University, pointing
than previous algorithms because it ran on the benchmark in 62.1ms. out that at least three papers of Bogie are virtually the same.
7. ….? 6. … ?
51 52
Scenario: Ellen and the middle-aged Miles Scenario: Kathleen and Mabel, with Malmsbury error detection
53 54
Scenario: Banbury, Brightwistle and the X-Rays Scenario: Formby and the googly algorithm
1. A PhD student, Banbury, invents a wobbly algorithm and applies it to 1. A PhD student, Formby, invents a googly algorithm and applies it to
1996 chest X-ray data from Wentworth. 1996 chest X-ray data from Wentworth.
2. He publishes the paper in WOBBLY2004, claiming that it is better 2. The algorithm runs well on this data.
than the 2003 wobbly algorithm of Brightwhistle and Scott. 3. He publishes the paper in GOOGLY2004
3. Brightwhistle gets annoyed, because she thinks her algorithm is the 4. Section 5 of the paper is “Evaluation”, based on the 1996 Wentworth
best. chest X-ray data.
4. Brightwhistle wants to test her 2003 algorithm on the 1996 chest X- 5. A year later, Formby is depressed because he hasn’t discovered any
ray data from Wentworth, and asks Banbury for the data. new googly algorithms for a while.
5. Banbury replies that he spent half his grant extracting the data from 6. He applies his original googly algorithm to 1997 chest X-ray data
the database, and if Brightwhistle wants the data, then she can get it from Billingworth.
herself. 7. He submits a paper in GOOGLY2005, same as the 2004 paper,
6. … ? except that Section 5 uses the 1997 Billingworth chest X-ray data.
8. … ?
55 56