Download as pdf or txt
Download as pdf or txt
You are on page 1of 428

RESEARCH ETHICS

Dr P. K. Sharma
Professor
SCE, LPU
OBJECTIVES
 Discuss what is meant by and why there
should be ethical standards in Bio Medical
research
 Identify ethical issues in Bio Medical research
which would amount to scientific misconduct
 Explain the role of an ethics review committee
 Construct a set of guidelines for members of
ethics review committees
Research Ethics…..

 Involves the application of


fundamental ethical principles to
planning, conducting & publishing
of research
Guiding principles

 Autonomy and respect


 Beneficence
 Non-maleficence
 Justice ( free from exploitation)
 Scientific validity
 Honesty
Student activity

Identify ethical issues in the


following scenarios
Group 1
Two graduate students have made some
measurements on a new material. The data
points are as shown. To prove their hypothesis
the results should lie on the curve shown. The
two students considered omitting the two data
points which were off the theoretical curve.
 Unethical as it would amount to falsification
of data

 Should include outliers and give probable


reasons or find out statistically acceptable
ways of trimming outliers
Group 2

A group of medical students conducted a


research on the awareness of diabetic diet in
medical clinic participants. Their research was
recognized as the best undergraduate research
and later they submitted the same research
paper to two different journals to see which
journal publishes it first.
 Unethical as it would result in "inadvertent double-
counting or inappropriate weighting of the results of
a single study, which distorts the available
evidence
-it would give a false idea of the number of
publications in a given area
-wasting of resources on the review and
publication process

 Should submit to one journal and wait for response


prior to submitting to another
Group 3

Students are required to prepare a research


proposal during their undergraduate
program. Nimal developed the idea for his
project and discussed with a friend. Several
months later, he found that his idea had been
submitted as a research proposal by his friend
without his knowledge.
 Unethical as failure to give credit to the
person whose idea it is (intellectual
property) amounts to plagiarism

 Should discuss and include as co-author


Group 4

Four friends decide to work together on a


research project during the vacation. One of
them went abroad during the vacation and did
not contribute to the research. The friends
include all 4 names in a presentation made at
a scientific congress.
 Unethical as only those who contributed
intellectually should be cited as authors

 Those who contribute in other ways may be


acknowledged
Group 5

A group of undergraduate students planned a


research project on the detection of fetal
abnormalities in the second trimester, by
ultrasound scanning. They collected data
from the scan room without informing the
mothers
 Unethical as informed consent was not
taken

 Should have informed mothers of their


intent even though there is no particular
advantage/disadvantage to the mother in
doing so
Group 6

A group of undergraduate students collected


data from a group of bank officers, with their
consent, regarding their working hours and
salary with regards to the prevalence of high
blood pressure. Subsequently the researchers
gave the same data to another group who were
in need of same data variables.
 Unethical as violating principles of consent
and confidentiality

 Data can be used for a secondary purpose


which was not first considered as long as
- informed consent for sharing has been given
- identities anonymised
- due consideration to access restrictions
 Develop ethical guidelines for data sharing?
Why should there be research ethics?

 To protect participants /patients /society


/resources /researcher?

 To ensure accuracy of scientific knowledge

 To protect intellectual and property rights


To protect
participants/patients/society/resources

 Protect from harm


 Show respect -privacy /confidentiality
 -Informed consent
 Refrain from Coercion and undue inducement
When do incentives amount to coersion/undue
inducement?
http://www.ncbi.nlm.nih.gov/pmc/articles/
PMC2600442
 Refrain from exploitation of vulnerable
participants Who are the vulnerable groups?

 Refrain from indiscriminate use of resources

 Ensure Favorable Risk-Benefit Ratio: risk


should be minimized & potential benefit to
society must outweigh risks
 Must be of social value: improvement of
health/knowledge for the benefit of
society/science

high social value: use of stem cells to improve quality


of life for Huntington's disease patients

less social value: drug studies conducted to obtain data


that allows a new drug to compete in the healthcare
marketplace even though existing effective and often
cheaper therapeutics are already available
To ensure accuracy of scientific knowledge
 Should be methodically rigorous - Scientific
validity
 Fair subject selection: with inclusion /
exclusion criteria & a valid number of subjects
in order to project results to the population
 State research method clearly so that another
person can conduct advanced study in future
by using publication
Is it ethical to copy the methodology from a
published paper?
 Do not gloss research method
 Should not falsify/modify/omit data
 Use actual data for analysis/cannot include
someone else's data
 Report errors
 Be aware of conflict of interest
 Should not withhold and/or ‘vaguing up’
information
 Keep data and material for 5 years
 Data and material should be available to others
 Do not present/publish paper from incomplete
research or from anticipated outcomes
 Should not duplicate publications and
submissions
 Avoid piecemeal publication
 Should be reviewed Independently by
unaffiliated individuals
To protect intellectual and property rights

 Citation and authorship


inclusion-Writing and significant
scientific contribution
order- order of contribution
-actual researchers
-approval must be sought to
include a name
 Whenever somebody else’s work is quoted
reference should be made to the original
author (Piracy vs plagiarism)

 Acknowledgement should include the names


of person who helped
Breach of ethics in research would
amount to scientific misconduct
Scientific misconduct
 Fraud : invention/fabrication of data

 Plagiarism : copying data, ideas, text without


acknowledgement of source

 Piracy : infringement of a copyright

 Submitting/Publishing the same paper to


different journals
Scientific misconduct …
 Not informing a collaborator of your intent
to file a patent in order to make sure that
you are the sole inventor

 Including a colleague as an author on a


paper in return for a favor even though the
colleague did not make a serious
contribution to the paper
 Trimming outliers from a data set without
discussing your reasons in paper

 Using an inappropriate statistical technique in


order to enhance the significance of your
research

 Bypassing the peer review process and


announcing your results through a press
conference without giving peers adequate
information to review your work
 Conducting a review of the literature that fails
to acknowledge contributions of others

 Stretching the truth on a grant application in


order to convince reviewers that your project
will make a significant contribution to the field

 Giving the same research project to two


graduate students in order to see who can do it
the fastest
 Overworking, neglecting, or exploiting
research students

 Making derogatory comments and personal


attacks in your review of author's
submission

 Making significant deviations from the


research protocol approved by the Review
Board without informing the committee
 Not reporting an adverse event in a human
research experiment

 Wasting animals in research

 Exposing students and staff to biological


risks

 Rejecting a manuscript for publication


without even reading it
 Sabotaging someone's work

 Rigging an experiment so you know how it


will turn out

 Deliberately overestimating the clinical


significance of a new drug in order to obtain
economic benefits
Ethical review committee
(Institutional Review Boards)
Convened to
 maintain ethical standards of practice in
research
 ensure protection of subjects/research
workers from harm or exploitation
 to provide reassurance to the public
 protect researchers from unjustified
criticism
Procedure for ethical clearance

 Fill ethical clearance form and attach


proposal, questionnaires, informed consent
forms, information leaflets etc., and submit
 When ethical clearance is granted, data
collection can commence according to the
approved methodology
 A group of undergraduate students planned a
research on family planning practices of Sri
Lankan females. As they were close to the
deadline for presenting their results, they
started collecting information form
participants before formal approval by the
ethics review committee
 What should members of ethics review
committees consider in evaluating a
proposal for ethical clearance?
 Elements of a review

 Reference
 deepthiforensic2000@gmail.com
THANK YOU
Why is Research Ethics Important?
 It is a reflection of respect for those who ‘take
part’ in research
 It ensures no unreasonable, unsafe or
thoughtless demands are made by
researchers
 It ensures sufficient knowledge is shared by
all concerned
 It imposes a common standard in all the
above respects
Why is Research Ethics Important
 It has become the norm as an expectation for
research activity
 …. a professional requirement for
practitioners in some disciplines e.g.
psychology
 … a requirement for access to participants in
others e.g. health
 … and a requirement to comply with external
REF’s to obtain funding e.g. ESRC
What Projects Need Ethical Approval?
 Human participants
 Use of the ‘products’ of human participants
 Animal participants
 Work that potentially impacts on human
participants

 Where ethical approval is deemed


unnecessary a disclaimer may be signed by
researcher (and supervisor)
Poll-1
 Ethics is needed in

(a)Research
(b)Daily life
(c)Corporate life in organization
(d)All of the above
Answer

(d) All of the above


Key Ethical Issues
 Informed Consent - special consideration for
minors
 Deception
 Need for debriefing
 Right to withdraw
 Confidentiality
 Safety and risk
What Else Does the Panel Need to
Know?
 Summary of background to and rationale for
proposal
 Nature of data to be collected
 Procedures and measuring tools/equipment
 Who are the participants?
 Where will data collection occur?
 How will data be stored and for how long?
Structure of Ethics Committees
 University Ethics Sub-Committee
 policy making, dissemination, monitoring/audit
 Faculty Ethics Panel
 routine approval, monitoring of sub-panels if
they exist
 Optional Programme/Subject Area Sub-
Panels
 routine approval
Full Procedure
 Complete Full University Approval form
 Attach consent form, information sheet and
additional material e.g. questionnaires
 Students must get form checked & signed by
supervisor
 Submit to appropriate Ethics Panel – where
Sub-Panels exist, staff and PG researchers
must still submit to Faculty Panel
 DATA COLLECTION MUST NOT START
UNTIL PANEL INFORMS
Outcomes of First Application
 Approved - must begin within the timescale
indicated
 Approved subject to amendments –
supervisor confirms with Chair of FEP
 Deferred – passed to UESC (v. rare!)
 Not Approved – major revisions and resubmit
Poll-2
 Exploitation of …..is not ethical

(a)Animal
(b)Human being
(c)Natural resources
(d)All of the above
Answer

(d) All of the above


Additional Issues
 Changes to original proposal must be notified
 Completion of project must be notified
 Adverse events must be notified
 Some applications will require evidence of
risk assessment
 Some applications will require evidence of
Police Clearance
Recent Developments
 University Ethics Website
 Assessment of training needs and
development of generic training material
 Wider dissemination of key information
 E.g. new staff, admin staff, partners
 Extension of principles to non-Faculty staff
 ADI to form Ethics Panel
 Extension to home and international partners
Recent Developments
 Extension of remit to enterprise and
knowledge transfer activities
 Auditing of Faculty activities
 Publication of new Code of Conduct for
Research
 Appointment of lay members
 Development of Fast-Track Approval
Procedures
Fast Track Approval Procedures
 Accepts principle that much routine research
conforms to accepted ethical principles
 Form requires checking off a series of
questions; if OK add 150 word summary
 Student form to be signed by supervisor + one
other
 All ft forms sent to Chair of FEP for information
 Option in student forms for signing in 2 stages
Ethics

Politics of Research
Ethics
 What are ethics?
 What are common
ethical issues that
seem to surface in
research?
 When should ethical
issues be considered?
Ethics
 Ethics: principles for guiding decision
making and reconciling conflicting values
 People may disagree on ‘ethics’ because it is
based on people's personal value systems

 What one person considers to be good or


right may be considered bad or wrong by
another person
Major approaches to ethics
 Deontological Approach
 This approach states that we should
identify and use a Universal code when
making ethical decisions. An action is
either ethical or not ethical, without
exception.
 Ethical skepticism
 This is the relativist viewpoint, stating
that ethical standards are not universal
but are relative to one's particular
culture and time.
 Utilitarianism
 This is a very practical viewpoint, stating
that decisions about the ethics of a
study should depend on the balance of
the consequences and benefits for the
research participants and the larger
society.
 The utilitarian approach is used by most
people in academia (such as Institutional
Review Boards).

 "Do the potential benefits outweigh the


risks associated with this research?"
Ethical Concerns to the Research Community

1. The relationship between society


and science.
 Many research ideas come from areas
considered important in society.
 The federal government and other
funding agencies use grants to affect
the areas researchers choose to
examine.
2. Professional issues.
 The primary ethical concern here is fraudulent activity by
scientists. Cheating or lying are never defensible.

 Two related issues are partial publication(publishing several


articles from the data collected in one large study) and
duplicate publication (publishing the same results in more
than one publication).

 Partial publication is usually not unethical for large research


studies where partial reports of data are likely.

 Duplicate publication is sometimes acceptable when the


results are being reported to different audiences in
publications tailored to those particular audiences.
3. Treatment of research
participants.

 This is probably the most fundamental


ethical issue.

 It involves insuring that research


participants are not harmed physically
or psychologically.
Ethical Guidelines for Research with Humans
 One set of guidelines specifically developed
to guide research conducted by educational
researchers is the AERA Guidelines.

 The AERA is the largest professional


association in the field of education, and is
also known as the American Educational
Research Association.
Informed Consent
 This is the process of providing the research
participants with information enables them to make
an informed decision as to whether they want to
participate in the research study.
 State the purpose of the research and describe the procedures to be followed.
 Describe any potential risks or discomforts the participant may encounter.
 Describe any potential benefits from participation.
 Describe extant to which results will be kept confidential.
 Give a list of names the participants may contact with any questions they have.
 
 State that participant is voluntary and that they are free to withdraw from the
study at any time.
Informed Consent with Minors as
Research Participants
 Consent must be obtained from parents
or guardians.

 Assent must also be obtained from


minors who are old enough or have
enough intellectual capacity to say they
are willing to participate.
Deception
 Providing false information to the participant about the nature
and/or purpose of the study
 It is discouraged by the AERA, but not disallowed in all cases.
 Sometimes deception is required in order to conduct a valid research study. The
researcher must justify the use of deception.

 If deception is used the following are very important:


 Debriefing is an interview with the research participant providing an opportunity for
the experimenter to reveal deceptive aspects of the study and for the participant to
have any questions about the study answered.
 Dehoaxing: informing the participant about deceptive aspects of the research
study
 Desensitizing: eliminating any stress or other undesirable feelings the study
may have created
Freedom to Withdraw
 Participants must be informed that they are
free to withdraw from the study at any time
without penalty.

 If you have a power relationship with the


participants you must be extra careful to make
sure that they really do feel free to withdraw.
Protection from Mental and Physical Harm

 This is the most fundamental ethical issue


confronting the researcher.

 Educational research generally poses


minimal risk to participants.
Economic Regulation of Research
 Economic regulation is the issue of who sponsors
your research as well as how much money you
get.

 It's the ethical duty of a researcher to get their


results published somewhere. This is called
dissemination of your research, and it requires
that you find the most appropriate and scholarly
outlet that you can.
Political Regulation of Research
 Historically, governments have had to put serious
restrictions on researchers. In fact, the origin of codes of
research ethics can be traced to the NUREMBERG CODE,
a list of rules established by a military tribunal on Nazi
war crimes during World War II.  The principles outlined
in the Nuremberg Code include:
 Voluntary consent
 Avoidance of unnecessary suffering
 Avoidance of accidental death or disability
 Termination of research if harm is likely
 Experiments should be conducted by highly qualified people
 Results should be for the good of society and unattainable by
any other means 
New Guide Lines
 The Nuremberg Code was followed by the 1948 U.N. Declaration of
Human Rights and the 1964 Helsinki accord.

 In 1971 (and revised in 1981), the U.S. government initiated guidelines


for all federally funded research. Most federal agencies followed the lead
of HEW (now HHS) because this list of rules could be applied generically
to both medical and nonmedical research. The HEW GUIDELINES were:
 Subjects should be given a fair explanation of the purpose and procedures of the research
 Subjects should be given a description of any reasonable risks or discomforts expected
 Subjects should be told of any possible benefits to be obtained by participating
 Researchers should disclose any alternative procedures that might be advantageous to the
subject
 Researchers should offer to answer any questions subjects may have during the research
 Subjects should be told they are free to withdraw and discontinue participation at any time
IRBs
 One of the outcomes of the NEW guidelines was the
establishment of INSTITUTIONAL REVIEW BOARDS
(IRBs) at colleges and universities across America. At
first, IRBs were seen as a hindrance on academic
freedom by faculty researchers, but they came to be
accepted, especially after 1981 when the revised HHS
guidelines exempted most social science and criminal
justice research from full review by creating a category
of "expedited" review.
Institutional Review Board
 This is a board consisting of professionals and lay people who review
research proposals to insure that the researcher will adhere to ethical
standards in the conduct of the research.
 Researchers must submit a Research Protocol to the IRB for review
 Three of the most important categories of review are exempt studies,
expedited review, and full board review
 Much educational research falls in the exempt category: being exempt
from certain requirements and full committee review because the study
involves no or minimal risk
 Studies with children, prisoners, and fetal participants are never exempt
 Even if your study ultimately falls in the exempt category, it is still
essential that you follow the ethical guidelines
There are three ways, and three ways only, to
encourage participation ethically (Senese 1997):
 Anonymity: Promise and keep your promises of anonymity. After
identifying your sampling frame, try to forget about taking names or
any other unique identifiers. Reassure people that you won't go to the
media. Fill them in on what journal outlet you have planned.
 Confidentiality: This is what you should promise if you can't keep
anonymity. In other words, use confidentiality if you can't guarantee
anonymity. It requires that you guarantee that no one will be
individually identifiable in any way by you, that all your tables,
reports, and publications will only discuss findings in the aggregate.
 Informed Consent: Be honest and fair with your subjects. Tell them
everything they want to know about your research. Be aware of any
hidden power differentials that might be pressuring them to
participate.
    CASE: TEAROOM TRADE
 Was the name of a book published by a sociologist
named Laud Humphreys in 1970 who posed as a
"watchqueen" in public restrooms to observe
homosexual behavior
 After every liaison where an old man would seduce
some "chicken hawk" with money for an oral sex
experience, Humphreys would jot down the license
plate number of each old man's vehicle. Then, he
had a friend in the police department trace the
addresses. He would then visit the old men at home
and pressure them into giving him an interview.
 The case stands as a classic example of invasion of
privacy.
CASE: TUSKEGEE SYPHILIS STUDY

 was conducted from 1932 to 1974 and


involved the withholding of penicillin from
black male sharecroppers so the
government could find out the long term
effects of syphilis
 Similar experiments went on with the U.S.
military involving nerve gas and nuclear
radiation. The CIA also performed bizarre
mind control experiments involving LSD,
ESP, hypnosis, and surgery.
 The moral of all this is not to conduct secret
testing on unsuspecting subjects.
CASE: ZIMBARDO'S PRISON SIMULATION

 was a study by psychologist Philip Zimbardo in 1972


that took Stanford University undergrads and made
some of them guards and some of them prisoners in
a mock underground dungeon for a planned two
week stay.

 The experiment had to be cancelled after six days


because by then, the student-guards became quite
sadistic, really getting into their roles. The prisoners
were also becoming quite mental.

 The experiment tells a story about psychological


harm and informed consent, since the subjects did
not know what they were getting into.    
Discussion Scenario (s)
 After a field study of deviant behavior during
a riot, law enforcement officials demand that
the researcher identify those people who were
observed looting. Rather than risk arrest as
an accomplice after the fact, the researcher
complies.

 Ethical issues?
 A research questionnaire is circulated among
students as part of their university registration
packet. Although students are not told they
must complete the questionnaire, the hope is
that they will believe they must – thus
ensuring a higher completion rate.

 Ethical Issues?
 Honesty and Integrity

This means that you need to report your research honestly, and that this applies to your
methods (what you did), your data, your results, and whether you have previously published
any of it. You should not make up any data, including extrapolating unreasonably from some
of your results, or do anything which could be construed as trying to mislead anyone. It is
better to undersell than over-exaggerate your findings.

When working with others, you should always keep to any agreements, and act sincerely.

 Objectivity

You should aim to avoid bias in any aspect of your research, including design, data analysis,
interpretation, and peer review. For example, you should never recommend as a peer
reviewer someone you know, or who you have worked with, and you should try to ensure that
no groups are inadvertently excluded from your research. This also means that you need to
disclose any personal or financial interests that may affect your research.

 Carefulness

Take care in carrying out your research to avoid careless mistakes. You should also review
your work carefully and critically to ensure that your results are credible. It is also important
to keep full records of your research. If you are asked to act as a peer reviewer, you should
take the time to do the job effectively and fully.

 Openness

You should always be prepared to share your data and results, along with any new tools that
you have developed, when you publish your findings, as this helps to further knowledge and
advance science. You should also be open to criticism and new ideas.

 Respect for Intellectual Property

You should never plagiarise, or copy, other people’s work and try to pass it off as your own.
You should always ask for permission before using other people’s tools or methods,
unpublished data or results. Not doing so is plagiarism. Obviously, you need to respect
copyrights and patents, together with other forms of intellectual property, and always
acknowledge contributions to your research. If in doubt, acknowledge, to avoid any risk of
plagiarism.

 Confidentiality

You should respect anything that has been provided in confidence. You should also follow
guidelines on protection of sensitive information such as patient records.

 Responsible Publication

You should publish to advance to state of research and knowledge, and not just to advance
your career. This means, in essence, that you should not publish anything that is not new, or
that duplicates someone else’s work.

 Legality
You should always be aware of laws and regulations that govern your work, and be sure that
you conform to them.

 Animal Care

If you are using animals in your research, you should always be sure that your experiments
are both necessary and well-designed. You should also show respect for the animals you are
using, and make sure that they are properly cared for.

 Human Subjects Protection

If your research involves people, you should make sure that you reduce any possible harm to
the minimum, and maximise the benefits both to participants and other people.

This means, for example, that you should not expose people to more tests than are strictly
necessary to fulfil your research aims. You should always respect human rights, including the
right to privacy and autonomy. You may need to take particular care with vulnerable groups,
which include, but are not limited to, children, older people, and those with learning
difficulties.
Research ethics provides guidelines for the responsible conduct of research. In addition, it educates and monitors scientists conducting
research to ensure a high ethical standard. The following is a general summary of some ethical principles:
Honesty:
Honestly report data, results, methods and procedures, and publication status. Do not fabricate, falsify, or misrepresent data.
Objectivity:
Strive to avoid bias in experimental design, data analysis, data interpretation, peer review, personnel decisions, grant writing, expert
testimony, and other aspects of research.
Integrity:
Keep your promises and agreements; act with sincerity; strive for consistency of thought and action.
Carefulness:
Avoid careless errors and negligence; carefully and critically examine your own work and the work of your peers. Keep good records of
research activities.
Openness:
Share data, results, ideas, tools, resources. Be open to criticism and new ideas.
Respect for Intellectual Property:
Honor patents, copyrights, and other forms of intellectual property. Do not use unpublished data, methods, or results without permission.
Give credit where credit is due. Never plagiarize.
Confidentiality:
Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and
patient records.
Responsible Publication:
Publish in order to advance research and scholarship, not to advance just your own career. Avoid wasteful and duplicative publication.
Responsible Mentoring:
Help to educate, mentor, and advise students. Promote their welfare and allow them to make their own decisions.
Respect for Colleagues:
Respect your colleagues and treat them fairly.
Social Responsibility:
Strive to promote social good and prevent or mitigate social harms through research, public education, and advocacy.
Non-Discrimination:
Avoid discrimination against colleagues or students on the basis of sex, race, ethnicity, or other factors that are not related to their scientific
competence and integrity.
Competence:
Maintain and improve your own professional competence and expertise through lifelong education and learning; take steps to promote
competence in science as a whole.
Legality:
Know and obey relevant laws and institutional and governmental policies.
Animal Care:
Show proper respect and care for animals when using them in research. Do not conduct unnecessary or poorly designed animal experiments.
Human Subjects Protection:
When conducting research on human subjects, minimize harms and risks and maximize benefits; respect human dignity, privacy, and
autonomy.

PRINCIPLES of Research Ethics


There are a number of ethical principles that should be taken into account when performing undergraduate and master's level dissertation research. At
the core, these ethical principles stress the need to

(a) do good (known as beneficence) and


(b) (b) do no harm (known as non-malfeasance). In practice, these ethical principles mean that as a researcher, you need
to: (a) obtain informed consent from potential research participants; (b) minimise the risk of harm to participants; (c) protect
their anonymity and confidentiality; (d) avoid using deceptive practices; and (e) give participants the right to withdraw from your research.
This article discusses these five ethical principles and their practical implications when carrying out dissertation research.

When you look at these five basic ethical principles, it may appear obvious that your dissertation should include these. However, there are many
instances where it is not possible or desirable to obtain informed consent from research participants. Similarly, there may be instances where you seek
permission from participants not to protect their anonymity. More often than not, such choices should reflect the research strategy that you adopt to
guide your dissertation.

Broadly speaking, your dissertation research should not only aim to do good (i.e., beneficence), but also avoid doing any harm (i.e., non-malfeasance).
Whilst ethical requirements in research can vary across countries, these are the basic principles of research ethics. This is important not only for ethical
reasons, but also practical ones, since a failure to meet such basic principles may lead to your research being (a) criticised, potentially leading to a lower
mark, and/or (b) rejected by your supervisor or Ethics Committee, costing you valuable time. In the sections that follow, we discuss the five of the
main practical ethical principles that stem from these basic principles. Each of these basic principles of research ethics is discussed in turn:

 PRINCIPLE ONE: Minimising the risk of harm


 PRINCIPLE TWO: Obtaining informed consent
 PRINCIPLE THREE: Protecting anonymity and confidentiality
 PRINCIPLE FOUR: Avoiding deceptive practices

 PRINCIPLE FIVE: Providing the right to withdraw

PRINCIPLE ONE
Minimising the risk of harm

Dissertation research should not harm participants. Where there is the possibility that participants could be harmed or put in a position of discomfort,
there must be strong justifications for this. Such scenarios will also require (a) additional planning to illustrate how participant harm (or discomfort) will
be reduced, (b) informed consent, and (c) detailed debriefing.

There are a number of types of harm that participants can be subjected to. These include:

 Physical harm to participants.


 Psychological distress and discomfort.
 Social disadvantage.
 Harm to participants? financial status.
 An invasion of participants? privacy and anonymity.

Typically, it is not harm that we need to think about since a researcher does not intentionally go out to cause harm. Rather, it is the risk of harm that you
should try to minimise. In order to minimising the risk of harm you should think about:

 Obtaining informed consent from participants.


 Protecting the anonymity and confidentiality of participants.
 Avoiding deceptive practices when designing your research.
 Providing participants with the right to withdraw from your research at any time.

We discuss each of these ethical principles in the sections that follow, explaining (a) what they mean and (b) instances where they should (and should
not) be followed.

PRINCIPLE TWO
Obtaining informed consent

One of the foundations of research ethics is the idea of informed consent. Simply put, informed consent means that participants should understand
that (a) they are taking part in research and (b) what the research requires of them. Such information may include the purpose of the research, the
methods being used, the possible outcomes of the research, as well as associated demands, discomforts, inconveniences and risks that the participants
may face. Whilst is it not possible to know exactly what information a potential participant would (or would not) want to know, you should aim not to
leave out any material information; that is, information that you feel would influence whether consent would (or would not) be granted.

Another component of informed consent is the principle that participants should be volunteers, taking part without having been coerced and deceived.
Where informed consent cannot be obtained from participants, you must explain why this is the case. You should also be aware that there are instances
informed consent is not necessarily needed or needs to be relaxed. These include certain educational, organisational and naturalistic research settings.
We discuss these in more detail under the section: Avoiding deceptive practices.

PRINCIPLE THREE
Protecting anonymity and confidentiality

Protecting the anonymity and confidentiality of research participants is another practical component of research ethics. After all, participants will typically
only be willing to volunteer information, especially information of a private or sensitive nature, if the researcher agrees to hold such information in
confidence. Whilst it is possible that research participants may be hurt in some way if the data collection methods used are somehow insensitive, there is
perhaps a greater danger that harm can be caused once data has been collected. This occurs when data is not treated confidentially, whether in terms of
the storage of data, its analysis, or during the publication process (i.e., when submitting your dissertation to be marked). However, this does not mean
that all data collected from research participants needs to be kept confidential or anonymous. It may be possible to disclose the identity and views of
individuals at various stages of the research process (from data collection through to publication of your dissertation). Nonetheless, permissions should be
sought before such confidential information is disclosed.

An alternative is to remove identifiers (e.g., vernacular terms, names, geographical cues, etc.) or provide proxies when writing up. However, such a
stripping of identifiable information may not always be possible to anticipate at the outset of your dissertation when thinking about issues of research
ethics. This is not only a consideration for dissertations following a qualitative research design, but also a quantitative research design [for more
information, see the article: Research strategy and research ethics].

For example:
Imagine that your dissertation used a quantitative research design and a survey as your main research method. In the process of analysing your data, it
is possible that when examining relationships between variables (i.e., questions in your survey), a person's identity and responses could be inferred. For
instance, imagine that you were comparing responses amongst employees within an organisation based on specific age groups. There may only be a
small group (or just one employee) within a particular age group (e.g., over 70 years old), which could enable others to identify the responses of this
individual (or small group of employees).

Therefore, you need to consider ways of overcoming such problems, such as: (a) aggregating data in tables and (b) setting rules that ensure a minimum
number of units are present before data/information can be presented.

A further alternative is to seek permission for access to data and analysis to be restricted to the published material, perhaps only allowing it to be viewed
by those individuals marking your work. If the work is later published, adjustments would then need to be made to protect the confidentiality of
participants.

There are also a wide range of potential legal protections that may affect what research you can and cannot perform, how you must treated the data of
research participants, and so forth. In other words, you don?t simply have a duty to protect the data you collect from participants; you may also have (in
some cases) a legal responsibility to do so. Since this varies from country-to-country, you should ask your dissertation supervisor or Ethics Committee for
advice (or a legal professional).

PRINCIPLE FOUR
Avoiding deceptive practices

At first sight, deceptive practices fly in the face of informed consent. After all, how can participants know (a) that they are taking part in research
and (b) what the research requires of them if they are being deceived? This is part of what makes the use of deceptive practices controversial. For this
reason, in most circumstances, dissertation research should avoid any kinds of deceptive practices. However, this is not always the case.

Deception is sometimes a necessary component of covert research, which can be justified in some cases. Covert research reflects research
where (a) the identity of the observer and/or (b) the purpose of the research is not known to participants. Cases where you may choose to engage in
covert research may include instances where:

 It is not feasible to let everyone in a particular research setting know what you are doing.
 Overt observation or knowledge of the purpose of the research may alter the particular phenomenon that is being studied.
Let's take each of these in turn:

It is not feasible to let everyone in a particular research setting know what you are doing

By feasibility, we are not talking about the cost of doing research. Instead, we mean that it is not practically possible to let everyone in a particular
research setting know what you are doing. This is most likely to be the case where research involves observation, rather than direct contact with
participants, especially in a public or online setting. There are a number of obvious instances where this may be the case:

 Observing what users are doing in an Internet chat room.


 Observing individuals going about their business (e.g., shopping, going to work, etc.).

Clearly, in these cases, where individuals are coming and going, it may simply be impossible to let everyone known what you are doing. You
may not be intentionally trying to engage in deceptive practices, but clearly participants are not giving you their informed consent.

Overt observation or knowledge of the purpose of the research may alter the particular phenomenon that is being studied

Where observations or a participants? knowledge of the true purpose of the research have the potential to alter the particular phenomenon that you are
interested in, this is a major concern in terms of the quality of your findings.

Therefore, when you think about whether to engage in covert research and possibly deceptive practices, you should think about the extent to which this
could be beneficial in your dissertation, not research in general; that is, everything from the research paradigm that guides your dissertation through to
the data analysis techniques you choose affect issues of research ethics in your dissertation [see the article: Research strategy and research ethics].

Imagine some of the following scenarios where covert research may be considered justifiable:

 Scenario A

You are conducting a piece of research looking at prejudice. Whilst participants are given a questionnaire to complete that measures their
prejudice, it is not obvious from the questions that this is the case. Furthermore, participants are not told that the research is
about prejudice because it is felt that this could alter their responses. After all, few people would be happy if other people thought they were
prejudice. As a result, if participants knew that this is the purpose of the study, they may well provide responses that they think will make
them appear less prejudice.

 Scenario B

You are interested in understanding the organisational culture in a single firm. You feel that observation would be an appropriate research
method in such a naturalistic setting. However, you feel that if employees knew that you were monitoring them, they may behave in a
different way. Therefore, you may have received permission to go undercover or provide a story to explain why you are there, which is not
the truth.

Whilst such covert research and deceptive practices, especially where used intentionally, can be viewed as controversial, it can be argued that they have
a place in research.

PRINCIPLE FIVE
Providing the right to withdraw

With the exception of those instances of covert observation where is not feasible to let everyone that is being observed know what you are doing,
research participants should always have the right to withdraw from the research process. Furthermore, participants should have the right to withdraw at
any stage in the research process. When a participant chooses to withdraw from the research process, they should not be pressured or coerced in any
way to try and stop them from withdrawing.
If your supervisor and/or Ethics Committee expect you to complete an Ethics Consent Form, it is likely that you will have to let participants know that
they have the right to withdraw at any time [see the article: Ethics consent form].

Next Steps

Now that you have read these basic principles of research ethics, you may want to understand how the research strategy you have chosen affects
your approach to research ethics [see the article: Research strategy and research ethics]. You will need to understand the impact of your research
strategy on your approach to research ethics when writing up the Research Ethics section of your Research Strategy chapter (usually Chapter Three:
Research Strategy).
What is plagiarism?
Latin plagium - means "kidnapping"
 It is intellectual theft
 It is a serious scientific misconduct

(American Heritage Dictionary of the


English Language, 3rd ed., 1992) Gitanjali 1
Writecon 2007
Definition of Plagiarism*
 "Plagiarism is the use of others' published and unpublished
ideas or words (or other intellectual property) without attribution
or permission, and presenting them as new and original rather
than derived from an existing source. The intent and effect of
plagiarism is to mislead the reader as to the contributions of the
plagiarizer. This applies whether the ideas or words are taken
from abstracts, research grant applications, Institutional Review
Board applications, or unpublished or published manuscripts in
any publication format (print or electronic).

WAME Publication Ethics Policies for Medical Journals, at


http://www.wame.org/resources/publication-ethics-policies-for-medical-journals#plagiarism :
Gitanjali 2
Writecon 2007
What is the magnitude of the problem?

Giles J. Taking on the cheats. Nature 435, 258-


9, 19 May 2005.
Gitanjali 3
Writecon 2007
Saturday, March 17, 2007 - R. A. Mashelkar
resigns from patent panel following
plagiarism charge
 Dr. Mashelkar confirmed to The Hindu that
certain lines used in their report's conclusion had
been taken "verbatim" from a November 2005
paper that was authored by Shamnad Basheer, a
doctoral student and an Associate at the Oxford
Intellectual Property Research Centre, University
of Oxford. (Feb 22, 2007)

Source: The Hindu Gitanjali 4


Writecon 2007
“Intriguing proposal!...Give me some time to
mull it over and co-opt it as my own.”

Gitanjali 5
Writecon 2007
Plagiarism is
plagiarism…
irrespective of
Intent, Source,
Quantity and
Copyright

Gitanjali 6
Writecon 2007
Poll-1
Copying the text of existing research is

(a)Copy right
(b)Plagiarism
(c)Ethical
(d)All of the above

Gitanjali 7
Writecon 2007
What is cyber-plagiarism?
 Copyingideas, text, material from the
web without proper accreditation
 Digital
plagiarism is a term used to
describe copying using computers

Creativity is fine
but plagiarism is
faster…
Gitanjali 8
Writecon 2007
‘You’ve copied all this off
the internet…’
Gitanjali 9
Writecon 2007
Truth is stranger than
fiction…
 17/3/2007
Ethics Student Plagiarizes Class
Presentation on Plagiarism
(downloaded the slides from internet)
Types of plagiarism
 Word for word (Direct, Text)
 Mosaic
 Thesaurus (Paraphrase)
 Ideas
 Authorship
 Secondary sources
 Self
Gitanjali 11
Writecon 2007
What is self-plagiarism?
 The practice of an author using portions of their
previous writings on the same topic in another of their
publications, without specifically citing it formally in
quotes.
 This practice is widespread and at times
unintentional
 Violates the copyright that has been assigned to the
publisher
 No consensus whether this is scientific misconduct

Gitanjali 12
Writecon 2007
Are you saying that JK Rowling plagiarized you
simply because you both use “because“ and
“too” on page 256?

Gitanjali 13
Writecon 2007
Why do people plagiarize?
 Ignorance
 Lack of knowledge on the ethics of scholarly
writing / poor writing skills
 Ambition, fierce competition
 Pressure from seniors
 Publish or perish system
 Faster
 Chances of getting caught or action
being taken is slim
Gitanjali 14
Writecon 2007
How to avoid plagiarism?
 For short quotes, use quotation marks in the sentence.
 For longer quotes indent the entire passage
 If you have used a table, chart, diagram etc., cite the source
directly below with a statement that permission has been
obtained.
 “All sources should be disclosed and, if large amounts of other
people's written or illustrative material are to be used,
permission must be sought.” COPE, 1999.
Even if you change a few words here and
there it is considered plagiarism
Gitanjali 15
Writecon 2007
Poll-2
How much plagiarism is allowed in
Scopus indexed journals

(a)20%
(b)40%
(c)50%
(d)00%

Gitanjali 16
Writecon 2007
Figure 1. Brain regions of current interest to the
neurobiology of sleep. (Figure reproduced with
permission from: Pace-Schott EF, Hobson JA. The
neurobiology of sleep. Nature Reviews
2002;3:697-723.)
Fair Use of Intellectual Property
 use of a copyrighted work for purposes
such as criticism, comment, news
reporting, teaching or scholarship.
 use copyrighted materials without
seeking permission from the creator or
publisher and without paying copyright
fees.
Does not mean that you
can plagiarize!!!

Gitanjali 18
Writecon 2007
Copyright and Plagiarism
12,500 USD
 Plagiarism issues are not strictly related
to copyright issues - though the two may overlap.   
 Copyright is a legal concept; plagiarism is literary
and more of an ethical issue.
 Publishers are more worried about copyright
violation.

WAME discussion board Gitanjali 19


Writecon 2007
We now have a
drug to cure
‘writer’s block’, but
a common side
effect is plagiarism

Gitanjali 20
Writecon 2007
British Student says University was Negligent for
Not Stopping his Plagiarism (
http://chronicle.com/prm/daily/2004/06/2004060404n.htm

Are we doing
enough?

Interesting websites:
http://www.famousplagiarists.com/scienceandmedicine.htm.
www.turnitin.com
What is plagiarism?
 the copying from a book, article, notebook,
video, or other source material, whether
published or unpublished, without proper credit
through the use of quotation marks, footnotes,
and other customary means of identifying
sources, or passing off as one's own the ideas,
words, writings, programs, and experiments of
another, whether or not such actions are
intentional or unintentional."
Undergraduate catalogue, William Patterson
University, 2002
Gitanjali 22
Writecon 2007
Gitanjali 23
Writecon 2007
“It’s not the same. I was caught stealing
office supplies. You on the other hand, got
caught stealing ideas.”
Gitanjali 25
Writecon 2007
Avoiding Plagiarism:
and other writing tips…*
What Is Plagiarism?
 Use of another’s work without giving credit

 “Intentionally or knowingly representing the


words, ideas, or work of another as one’s
own in any academic exercise” (CSUN 2010-
2012 Catalog, Appendix E)
Discussion Question
 Why should we be concerned about
it?
Because…
 If you plagiarize, you are cheating yourself.
You don’t learn to write out your thoughts in your own words,
and you don’t get specific feedback geared to your individual
needs and skills.
Plagiarizing a paper is like sending a friend to basketball
practice for you – you’ll never get the benefit of the practice
yourself.
Plagiarism is dishonest because it misrepresents the
work of another as your own.
 Plagiarism devalues others' original work.

Submitting another writer's work as yours is taking an unfair


advantage over students who do their own work.
Because…
 It is wrong to take or use property (an author's work)
without giving the owner the value or credit due.

 Copyright violations can result in fines or legal


damages.

 Plagiarism violates the CSUN Code of Conduct and


can result in suspension or expulsion.
 CSUN's reputation affects the value of your degree;
student dishonesty hurts CSUN’s standing and can
make your degree worth less. 
Discussion Questions
 Why do people plagiarize?

 What can we do to prevent it?


Types of Plagiarism
 Intentional plagiarism:
deliberate copying or use of another’s work without credit.
 Unintentional plagiarism can result from:
 not knowing citation standards
(e.g., “I thought the Internet was free!”)
 sloppy research and poor note-taking habits, or
 careless “copying and pasting” of electronic sources.
 Both types are subject to disciplinary
action
The Spectrum of Offenses

Possibly Deliberate
Unintentional Plagiarism
Plagiarism

Using a Building on Copying from Hiring Buying,


source too someone’s another source someone to stealing, or
closely when ideas without without citing write your borrowing a
paraphrasing citation (on purpose or paper paper
by accident)
Avoiding Plagiarism
 Manage your time
 Keep track of your sources
 Distinguish your ideas from the ideas in
other sources
 Be careful when working with others
 Think of the consequences
Proper Citation
 Know what to cite
 Keep track of original sources
 Be careful of “cut and paste” online research
 There are “no freebies”
 Beware of “common knowledge”
 Know how to cite
 Provide enough information so we can find the original source
 Use an accepted standard such as APA or MLA
 Use your own words and ideas
 If you repeat another’s exact words, you must use quotation
marks and cite the source.
 Avoid using others’ work with minor cosmetic changes.
Proper Citation – cont’d
 Know when to cite
 Direct quotations
 Paraphrased ideas
 Facts or information that isn’t common
knowledge
 When in doubt, you must cite
Plagiarism in Teams
 Team Assignments
 All members of the team are responsible for

accuracy and honesty of team work


 Keep track of your own research and contributions

to the team
 Proofread for each other

 Read the paper before it is submitted

 Study Groups
 When working together on individual assignments,

hand in your own words/answers


 Don’t give others your written answers. You can

discuss how you got your solutions


Deciding When To Give
Credit: Examples
Below are some situations in which writers need to decide whether or not they are
running the risk of plagiarizing. Indicate if you would need to document (Yes), or if it
is not necessary to provide quotation marks or a citation (No). If you do need to give
the source credit in some way, explain how you would handle it. If not, explain why.

1 You are writing new insights about your own experiences.

2 You are using an editorial from your school’s newspaper with which you disagree.

3 You use some information from a source without ever quoting it directly.

4 You have no other way of expressing the exact meaning of a text without using the
original source verbatim.

5 You mention that many people in your discipline belong to a certain organization.

6 You want to begin your paper with a story that one of your classmates told about her
experience in Bosnia.

7 The quote you want to use is too long, so you leave out a couple of phrases.

8 You really like the particular phrase somebody else made up, so you use it.
Academic Dishonesty
Types of Academic Dishonesty
 Cheating
 “Intentionally using or attempting to use

unauthorized materials, information, or study aids in


any academic exercise”
 Fabrication
 “Intentional falsification or invention of any

information or citation in an academic exercise”


 Facilitating academic dishonesty
 “Intentionally or knowingly helping or attempting to

help another to commit an act of academic


dishonesty”
 Plagiarism

Source: CSUN 2010-2012 Catalog, Appendix E.


Plagiarism
What is plagiarism?
Latin plagium - means "kidnapping"
 It is intellectual theft
 It is a serious scientific misconduct

(American Heritage Dictionary of the


English Language, 3rd ed., 1992) Gitanjali 2
Writecon 2007
Definition of Plagiarism*
 "Plagiarism is the use of others' published and unpublished
ideas or words (or other intellectual property) without attribution
or permission, and presenting them as new and original rather
than derived from an existing source. The intent and effect of
plagiarism is to mislead the reader as to the contributions of the
plagiarizer. This applies whether the ideas or words are taken
from abstracts, research grant applications, Institutional Review
Board applications, or unpublished or published manuscripts in
any publication format (print or electronic).

WAME Publication Ethics Policies for Medical Journals, at


http://www.wame.org/resources/publication-ethics-policies-for-medical-journals#plagiarism :
Gitanjali 3
Writecon 2007
What is the magnitude of the problem?

Giles J. Taking on the cheats. Nature 435, 258-


9, 19 May 2005.
Gitanjali 4
Writecon 2007
Saturday, March 17, 2007 - R. A. Mashelkar
resigns from patent panel following
plagiarism charge
 Dr. Mashelkar confirmed to The Hindu that
certain lines used in their report's conclusion had
been taken "verbatim" from a November 2005
paper that was authored by Shamnad Basheer, a
doctoral student and an Associate at the Oxford
Intellectual Property Research Centre, University
of Oxford. (Feb 22, 2007)

Source: The Hindu Gitanjali 5


Writecon 2007
“Intriguing proposal!...Give me some time to
mull it over and co-opt it as my own.”

Gitanjali 6
Writecon 2007
Plagiarism is
plagiarism…
irrespective of
Intent, Source,
Quantity and
Copyright

Gitanjali 7
Writecon 2007
What is cyber-plagiarism?
 Copyingideas, text, material from the
web without proper accreditation
 Digital
plagiarism is a term used to
describe copying using computers

Creativity is fine
but plagiarism is
faster…
Gitanjali 8
Writecon 2007
‘You’ve copied all this off
the internet…’
Gitanjali 9
Writecon 2007
Truth is stranger than
fiction…
 17/3/2007
Ethics Student Plagiarizes Class
Presentation on Plagiarism
(downloaded the slides from internet)
Types of plagiarism
 Word for word (Direct, Text)
 Mosaic
 Thesaurus (Paraphrase)
 Ideas
 Authorship
 Secondary sources
 Self
Gitanjali 11
Writecon 2007
What is self-plagiarism?
 The practice of an author using portions of their
previous writings on the same topic in another of their
publications, without specifically citing it formally in
quotes.
 This practice is widespread and at times
unintentional
 Violates the copyright that has been assigned to the
publisher
 No consensus whether this is scientific misconduct

Gitanjali 12
Writecon 2007
Are you saying that JK Rowling plagiarized you
simply because you both use “because“ and
“too” on page 256?

Gitanjali 13
Writecon 2007
Why do people plagiarize?
 Ignorance
 Lack of knowledge on the ethics of scholarly
writing / poor writing skills
 Ambition, fierce competition
 Pressure from seniors
 Publish or perish system
 Faster
 Chances of getting caught or action
being taken is slim
Gitanjali 14
Writecon 2007
How to avoid plagiarism?
 For short quotes, use quotation marks in the sentence.
 For longer quotes indent the entire passage
 If you have used a table, chart, diagram etc., cite the source
directly below with a statement that permission has been
obtained.
 “All sources should be disclosed and, if large amounts of other
people's written or illustrative material are to be used,
permission must be sought.” COPE, 1999.
Even if you change a few words here and
there it is considered plagiarism
Gitanjali 15
Writecon 2007
Figure 1. Brain regions of current interest to the
neurobiology of sleep. (Figure reproduced with
permission from: Pace-Schott EF, Hobson JA. The
neurobiology of sleep. Nature Reviews
2002;3:697-723.)
Fair Use of Intellectual Property
 use of a copyrighted work for purposes
such as criticism, comment, news
reporting, teaching or scholarship.
 use copyrighted materials without
seeking permission from the creator or
publisher and without paying copyright
fees.
Does not mean that you
can plagiarize!!!

Gitanjali 17
Writecon 2007
Copyright and Plagiarism
12,500 USD
 Plagiarism issues are not strictly related
to copyright issues - though the two may overlap.   
 Copyright is a legal concept; plagiarism is literary
and more of an ethical issue.
 Publishers are more worried about copyright
violation.

WAME discussion board Gitanjali 18


Writecon 2007
We now have a
drug to cure
‘writer’s block’,
but a common
side effect is
plagiarism

Gitanjali 19
Writecon 2007
British Student says University was Negligent for
Not Stopping his Plagiarism (
http://chronicle.com/prm/daily/2004/06/2004060404n.htm

Are we doing
enough?

Interesting websites:
http://www.famousplagiarists.com/scienceandmedicine.htm.
www.turnitin.com
What is plagiarism?
 the copying from a book, article, notebook,
video, or other source material, whether
published or unpublished, without proper credit
through the use of quotation marks, footnotes,
and other customary means of identifying
sources, or passing off as one's own the ideas,
words, writings, programs, and experiments of
another, whether or not such actions are
intentional or unintentional."
Undergraduate catalogue, William Patterson
University, 2002
Gitanjali 21
Writecon 2007
Gitanjali 22
Writecon 2007
“It’s not the same. I was caught stealing
office supplies. You on the other hand, got
caught stealing ideas.”
Gitanjali 24
Writecon 2007
Citing and Writing to
Prevent Plagiarism

Kean University Library


Spreading the Word Team
What is Plagiarism?

“To steal and pass off


(the ideas or words of
another) as one's own
: use (another's
production) without
crediting the source.” PLAGIARISM

Merriam-Webster Online Dictionary


http://www.m-w.com/cgi-bin/dictionary?book=Dictionary&va=ultimun
What is Plagiarism?
Definition according to
Kean University Academic
Integrity document

“Plagiarism occurs when a person


represents someone else’s words,
ideas, phrases, sentences, or data
as one’s own work.”

http://www.kean.edu/forms/AcademicIntegrity.pdf
Intentional plagiarism:
  Copying words or ideas from others and
using as your own 
 Cutting and pasting information without citing
 Buying or borrowing a written work by
someone else and submitting it as your
work 
 Using videos, audio recorder or other media
without citing

Plagiarism.org http://www.plagiarism.org/learning_center/educational_tips.html
Unintentional plagiarism:

 Citing incorrectly, Omitting citations


 Deficient of knowledge and understanding of how
paraphrase
 Failure to use your own “voice”
 Extremely use of Quotations
 Inexperienced writers and language
issues.
 Citing incorrectly, Omitting citations
Plagiarism.org http://www.plagiarism.org/learning_center/educational_tips.html
Kean University
Academic
Integrity policy

http://www.kean.edu/forms/AcademicIntegrity.pdf
Kean University
Academic Integrity Policy

Consequences if you plagiarize

Violations of academic
integrity are classified into
four categories based on
the level of seriousness of
the behaviors.
Level 1 Violations

Example:
- Improper footnoting or unauthorized
assistance with academic work on the part of a
first-year student.

Recommended Penalty: make-up assignment


at a more difficult level or assignment of no-
credit for work in question, required attendance
at a workshop on preparation of term papers, or
a library assignment on preparation of term
papers.
Level 2 Violations

Example:
- Quoting directly or paraphrasing without
proper acknowledgment (cite) on a small
portion of the assignment
- Failing to acknowledge (cite) all sources of
information and contributors who helped with
an assignment.

Recommended penalty: A failing grade on the


assignment and/or in the course.
Level 3 Violations

Example:
- Plagiarizing major portions of an
assignment
- Using a purchased term paper
- Presenting the work of another as one’s own

Recommended penalty: Probation or


suspension from the University for one or more
semesters with a notation of “disciplinary
suspension” placed in a student’s record and/or
a failing grade in the course.
Level 4 Violations

Example:
- Any degree of falsification or plagiarism
relating to a senior or graduate thesis
- infractions involving academic integrity
committed after return from suspension for a
previous violation.

Recommended penalty: Expulsion from the


university and a permanent dismissal notation
on the student’s internal transcript
How can we find the source of
Plagiarized papers?

Google or other engine
search systems-
Searching part of the
student work, like a
phrase or sentence.

 Submitting the student


work to Turnitin.com or
other plagiarism detection
service or software.  
How to avoid plagiarism?

You avoid plagiarism by giving


credit (cite) to the person or
persons that created the words,
ideas, images, sounds, or any
creative expression.
What is a Citation?

The act of citing or quoting a passage from a


book or other reference. A passage cited;
quotation. A quotation showing a particular
word or phrase in context. Mention or
enumeration.

Merriam-Webster Online Dictionary


http://www.m-w.com/cgi-bin/dictionary?book=Dictionary&va=ultimun
Why use citation?

 To prevent plagiarism
 To write with authority

 To make possible for your

readers to locate your source


 To demonstrate your knowledge

acquisition
 To show your ethical values
Exception for citation

You do not have to


document information or
fact considered
“common knowledge”
Common knowledge

Facts that can be found in


numerous places and are likely
to be known by a lot of people.
Examples of common knowledge

 The Emancipation Proclamation was


sign by President Abraham Lincoln.
 On July 4, 1776, the Second
Continental Congress approved the
Declaration of Independence.

When you don’t know if the information


is “common knowledge”, use citation.
You don’t need to cite when:

 You are using common knowledge


 You are discussing your own opinions,
experiences, observations, or reactions
 Compiling the results of your original
research, science experimentations,
social or psychological observations,
etc.
You have to cite when :

 Summarizing
 Paraphrasing
 Quoting
References

- Harris, Robert. (2004). Anti-Plagiarism Strategies for


Research Papers. Retrieved March 18, 2008, from
http://www.virtualsalt.com/antiplag.htm
- Kean University, (2006). Kean University Academic
POLICY. Retrieved March 20, 2008, from
http://www.kean.edu/forms/AcademicIntegrity.pdf
- Lexico Publishing. (2008). citation. (n.d.). Merriam-
Webster's Dictionary of Law. Retrieved March 17, 2008,
from Dictionary.com website:
http://dictionary.reference.com/browse/citation
- Lexico Publishing. (2008). plagiarism. (n.d.). Merriam-
Webster's Dictionary of Law. Retrieved March 17, 2008,
from Dictionary.com website:
http://dictionary.reference.com/browse/citation
References
- Plagiarism.org . (2008). Educational tips on plagiarism
prevention. Retrieved April 2, 2008, from
http://www.plagiarism.org/learning_center/educational_ti
ps.html
- Purdue University Online Writing Lab. (2006). APA
formatting and style guide. Retrieved March 18, 2008,
from http://owl.english.purdue.edu/owl/resource/560/01/
- Sharka, Jane. (2007). Plagiarism Stopper: A Teacher’s
Guide. Retrieved March 18, 2008, from
http://www.ncusd203.org/central/html/where/plagiarism_
stoppers.html
- Standler, Ronald B. (2000). Plagiarism in Colleges in
USA. Retrieved March 18, 2008, from
http://www.rbs2.com/plag.htm
Kean University Library

Citing and Writing to Prevent


Plagiarism

Copyright © 2008
by Janette González
Reference Librarian
Citing and referencing
academic sources
Student Learning Development
Student Counselling Service
student.learning@tcd.ie
http://student-learning.tcd.ie
896-1407
Demystifying citation
Session Objectives:
• What is a reference or citation?
• Examples of citations
• What is a citation or reference style?
• The Harvard Referencing style
• Avoiding plagiarism
• Where to get more information about citing
and referencing
What is a reference or citation?

• A way of giving credit for someone's


thinking, writing or research
• You mark the material when you use it (a
citation) and give the full identification at
the end (a reference)
• In academic writing you are obliged to
attribute every piece of material you use to
its author
Why cite or reference?
• Credit sources of information & ideas

• Reader can locate for further information if


required
• Validate arguments
• Increase and spread knowledge
• Show depth, breadth & quality of your
reading!
When to cite?

 Direct quotes
 Statistics/Studies
 Theories
 Facts
 Interpretations
 Paraphrases
Example citation in text –summary

The prologue to Peter Stevens’ (2003) “The


Voyage of the Catalpa” has a strong Irish flavour
yet it is clearly set on the eastern seaboard of
the United States of America.

A study by O'Connor of the CIBA foundation


found that 52 scientific journals had used 33
different reference styles (cited by Garfield 1986,
p. 3)
Example of citation in text –
paraphrase

The beautifully refitted and well equipped


ship carried supplies for two years at sea
whaling in the Atlantic (Stevens, 2003).

We all perceive the world around us in


ways that are often unique to us through a
series of personal filters and we 'construct'
our own versions of reality (Kelly 1955).
Example of citation in text –
quotation

The conspiratorial tone of the prologue is no


better expressed than in the final line, “Not a
man but ourselves had the least suspicion of her
true mission, and she is well on her way now.”
(Stevens, 2003, p. 2).
Another example quote
A recent study (Oshagbemi, 2004) also suggests
that older managers can bring balance to a
management team, as older managers,
compared to younger, consult more widely and
favour more participation, which tends to be
well-received by other staff. Oshagbemi asserts
that: "older workers tend to have a maturity and
wisdom that enables them to anticipate
problems and to respond to them calmly and
with confidence" (p.2).
Poll-1

Citation of Referencing is
(a)Numeric
(b)Text
(c)Both
(d)None
How? Citation or reference style

• A citation style or reference system is a


standardised system for referring to
materials used in your writing
• There are several different citation styles
developed independently by professional
organisations
• University Departments generally stipulate
which style to use for your subject
The Harvard Referencing style

• The most commonly used system in


College
• Also known as the “author date system”
• There are very specific rules for textual
citations
• There are very specific rules for listing
your references at the end of your essay
Refernces or Bibliography

• “Bibliography” and “References”


• The conventions of your subject will
determine which term you use
• In the Harvard system, references are
listed alphabetically
• There is a double space between
references
Citation listed in ‘References’

Book:
Stevens, P. (2003) The Voyage of the
Catalpa: A Perilous Journey and Six Irish
Rebels’ Escape to Freedom. London:
Weidenfeld and Nicolson.

Harvard
Citation listed in a ‘References’

Journal article
Stevens, P. (2003) ‘The Voyage of the
Catalpa: A Perilous Journey and Six Irish
Rebels’ Escape to Freedom’. Irish Journal
of Social History 50 (2) 34-42.

– The “Irish Journal of Social History” is


fictitious and for this example only
Avoiding plagiarism
• The availability of text in digital form
increases the possibility of accidentally
using someone else's material without
acknowledgement
• Make sure you record all the details of the
material you make notes on at the time so
that you know who’s it is later
• By all means use quotes and paraphrased
material but cite it properly
Poll-2

Plagiarism can be reduced by

(a)Paraphrasing
(b)Citation and referencing
(c)Providing source of the content
(d)All of the above
Further information

• http://www.tcd.ie/Library/support/
referencing.php
• http://www.learnhigher.ac.uk
• http://www.coventry.ac.uk/caw
• http://www.cite.auckland.ac.nz
Name of author.
GEN530 UNIT-4 LECTURE-7

TOPIC: University Grants Commission’s (UGC) policy for


curbing plagiarism

Delivered by

Dr. Pushpendra Kumar Sharma


Introduction

Plagiarism is one of the biggest issues that educational


institutions and academia are facing, not only due to the fact
that it is basically stealing someone else’s work, but also
because this practice is so widespread in higher education, be
it Ph.D. scholars or the average undergraduate.
Plagiarism is a stain upon the legitimacy of education in India,
thus the UGC has recently drafted certain regulations to
control and punish plagiarism.
UGC
• The University Grants Commission or the UGC was set up in
1956 by an act passed by the legislature called the University
Grants Commission Act, 1956; under the Ministry of Human
Resource Development.
• It was created in order to regulate the higher education system
of India. The UGC is thus responsible for the rules and
guidelines that a college or university is supposed to follow.
Functions of the UGC
• Chapter II of the UGC Act, 1956
• Maintaining the standards for teaching, examination, and research. The law has further provided
certain powers to ensure such standards. The UGC can;
• Inquire about the financial situation of a university.
• Allocate funding to universities established or incorporated by a central act.
• Allocate funding to any other universities as they may deem fit.
• Recommend any measure for the improvement of education of a university.
• Advise the State or Centre on the issue of allocation of grants to universities or any other matter
referred to the UGC by centre or state.
• Prescribe minimum standards of qualification for both students and teachers.
• Prescribe regulations regarding the fees and course of study.
• Under Section 26 of this act, the UGC has the power to frame any rules or regulations in order to
fulfill the above functions.
Procedure of Passing Rules and Regulations under
Section 26 of UGC Act, 1956
• The rules and regulations must be notified in the Official
Gazette.
•The permission of the Central Government must be taken
before it can be made.
•Such rule or regulation has to be placed before both the houses
of parliament for a total period of 30 days and if both the
houses recommend modifying the rules or regulations, then it
shall have effect only in the modified form or have no effect if
the parliament rejects it.
UGC Rules Regarding Plagiarism

• The UGC had constituted a committee to look into the issue


of plagiarism and this committee framed a draft regulation
known as the University Grants Commission (Promotion of
Academic Integrity and Prevention of Plagiarism in Higher
Education Institutions) Regulations, 2017; which was
publicly notified by the UGC on 1st September 2017. On
20th March 2018, the regulations were approved by the UGC
awaiting notification after the approval of the Ministry of
Human Resource Development (MHRD).
Objectives of the Guideline

• Section 3 of the draft as:


• Creating awareness of responsible conduct in academia and
prevention of misconduct including plagiarism.
• Establishing an institutional mechanism for the promotion of
academic integrity, responsible conduct, and prevention of
plagiarism.
• Setting up a system for catching plagiarism and mechanism
for punishing the act of plagiarism.
Poll-1
• UGC got established in

(a) 1963
(b) 1956
(c) 1965
(d) 1988
Answer

(b) 1956
Plagiarism Defined

• The definition of plagiarism has been defined in Section 2 (k)


of UGC Act 1956, the regulation as, “Plagiarism as an act of
academic dishonesty and a breach of ethics. It involves using
someone else’s work as one’s own.
• It also includes data plagiarism and self-plagiarism.”
Self-Plagiarism
• The inclusion of self-plagiarism is an interesting addition as it means that using
your own previous work without adequately citing it has also been brought
within the ambit of the definition.
• This idea may appear counterintuitive to the very soul of plagiarism which is
stealing someone else’s work but it is important to understand that representing
old work as new work is stealing from yourself.
• It also defeats the purpose of research papers which is to present original work
and the integrity of the work is marred.
• Most publishers will not allow for self-plagiarism as there is no differentiation
made between your published work and other people’s published work.
• One of the most important facets to consider is that the copyright for published
works are usually held by the journal rather than the author and plagiarizing
from your own work would mean the violation of such copyright.
Scope of the Guidelines
• Universities, which are the institutions that have been incorporated by a
Central, Provincial or State Act or any institution that has been deemed as
such.
• Any institute that has been declared by the parliament to be of national
importance.
• Or any constituent unit within such institutions that provide education after
12 years of schooling and which provides degrees or diplomas after
completion of said education.
• Further the guidelines are applicable only on “scripts”, the definition of
which has been provided in Section 2 (n) as any “…research paper, thesis,
study, project report, assignment, dissertation and any other such work
submitted for assessment/opinion leading to the award of degree or
publication in print or electronic media by students or faculty or staff of an
Institution of Higher Education;” the guidelines have also provided that
exam scripts are exempt.
Duties of Higher Education Institutes (HEI) for Curbing of Plagiarism

• HEIs must establish a mechanism in order to spread awareness so as to


promote responsible conduct, deterrence of plagiarism and academic integrity.
• The HEIs are to hold sensitization seminars for students, faculty and other
members every semester for responsible conduct in pursuit of academia as
well as teach academic ethics to students.
• The HEIs must put academic ethics in the coursework for Undergraduate,
Postgraduate, and Masters degrees. They must also include research and
publication ethics for coursework of Ph.D. and M.Phil scholars.
• The HEIs must provide training for using plagiarism detection technology.
• The institutions must establish facilities for the detection of plagiarism.
Methods for Curbing Plagiarism
• Section 6 provides the various ways in which plagiarism is to be
deterred by the various Higher Education Institutes. They are as
follows:
• All HEIs are to implement a mechanism in order to detect plagiarism
at the time the scripts are submitted to the institution.
• Every student who is submitting such scripts must also provide an
undertaking which says that the work is original and no content has
been plagiarised. The undertaking will also include that the work has
been checked for plagiarism.
• All the members of the faculty, Ph.D. or M.Phil students are to be
given access to such plagiarism detection tool.
• The institutions will come up with a plagiarism policy that has to be
approved by the relevant statutory bodies.

• All supervisors will provide a certificate which states that the
student or researcher under him/her has not plagiarised any
content.
• All soft copies of the dissertations and theses by M.Phil and
Ph.D. scholars after degree is awarded are to be submitting
on the Information and Library Network Centre
(INFLIBNET) for hosting by the HEIs.
• The institutions will set up an online repository for
dissertations, theses, paper, publication and all other in-house
publications.
Exemptions

• Certain content will be exempted from the charge of plagiarism even


though they are reproductions of other works. The said exemptions are
as follow:
• Quoted work which is either in the public domain or has been
attributed adequately or permission has been granted for its use.
• All references, table of content, preface, acknowledgement, and
bibliography are exempted.
• Similar content which is minor.
• Standard equations and symbols, laws and generic terms.
Tolerance of Plagiarism
• Tolerance of plagiarism has been divided into two part under Sections
8 and 9, they are:
• Zero-tolerance areas: This means that plagiarism of any degree will
not be tolerated. Zero tolerance is restricted to core areas. Core areas
are the hypothesis, the recommendations, the abstract, the summary,
the conclusion, the results and the observations.
• Tolerance areas: Plagiarism in all areas but the core areas is tolerable
to a certain extent. The various levels of plagiarism have been
quantified and given below;
• Up to 10%- Excluded
• Between 10% and 40%- Level 1
• Between 40% and 60%- Level 2
• Above 60%- Level 3
Reporting of Plagiarism and Procedure to be Followed

• In case plagiarism is suspected and there is proof of such, any member


of the academic community may approach the relevant institution after
which the institution will refer it to the Academic Misconduct Panel
(AMP).
• The AMP is to be set up by all HEIs in order to investigate and submit
a report. After the AMP has thoroughly investigated the situation, they
will make a report to the Plagiarism Disciplinary Authority (PDA),
preferably within a period of 45 days.
• The PDA is to be formed by the HEI and their job is to take
appropriate decision after consideration of both the recommendations
of the AMP as well as the hearing of the accused. Their decision will
be final and binding.
Penalties for the Act of Plagiarism
• The various penalties for plagiarism have been provided in
Section 13 of the guidelines.
• Different penalties have been given for different tiers of
plagiarism severity. Section 13 provides that penalties shall
be awarded only when there is no doubt that the accused has
committed the act and after all other avenues of appeal have
been exhausted. The accused must also be given adequate
opportunity to defend himself/herself.
• Further, the proceedings are to be held in camera, meaning
that proceedings are to be closed to the public. The penalties
given should be in proportion to the severity of plagiarism.
Poll-2
• Penalties for plagiarism are in UGC Act 1956

(a) Section 3
(b) Section-4
(c) Section-13
(d) Section-7
Answer

(c) Section-13
Penalties for Students
• Penalties will be given to students according to the decision of the
Plagiarism Disciplinary Authority (PDA). The punishments given to
students for plagiarism for different levels of severity are given below:
• Level 1 (10%-40%)– the student will not be given any mark or credit
and revised script must be resubmitted within a stipulated time period
which does not exceed 6 months.
• Level 2 (40%-60%)– the student will not be given any mark or credit
and the revised script is to be resubmitted between 1 year and 18
months.
• Level 3 (above 60%)– the student will not be given any mark or
credit and their registration for that course will be canceled.

• If a student repeats such act of plagiarism then the
punishment will be for the next level to the one previously
committed. In cases where the highest level of plagiarisation
occurs then the punishment remains the same and the
registration will be canceled.
• If degree or credit has already been obtained and the accused
has been proven to have plagiarized content then said degree
or credit will be suspended for a stipulated time period.
Penalties for Faculty, Staff or Researcher
• Penalties for faculty, staff or researcher of Higher Education Institutes
will also be given according to the severity of plagiarism.
• Level 1 (10%-40%)– he/she will be asked to withdraw the manuscript
submitted for publication and will not be allowed to publish any work
for a minimum time period of 1 year.
• Level 2 (40%-60%)– he/she will be asked to withdraw manuscript
submitted for publication and will not be allowed to publish their work
for a minimum time period of 2 years. He/she will also be denied any
annual increment that they have been receiving, he/she will also not be
allowed to act as a supervisor for students or scholars for 2 years.
• Level 3 (above 60%)– he/she will be asked to withdraw manuscript
submitted for publication and will not be allowed to publish any work
for a minimum time period of 3 years. He/she will also be denied any
annual increment they are receiving for 2 years, he/she will not be
….
• If a person repeats the same act of plagiarisation then he/she will be
subject to punishment of the next level from the level which the
person was previously punished for. If Level 3 plagiarism is repeated
than the person committing it will be dismissed from their job.
• If a person has already attained any benefit or credit before plagiarism
was proved then such benefit or credit will be suspended for a time
period that is to be decided by the AMP and PDA.
• Head of Higher Education Institute
• If the head of an HEI is accused of plagiarising then the guidelines
have provided that appropriate shall be taken by the concerned
authority.
Conclusion

• The current draft guidelines have provided a recourse for the


problem of plagiarism which has been allowed to run
rampant throughout institutions all across the country.
• These guidelines will be the first of its kind to be introduced
in India and as with other regulatory legislations, its
effectiveness can only be determined after it is applied.
• Thus the UGC must make sure that it is properly
implemented by the institutions and the institutions, in turn,
must comply with the guidelines before any positive result
towards significant reduction of plagiarism can be seen.
Reference
• https://blog.ipleaders.in/ugc-rules-regarding-plagiarism/
• India creates unique tiered system to punish plagiarism (
https://www.sciencemag.org/news/2018/04/india-creates-unique-tiered
-system-punish-plagiarism
)
• UGC drafted strict regulations on plagiarism by teachers, students (
https://www.indiatoday.in/education-today/news/story/ugc-drafted-stri
ct-regulations-on-plagiarism-by-teachers-students-1203761-2018-04-0
3
)
Reqfrqrm q<n wrtittt
. fst\!/z\ University Gronls Comrnission

-vv
\ZZ
(qr-rq rimqt k6rs {il-fr, qrta wr6n)
(Ministq ol Humon Resource Developmenl, C'od. of Indio)

fr.*.wg{ {6gan€ qF{ qri', r{ ftd-rroooz


{fr{ Bohodur Shoh Zofor Morg, New Delhi-l10002

Ph., 0l l-23236288 t23239337


P. K. Thakur Fox , 0l l-23?3 8858
IP&TAFS
Secratary emoil : pklhokur.ugt@nic.in

No.F. r-r8/zoro(CPP-[) rst Septembetr zoaT

PUBLICNOTICE

University Grants Commission had constituted a Committee of experts to look


into issues of Plagiarism and recommend some institutional mechanism to eliminate the
scope of this menace in higher education system in the country. The objective of the
regulations is to promote academic research and deterrence from plagiarism by
developing systems to detect plagiarism. As a result, the Committee emphasized on the
needs to refer plagiarism in a broader way by putting appropriate systems and checks in
place.

The draft University Grants Commission (Promotion of Academic Integrity and


Prevention of Plagiarism in Higher Education Institutions) Regulations, zorT prepared
by the Committee is attached herewith for observations and suggestions of stakeholders.
The Feedback and comments on the above draft may be sent to UGC on
pgmhei.zorT@gmail.com on or before 3oth Septembet,2077.

)r^-. '
(P.K. Thakur)
Secretary
,benrT-
1

[To be published in the Gazette of lndia, Part III, Section 4 (Extraordinary)]

(UNIVERSITY GRANTS COMMISSION)

TJNN'ERSITY GRANTS COMMISSION (PROMOTION OF ACADEMIC


INTEGRITYAND PREVENTION OF PI.AGIARISM IN HIGHER EDUCATION
INSTITUTIONS) REGULATIONS - 2or7
NOTIFICATION

Preamble

Whereas, University Grants Commission (UGC), as per UGC Act, 1956, is mandated to
coordinate and determine the standards of higher education;
And whereas, assessment of academic and research work done by a studcnt or a faculty
or a researcher or a staff, in the form of essays, assignments, term papers, project reports,
coursework, thcsis and dissertation leading to the award of degrees, research papers, policy
papers, chapters in books, full-fledged books and any other work including computer programs
is instrumental in identifying and certiffing the academic standards accomplished by such
student(s) or faculty or researcher(s) or staff and projecting them far and wide as an objective
and impartial indicator of the pcrformance of individual(s);
And whereas. any academic and research work undertaken in any form by a student or a
faculty or a researcher or a staff, reflects the extent to which elements of academic integrity,
originality and innol-ation have been injected in various processes of education adopted by
Higher Educational Institutions(HEI's) ;

Tlrcrefore, in exercise of the powers conferred by clause 0) of Section rz read uith


clauses (0 and (g) of sub-section (r) of Section z6 of the University Grants Commission Act,
1956, the University Grants Commission hereby makes the following regulations:-

r.Short title, application and commencement -


(a) These regulations shall be called the University Grants Commission (Promotion of
Academic Integrity and Prevention of Plagiarism in Higher Educational
Institutions) Regulations, zor7.
(b) They shall appll' to the students, researchers, faculty and staff of all Highcr
Educational Institutions in the country.
(c) Thesc regulations shall come into force from the date of their notification in the
Official Gazette.
z.Definitions -

In these regulations, unless the context othenn'ise requires-


a. "Academic Misconduct Panel" shall mean the body constituted to invcstigate
allegations of plagiarism as described under clause tr in these regulations.
b. "Academic Integrity" is the intellectual honesty in proposing, performing and
2

reporting any activity, which leads to the creation of intellectual property.


"Author" includes a student or a faculty or a researcher or staff of Higher
Educational Institution (HEI) n'ho claims to be the creator of the n'ork under
consideration;
d. "College" means any institution, whether known as such or by any other name
which provides for a course of study for obtaining any qualification from a
university and which, in accordance with the rules and regulations of such
university, is recognized as competent to provide for such course of study and
present students undergoing such course of study for the examination for the
award of such qualification;
e. "Commission" means the University Grants Commission as defined in the
University Grants Commission Act 1956;
f. "Degree" means any such degree, as may, with the pre'ious approval ofthe Central
Government, be specified in this behalf by the University Grants Commission, by
notification in the official Gazette, under section zz of the university Grants
Commission Act, 1956;
"Faculty" refers to a person who is teaching and / or guiding students enrolled in
an Institution of Higher Education in any capacity whatsoever i.e. regular, ad-hoc,
guest, temporary, visiting etc;

h. "Higher Educational Institution (HEI)" means an institution of Iearning including a


university, an institution deemed to be university, a college, an institution of
national importance declared as such by an Act of Parliament, or a constituent unit
of such institution, which is imparting (whether through conduct of regular classes
or distance education systems) higher education after twelve years of schooling
Ieading to the award of a degree or diploma;
l. "Information" includes data, message, text, images, sound, voice, codes, compurer
programs, software and databases or micro film or computer generated micro
fiche;
"Notification" means a notification published in the Official Gazette and the
expression "notify" with its cognate meanings and grammatical variation shall be
construed accordingly;
't,
"Plagiarism" means an act of academic dishonesty and a breach of ethics. It involves
using someone else's work as one's own. It also includes data plagiarism and self-
plagiarism;
"Programme" means a course or programme of study leading to the award of a
degree or a diploma in Institution of Higher Education;
m. "Researcher" refers to a person conducting academic / scientific research in
Institution of Higher Education.
n. "Script" includes research paper, thesis, study, project report, assignment,
dissertation and any other such work submitted for assessment / opinion leading to
3

the award of degree or publication in print or electronic media by students or


faculty or staff of an Institution of Higher Education;
Note: This shall however exclude answer scripts submitted in response to a question
paper set by a HEI.

o. "Source" means the published primary and secondary material from anl' source
whatsoever and includes written information and opinions gained dircctly from
other people, including eminent scholars, public figurcs and practitioners in any
form whatsoer,er as also data and information in the electronic form be it audio,
video, imagc or texq Information being given the same meaning as defined under
Section z (r) (v) of the Information Technology Act, zooo and reproduced here in
Regulation z (l).
p. "Staff'refers to all non-teaching staffworking in Institution of Highcr Education in
any capacity whatsoever i.c. regular, temporary, contractual, outsourced etc.
q. "Student" means a pcrson duly admitted and pursuing a programme of study
including a research programme in full time or part-time or distant mode;
r. "University" means a univcrsity established or incorporated by or under a Central
Act, a Provincial Act or a State Act, and includes an institution dcemed to be
universi$;
s. "Year" means the academic session in which a proven offence has been committed.
Words and cxpressions used and not defined in these regulations but defincd in the
University Grants Commission Act, 1956 shall have the meanings respectively assigned to
them in UGC Act, 1956.

3. Objectives
3.r To create academic awareness about responsible conduct of research, study, project
rn'ork, assignment, thesis, dissertation, promotion of academic integrity- and
prevcntion of misconduct including plagiarism in academic writing among
students, researchers, faculg- and other members of academic staff as r,r'ell as any
employee of HEIs.

3.2 To establish institutional mechanism through education and training to facilitate


responsible conduct of research, study, project work, assignment, thesis,
dissertation, promotion of academic integrity and deterrence from plagiarism.

3.3.To develop systems to detect plagiarism and to set up mechanisms to prevent


plagiarism and punish a student, faculty, or staff of HEI committing the act of
plagiarism.

4. Duties of HEI:
Every HEI should establish the mechanism as prescribed in these regulations to enhance
a\{areness about responsible conduct of research and academic activities, promotion of
intcgrity and deterrence from plagiarism.
4

S. Awareness Programmes and Trainings:

(a) Every HEI shall instruct students, faculty and staffabout proper attribution, seeking
permission of the author wherever necessary, acknowledgement of source compatible
with the needs and specificities of disciplines and in accordance with rules and
regulations governing the source.

(b) AIl HEIs shall conduct sensitization seminars/ awareness programmes every semester
on responsible conduct of research, project work, assignment, thesis, dissertation,
promotion of academic integrity and ethics in education for students, faculw and other
members of academic staff.

(c) All HEIs shall

i. Include the cardinal principles of academic integrity in the curricula of


Undergraduate (UG)/Postgraduate (PG)/Master's degree as a compulsory
course work.

ii. Includc elements of responsible conduct of research and publication ethics as


a compulsory course work for M.Phil. and Ph.D. Scholars.
iii. Include elements of responsible conduct of research and publication ethics in
Orientation and Refresher Courses organized for faculty and other members of
academic staff.

ir'. Shall train student, faculty, staff and researcher for using plagiarism detection
tools and reference management tools.

v. Shall establish facility equipped with modern technologies for detection of


plagia rism.

vi. Shall encourage student, faculty, staff and researcher to register on


international researcher's Registry systems.

6. Curbing Plagiarism
a) Every HEI shall declare and implement the technology based mechanism using
appropriate software so as to ensure that documents such as thesis, dissertation,
term papers, reports, publications or any other such documents are free of
plagiarism at the time of their submission.

b) Every student submitting a thesis, dissertation, term papers, reports or any other
such documents to the HEI shall submit an undertaking indicating that the
document has been prepared by him or her and that the document is his/her
original work and free of any plagiarism.

c) Every faculfy-, researcher and M.Phil/Ph.D students should be provided account in


plagiarism detection tools for checking the content of their scripts .

d) The undertaking shall include the fact that the document has been duly chccked
through a Plagiarism detection tool approved by the HEI.
tr

e) The HEI shall develop a policy on plagiarism and get it approved by the relevant
statutory bodies ofthe University.

0 Each superv'isor shall submit a certificate indicating that thc n'ork done by the
researcher under him / her is plagiarism free.

g) All HEIs shall submit to INFLIBNET soft copies of all M.Phil., Ph.D. dissertations
and theses carried out in its various departments after the award of degrees for
hosting in the digital repository under the "Shodh Ganga e-repository" programme.

h) All HEIs shall create Institutional Repository on institute u'ebsite which shall
include dissertation / thesis / paper / publication and other in-house publications.

7. Similarity checks for exclusion from Plagiarism


The similarity chccks for plagiarism shall exclude the following:

i. All quoted work either falling under public domain or reproduced n'ith all nccessary
permission and/or attribution.
ii. All references, bibliography, table of content, preface and acknowledgements.
iii. All small similaritics of minor nature.
iv. AII generic tcrms, larn's, standard symbols and standards equations.

8. Zero Tolerance Policv in core area:

The core nork carricd out by the student, faculty, staff and researcher shall be based on
original ideas and shall be covered by Zero Tolerance Policy on Plagiarism. In case
Plagiarism is established in the core work claimed then Plagiarism Disciplinary Authority
(PDA) of the HEI shall impose maximum penalty.

The core work shall include abstract, summary, hlpothesis, observations, results,
conclusions and recommendations.

9. Levels of Plagiarism in non-core areas

For all other (non-corc)cases, plagiarism would be quantified into follou'ing levels in
asccnding order of severity for the purpose of its definition:

i. Similarities upto ro% .- excluded


ll. Lerel r: Similarities abole ro% to 4oy"
lll. Level z: Similarities above 4oo/o Io 6o0/o
iv. Level 3: Similarities above 600/"

1o. Detection/Reporting/Handling of Plagiarism


If any mcmber of the academic community suspects with appropriate proof that a case of
plagiarism has happened in any document, he or shc shall report it to the
competent/designated authority of the university. Upon receipt of such a complaint or
allegation the universiry authority shall refer the case to the Academic Misconduct Panel
(AMP) of the HEI rvho in turn shall submit a report to the Plagiarism Disciplinary Authority
6

(PDA).

The authorities of HEI can also take su motu notice of an act of plagiarism and initiate
proceedings under these regulations. Similarly proceedings can also be initiated by the HEI
on the basis of findings of an examiner.

rr. Academic Misconduct Panel (AMP)


t AMP shall be constituted by the HEI to investigate about the allegation of
plagiarism and submit the report to the PDA.

u. The AMP shall have the power to assess the level of plagiarism and thus
recommend penalty (ies) accordingly.

1lI. The AMP shall consist of four members who shall be senior academicians with
good publication record with at least one mcmber nominated by the Head of
HEI from outside the HEL The Chairman of the AMP shall be an academic
functionary (Dean/Pro-VC/Senior Academician) of the HEI. The third mcmber
shall be a reputed Academician from the Discipline in rvhich the plagiarism is
alleged. The fourth member shall be an expert well versed with anti plagiarism
tools.

tv. The AMP shall follow the principles of natural justice while deciding about the
allegation of plagiarism against the student, researcher, faculty member or any
other employee of HEI.

The AMP shall send the report after investigation and the recornmendation on
penalties to be imposed to the PDA preferably within a period of 45 days from
the date of complaint / initiation ofthe proceedings in case ofsu mofu notice.

vi. The AMP shall pror.'ide a copy of the report to the person(s) against whom
inquiry report is submitted.
re. Plagiarism Disciplinary Authority (PDA):
i. PDA shall be constituted by the HEI to consider the recommendation of the AMP
and take appropriate decision after giving a hearing to the accused person.

ii. There shall be three members in the PDA chaired by head of the HEI / The Head of
the institution/ Appointing and Dismissal Authority. The other members shall be
Dean / Director (Academic / Research) and one senior academician not below the
rank of Professor in the relevant discipline from outside the HEI.

iii. The decision ofthe PDA shall be final and bindine.

13. Penalties

Penalties in the cases of plagiarism shall be imposed on students pursuing studies at the
level of UG, PG, Masters, M. Phil., Ph.D. and faculty &staff of the HEI only after academic
misconduct on the part of the offender has been established w'ithout doubt, n'hen all
avenues of appeal have been exhausted and individual in question has been provided
enough opportunity to defend himself or herself in a fair or transparent manner. While
developing policy document, the HEI may consider penalties in the cases of plagiarism. It
shall be ensured by the competent authority in the HEI that the degree of pcnalty served is
commensurate with the degree of seriousness of offence and misconduct established. Since
act <lf plagiarism, witting or unwitting, is potentially detrimental to the academic credibility
and social reputation of the individual concerned, all proceedings of investigations and
imposition of penalties shall bc conducted in camera so as to prevent encrustation of stigma
and slur upon individual concerned:

(a) Penalties for Students

Plagiarism Disciplinary Authority (PDA) of the HEI, based on recommendations of the


Academic Misconduct Panel (AMP), shall impose penalty considering the severiq' of the
Plagiarism.

i. Level t: Similarities atrove roo/o to 4o% - Such student shall not be given any
mark and/or credit for the plagiarized script and shall be asked to submit a revised
script within a stipulated time period not exceeding 6 months.
ii. Level z: Similarities above loo/o to 6o% - Such student shall not be given any
mark and/or credit for the plagiarized script and shall be asked to submit a rer,ised
script after time period of one year but not exceeding eighteen months.
a
iii. Level 3: Similarities above 6o% -Such student shall not be given any mark
and/or credit for the plagiarized script and his/her registration for that course to be
cancelled.

Note r: Penalty on repeated plagiarism- Such student shall be punished for the
plagiarism of one ler.el higher than the prcvious level committed by him/her. In case where
plagiarism of highest lerel is committed then the punishment for thc same shall be
operatire.

Note z: Penalty in case where the degree/credit has already been obtained - If
plagiarism is proved on a date later than the date of anard of degree or credit as the case
may.be then his/her degree or credit shall be put in abcyance for a period decided by the
AMP and PDA.

(b) Penalties for faculty, staff, researcher of HEI


(i) Level r: Similarities above reo/o to 4o% - Shall be asked to withdran' manuscript
submitted for publication and shall not be allow-ed to publish any work for a minimum
period of one year.

(ii) Level z: Similarities above 4oo/o to 6o% - shall be askcd to u'ithdrau' manuscript
submitted for publication and shall not be allowed to publish any rvork for a minimum
period of t$'o )rears and shall be dcnied a right to one annual increment and shall not be
allou'ed to be a supervisor to any UG, PG, Master's, M'Phil., Ph.D' student/scholar for a
period of two years.

(iii) Level 3: Similarities above 600/o - shall bc asked to rvithdraw manuscript


submitted for publication and shall not be allowcd to publish any r,r'ork for a minimum
I

period ofthree years and shall be denied a right to two successive annual increments and
shall not be allowed to be a supervisor to any UG, pG, Master's, M.phil., ph.D.
student/scholar for a period ofthree years.

Note r: Enhanced penalty on repeated plagiarism - shall be punished for the


plagiarism of one level higher than the lower level committed by him/her. In case where
plagiarism of highest level is committed then the punishment for the same shall be
operative. In case level 3 offence is repeated then the concerned person shall be dismissed.

Note z: Penalty in case where the benefit or credit has already been obtained -
If plagiarism is proved on a date later than the date of benefit or credit obtained as the case
may be then his/her benefit or credit shall be put in abeyance for a period decided by the
AMP and PDA on recommendation of the AMP.

Note 3: If there is any complaint of plagiarism against the Head of an HEI, a suitable
action, in line with these regulations, will be taken by the Competent Authority/Governing
Board/Governing Council as the title may be.
GEN530 UNIT-4 LECTURE-8_TURNITIN

Topic

Use of turnitin / ithenticate software


&
Hand on Practice
Turnitin2
Antiplagiarism software

Interaction with Researchers


Poll-1

Turnitin is used for

(a) Checking the similarity index


(b)Checking plagiarism
(c) Finding the source where from the content is copied
(d)All of the above
Answer

(d) All of the above


Poll-2
Any doc or pdf file saved in repository will show the plagiarism when
checked repeatedly

(a) A higher plagiarism


(b) A lower similarity index
(c) Not an issue
(d) All of the above
Answer

(a) A higher plagiarism


Important points to remember
• Don’t Share password with students.
• Limited IDs are available so you are requested to coordinate and
cooperate.
• Surrender the ID to Turitin coordinator or inform us through e-mail
that before leaving the University after resigning so that proper
transfer of account can be done.
• Use the settings properly and with absolute honesty.
• Avoid using this facility for non-LPU associated faculty and students.
Thank You
Queries???
Turnitin or Turnitoff?

Academic Integrity
The UWS approach
Liz Curach
University Librarian
UWS
Plagiarism: a new
phenomenon?
"In comparing various authors with one
another, I have discovered that some
of the gravest and latest writers have
transcribed, word for word, from
former writers, without making
acknowledgement.”
Pliny the Elder (23 AD-79 AD), Natural History

http://www.quotationspage.com/search.php3?homesearch=pliny+the+elder
Plagiarism defined ..
 Plagiarism is the presentation of the
thoughts or work of another as one’s
own
St James Ethics Centre

 … to take and use the writings of


another
(from the Latin ‘plagiarus’, meaning
kidnapper) Oxford English Dictionary
Plagiarism on the rise?
 18,000 participant study confirmed that
internet plagiarism was prevalent across 23
US institutions:
– 38% of participants had engaged in more than 1
instance of ‘cut and paste’;
– 44% believed such behaviour trivial and not
cheating;
– 90% of students believe cheaters are never
caught or disciplined.
 Plagiarism from books and paper based
materials remains slightly more popular
than internet plagiarism.
Rutgers University, 2003
http://ur.rutgers.edu/medrel/viewArticle.html?ArticleID=3408
Plagiarism on the rise? (cont’d)

 75% of respondents never plagiarised


 9% plagiarised once
 18% plagiarised more than once
 3% believe that plagiarism not cheating
 78% classify plagiarism as moderate to
severe cheating
 Detection rate is only 3%
 83% of respondents disapprove of
plagiarism
JISC Plagiarism Advisory Service (UK), 2004
It’s easy to cheat ….
 Verbatim copying – copy / paste
 Recycling: same assignment
submitted more than once for different
courses
 Ghost writing (including mum and dad)
 “Paper mills” and cheat sites (250+)
offer many resources (free and fee
based) for student “success”
Why do students plagiarise?
 Poor time management or research skills
 Lack of interest in the subject
 Lack of knowledge or ability to write / research an
assignment
 Problems of writing in a second language
 Poor citation skills
 Low likelihood of detection
 Ease of cut and paste from web and cheat sites
 Over-emphasis on grades vs learning
 Lack of knowledge of what constitutes plagiarism
or academic integrity
The UWS approach to
plagiarism prevention
 Clear and widely promulgated policies;
 A whole of institution commitment to
academic integrity;
 UWS values Scholarly Rigour and
Integrity
 University wide support structures;
 Availability of Turnitin text matching
software
Turnitin
 Electronic text matching software
(digital ‘fingerprinting’);
 Developed in US by Prof James Barrie;
 Demonstrates highest rate of
detection from amongst a range of
subscription checking tools;
 UWS focus on prevention rather than
detection.
What text is matched?
 Internet resources (4.5 bill www
pages, including archived pages;
 Proprietary databases (Gale, Proquest,
e-books, newspaper collection)
 Previously submitted student papers
(10 mill +)
 Assignments obtained from paper
mills
What is not matched ..
What is not matched ..
Print based materials;
Range of proprietary databases – e.g.
Psychinfo, Ebsco …..;
Diagrammatic, pictorial
representations, mathematical
formulae;
Anything pre www
Plagiarism detection?
 NO!
 Turnitin does not detect plagiarism;
Matched text does not necessarily translate
to plagiarism;
 Turnitin cannot ‘think’ or apply qualitative
judgements;
 Turnitin does not differentiate between
legitimate citation and unsourced
secondary text used either in error or
illegitimately
How Turnitin works ….
Originality reports
 Highlight matched sentences / phrases;
 Provide links to original source;
 Indicate overall percentage of matched
text - ‘similarity index’;
 Colour coding assists in interpretation;
 Academic judgement must be applied in
interpreting the originality reports.
Turnitin as an educative
tool
 Students self submit draft
assignments prior to due date for
originality checking;
– Multiple submissions permitted up until due
date;
– Students review originality reports, correcting
citations, paraphrasing etc. prior to final
submission;
– Academic may or may not wish to review final
originality report.
Turnitin as a punitive
tool
 Mandated use of Turnitin across
university;
 Students not granted access to
originality reports;
 Turnitin reports used to “catch out”
potential plagiarists.
The punitive approach will fail!
 The primary goal should be prevention
rather than punishment.
Turnitin detractors ….
 Turnitin database does not include all
internet accessible materials;
 Does not include print based materials;
 “Matches” commonly used words and
phrases;
 Makes profit from student work by
storing submitted material in database.
However ….
 Turnitin is but one tool in the academic
integrity toolbox:
– Design assessment to minimise potential
plagiarism;
– Make expectations clear to students;
– Monitor, detect and respond to incidences of
possible plagiarism;
– Teach skills of summarising and paraphrasing;
– Teach skills of referencing and citation;
– Teach skills of critical analysis and interpretation;
– etc
Centre for the Study of Higher Education, 2006
Turnitin claims …
Turnitin claims …
“Students will realise that they can no
longer “borrow” intellectual materials
without being at risk of being caught.
They will submit their own work, and
as a result educational quality,
student morale and ethics will
improve”
Discussion and questions
….

Turnitin,
or
Turnitoff ??
Turnitin is an originality checking and plagiarism prevention service that checks your writing for
citation mistakes or inappropriate copying. When you submit your paper, Turnitin compares it
to text in its massive database of student work, websites, books, articles, etc.
Turnitin is integrated into the Assignments tool in all online classrooms and is managed by
Classroom Support. This means that when you upload your paper to your classroom for grading,
it will automatically be sent through Turnitin's repository. The Similarity Report that it generates
will help identify possible instances of plagiarism.
Turnitin is an American commercial, Internet-based plagiarism detection service which is a
subsidiary of Advance.
Founded in 1997, universities and high schools typically buy licenses to use the software as a
service (SaaS) website, which checks submitted documents against its database and the
content of other websites with the aim of identifying plagiarism. Results can identify
similarities with existing sources, and can also be used in formative assessment to help
students learn to avoid plagiarism and improve their writing.
Students may be required to submit work to Turnitin as a requirement of taking a certain
course or class. The software has been a source of controversy, with some students refusing
to submit, arguing that requiring submission implies a presumption of guilt. Some critics
have alleged that use of this proprietary software violates educational privacy as well as
international intellectual-property laws, and exploits students' works for commercial purposes
by permanently storing them in Turnitin's privately held database.
Turnitin's parent company, iParadigms LLC, runs the informational website Plagiarism.org
and also offers a similar plagiarism-detection service for newspaper editors and book and
magazine publishers called iThenticate. Other tools included with the Turnitin suite are
GradeMark (online grading and feedback) and PeerMark (peer-review services). Turnitin
released the WriteCycle Suite on February 3, 2009, which bundles the Originality Checking
service with its GradeMark online grading tools and PeerMark tools. Turnitin released
Turnitin2 on September 4, 2010, dropping the "WriteCycle" nomenclature.
In March 2019, Advance acquired the company for US$1.75 billion.
Comparison Between Turnitin and iThenticate

Turnitin iThenticate

For research active continuing and fixed term academic staff, to


For instructors to check students' work, or for check their own work, or to check the work of any higher degree
Users students to submit and check their own submission research candidates (candidates enrolled in a PhD, MPhil or Masters
(if configured by the instructor). by Research) they supervise.

To UNSW Research Staff and research support staff (including


conjoint/adjunct researchers).

To UNSW Undergraduate students and Academic


Access
Coursework Staff.
Please note: Higher Degree Research Students requiring access will
need to submit documents through their supervisor, they will not
be provided directly with access.

Submission Web pages, other content, scholarly journals, student Web pages, other content, scholarly journals*, ProQuest.
s checked paper database. More information.
against More information.

Submission (By default) added to student paper database.


Not added to database.
s Lecturer can change this setting.

Submission
maximum
400 pages or less, 40 MB or less 400 pages or less, 40 MB or less
length and
size**


Quick Start Turnitin User Guides  iThenticate
Guides
 Quick Submit

https://www.gs.unsw.edu.au/policy/assessmentpolicy.  UNSW Research Code of Conduct


html  Higher Degree Research Supervision Policy
UNSW  Higher Degree Research Supervision Procedure
policy  UNSW Plagiarism Policy Statement
https://www.gs.unsw.edu.au/policy/documents/asses  https://www.gs.unsw.edu.au/policy/assessmentpolicy.html
smentimplementationprocedure.pdf  https://www.gs.unsw.edu.au/policy/documents/assessmen
timplementationprocedure.pdf
Microsoft Word, PowerPoint, WordPerfect, PostScript,
Microsoft Word® (DOC and DOCX), Word XML, Plain Text (TXT),
PDF, HTML, RTF, OpenOffice (ODT), Hangul (HWP),
File types Adobe PostScript®, Portable Document Format (PDF), HTML, Corel
Google Docs (submitted via the Google Drive
WordPerfect® (WPD), Rich Text Format (RTF).
submission option), plain text files.

Features Similarity Report, PeerMark Similarity Check, Plagiarism Detection Software

Access Two methods to access Turnitin (using UNSW zID)  iThenticate account provided by the UNSW IT Service Centre
(ITServiceCentre@unsw.edu.au or x51333). iThenticate Login details
Compare
Moodle Login or Turnitin will be provided by UNSW for access via the iThenticate website.
submission
methods

How Turnitin works

So how does the software scan for similarity?

There are, generally speaking, four different ways to go about doing this.
The first way is through keyword analysis. What does that mean? Like a
search engine, you enter in a keyword and the software scans documents
to find instances of that word. Another way to scan text for similarity is to
look at groups, or strings, of words. Rather than looking just at individual
words, the software looks for strings or sequences of words (say 3-4 or
more words ordered in such a way to create a sentence or sentence
fragments). As you may be able to see already, these two approaches can
be pretty effective for identifying the strict or exact copying of content within
one document to others. The shortcoming of these approaches, however,
is that it doesn't identify paraphrasing--where the ideas and meaning may
have been copied--but the text is different enough that it doesn't get
identified as a match.

A way to better get at this type of problem would be through a third way,
which is to go about scanning for content matches by looking at the style of
the writing and to compare that style to other documents. This is not a strict
word-to-word analysis, but more of an approach that takes a look at the
probability of certain word sequences ("phrases") that may appear in one
document and then compare it to other documents. The challenge here is
fine grained, word-for-word matches can get lost. Better yet, why not
identify a document's unique "fingerprint," and then compare that fingerprint
to others? This last approach, that we will discuss in this blog post, is what
we largely do at Turnitin.

With "fingerprinting," Turnitin's technology scans and identifies the unique


fragments and the ordering of word fragments that appear in a document.
With this level of analysis, we can uncover word string matches
("fragments"), but also look at the unique sequences of those matches to
create a fingerprint of the document.

Fingerprints are entirely unique and can be identified by the specific


features displayed in a print. The same thing can be said for documents,
each document has unique features such as phrasing, tone, style that if
completely original is like a fingerprint, unique. If a document contains
content that is unoriginal in its phrasing, the document will match to other
document fingerprints that also contain this feature.

One issue this approach faces is how to avoid picking up very common
words--like articles ("the," "an," "a") or conjunctions ("and," "but," "of")--and
hone in on the strings of words that make a document unique.
Fingerprinting gives us a way to exclude commonly-used words, while
providing us with the ability to identify when content is poorly paraphrased.
Because Turnitin was developed for use in academic contexts, our
approach with fingerprinting is to focus on features of the text that are
clearly relevant to the content or subject matter of the document.

For example, if you're finalizing your dissertation thesis you would want to
make sure that all of the ideas you discussed were properly referenced and
cited and that sections where you paraphrased were paraphrased properly.
What gets less emphasized is strict word-to-word matches. If a more
keyword search-biased approach were used here, we'd be unable to
identify poor paraphrasing or selective word substitution--which incidentally
is the majority of what academic and educators see in student work.

If you're looking for strict word-to-word matches, you could use a search
engine (which is what everyone did before the advent of plagiarism
detection software). If you're looking at comparing one author's style to
another, there's an approach for that. As for identifying content matches in
academic-type writing, Turnitin has developed a fingerprint-based approach
that excels at finding the content that matters, when it matters. In other
words, Turnitin is designed to support students who are learning how to
use the internet to do research, use source materials, and take ownership
of their own writing and ideas.
Turnitin is an American commercial, Internet-based plagiarism detection service which is a
subsidiary of Advance.
Founded in 1997, universities and high schools typically buy licenses to use the software as a
service (SaaS) website, which checks submitted documents against its database and the
content of other websites with the aim of identifying plagiarism. Results can identify
similarities with existing sources, and can also be used in formative assessment to help
students learn to avoid plagiarism and improve their writing.
Students may be required to submit work to Turnitin as a requirement of taking a certain
course or class. The software has been a source of controversy, with some students refusing
to submit, arguing that requiring submission implies a presumption of guilt. Some critics
have alleged that use of this proprietary software violates educational privacy as well as
international intellectual-property laws, and exploits students' works for commercial purposes
by permanently storing them in Turnitin's privately held database.
Turnitin's parent company, iParadigms LLC, runs the informational website Plagiarism.org
and also offers a similar plagiarism-detection service for newspaper editors and book and
magazine publishers called iThenticate. Other tools included with the Turnitin suite are
GradeMark (online grading and feedback) and PeerMark (peer-review services). Turnitin
released the WriteCycle Suite on February 3, 2009, which bundles the Originality Checking
service with its GradeMark online grading tools and PeerMark tools. Turnitin released
Turnitin2 on September 4, 2010, dropping the "WriteCycle" nomenclature.
In March 2019, Advance acquired the company for US$1.75 billion.
PROMOTION OF
ACADEMIC INTEGRITY &
PREVENTION OF PLAGIARISM:

ENSURE ORIGINALITY
OF RESEARCH OUTPUT

Academic Performance
Indicators

ANTIPLAGIARISM SOFTWARE
1. “TURNITIN” Dr.C.P.RAMASESH
2. “iTHENTICATE” Former Librarian
3. “VIPER” University of Mysore
Cell: 9731343004
4. “URKUND”
WHY DO SCHOLARS PLAGIARISE ?
1.Lack of knowledge
2.Poor research skills
3.Poor expression
(Lack of command over
the language)
4.Laziness
5.Fear of failure
6.Lack of time for reading and understanding
7.Pressure to publish for career advancement
8.Desire to get recognition soon
9.To influence others
PLAGIARISM DETECTION METHODS:

MANUAL DETECTION :

Manual detection requires substantial effort and vast


reading and excellent memory. Subject expert alone can
do the job easily. Becomes impractical where too many
documents must be traced and compared.

COMPUTER –ASSISTED DETECTION:

Allows vast collection of documents to be compared.


Search the databases of e-books and e-journals.
Automatically browse the web content.
FIRST ANTI-PLAGIARISM SOFTWARE INTRODUCED:
First anti-plagiarism software was introduced back in
1993.

Harward University has become the first Ivy League


institution to license the use of anti-plagiarism software
in 1993.

The software was used to control plagiarism in the


students’ submissions, especially in their theses and
dissertations.
John Barrie, president of iParadigms LLC, the Oakland, California-based
company - makes Turnitin.com, in collaboration.
PLAGIARISM DETECTION TOOLS.
SOFTWARE PACKAGES:
1. iThenticate, California, USA
2. Turnitin, California, USA
3. WriteCheck, California, USA
4. Viper,England.
5. PlagAware, Ulm, Germany
6. PlagScan, Germany.
7. Urkund, Sweden.
8. Docoloc, Germany.
9. Plagiarism Checker X, New York, USA.
10. Plag Tracker,
ANTI-PLAGIARISM SOFTFARE
iParadigms, California, USA
Ithenticate : For research papers
and theses
American, Rs. 450000=00 per year
for 1000 scans

----------------------------------------------------------------
TURNITIN: For students’ submissions
American, Rs. 380000=00 per year for
20 users, unlimited scans
iParadigms, California, USA
1. Software product from iParadigms, California, USA
2. iThenticate checks 3 million manuscripts annually
3. 15 + Million matches identified over last 18 months
4. 92 + Million offline works: Journals and Abstracts
5. 65 + Billion web pages-
6. 50 Million items of e-books and e-journal articles
7. 115000 Journals covered.
Covers Books, Journals & Conference Proceedings,
8. Doctoral theses, Internet sources & Inst. Repositories

 iThenticate will identify any matched content,


un-cited phrases and original sources for you. Many of
the world’s leading publishers currently use iThenticate
SUPPORTED LANGUAGES:
iThenticate supports more than 30 languages.
English, Arabic, Chinese, Japanese, Thai, Korean,
Catalon, Croatian, Czech, Danish, Dutch, Finnish,
French, German, Hungarian, Italian, Norwegian, Polish,
Portuguese, Romanian, Serbian, Slovak, Slovenian,
Spanish, Swedish, Greek, Hebrew, Farsi, Russian and
Turkish.
UP-LOADING FILES FOR SCANNING:
Word, HTML, PDF, XML, Corel Word Perfect, Rich Text
Format, Adobe PostScript, Plain Text -TXT
Up load from :
Local computer
Pen drive
Google Drop Box
Web Content/Database
------------------------------------
Single file : Journal article
Multiple files: Several articles
Zip files: Thesis file
Copy & paste
WITH 20 MB LIMIT PER SCAN
Average cost per scan: $. 5.00 to $ 10.00
HOW PLAGIARISM CHECK TOOLS WORK?

Thesis /article up-loaded will be initially scanned.

So also the world wide web and archives/database.

Then it’s very likely you will see some red in your results
Common keywords and phrases may trigger in red.

If there are complete sentences that are not original, the tool will
identify the original source of plagiarized content that was copied.

Further, if you click on any red line, you can see original source
for your reference and record; allow side by side comparison.

Finally, you will be given an exact percentage that tells you how
original your article/thesis is.
URKUND
PRIO INFO CENTRE AB
SWEDEN, SWEDISH SOFTWARE
Coverage: Internet sources, Published Materials, Repositories
of students’ submissions:
Price: 100 Scans – Rs. 50000=00
REPOSITORIES COVERED FOR SCANNING:

1. Internet Resources
2. Cross Check: Conference, Seminar

Proceedings, Reports, Research papers


3. Publications: Journals, Periodicals
4. Institutional Repositories
You can confine your search
VIEWER REPORT MODES:
1. Overview in Percentage: BASED ON WORD COUNT
2. All Sources depicted with percentage
3. Breakdown giving each sources
4. Text Comparison side by side (Similar content)
--------------------
5. Summary Report
6. Download: Similarity Report
7. Delete Link/ Deactivate after downloading report
HIGHER SIMILARITY REPORT POINTS TO
 POOR ACADEMIC WRITING
 POOR REFERENCING AND CITATION
 OVERUSE OF QUOTATIONS
 EXTENSIVE BIBLIOGRAPHIC SOURCES

 LITERATURE REVIEW COVERING


IRRELEVANT SOURCES AND AUTHOR
ABSTRACTS

 PLAGIARISM: INTENTIONAL /UNINTENTIONAL.


Overview
 Plagiarism
 UGC Regulations 2018 (Prevention of Plagiarism In Higher
Educational Institutions)
 Levels of Plagiarism
 Penalties of Plagiarism
 Preventing or Precaution of Plagiarism
 Anti-plagiarism Tools
 Turnitin Introduction
 Turnitin Account Setup
 Paper Upload
 Download Originality Report
Plagiarism

 “Plagiarism” means the practice of taking someone


else’s work or idea and passing them as one’s own.

 Without giving necessary credits make use of others


thought.

 Plagiarism is a serious academic offence.


UGC (Promotion of Academic Integrity and
Prevention of Plagiarism In Higher Educational
Institutions) Regulations, 2018 (Notification)

Main Objectives
 To create awareness
 To establish institutional mechanism
 To develop systems to detect plagiarism
 To set up mechanism to prevent plagiarism and punish

Source: UGC Regulations, 2018


Content to be checked necessarily under the
guidelines of UGC

Research
Theses
papers

Dissertat Chapters
CONTENTS in Books
ions

Any
Full-
other
fledged
similar
books
work
Source: UGC Regulations, 2018
Content not to be checked necessarily under
the guidelines of UGC

Assignme Term
nts papers

Contents
Answer not to be
Project
scripts checked reports

Course
Essays
works

Source: UGC Regulations, 2018


Similarity checks for exclusion from
Plagiarism
 All quoted work reproduced with all necessary permission and/or attribution.
 All references, bibliography, table of content, preface and acknowledgements.
 All generic terms, laws, standard symbols and standards equations.
Example:
Generic term: Lions are noble beasts.
Law: 3. (1) The State Government shall, by order published in the Official
Gazette, take over the management and control of the Bangabasi Group of
Colleges.
Standard Signs Standard Equations
Levels of Plagiarism

Level 0: Similarities upto 10%

Level 1: Similarities above 10% to 40%

Level 2: Similarities above 40% to 60%

Level 3: Similarities above 60%

Source: UGC Regulations, 2018


Penalties in case of plagiarism in
submission of thesis and dissertations
Level 0: Similarities upto 10% Minor Similarities, no penalty

Level 1: Similarities above 10% to 40% Such student shall be asked to


submit a revised script within a
stipulated time period not
exceeding.
Level 2: Similarities above 40% to 60% Such student shall be debarred from
submitting a revised script for a
period of one year.
Level 3: Similarities above 60% Such student registration for that
programme shall be cancelled.

Source: UGC Regulations, 2018


Penalties in case of plagiarism in
academic and research publications
Level 0: Similarities upto 10% Minor Similarities, no penalty

Level 1: Similarities above 10% to 40% Shall be asked to withdraw manuscript.

Level 2: Similarities above 40% to 60% i. Shall be asked to withdraw manuscript.


ii. Shall be denied a right to one annual
increment.
iii. Shall not be allowed to be a supervisor
for a period of two years.
Level 3: Similarities above 60% i. Shall be asked to withdraw manuscript.
ii. Shall be denied a right to two successive
annual increment.
iii. Shall not be allowed to be a supervisor
for a period of two years.
Source: UGC Regulations, 2018
UGC Reserves

However implemented the regulations,

UGC reserves the right to remove difficulty/difficulties in


the course of implementations of these Regulations in
consultation with the Government of India/ Ministry of
Human Resource Development.
Preventing Plagiarism
 Consult with teacher

 Plan Your Paper

 Take Effective Notes

 Cite Sources

 Make it Clear Who Said What

 Know How to Paraphrase

 Analyze and Evaluate Your Sources

Source: www.plagiarism.org
Precaution
Cite Paraphrase Quoting

Citing Quotes Cite your Own Material Referencing

 Provide proper references wherever is required


 Provide references even for a Photographs, Diagrams, Pictures,
Graphs, and Maps.
 While paraphrasing make sure you are rearranging/ replacing few
words.
 Once check originality of the content before submitting the
document
What is anti-plagiarism software?
“Software that searches the Web for duplicate textual content. It
may be a stand-alone program installed in the user's computer or a
function of a website, such as www.turnitin.com. Universities
increasingly use anti-plagiarism software to determine if students
have copied someone else's prose, and writers use it to see if others
are using their copyrighted work in full or in part” (Source:
www.pcmag.com).

Anti-plagiarism software/tool cannot stop or prevent the plagiarism.


Find/detect the sources of contents which are matching.
Plagiarism Detection Tools by Subscription (Not free)

Turnitin

Plagiarism
iThenticate
Detect.org
Plagiarism Detection
Tools by
Subscription (Not
free)

grammarly Academic
Plagiarism

Blackboard
Plagiarism Detecting Sources
Plagiarism Tools Detecting Sources

Turnitin Vast amounts of web content, previously submitted papers, and


subscription-based journals and publications.
iThenticate Database of over 60 billion web pages, 155 million content
items, and 49 million works from 800 scholarly publishers
Blackboard Internet, ProQuest ABI/Inform database with over 1,100
publication titles and about 2.6 million articles, Global
Reference Database of Blackboard
Grammarly Detect plagiarism from 16 billion web pages and ProQuest's
databases.
PlagiarismDetection.org Contains millions of documents like (books, paper, essays,
articles and assignments)
Plagiarism
Checker
PlagScan Dupli Checker

Open Access
PlagTracker Plagiarism Detection PaperRater
Tools

Copyleaks Plagiarisma
Plagium
Introduction to Turnitin
 Turnitin is a web-based plagiarism detection software provided by
Turnitin.com.
 Turnitin is a tool to find and indicate the matching contents.
 Turnitin’s plagiarism prevention tool generates originality reports that show
how much of a document is original, cited from other sources, or
unoriginal.
 For students to identify their mistakes or weaknesses in citations so as to
improve their academic writing skills.
 Compares with huge collections of e-resources available around the
world.
 Turnitin is used by more than 30 million students at 15,000 institutions in 150
countries.
Turnitin Coverages
The major databases coverages of Turnitin

• Springer • Sage
• EBSCO Host • Crossref
• ProQuest • Oxford University
• Thieme Press
• Elsevier • De Gruyter
• PubMed • Peter Lang
• Medline • UCSanDiego
Sources (Electronic)
 Internet sources publicly accessible
 Published journals, books, proceedings, etc.
 Student submission in turnitin

Sources which are not covered…


 Unpublished articles/papers
 In-house repositories
 In-house database
Turnitin

Internet Sources

Search
Document Upload

Publications
(Articles & Books)

Report Deliver
Student Papers
of Turnitin
Features of Turnitin

 Easy to submit your papers, articles, book chapters,


theses, and etc.;
 Find and get source of the matching contents;
 Instant receipt of submission;
 Feedback through same interface; and
 Useful for checking referencing before submission.
Turnitin differentiates the levels of index

Blue No matching words

Green 1% - 24% similarity index

Yellow 25% - 49% similarity index

Orange 50% - 74% similarity index

Red 75% - 100% similarity index


Turnitin - Subscription
There are four types of subscriptions:

• A top level account containing a number of institutional accounts


Consortium for clients with multiple locations which may be geographically
separated.

• The institutional or ‘single campus’ account allows the


administrator to create multiple departmental accounts beneath
Institution it for purposes of statistical tracking or to allow departmental level
administrators to access the service

• This account type can only allow individual instructor accounts to


Department be created as sub-accounts.

• A single user Turnitin account. Only a single instructor profile can


Individual be joined to an individual account.
Turnitin – Access Levels
There are three types of access levels:

• Administrator can create instructors and download the statistics


Administrator of usage of the Turnitin account

• Instructor can create classes, assignments, add students, filter


Instructor settings, and exclude matching sources in the report.

• Student can upload a paper in the assigned class, download


Student originality report, and filter settings.
Subscription at Central Library, IIT
Kharagpur
 Uses by the Institute since 2013
 One year subscription
 1000 user access
 Only originality checking

Instructor Id 200 (Over the period)

5745 accounts have been created and renewed for


Student Id
students (Over the periods)

Reports Delivered More than 1000 reports (Over the period)


Turnitin : A complete process
Account Setup Document Upload Originality Reports

Step 1: Get a student Account Step 1: Login with student Step 1: Select the document
from “Instructor” account submitted

Step 2: Account Setup Step 2: Select “Class” Step 2: Matching overview

Step 3: Account Validation Step 3: Filter and settings


Step 3: Select “Assignment
Submission”
Step 4: Create your own Step 4: Matching sources
password
Step 4: Document submission
Step 5: Download originality
with title
Step 5: Create your secret report
question and answer Requirements for file upload
Step 5: Confirm the submission Step 6: Turnitin originality
Step 6: Acceptance of User report
agreement Step 6: Document Upload
Complete Step 7: Text only report
Turnitin Repository Options

• The benefit of submitting papers to the standard paper repository

Standard is that student papers submitted to the assignment are checked


against other institutions' student submissions.

Repository • Institution's paper repository, this means that the assignment will
only be checked against other students' submissions within the
institution.

• Students' papers will not be stored in the Turnitin standard paper

No repository repository or the institution's paper repository.


• The papers will not be checked for collusion between students of
the same or different institutions.
Removing of Paper from the
Repository of Turnitin
A student submission can be permanently deleted from the Turnitin
database so that it can no longer be used as a searchable source. All
paper deletion requests must be submitted in writing by the “Turnitin
administrator” to “Turnitin Support”.

The following information can be found in your originality report and if


these are provided by the administrator

• Class ID
• Assignment name
• Submission ID

Turnitin support send an email to the administrator asking him to confirm


the deletion. The paper is then permanently deleted.
Get a student account
 Contact your “Instructor” to get your Turnitin account.
Note: Instructor account will be created by “Turnitin Administrator”

 Register your First name, Last name and email-id.


If an instructor has added the student to a course and the student has
received the automated notification e-mail containing a temporary
password.

Next
How to use?
 You'll receive an email from
noreply@turnitin.com titled
Log in to your Turnitin
Account. In this email, find
the Create Your Password
button and select it.
 Proceed with instructions
given by Turnitin and
complete the “Create
Password Procedure”.

Previous Back
Account Setup
 Enter your registered
email-id in the “Email
Address” box
 Enter your “Last Name”
in the appropriate box, Enter your registered email-id.
Last name is available
in your Email inbox. Last name is available in your inbox.
 Proceed with “Next”.

Back
Account Validation

Next
Web-link of validation in your inbox

Previous Back
Create your own password

Back
Complete the account setup

Back
Turnitin Login

Registered Email-id

Own Password

Back
Create your secret question and answer

Back
Acceptance of user agreement

Back
Home page of your account

Select Class name

The Student Homepage is the first page you see after logging in to Turnitin. You'll see a list of
all the classes that you are currently enrolled in. Select the name of your class to open your
assignment inbox.

Back
Paper submission
From the Assignment Inbox, select the Submit button relevant to your assignment.

Click here to submit paper

Back
Paper submission

Enter your paper/article


title and then select
“Choose from this
computer” to pick a file
Paper title
that you have saved on
your computer.

Select your paper

Next
Requirements for file upload
• File must be less than 40 MB

• Files must have at least 20 words of text

• The maximum paper length is 400 pages

• File types allowed: Microsoft Word, Excel, PowerPoint,


WordPerfect, PDF, HTML, RTF, OpenOffice, Google
Docs, and plain text

Back
Paper Submission

Once you have selected


your file, select the
“Upload” button to
upload your paper.
Uploaded file

Previous Back
Upload confirmation

Show you a preview of the


paper and some details
about it for you to look over.

Submission is not complete


until you've confirmed your
submission.

Back
Submission complete

Submission id (Also called Paper Id)

Back
Plagiarism checking

Back
Similarity Percentage

To view the report

Similarity percentage

Back
Turnitin Match Overview

Back
Turnitin – Filter and Settings

Filter and settings can be done only by instructor. Back


Turnitin – Matching Sources

Next
Excluding Sources and Options
Student:
In Student Account, they can set exclude options like quotes, exclude
bibliography, small matches of words, and percentage of matches in the "Filter
Settings".

Instructor:
Instructor can access the student's upload document and its similarity reports.

Only Instructor can remove individual sources from the matching sources. Student
can not access this option.

Note: Excluding sources allows to remove individual sources that do not want a
document to match against. Excluding a source will adjust the Similarity Score
accordingly.

Previous Back
Download originality report

Select to download report

Back
Turnitin Originality Report

Back
Turnitin – Text only report

Next
Turnitin – Text only report

Previous Back
Q. When Is A Qualitative Research Methodology Appropriate?
Answer :
A qualitative research study is appropriate when you need to tap into the hearts and minds of
the customer.
A highly subjective research discipline, qualitative research is specifically designed to look
"beyond the percentages" to gain an understanding of the customer's feelings, impressions
and viewpoints. Such intuitive, highly subjective personal input can only be obtained through
qualitative research.

Strengths:
o Small samples, sharp focus: Qualitative research is laser-focused, dealing only
with smaller samples.
o Probing interviews: Expert moderators, unencumbered by the time constraints of a
quantitative survey, use a multitude of techniques during lengthy interviews to
obtain in-depth information.
o Rich responses: The interviews, which last as long as two hours, allow the
moderator to elicit extremely candid, highly complex responses.

What Is The Case Study Method Of Research?


Answer :
A case study is an intensive study of one individual. Typically, the case study may involve
interviews, observation, experiments and tests.

What Are The Steps Involved In Research Process?


Answer :
The Steps involved in Research Process are:
1. Formulating the Research Problem
2. Extensive Literature Review
3. Developing the objectives
4. Preparing the Research Design including Sample Design
5. Collecting the Data
6. Analysis of Data
7. Generalization and Interpretation
8. Preparation of the Report or Presentation of Results-Formal write ups of
conclusions reached.

Write a Note on Fundamental Research. How it it different from Applied research

Answer :
Fundamental Research
Fundamental research, also known as basic research or pure research does not
usually generate findings that have immediate applications in a practical level.
Fundamental research is driven by curiosity and the desire to expand knowledge in
specific research area. This type of research makes a specific contribution to the
academic body of knowledge in the research area.
Fundamental studies tend to make generalizations about the phenomenon, and the
philosophy of this type of studies can be explained as „gathering knowledge for the
sake of knowledge‟. Fundamental researches mainly aim to answer the questions of
why, what or how and they tend to contribute the pool of fundamental knowledge in
the research area.
Opposite to fundamental research is applied research that aims to solve specific
problems, thus findings of applied research do have immediate practical implications.

Differences between Fundamental and Applied Research


Differences between applied and fundamental research have been specified in a way
that fundamental research studies individual cases without generalizing, and
recognizes that other variables are in constant change.
Applied research, on the contrary, seeks generalizations and assumes that other
variables do not change. The table below summarizes the differences between the two
types of research in terms of purpose and context:

Fundamental research Applied research

Improve understanding of particular business


Expand knowledge of processes of business or managemtn problem
and management Results in solution to problem
Results in universal principles relating to the
process and its relationship to outcomes New knowledge limited to problem
Findings of significance and value to society in Findings of practical relevance and value to
general manager(s) in organization(s)
Purpose

Undertaken by people based in a variety of


Undertaken by people based in universities settings including organizations and
Choice of topic and objectives determined by universities
the researcher Objectives negotiated with originator
Flexible time scales Tight time scales
Context
Differences between fundamental and applied research[1]
It is important to note that although fundamental studies do not pursue immediate
commercial objectives, nevertheless, findings of fundamental studies may result in
innovations, as well as, generating solutions to practical problems. For example, a
study entitled “A critical assessment of the role of organizational culture in facilitating
management-employee communications” is a fundamental study, but findings of this
study may be used to increase the levels of effectiveness of management-employee
communications, thus resulting in practical implications.
Examples of Fundamental Research

The following are examples for fundamental researches in business:

 A critical analysis of product placement as an effective marketing strategy


 An investigation into the main elements of brands and branding
 A study of factors impacting each stage of product life cycle

Advantages and Disadvantages of Fundamental Research


Advantages of fundamental research are considered as disadvantages of applied
research and vice versa. Fundamental researches are important to expand the pool of
knowledge in any discipline. Findings of fundamental studies are usually applicable in
a wide range of cases and scenarios. Fundamental studies usually do not have strict
deadlines and they are usually driven by the curiosity of the researcher.
At the same time, fundamental studies have disadvantages as well. Findings of this
type of studies have little or no practical implications. In other words, fundamental
studies do not resolve concrete and specific business problems.

Research Definition – Research is a careful investigation or inquiry


specifically through search for new facts in any branch of knowledge. It is an
original contribution to the existing stock of knowledge making for its
advancement.

Research can simply be defined a task of searching from available data to


modify a certain result or theory.

Research Methodology refers to

– A systematic study

– Defining a problem

– Formulating a Hypothesis

– Collecting and Analyzing data

– Deductions and Conclusions

Objectives of Research –

♦ To gain familiarity or achieve a new insight towards a certain topic.


♦ To verify and test important facts

♦ To analyze an event, process or phenomenon

♦ To identify the cause and effect relationship

♦ To find solutions to scientific, non-scientific and social problems

♦ To determine the frequency at which something occurs

What makes people do research?

♦ Desire to get a research degree

♦ Desire to solve unsolved and challenging problems

♦ Desire to get intellectual joy of doing creative work

♦ Desire to be of service to the society

♦ Desire for innovation and recognition

Types of Research
It can be broadly categorized into two categories –

→ Pure or Fundamental Research – It is based on the Question „Why things


happen?‟

→ Action or Applied Research – It is based on the Question „How things


happen?‟
Research Process
It consists a logical sequence of steps or actions that are necessary to effectively
solve a research problem.
Deatil:

(i) Formulating the Research Problem – The researcher must choose the
problem he wants to study and decide the area of interest and subject matter he
would inquire about.

(ii) Extensive Literature Survey – After choosing the research problem an


extensive literature survey is done and a brief summary of the problem is
written down.

(iii) Development of working hypothesis – A working hypothesis must be


stated in clear terms. It can be developed through the following approaches:-

Finding about the origin of the problem and studying its objectives

By discussing the problem with colleagues and experts

By examining past data and records

By review of similar studies and similar problems

(iv) Preparing the research design – The research is designed depending upon
its utility and appropriateness for a particular research problem. It involves
consideration of the following :-

The means of obtaining the information

The availability and skills of a researcher

Accuracy, Reliability and Validity of the data

The time available for research and the costs related to the research

(v) Determining the sample design – Sampling can either be probability


sampling or non-probability sampling. The researcher must carefully choose the
sampling procedure and sample size and must also look out for sampling errors.

(vi) Collecting the Data – There is a need for reliable and accurate data to carry
out an effective research. Data collection may be done by any of the following
methods:-

Observation

Interview
Telephonic Interviews

Questionnaire

Schedules

Other Methods

(vii) Execution of research – The research must be systematically executed in


order to collect correct and accurate data.

(viii) Analysis of Data – Analysis of data involves the application of many


tools and techniques to the raw data to make meaningful and useful
interpretations. The main task include establishment of categories, tabulation of
data and drawing out statistical inferences.

(ix) Hypothesis testing – After analyzing the data the researcher tests the
hypothesis formulated by him in the earlier stages.

(x) Generalizations and Interpretations – The hypothesis testing may be


favourable or unfavourable . The researcher arrives at generalizations based on
the result of the hypothesis testing.

(xi) Preparation of the research report – The layout for a research report
should be in the order:-

Preliminary Pages – The research report must contain the full title, foreword
and acknowledgement in the preliminary pages.

You might also like