Professional Documents
Culture Documents
Gen 530 Unit-5 Ethics
Gen 530 Unit-5 Ethics
Dr P. K. Sharma
Professor
SCE, LPU
OBJECTIVES
Discuss what is meant by and why there
should be ethical standards in Bio Medical
research
Identify ethical issues in Bio Medical research
which would amount to scientific misconduct
Explain the role of an ethics review committee
Construct a set of guidelines for members of
ethics review committees
Research Ethics…..
Reference
deepthiforensic2000@gmail.com
THANK YOU
Why is Research Ethics Important?
It is a reflection of respect for those who ‘take
part’ in research
It ensures no unreasonable, unsafe or
thoughtless demands are made by
researchers
It ensures sufficient knowledge is shared by
all concerned
It imposes a common standard in all the
above respects
Why is Research Ethics Important
It has become the norm as an expectation for
research activity
…. a professional requirement for
practitioners in some disciplines e.g.
psychology
… a requirement for access to participants in
others e.g. health
… and a requirement to comply with external
REF’s to obtain funding e.g. ESRC
What Projects Need Ethical Approval?
Human participants
Use of the ‘products’ of human participants
Animal participants
Work that potentially impacts on human
participants
(a)Research
(b)Daily life
(c)Corporate life in organization
(d)All of the above
Answer
(a)Animal
(b)Human being
(c)Natural resources
(d)All of the above
Answer
Politics of Research
Ethics
What are ethics?
What are common
ethical issues that
seem to surface in
research?
When should ethical
issues be considered?
Ethics
Ethics: principles for guiding decision
making and reconciling conflicting values
People may disagree on ‘ethics’ because it is
based on people's personal value systems
Ethical issues?
A research questionnaire is circulated among
students as part of their university registration
packet. Although students are not told they
must complete the questionnaire, the hope is
that they will believe they must – thus
ensuring a higher completion rate.
Ethical Issues?
Honesty and Integrity
This means that you need to report your research honestly, and that this applies to your
methods (what you did), your data, your results, and whether you have previously published
any of it. You should not make up any data, including extrapolating unreasonably from some
of your results, or do anything which could be construed as trying to mislead anyone. It is
better to undersell than over-exaggerate your findings.
When working with others, you should always keep to any agreements, and act sincerely.
Objectivity
You should aim to avoid bias in any aspect of your research, including design, data analysis,
interpretation, and peer review. For example, you should never recommend as a peer
reviewer someone you know, or who you have worked with, and you should try to ensure that
no groups are inadvertently excluded from your research. This also means that you need to
disclose any personal or financial interests that may affect your research.
Carefulness
Take care in carrying out your research to avoid careless mistakes. You should also review
your work carefully and critically to ensure that your results are credible. It is also important
to keep full records of your research. If you are asked to act as a peer reviewer, you should
take the time to do the job effectively and fully.
Openness
You should always be prepared to share your data and results, along with any new tools that
you have developed, when you publish your findings, as this helps to further knowledge and
advance science. You should also be open to criticism and new ideas.
You should never plagiarise, or copy, other people’s work and try to pass it off as your own.
You should always ask for permission before using other people’s tools or methods,
unpublished data or results. Not doing so is plagiarism. Obviously, you need to respect
copyrights and patents, together with other forms of intellectual property, and always
acknowledge contributions to your research. If in doubt, acknowledge, to avoid any risk of
plagiarism.
Confidentiality
You should respect anything that has been provided in confidence. You should also follow
guidelines on protection of sensitive information such as patient records.
Responsible Publication
You should publish to advance to state of research and knowledge, and not just to advance
your career. This means, in essence, that you should not publish anything that is not new, or
that duplicates someone else’s work.
Legality
You should always be aware of laws and regulations that govern your work, and be sure that
you conform to them.
Animal Care
If you are using animals in your research, you should always be sure that your experiments
are both necessary and well-designed. You should also show respect for the animals you are
using, and make sure that they are properly cared for.
If your research involves people, you should make sure that you reduce any possible harm to
the minimum, and maximise the benefits both to participants and other people.
This means, for example, that you should not expose people to more tests than are strictly
necessary to fulfil your research aims. You should always respect human rights, including the
right to privacy and autonomy. You may need to take particular care with vulnerable groups,
which include, but are not limited to, children, older people, and those with learning
difficulties.
Research ethics provides guidelines for the responsible conduct of research. In addition, it educates and monitors scientists conducting
research to ensure a high ethical standard. The following is a general summary of some ethical principles:
Honesty:
Honestly report data, results, methods and procedures, and publication status. Do not fabricate, falsify, or misrepresent data.
Objectivity:
Strive to avoid bias in experimental design, data analysis, data interpretation, peer review, personnel decisions, grant writing, expert
testimony, and other aspects of research.
Integrity:
Keep your promises and agreements; act with sincerity; strive for consistency of thought and action.
Carefulness:
Avoid careless errors and negligence; carefully and critically examine your own work and the work of your peers. Keep good records of
research activities.
Openness:
Share data, results, ideas, tools, resources. Be open to criticism and new ideas.
Respect for Intellectual Property:
Honor patents, copyrights, and other forms of intellectual property. Do not use unpublished data, methods, or results without permission.
Give credit where credit is due. Never plagiarize.
Confidentiality:
Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and
patient records.
Responsible Publication:
Publish in order to advance research and scholarship, not to advance just your own career. Avoid wasteful and duplicative publication.
Responsible Mentoring:
Help to educate, mentor, and advise students. Promote their welfare and allow them to make their own decisions.
Respect for Colleagues:
Respect your colleagues and treat them fairly.
Social Responsibility:
Strive to promote social good and prevent or mitigate social harms through research, public education, and advocacy.
Non-Discrimination:
Avoid discrimination against colleagues or students on the basis of sex, race, ethnicity, or other factors that are not related to their scientific
competence and integrity.
Competence:
Maintain and improve your own professional competence and expertise through lifelong education and learning; take steps to promote
competence in science as a whole.
Legality:
Know and obey relevant laws and institutional and governmental policies.
Animal Care:
Show proper respect and care for animals when using them in research. Do not conduct unnecessary or poorly designed animal experiments.
Human Subjects Protection:
When conducting research on human subjects, minimize harms and risks and maximize benefits; respect human dignity, privacy, and
autonomy.
When you look at these five basic ethical principles, it may appear obvious that your dissertation should include these. However, there are many
instances where it is not possible or desirable to obtain informed consent from research participants. Similarly, there may be instances where you seek
permission from participants not to protect their anonymity. More often than not, such choices should reflect the research strategy that you adopt to
guide your dissertation.
Broadly speaking, your dissertation research should not only aim to do good (i.e., beneficence), but also avoid doing any harm (i.e., non-malfeasance).
Whilst ethical requirements in research can vary across countries, these are the basic principles of research ethics. This is important not only for ethical
reasons, but also practical ones, since a failure to meet such basic principles may lead to your research being (a) criticised, potentially leading to a lower
mark, and/or (b) rejected by your supervisor or Ethics Committee, costing you valuable time. In the sections that follow, we discuss the five of the
main practical ethical principles that stem from these basic principles. Each of these basic principles of research ethics is discussed in turn:
PRINCIPLE ONE
Minimising the risk of harm
Dissertation research should not harm participants. Where there is the possibility that participants could be harmed or put in a position of discomfort,
there must be strong justifications for this. Such scenarios will also require (a) additional planning to illustrate how participant harm (or discomfort) will
be reduced, (b) informed consent, and (c) detailed debriefing.
There are a number of types of harm that participants can be subjected to. These include:
Typically, it is not harm that we need to think about since a researcher does not intentionally go out to cause harm. Rather, it is the risk of harm that you
should try to minimise. In order to minimising the risk of harm you should think about:
We discuss each of these ethical principles in the sections that follow, explaining (a) what they mean and (b) instances where they should (and should
not) be followed.
PRINCIPLE TWO
Obtaining informed consent
One of the foundations of research ethics is the idea of informed consent. Simply put, informed consent means that participants should understand
that (a) they are taking part in research and (b) what the research requires of them. Such information may include the purpose of the research, the
methods being used, the possible outcomes of the research, as well as associated demands, discomforts, inconveniences and risks that the participants
may face. Whilst is it not possible to know exactly what information a potential participant would (or would not) want to know, you should aim not to
leave out any material information; that is, information that you feel would influence whether consent would (or would not) be granted.
Another component of informed consent is the principle that participants should be volunteers, taking part without having been coerced and deceived.
Where informed consent cannot be obtained from participants, you must explain why this is the case. You should also be aware that there are instances
informed consent is not necessarily needed or needs to be relaxed. These include certain educational, organisational and naturalistic research settings.
We discuss these in more detail under the section: Avoiding deceptive practices.
PRINCIPLE THREE
Protecting anonymity and confidentiality
Protecting the anonymity and confidentiality of research participants is another practical component of research ethics. After all, participants will typically
only be willing to volunteer information, especially information of a private or sensitive nature, if the researcher agrees to hold such information in
confidence. Whilst it is possible that research participants may be hurt in some way if the data collection methods used are somehow insensitive, there is
perhaps a greater danger that harm can be caused once data has been collected. This occurs when data is not treated confidentially, whether in terms of
the storage of data, its analysis, or during the publication process (i.e., when submitting your dissertation to be marked). However, this does not mean
that all data collected from research participants needs to be kept confidential or anonymous. It may be possible to disclose the identity and views of
individuals at various stages of the research process (from data collection through to publication of your dissertation). Nonetheless, permissions should be
sought before such confidential information is disclosed.
An alternative is to remove identifiers (e.g., vernacular terms, names, geographical cues, etc.) or provide proxies when writing up. However, such a
stripping of identifiable information may not always be possible to anticipate at the outset of your dissertation when thinking about issues of research
ethics. This is not only a consideration for dissertations following a qualitative research design, but also a quantitative research design [for more
information, see the article: Research strategy and research ethics].
For example:
Imagine that your dissertation used a quantitative research design and a survey as your main research method. In the process of analysing your data, it
is possible that when examining relationships between variables (i.e., questions in your survey), a person's identity and responses could be inferred. For
instance, imagine that you were comparing responses amongst employees within an organisation based on specific age groups. There may only be a
small group (or just one employee) within a particular age group (e.g., over 70 years old), which could enable others to identify the responses of this
individual (or small group of employees).
Therefore, you need to consider ways of overcoming such problems, such as: (a) aggregating data in tables and (b) setting rules that ensure a minimum
number of units are present before data/information can be presented.
A further alternative is to seek permission for access to data and analysis to be restricted to the published material, perhaps only allowing it to be viewed
by those individuals marking your work. If the work is later published, adjustments would then need to be made to protect the confidentiality of
participants.
There are also a wide range of potential legal protections that may affect what research you can and cannot perform, how you must treated the data of
research participants, and so forth. In other words, you don?t simply have a duty to protect the data you collect from participants; you may also have (in
some cases) a legal responsibility to do so. Since this varies from country-to-country, you should ask your dissertation supervisor or Ethics Committee for
advice (or a legal professional).
PRINCIPLE FOUR
Avoiding deceptive practices
At first sight, deceptive practices fly in the face of informed consent. After all, how can participants know (a) that they are taking part in research
and (b) what the research requires of them if they are being deceived? This is part of what makes the use of deceptive practices controversial. For this
reason, in most circumstances, dissertation research should avoid any kinds of deceptive practices. However, this is not always the case.
Deception is sometimes a necessary component of covert research, which can be justified in some cases. Covert research reflects research
where (a) the identity of the observer and/or (b) the purpose of the research is not known to participants. Cases where you may choose to engage in
covert research may include instances where:
It is not feasible to let everyone in a particular research setting know what you are doing.
Overt observation or knowledge of the purpose of the research may alter the particular phenomenon that is being studied.
Let's take each of these in turn:
It is not feasible to let everyone in a particular research setting know what you are doing
By feasibility, we are not talking about the cost of doing research. Instead, we mean that it is not practically possible to let everyone in a particular
research setting know what you are doing. This is most likely to be the case where research involves observation, rather than direct contact with
participants, especially in a public or online setting. There are a number of obvious instances where this may be the case:
Clearly, in these cases, where individuals are coming and going, it may simply be impossible to let everyone known what you are doing. You
may not be intentionally trying to engage in deceptive practices, but clearly participants are not giving you their informed consent.
Overt observation or knowledge of the purpose of the research may alter the particular phenomenon that is being studied
Where observations or a participants? knowledge of the true purpose of the research have the potential to alter the particular phenomenon that you are
interested in, this is a major concern in terms of the quality of your findings.
Therefore, when you think about whether to engage in covert research and possibly deceptive practices, you should think about the extent to which this
could be beneficial in your dissertation, not research in general; that is, everything from the research paradigm that guides your dissertation through to
the data analysis techniques you choose affect issues of research ethics in your dissertation [see the article: Research strategy and research ethics].
Imagine some of the following scenarios where covert research may be considered justifiable:
Scenario A
You are conducting a piece of research looking at prejudice. Whilst participants are given a questionnaire to complete that measures their
prejudice, it is not obvious from the questions that this is the case. Furthermore, participants are not told that the research is
about prejudice because it is felt that this could alter their responses. After all, few people would be happy if other people thought they were
prejudice. As a result, if participants knew that this is the purpose of the study, they may well provide responses that they think will make
them appear less prejudice.
Scenario B
You are interested in understanding the organisational culture in a single firm. You feel that observation would be an appropriate research
method in such a naturalistic setting. However, you feel that if employees knew that you were monitoring them, they may behave in a
different way. Therefore, you may have received permission to go undercover or provide a story to explain why you are there, which is not
the truth.
Whilst such covert research and deceptive practices, especially where used intentionally, can be viewed as controversial, it can be argued that they have
a place in research.
PRINCIPLE FIVE
Providing the right to withdraw
With the exception of those instances of covert observation where is not feasible to let everyone that is being observed know what you are doing,
research participants should always have the right to withdraw from the research process. Furthermore, participants should have the right to withdraw at
any stage in the research process. When a participant chooses to withdraw from the research process, they should not be pressured or coerced in any
way to try and stop them from withdrawing.
If your supervisor and/or Ethics Committee expect you to complete an Ethics Consent Form, it is likely that you will have to let participants know that
they have the right to withdraw at any time [see the article: Ethics consent form].
Next Steps
Now that you have read these basic principles of research ethics, you may want to understand how the research strategy you have chosen affects
your approach to research ethics [see the article: Research strategy and research ethics]. You will need to understand the impact of your research
strategy on your approach to research ethics when writing up the Research Ethics section of your Research Strategy chapter (usually Chapter Three:
Research Strategy).
What is plagiarism?
Latin plagium - means "kidnapping"
It is intellectual theft
It is a serious scientific misconduct
Gitanjali 5
Writecon 2007
Plagiarism is
plagiarism…
irrespective of
Intent, Source,
Quantity and
Copyright
Gitanjali 6
Writecon 2007
Poll-1
Copying the text of existing research is
(a)Copy right
(b)Plagiarism
(c)Ethical
(d)All of the above
Gitanjali 7
Writecon 2007
What is cyber-plagiarism?
Copyingideas, text, material from the
web without proper accreditation
Digital
plagiarism is a term used to
describe copying using computers
Creativity is fine
but plagiarism is
faster…
Gitanjali 8
Writecon 2007
‘You’ve copied all this off
the internet…’
Gitanjali 9
Writecon 2007
Truth is stranger than
fiction…
17/3/2007
Ethics Student Plagiarizes Class
Presentation on Plagiarism
(downloaded the slides from internet)
Types of plagiarism
Word for word (Direct, Text)
Mosaic
Thesaurus (Paraphrase)
Ideas
Authorship
Secondary sources
Self
Gitanjali 11
Writecon 2007
What is self-plagiarism?
The practice of an author using portions of their
previous writings on the same topic in another of their
publications, without specifically citing it formally in
quotes.
This practice is widespread and at times
unintentional
Violates the copyright that has been assigned to the
publisher
No consensus whether this is scientific misconduct
Gitanjali 12
Writecon 2007
Are you saying that JK Rowling plagiarized you
simply because you both use “because“ and
“too” on page 256?
Gitanjali 13
Writecon 2007
Why do people plagiarize?
Ignorance
Lack of knowledge on the ethics of scholarly
writing / poor writing skills
Ambition, fierce competition
Pressure from seniors
Publish or perish system
Faster
Chances of getting caught or action
being taken is slim
Gitanjali 14
Writecon 2007
How to avoid plagiarism?
For short quotes, use quotation marks in the sentence.
For longer quotes indent the entire passage
If you have used a table, chart, diagram etc., cite the source
directly below with a statement that permission has been
obtained.
“All sources should be disclosed and, if large amounts of other
people's written or illustrative material are to be used,
permission must be sought.” COPE, 1999.
Even if you change a few words here and
there it is considered plagiarism
Gitanjali 15
Writecon 2007
Poll-2
How much plagiarism is allowed in
Scopus indexed journals
(a)20%
(b)40%
(c)50%
(d)00%
Gitanjali 16
Writecon 2007
Figure 1. Brain regions of current interest to the
neurobiology of sleep. (Figure reproduced with
permission from: Pace-Schott EF, Hobson JA. The
neurobiology of sleep. Nature Reviews
2002;3:697-723.)
Fair Use of Intellectual Property
use of a copyrighted work for purposes
such as criticism, comment, news
reporting, teaching or scholarship.
use copyrighted materials without
seeking permission from the creator or
publisher and without paying copyright
fees.
Does not mean that you
can plagiarize!!!
Gitanjali 18
Writecon 2007
Copyright and Plagiarism
12,500 USD
Plagiarism issues are not strictly related
to copyright issues - though the two may overlap.
Copyright is a legal concept; plagiarism is literary
and more of an ethical issue.
Publishers are more worried about copyright
violation.
Gitanjali 20
Writecon 2007
British Student says University was Negligent for
Not Stopping his Plagiarism (
http://chronicle.com/prm/daily/2004/06/2004060404n.htm
Are we doing
enough?
Interesting websites:
http://www.famousplagiarists.com/scienceandmedicine.htm.
www.turnitin.com
What is plagiarism?
the copying from a book, article, notebook,
video, or other source material, whether
published or unpublished, without proper credit
through the use of quotation marks, footnotes,
and other customary means of identifying
sources, or passing off as one's own the ideas,
words, writings, programs, and experiments of
another, whether or not such actions are
intentional or unintentional."
Undergraduate catalogue, William Patterson
University, 2002
Gitanjali 22
Writecon 2007
Gitanjali 23
Writecon 2007
“It’s not the same. I was caught stealing
office supplies. You on the other hand, got
caught stealing ideas.”
Gitanjali 25
Writecon 2007
Avoiding Plagiarism:
and other writing tips…*
What Is Plagiarism?
Use of another’s work without giving credit
Possibly Deliberate
Unintentional Plagiarism
Plagiarism
to the team
Proofread for each other
Study Groups
When working together on individual assignments,
2 You are using an editorial from your school’s newspaper with which you disagree.
3 You use some information from a source without ever quoting it directly.
4 You have no other way of expressing the exact meaning of a text without using the
original source verbatim.
5 You mention that many people in your discipline belong to a certain organization.
6 You want to begin your paper with a story that one of your classmates told about her
experience in Bosnia.
7 The quote you want to use is too long, so you leave out a couple of phrases.
8 You really like the particular phrase somebody else made up, so you use it.
Academic Dishonesty
Types of Academic Dishonesty
Cheating
“Intentionally using or attempting to use
Gitanjali 6
Writecon 2007
Plagiarism is
plagiarism…
irrespective of
Intent, Source,
Quantity and
Copyright
Gitanjali 7
Writecon 2007
What is cyber-plagiarism?
Copyingideas, text, material from the
web without proper accreditation
Digital
plagiarism is a term used to
describe copying using computers
Creativity is fine
but plagiarism is
faster…
Gitanjali 8
Writecon 2007
‘You’ve copied all this off
the internet…’
Gitanjali 9
Writecon 2007
Truth is stranger than
fiction…
17/3/2007
Ethics Student Plagiarizes Class
Presentation on Plagiarism
(downloaded the slides from internet)
Types of plagiarism
Word for word (Direct, Text)
Mosaic
Thesaurus (Paraphrase)
Ideas
Authorship
Secondary sources
Self
Gitanjali 11
Writecon 2007
What is self-plagiarism?
The practice of an author using portions of their
previous writings on the same topic in another of their
publications, without specifically citing it formally in
quotes.
This practice is widespread and at times
unintentional
Violates the copyright that has been assigned to the
publisher
No consensus whether this is scientific misconduct
Gitanjali 12
Writecon 2007
Are you saying that JK Rowling plagiarized you
simply because you both use “because“ and
“too” on page 256?
Gitanjali 13
Writecon 2007
Why do people plagiarize?
Ignorance
Lack of knowledge on the ethics of scholarly
writing / poor writing skills
Ambition, fierce competition
Pressure from seniors
Publish or perish system
Faster
Chances of getting caught or action
being taken is slim
Gitanjali 14
Writecon 2007
How to avoid plagiarism?
For short quotes, use quotation marks in the sentence.
For longer quotes indent the entire passage
If you have used a table, chart, diagram etc., cite the source
directly below with a statement that permission has been
obtained.
“All sources should be disclosed and, if large amounts of other
people's written or illustrative material are to be used,
permission must be sought.” COPE, 1999.
Even if you change a few words here and
there it is considered plagiarism
Gitanjali 15
Writecon 2007
Figure 1. Brain regions of current interest to the
neurobiology of sleep. (Figure reproduced with
permission from: Pace-Schott EF, Hobson JA. The
neurobiology of sleep. Nature Reviews
2002;3:697-723.)
Fair Use of Intellectual Property
use of a copyrighted work for purposes
such as criticism, comment, news
reporting, teaching or scholarship.
use copyrighted materials without
seeking permission from the creator or
publisher and without paying copyright
fees.
Does not mean that you
can plagiarize!!!
Gitanjali 17
Writecon 2007
Copyright and Plagiarism
12,500 USD
Plagiarism issues are not strictly related
to copyright issues - though the two may overlap.
Copyright is a legal concept; plagiarism is literary
and more of an ethical issue.
Publishers are more worried about copyright
violation.
Gitanjali 19
Writecon 2007
British Student says University was Negligent for
Not Stopping his Plagiarism (
http://chronicle.com/prm/daily/2004/06/2004060404n.htm
Are we doing
enough?
Interesting websites:
http://www.famousplagiarists.com/scienceandmedicine.htm.
www.turnitin.com
What is plagiarism?
the copying from a book, article, notebook,
video, or other source material, whether
published or unpublished, without proper credit
through the use of quotation marks, footnotes,
and other customary means of identifying
sources, or passing off as one's own the ideas,
words, writings, programs, and experiments of
another, whether or not such actions are
intentional or unintentional."
Undergraduate catalogue, William Patterson
University, 2002
Gitanjali 21
Writecon 2007
Gitanjali 22
Writecon 2007
“It’s not the same. I was caught stealing
office supplies. You on the other hand, got
caught stealing ideas.”
Gitanjali 24
Writecon 2007
Citing and Writing to
Prevent Plagiarism
http://www.kean.edu/forms/AcademicIntegrity.pdf
Intentional plagiarism:
Copying words or ideas from others and
using as your own
Cutting and pasting information without citing
Buying or borrowing a written work by
someone else and submitting it as your
work
Using videos, audio recorder or other media
without citing
Plagiarism.org http://www.plagiarism.org/learning_center/educational_tips.html
Unintentional plagiarism:
http://www.kean.edu/forms/AcademicIntegrity.pdf
Kean University
Academic Integrity Policy
Violations of academic
integrity are classified into
four categories based on
the level of seriousness of
the behaviors.
Level 1 Violations
Example:
- Improper footnoting or unauthorized
assistance with academic work on the part of a
first-year student.
Example:
- Quoting directly or paraphrasing without
proper acknowledgment (cite) on a small
portion of the assignment
- Failing to acknowledge (cite) all sources of
information and contributors who helped with
an assignment.
Example:
- Plagiarizing major portions of an
assignment
- Using a purchased term paper
- Presenting the work of another as one’s own
Example:
- Any degree of falsification or plagiarism
relating to a senior or graduate thesis
- infractions involving academic integrity
committed after return from suspension for a
previous violation.
To prevent plagiarism
To write with authority
acquisition
To show your ethical values
Exception for citation
Summarizing
Paraphrasing
Quoting
References
Copyright © 2008
by Janette González
Reference Librarian
Citing and referencing
academic sources
Student Learning Development
Student Counselling Service
student.learning@tcd.ie
http://student-learning.tcd.ie
896-1407
Demystifying citation
Session Objectives:
• What is a reference or citation?
• Examples of citations
• What is a citation or reference style?
• The Harvard Referencing style
• Avoiding plagiarism
• Where to get more information about citing
and referencing
What is a reference or citation?
Direct quotes
Statistics/Studies
Theories
Facts
Interpretations
Paraphrases
Example citation in text –summary
Citation of Referencing is
(a)Numeric
(b)Text
(c)Both
(d)None
How? Citation or reference style
Book:
Stevens, P. (2003) The Voyage of the
Catalpa: A Perilous Journey and Six Irish
Rebels’ Escape to Freedom. London:
Weidenfeld and Nicolson.
Harvard
Citation listed in a ‘References’
Journal article
Stevens, P. (2003) ‘The Voyage of the
Catalpa: A Perilous Journey and Six Irish
Rebels’ Escape to Freedom’. Irish Journal
of Social History 50 (2) 34-42.
(a)Paraphrasing
(b)Citation and referencing
(c)Providing source of the content
(d)All of the above
Further information
• http://www.tcd.ie/Library/support/
referencing.php
• http://www.learnhigher.ac.uk
• http://www.coventry.ac.uk/caw
• http://www.cite.auckland.ac.nz
Name of author.
GEN530 UNIT-4 LECTURE-7
Delivered by
(a) 1963
(b) 1956
(c) 1965
(d) 1988
Answer
(b) 1956
Plagiarism Defined
(a) Section 3
(b) Section-4
(c) Section-13
(d) Section-7
Answer
(c) Section-13
Penalties for Students
• Penalties will be given to students according to the decision of the
Plagiarism Disciplinary Authority (PDA). The punishments given to
students for plagiarism for different levels of severity are given below:
• Level 1 (10%-40%)– the student will not be given any mark or credit
and revised script must be resubmitted within a stipulated time period
which does not exceed 6 months.
• Level 2 (40%-60%)– the student will not be given any mark or credit
and the revised script is to be resubmitted between 1 year and 18
months.
• Level 3 (above 60%)– the student will not be given any mark or
credit and their registration for that course will be canceled.
…
• If a student repeats such act of plagiarism then the
punishment will be for the next level to the one previously
committed. In cases where the highest level of plagiarisation
occurs then the punishment remains the same and the
registration will be canceled.
• If degree or credit has already been obtained and the accused
has been proven to have plagiarized content then said degree
or credit will be suspended for a stipulated time period.
Penalties for Faculty, Staff or Researcher
• Penalties for faculty, staff or researcher of Higher Education Institutes
will also be given according to the severity of plagiarism.
• Level 1 (10%-40%)– he/she will be asked to withdraw the manuscript
submitted for publication and will not be allowed to publish any work
for a minimum time period of 1 year.
• Level 2 (40%-60%)– he/she will be asked to withdraw manuscript
submitted for publication and will not be allowed to publish their work
for a minimum time period of 2 years. He/she will also be denied any
annual increment that they have been receiving, he/she will also not be
allowed to act as a supervisor for students or scholars for 2 years.
• Level 3 (above 60%)– he/she will be asked to withdraw manuscript
submitted for publication and will not be allowed to publish any work
for a minimum time period of 3 years. He/she will also be denied any
annual increment they are receiving for 2 years, he/she will not be
….
• If a person repeats the same act of plagiarisation then he/she will be
subject to punishment of the next level from the level which the
person was previously punished for. If Level 3 plagiarism is repeated
than the person committing it will be dismissed from their job.
• If a person has already attained any benefit or credit before plagiarism
was proved then such benefit or credit will be suspended for a time
period that is to be decided by the AMP and PDA.
• Head of Higher Education Institute
• If the head of an HEI is accused of plagiarising then the guidelines
have provided that appropriate shall be taken by the concerned
authority.
Conclusion
-vv
\ZZ
(qr-rq rimqt k6rs {il-fr, qrta wr6n)
(Ministq ol Humon Resource Developmenl, C'od. of Indio)
PUBLICNOTICE
)r^-. '
(P.K. Thakur)
Secretary
,benrT-
1
Preamble
Whereas, University Grants Commission (UGC), as per UGC Act, 1956, is mandated to
coordinate and determine the standards of higher education;
And whereas, assessment of academic and research work done by a studcnt or a faculty
or a researcher or a staff, in the form of essays, assignments, term papers, project reports,
coursework, thcsis and dissertation leading to the award of degrees, research papers, policy
papers, chapters in books, full-fledged books and any other work including computer programs
is instrumental in identifying and certiffing the academic standards accomplished by such
student(s) or faculty or researcher(s) or staff and projecting them far and wide as an objective
and impartial indicator of the pcrformance of individual(s);
And whereas. any academic and research work undertaken in any form by a student or a
faculty or a researcher or a staff, reflects the extent to which elements of academic integrity,
originality and innol-ation have been injected in various processes of education adopted by
Higher Educational Institutions(HEI's) ;
o. "Source" means the published primary and secondary material from anl' source
whatsoever and includes written information and opinions gained dircctly from
other people, including eminent scholars, public figurcs and practitioners in any
form whatsoer,er as also data and information in the electronic form be it audio,
video, imagc or texq Information being given the same meaning as defined under
Section z (r) (v) of the Information Technology Act, zooo and reproduced here in
Regulation z (l).
p. "Staff'refers to all non-teaching staffworking in Institution of Highcr Education in
any capacity whatsoever i.c. regular, temporary, contractual, outsourced etc.
q. "Student" means a pcrson duly admitted and pursuing a programme of study
including a research programme in full time or part-time or distant mode;
r. "University" means a univcrsity established or incorporated by or under a Central
Act, a Provincial Act or a State Act, and includes an institution dcemed to be
universi$;
s. "Year" means the academic session in which a proven offence has been committed.
Words and cxpressions used and not defined in these regulations but defincd in the
University Grants Commission Act, 1956 shall have the meanings respectively assigned to
them in UGC Act, 1956.
3. Objectives
3.r To create academic awareness about responsible conduct of research, study, project
rn'ork, assignment, thesis, dissertation, promotion of academic integrity- and
prevcntion of misconduct including plagiarism in academic writing among
students, researchers, faculg- and other members of academic staff as r,r'ell as any
employee of HEIs.
4. Duties of HEI:
Every HEI should establish the mechanism as prescribed in these regulations to enhance
a\{areness about responsible conduct of research and academic activities, promotion of
intcgrity and deterrence from plagiarism.
4
(a) Every HEI shall instruct students, faculty and staffabout proper attribution, seeking
permission of the author wherever necessary, acknowledgement of source compatible
with the needs and specificities of disciplines and in accordance with rules and
regulations governing the source.
(b) AIl HEIs shall conduct sensitization seminars/ awareness programmes every semester
on responsible conduct of research, project work, assignment, thesis, dissertation,
promotion of academic integrity and ethics in education for students, faculw and other
members of academic staff.
ir'. Shall train student, faculty, staff and researcher for using plagiarism detection
tools and reference management tools.
6. Curbing Plagiarism
a) Every HEI shall declare and implement the technology based mechanism using
appropriate software so as to ensure that documents such as thesis, dissertation,
term papers, reports, publications or any other such documents are free of
plagiarism at the time of their submission.
b) Every student submitting a thesis, dissertation, term papers, reports or any other
such documents to the HEI shall submit an undertaking indicating that the
document has been prepared by him or her and that the document is his/her
original work and free of any plagiarism.
d) The undertaking shall include the fact that the document has been duly chccked
through a Plagiarism detection tool approved by the HEI.
tr
e) The HEI shall develop a policy on plagiarism and get it approved by the relevant
statutory bodies ofthe University.
0 Each superv'isor shall submit a certificate indicating that thc n'ork done by the
researcher under him / her is plagiarism free.
g) All HEIs shall submit to INFLIBNET soft copies of all M.Phil., Ph.D. dissertations
and theses carried out in its various departments after the award of degrees for
hosting in the digital repository under the "Shodh Ganga e-repository" programme.
h) All HEIs shall create Institutional Repository on institute u'ebsite which shall
include dissertation / thesis / paper / publication and other in-house publications.
i. All quoted work either falling under public domain or reproduced n'ith all nccessary
permission and/or attribution.
ii. All references, bibliography, table of content, preface and acknowledgements.
iii. All small similaritics of minor nature.
iv. AII generic tcrms, larn's, standard symbols and standards equations.
The core nork carricd out by the student, faculty, staff and researcher shall be based on
original ideas and shall be covered by Zero Tolerance Policy on Plagiarism. In case
Plagiarism is established in the core work claimed then Plagiarism Disciplinary Authority
(PDA) of the HEI shall impose maximum penalty.
The core work shall include abstract, summary, hlpothesis, observations, results,
conclusions and recommendations.
For all other (non-corc)cases, plagiarism would be quantified into follou'ing levels in
asccnding order of severity for the purpose of its definition:
(PDA).
The authorities of HEI can also take su motu notice of an act of plagiarism and initiate
proceedings under these regulations. Similarly proceedings can also be initiated by the HEI
on the basis of findings of an examiner.
u. The AMP shall have the power to assess the level of plagiarism and thus
recommend penalty (ies) accordingly.
1lI. The AMP shall consist of four members who shall be senior academicians with
good publication record with at least one mcmber nominated by the Head of
HEI from outside the HEL The Chairman of the AMP shall be an academic
functionary (Dean/Pro-VC/Senior Academician) of the HEI. The third mcmber
shall be a reputed Academician from the Discipline in rvhich the plagiarism is
alleged. The fourth member shall be an expert well versed with anti plagiarism
tools.
tv. The AMP shall follow the principles of natural justice while deciding about the
allegation of plagiarism against the student, researcher, faculty member or any
other employee of HEI.
The AMP shall send the report after investigation and the recornmendation on
penalties to be imposed to the PDA preferably within a period of 45 days from
the date of complaint / initiation ofthe proceedings in case ofsu mofu notice.
vi. The AMP shall pror.'ide a copy of the report to the person(s) against whom
inquiry report is submitted.
re. Plagiarism Disciplinary Authority (PDA):
i. PDA shall be constituted by the HEI to consider the recommendation of the AMP
and take appropriate decision after giving a hearing to the accused person.
ii. There shall be three members in the PDA chaired by head of the HEI / The Head of
the institution/ Appointing and Dismissal Authority. The other members shall be
Dean / Director (Academic / Research) and one senior academician not below the
rank of Professor in the relevant discipline from outside the HEI.
13. Penalties
Penalties in the cases of plagiarism shall be imposed on students pursuing studies at the
level of UG, PG, Masters, M. Phil., Ph.D. and faculty &staff of the HEI only after academic
misconduct on the part of the offender has been established w'ithout doubt, n'hen all
avenues of appeal have been exhausted and individual in question has been provided
enough opportunity to defend himself or herself in a fair or transparent manner. While
developing policy document, the HEI may consider penalties in the cases of plagiarism. It
shall be ensured by the competent authority in the HEI that the degree of pcnalty served is
commensurate with the degree of seriousness of offence and misconduct established. Since
act <lf plagiarism, witting or unwitting, is potentially detrimental to the academic credibility
and social reputation of the individual concerned, all proceedings of investigations and
imposition of penalties shall bc conducted in camera so as to prevent encrustation of stigma
and slur upon individual concerned:
i. Level t: Similarities atrove roo/o to 4o% - Such student shall not be given any
mark and/or credit for the plagiarized script and shall be asked to submit a revised
script within a stipulated time period not exceeding 6 months.
ii. Level z: Similarities above loo/o to 6o% - Such student shall not be given any
mark and/or credit for the plagiarized script and shall be asked to submit a rer,ised
script after time period of one year but not exceeding eighteen months.
a
iii. Level 3: Similarities above 6o% -Such student shall not be given any mark
and/or credit for the plagiarized script and his/her registration for that course to be
cancelled.
Note r: Penalty on repeated plagiarism- Such student shall be punished for the
plagiarism of one ler.el higher than the prcvious level committed by him/her. In case where
plagiarism of highest lerel is committed then the punishment for thc same shall be
operatire.
Note z: Penalty in case where the degree/credit has already been obtained - If
plagiarism is proved on a date later than the date of anard of degree or credit as the case
may.be then his/her degree or credit shall be put in abcyance for a period decided by the
AMP and PDA.
(ii) Level z: Similarities above 4oo/o to 6o% - shall be askcd to u'ithdrau' manuscript
submitted for publication and shall not be allowed to publish any rvork for a minimum
period of t$'o )rears and shall be dcnied a right to one annual increment and shall not be
allou'ed to be a supervisor to any UG, PG, Master's, M'Phil., Ph.D' student/scholar for a
period of two years.
period ofthree years and shall be denied a right to two successive annual increments and
shall not be allowed to be a supervisor to any UG, pG, Master's, M.phil., ph.D.
student/scholar for a period ofthree years.
Note z: Penalty in case where the benefit or credit has already been obtained -
If plagiarism is proved on a date later than the date of benefit or credit obtained as the case
may be then his/her benefit or credit shall be put in abeyance for a period decided by the
AMP and PDA on recommendation of the AMP.
Note 3: If there is any complaint of plagiarism against the Head of an HEI, a suitable
action, in line with these regulations, will be taken by the Competent Authority/Governing
Board/Governing Council as the title may be.
GEN530 UNIT-4 LECTURE-8_TURNITIN
Topic
Academic Integrity
The UWS approach
Liz Curach
University Librarian
UWS
Plagiarism: a new
phenomenon?
"In comparing various authors with one
another, I have discovered that some
of the gravest and latest writers have
transcribed, word for word, from
former writers, without making
acknowledgement.”
Pliny the Elder (23 AD-79 AD), Natural History
http://www.quotationspage.com/search.php3?homesearch=pliny+the+elder
Plagiarism defined ..
Plagiarism is the presentation of the
thoughts or work of another as one’s
own
St James Ethics Centre
Turnitin,
or
Turnitoff ??
Turnitin is an originality checking and plagiarism prevention service that checks your writing for
citation mistakes or inappropriate copying. When you submit your paper, Turnitin compares it
to text in its massive database of student work, websites, books, articles, etc.
Turnitin is integrated into the Assignments tool in all online classrooms and is managed by
Classroom Support. This means that when you upload your paper to your classroom for grading,
it will automatically be sent through Turnitin's repository. The Similarity Report that it generates
will help identify possible instances of plagiarism.
Turnitin is an American commercial, Internet-based plagiarism detection service which is a
subsidiary of Advance.
Founded in 1997, universities and high schools typically buy licenses to use the software as a
service (SaaS) website, which checks submitted documents against its database and the
content of other websites with the aim of identifying plagiarism. Results can identify
similarities with existing sources, and can also be used in formative assessment to help
students learn to avoid plagiarism and improve their writing.
Students may be required to submit work to Turnitin as a requirement of taking a certain
course or class. The software has been a source of controversy, with some students refusing
to submit, arguing that requiring submission implies a presumption of guilt. Some critics
have alleged that use of this proprietary software violates educational privacy as well as
international intellectual-property laws, and exploits students' works for commercial purposes
by permanently storing them in Turnitin's privately held database.
Turnitin's parent company, iParadigms LLC, runs the informational website Plagiarism.org
and also offers a similar plagiarism-detection service for newspaper editors and book and
magazine publishers called iThenticate. Other tools included with the Turnitin suite are
GradeMark (online grading and feedback) and PeerMark (peer-review services). Turnitin
released the WriteCycle Suite on February 3, 2009, which bundles the Originality Checking
service with its GradeMark online grading tools and PeerMark tools. Turnitin released
Turnitin2 on September 4, 2010, dropping the "WriteCycle" nomenclature.
In March 2019, Advance acquired the company for US$1.75 billion.
Comparison Between Turnitin and iThenticate
Turnitin iThenticate
Submission Web pages, other content, scholarly journals, student Web pages, other content, scholarly journals*, ProQuest.
s checked paper database. More information.
against More information.
Submission
maximum
400 pages or less, 40 MB or less 400 pages or less, 40 MB or less
length and
size**
Quick Start Turnitin User Guides iThenticate
Guides
Quick Submit
Access Two methods to access Turnitin (using UNSW zID) iThenticate account provided by the UNSW IT Service Centre
(ITServiceCentre@unsw.edu.au or x51333). iThenticate Login details
Compare
Moodle Login or Turnitin will be provided by UNSW for access via the iThenticate website.
submission
methods
How Turnitin works
There are, generally speaking, four different ways to go about doing this.
The first way is through keyword analysis. What does that mean? Like a
search engine, you enter in a keyword and the software scans documents
to find instances of that word. Another way to scan text for similarity is to
look at groups, or strings, of words. Rather than looking just at individual
words, the software looks for strings or sequences of words (say 3-4 or
more words ordered in such a way to create a sentence or sentence
fragments). As you may be able to see already, these two approaches can
be pretty effective for identifying the strict or exact copying of content within
one document to others. The shortcoming of these approaches, however,
is that it doesn't identify paraphrasing--where the ideas and meaning may
have been copied--but the text is different enough that it doesn't get
identified as a match.
A way to better get at this type of problem would be through a third way,
which is to go about scanning for content matches by looking at the style of
the writing and to compare that style to other documents. This is not a strict
word-to-word analysis, but more of an approach that takes a look at the
probability of certain word sequences ("phrases") that may appear in one
document and then compare it to other documents. The challenge here is
fine grained, word-for-word matches can get lost. Better yet, why not
identify a document's unique "fingerprint," and then compare that fingerprint
to others? This last approach, that we will discuss in this blog post, is what
we largely do at Turnitin.
One issue this approach faces is how to avoid picking up very common
words--like articles ("the," "an," "a") or conjunctions ("and," "but," "of")--and
hone in on the strings of words that make a document unique.
Fingerprinting gives us a way to exclude commonly-used words, while
providing us with the ability to identify when content is poorly paraphrased.
Because Turnitin was developed for use in academic contexts, our
approach with fingerprinting is to focus on features of the text that are
clearly relevant to the content or subject matter of the document.
For example, if you're finalizing your dissertation thesis you would want to
make sure that all of the ideas you discussed were properly referenced and
cited and that sections where you paraphrased were paraphrased properly.
What gets less emphasized is strict word-to-word matches. If a more
keyword search-biased approach were used here, we'd be unable to
identify poor paraphrasing or selective word substitution--which incidentally
is the majority of what academic and educators see in student work.
If you're looking for strict word-to-word matches, you could use a search
engine (which is what everyone did before the advent of plagiarism
detection software). If you're looking at comparing one author's style to
another, there's an approach for that. As for identifying content matches in
academic-type writing, Turnitin has developed a fingerprint-based approach
that excels at finding the content that matters, when it matters. In other
words, Turnitin is designed to support students who are learning how to
use the internet to do research, use source materials, and take ownership
of their own writing and ideas.
Turnitin is an American commercial, Internet-based plagiarism detection service which is a
subsidiary of Advance.
Founded in 1997, universities and high schools typically buy licenses to use the software as a
service (SaaS) website, which checks submitted documents against its database and the
content of other websites with the aim of identifying plagiarism. Results can identify
similarities with existing sources, and can also be used in formative assessment to help
students learn to avoid plagiarism and improve their writing.
Students may be required to submit work to Turnitin as a requirement of taking a certain
course or class. The software has been a source of controversy, with some students refusing
to submit, arguing that requiring submission implies a presumption of guilt. Some critics
have alleged that use of this proprietary software violates educational privacy as well as
international intellectual-property laws, and exploits students' works for commercial purposes
by permanently storing them in Turnitin's privately held database.
Turnitin's parent company, iParadigms LLC, runs the informational website Plagiarism.org
and also offers a similar plagiarism-detection service for newspaper editors and book and
magazine publishers called iThenticate. Other tools included with the Turnitin suite are
GradeMark (online grading and feedback) and PeerMark (peer-review services). Turnitin
released the WriteCycle Suite on February 3, 2009, which bundles the Originality Checking
service with its GradeMark online grading tools and PeerMark tools. Turnitin released
Turnitin2 on September 4, 2010, dropping the "WriteCycle" nomenclature.
In March 2019, Advance acquired the company for US$1.75 billion.
PROMOTION OF
ACADEMIC INTEGRITY &
PREVENTION OF PLAGIARISM:
ENSURE ORIGINALITY
OF RESEARCH OUTPUT
Academic Performance
Indicators
ANTIPLAGIARISM SOFTWARE
1. “TURNITIN” Dr.C.P.RAMASESH
2. “iTHENTICATE” Former Librarian
3. “VIPER” University of Mysore
Cell: 9731343004
4. “URKUND”
WHY DO SCHOLARS PLAGIARISE ?
1.Lack of knowledge
2.Poor research skills
3.Poor expression
(Lack of command over
the language)
4.Laziness
5.Fear of failure
6.Lack of time for reading and understanding
7.Pressure to publish for career advancement
8.Desire to get recognition soon
9.To influence others
PLAGIARISM DETECTION METHODS:
MANUAL DETECTION :
----------------------------------------------------------------
TURNITIN: For students’ submissions
American, Rs. 380000=00 per year for
20 users, unlimited scans
iParadigms, California, USA
1. Software product from iParadigms, California, USA
2. iThenticate checks 3 million manuscripts annually
3. 15 + Million matches identified over last 18 months
4. 92 + Million offline works: Journals and Abstracts
5. 65 + Billion web pages-
6. 50 Million items of e-books and e-journal articles
7. 115000 Journals covered.
Covers Books, Journals & Conference Proceedings,
8. Doctoral theses, Internet sources & Inst. Repositories
Then it’s very likely you will see some red in your results
Common keywords and phrases may trigger in red.
If there are complete sentences that are not original, the tool will
identify the original source of plagiarized content that was copied.
Further, if you click on any red line, you can see original source
for your reference and record; allow side by side comparison.
Finally, you will be given an exact percentage that tells you how
original your article/thesis is.
URKUND
PRIO INFO CENTRE AB
SWEDEN, SWEDISH SOFTWARE
Coverage: Internet sources, Published Materials, Repositories
of students’ submissions:
Price: 100 Scans – Rs. 50000=00
REPOSITORIES COVERED FOR SCANNING:
1. Internet Resources
2. Cross Check: Conference, Seminar
Main Objectives
To create awareness
To establish institutional mechanism
To develop systems to detect plagiarism
To set up mechanism to prevent plagiarism and punish
Research
Theses
papers
Dissertat Chapters
CONTENTS in Books
ions
Any
Full-
other
fledged
similar
books
work
Source: UGC Regulations, 2018
Content not to be checked necessarily under
the guidelines of UGC
Assignme Term
nts papers
Contents
Answer not to be
Project
scripts checked reports
Course
Essays
works
Cite Sources
Source: www.plagiarism.org
Precaution
Cite Paraphrase Quoting
Turnitin
Plagiarism
iThenticate
Detect.org
Plagiarism Detection
Tools by
Subscription (Not
free)
grammarly Academic
Plagiarism
Blackboard
Plagiarism Detecting Sources
Plagiarism Tools Detecting Sources
Open Access
PlagTracker Plagiarism Detection PaperRater
Tools
Copyleaks Plagiarisma
Plagium
Introduction to Turnitin
Turnitin is a web-based plagiarism detection software provided by
Turnitin.com.
Turnitin is a tool to find and indicate the matching contents.
Turnitin’s plagiarism prevention tool generates originality reports that show
how much of a document is original, cited from other sources, or
unoriginal.
For students to identify their mistakes or weaknesses in citations so as to
improve their academic writing skills.
Compares with huge collections of e-resources available around the
world.
Turnitin is used by more than 30 million students at 15,000 institutions in 150
countries.
Turnitin Coverages
The major databases coverages of Turnitin
• Springer • Sage
• EBSCO Host • Crossref
• ProQuest • Oxford University
• Thieme Press
• Elsevier • De Gruyter
• PubMed • Peter Lang
• Medline • UCSanDiego
Sources (Electronic)
Internet sources publicly accessible
Published journals, books, proceedings, etc.
Student submission in turnitin
Internet Sources
Search
Document Upload
Publications
(Articles & Books)
Report Deliver
Student Papers
of Turnitin
Features of Turnitin
Step 1: Get a student Account Step 1: Login with student Step 1: Select the document
from “Instructor” account submitted
Repository • Institution's paper repository, this means that the assignment will
only be checked against other students' submissions within the
institution.
• Class ID
• Assignment name
• Submission ID
Next
How to use?
You'll receive an email from
noreply@turnitin.com titled
Log in to your Turnitin
Account. In this email, find
the Create Your Password
button and select it.
Proceed with instructions
given by Turnitin and
complete the “Create
Password Procedure”.
Previous Back
Account Setup
Enter your registered
email-id in the “Email
Address” box
Enter your “Last Name”
in the appropriate box, Enter your registered email-id.
Last name is available
in your Email inbox. Last name is available in your inbox.
Proceed with “Next”.
Back
Account Validation
Next
Web-link of validation in your inbox
Previous Back
Create your own password
Back
Complete the account setup
Back
Turnitin Login
Registered Email-id
Own Password
Back
Create your secret question and answer
Back
Acceptance of user agreement
Back
Home page of your account
The Student Homepage is the first page you see after logging in to Turnitin. You'll see a list of
all the classes that you are currently enrolled in. Select the name of your class to open your
assignment inbox.
Back
Paper submission
From the Assignment Inbox, select the Submit button relevant to your assignment.
Back
Paper submission
Next
Requirements for file upload
• File must be less than 40 MB
Back
Paper Submission
Previous Back
Upload confirmation
Back
Submission complete
Back
Plagiarism checking
Back
Similarity Percentage
Similarity percentage
Back
Turnitin Match Overview
Back
Turnitin – Filter and Settings
Next
Excluding Sources and Options
Student:
In Student Account, they can set exclude options like quotes, exclude
bibliography, small matches of words, and percentage of matches in the "Filter
Settings".
Instructor:
Instructor can access the student's upload document and its similarity reports.
Only Instructor can remove individual sources from the matching sources. Student
can not access this option.
Note: Excluding sources allows to remove individual sources that do not want a
document to match against. Excluding a source will adjust the Similarity Score
accordingly.
Previous Back
Download originality report
Back
Turnitin Originality Report
Back
Turnitin – Text only report
Next
Turnitin – Text only report
Previous Back
Q. When Is A Qualitative Research Methodology Appropriate?
Answer :
A qualitative research study is appropriate when you need to tap into the hearts and minds of
the customer.
A highly subjective research discipline, qualitative research is specifically designed to look
"beyond the percentages" to gain an understanding of the customer's feelings, impressions
and viewpoints. Such intuitive, highly subjective personal input can only be obtained through
qualitative research.
Strengths:
o Small samples, sharp focus: Qualitative research is laser-focused, dealing only
with smaller samples.
o Probing interviews: Expert moderators, unencumbered by the time constraints of a
quantitative survey, use a multitude of techniques during lengthy interviews to
obtain in-depth information.
o Rich responses: The interviews, which last as long as two hours, allow the
moderator to elicit extremely candid, highly complex responses.
Answer :
Fundamental Research
Fundamental research, also known as basic research or pure research does not
usually generate findings that have immediate applications in a practical level.
Fundamental research is driven by curiosity and the desire to expand knowledge in
specific research area. This type of research makes a specific contribution to the
academic body of knowledge in the research area.
Fundamental studies tend to make generalizations about the phenomenon, and the
philosophy of this type of studies can be explained as „gathering knowledge for the
sake of knowledge‟. Fundamental researches mainly aim to answer the questions of
why, what or how and they tend to contribute the pool of fundamental knowledge in
the research area.
Opposite to fundamental research is applied research that aims to solve specific
problems, thus findings of applied research do have immediate practical implications.
– A systematic study
– Defining a problem
– Formulating a Hypothesis
Objectives of Research –
Types of Research
It can be broadly categorized into two categories –
(i) Formulating the Research Problem – The researcher must choose the
problem he wants to study and decide the area of interest and subject matter he
would inquire about.
Finding about the origin of the problem and studying its objectives
(iv) Preparing the research design – The research is designed depending upon
its utility and appropriateness for a particular research problem. It involves
consideration of the following :-
The time available for research and the costs related to the research
(vi) Collecting the Data – There is a need for reliable and accurate data to carry
out an effective research. Data collection may be done by any of the following
methods:-
Observation
Interview
Telephonic Interviews
Questionnaire
Schedules
Other Methods
(ix) Hypothesis testing – After analyzing the data the researcher tests the
hypothesis formulated by him in the earlier stages.
(xi) Preparation of the research report – The layout for a research report
should be in the order:-
Preliminary Pages – The research report must contain the full title, foreword
and acknowledgement in the preliminary pages.