Source: G. Stylianou - Writing for Computer Science, Justin Zobel Ethics.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

Doug Elliott Professor, Critical Care Nursing The final step: Presentation and publication Research Workshop: Conducting research in a clinical setting.
How to Review a Paper How to Get your Work Published
Welcome to the IEEE IPR Office Plagiarism Tutorial Click to begin.
HOW TO WRITE AN ACADEMIC PAPER
Submission Process. Overview Preparing for submission The submission process The review process.
Ethical principles at a University Patrice Koehl Computer Science, UC Davis Sources: Phil Rogaway, UC Davis Dave Touretsky, CMU.
WRITING RESEARCH PAPERS Puvaneswary Murugaiah. INTRODUCTION TO WRITING PAPERS Conducting research is academic activity Research must be original work.
Writing an original research paper Part one: Important considerations
RESPONSIBLE AUTHORSHIP Office for Research Protections The Pennsylvania State University Adapted from Scientific Integrity: An Internet-based course in.
Identifying research questions
Copyright © Allyn & Bacon (2007) APA Publication Style Graziano and Raulin Research Methods: Appendix B This multimedia product and its contents are protected.
The material was supported by an educational grant from Ferring How to Write a Scientific Article Nikolaos P. Polyzos M.D. PhD.
Scientific Research Dr. Noura Al-dayan.
Presenting your thesis as a series of papers – to do or not to do.... Dr Sato Juniper Manager, Graduate Research and Scholarships.
Responsible Conduct of Research, Scholarship, and Creative Activities Peer Review Responsible Conduct of Research, Scholarship, and Creative Activities.
Reporting results: APA style Psych 231: Research Methods in Psychology.
Grant Proposal Preparation Topic Hypotheses Subject Organization Evaluation Searching for articles.
Experimental Psychology PSY 433
Publishing Research Papers Charles E. Dunlap, Ph.D. U.S. Civilian Research & Development Foundation Arlington, Virginia
Research Methods for Computer Science CSCI 6620 Spring 2014 Dr. Pettey CSCI 6620 Spring 2014 Dr. Pettey.
Advanced Research Methodology
Publishing Research Outcomes Bruce Gnade, Ph.D. University of Texas Touradj Solouki, Ph.D. Baylor University.
Writing Research Papers. Research papers are often required of students in high school and in higher education.
Schechner Ethics and Design Ethics1 פרק 5 : אתיקה בהנדסה 5.1הקוד האתי של IEEE 25.הקוד.
IMSS005 Computer Science Seminar
“Knowing Revisited” And that’s how we can move toward really knowing something: Richard Feynman on the Scientific Method.
Week 1: Find resources, Summarize, paraphrase, thesis, and outline Week 2: Research and Write, incorporate evidence and transitions (1/2 done) Week 3:
How to write an article Dr. Zahra Abdulqader Amin
INFO4990 IT Research Methods Lecture on Research Ethics (Alan Fekete, based in part on slides by Judy Kay)
Title of presentation umanitoba.ca Research Ethics at the U of M Academic Integrity at the University of Manitoba Human Ethics Animal Ethics.
What is it? How do I avoid it?
How to Write Defne Apul and Jill Shalabi. Papers Summarized Johnson, T.M Tips on how to write a paper. J Am Acad Dermatol 59:6, Lee,
Software Engineering Experimentation Rules for Reviewing Papers Jeff Offutt See my editorials 17(3) and 17(4) in STVR
Being an Effective Peer Reviewer Barbara Gastel, MD, MPH Texas A&M University
Research Misconduct Adapted with permission from Virginia Tech University Office of the Vice-President for Research.
Qatar Health and Wellnesswww.qatar.ucalgary.caEnriching Qatar Health and Wellness Plagiarism Prevention UCQ Learning Commons.
Chapter 3 Research in Psychology: An Ethical Enterprise.
Scholarly Publication: Responsibilities for Authors and Reviewers Jean H. Shin, Ph.D. Director, Minority Affairs Program American Sociological Association.
Publication Ethics R.Raveendran Chief Editor, Journal of Pharmacology & Pharmacotherapeutics.
Ethics.
CITATION vs. PLAGIARISM INTRODUCTION Citation is the act of identifying sources. There are two types of citation.  Citation as a note or reference  Citation.
Authorship, peer review and conflicts of interest.
Ethics and Scientific Writing. Ethical Considerations Ethics more important than legal considerations Your name and integrity are all that you have!
Page 1 Plagiarism Concerns in IAS Manuscript Submissions March 2014
Ethics and Plagiarism AAHEP8 -- Amsterdam 2015 Erick Weinberg -- APS.
Ethical Conduct of Research for New Faculty, Post-Docs and Graduate Students Brief Overview.
In the name of Allah. Scientific & Technical Presentation Leila Sharif Sharif University of Technology
Of 20 Responsible Authorship Responsible Conduct of Research Seminar George Mason University 2016 Jeff Offutt Professor of Software Engineering, VSE
Writing Technical Reports in Science Writing in Science Writing in Science.
Copyright c 2001 The McGraw-Hill Companies, Inc.1 Chapter 5 Research Ethics All researchers, even students, have a responsibility to conduct ethical research.
A POCKET GUIDE TO PUBLIC SPEAKING 4 TH EDITION Chapter 4 Ethical Public Speaking.
Plagiarism Miss H. 2008/2009. The entire content of this presentation comes from TurnItIn.com Turnitin allows free distribution and non-profit use of.
Sept 17, 2007C.Watters 1 Reviewing Published Articles.
A POCKET GUIDE TO PUBLIC SPEAKING 5 TH EDITION Chapter 4 Ethical Public Speaking.
Dr.V.Jaiganesh Professor
PUBLICATION PRINCIPLES for PUBLICATION PROFESSIONALS
AF1: Thinking Scientifically
Parts of an Academic Paper
Chapter 5 Research Ethics
Critically Reviewing the Literature
A POCKET GUIDE TO PUBLIC SPEAKING 4TH EDITION Chapter 4
HOW TO WRITE A SYSTEMATIC/NARRATIVE REVIEW
Experimental Psychology PSY 433
A POCKET GUIDE TO PUBLIC SPEAKING 5TH EDITION Chapter 4
What the Editors want to see!
Welcome to the IEEE IPR Office Plagiarism Tutorial
Welcome to the IEEE IPR Office Plagiarism Tutorial
Welcome to the IEEE IPR Office Plagiarism Tutorial
MANUSCRIPT WRITING TIPS, TRICKS, & INFORMATION Madison Hedrick, MA
Presentation transcript:

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Ethics

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Introduction Science is built on trust Researchers (Scientists) are expected to be honest The major societies of science have codes of conduct that scientists are expected to adhere to – – Even senior academics have been sacked for offences committed many years earlier

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Plagiarism Example – plagiarism.htmlhttp:// plagiarism.html Definition –The re-use in one-paper of material that has appeared in another, without appropriate acknowledgement. –It may involve ideas, illustrations, results, text or even whole papers.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Plagiarism Suppose you found a nice illustration in a book and want to use it in a paper –Copying it is plagiarism Suppose you found a paragraph in a reference you feel you cannot improve –Using it is plagiarism –Even close paraphrase is plagiarism

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Example Suppose Barlman and Trey (2001) wrote –The impact of viruses has become a major issue in many large organizations, but most still rely on individual users maintaining virus definitions, with no internal firewalls to protect one user from another. However, any structure is only as strong as its weakest link; these organizations are highly vulnerable.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Example (cont.) [You wrote] –Viruses have become a major issue in many large organizations, but most still rely on individual users maintaining virus definitions, with no internal firewalls to protect one user from another. However, any structure is only as strong as its weakest link; these organizations are highly vulnerable. (Barlman and Trey 2001) It’s plagiarism. You provide a citation but it is not clear that it refers to the whole block of text Also, the wording has been copied

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Example (cont.) As discussed by Barlman and Trey (2001), who investigated the impact of viruses in large organizations, “most still rely on individual users maintaining virus definitions, with no internal firewalls to protect one user from another. However, any structure is only as strong as its weakest link; these organizations are highly vulnerable.” [CORRECT CITATION] Barlman and Trey (2001) investigated the impact of viruses in large organizations. They found that organizations are vulnerable if individuals fail to keep virus definitions up to date, as internal firewalls are rare. [CORRECT CITATION]

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Self-Plagiarism If you re-use your own text you are plagiarizing. Using the same text twice means you try to publish the same work twice. –There are rules for every conference for the work to be original Many think it’s acceptable to re-use the same background material in another paper.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Self-Plagiarism Arguments against: –If you are habit is copying the background in each paper, the material is likely to rapidly become stale –A high quality discussion of background, makes it easier for the paper to be published Publication of more than one paper based on the same results is prohibited Even if you publish like that, you create permanent records. Sooner or later you will be discovered.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Misrepresentation This is when a paper does not accurately reflect the outcomes that were observed or the contribution of previous research. When presenting results you are expected –to ensure they are accurate, –to describe any issues or limitations, –provide enough detail for reproduction or verification, –be fair in description of other work, –report negative and positive results, –ensure the statements are complete and accurate.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Authorship Deciding who has merited authorship of a paper can be a difficult and emotional issue A broadly accepted view is that each author must have made some significant contribution to the intellectual content of the paper So directed activities such as programming do not merit authorship, nor does proof-reading But participation in the conception, execution, or interpretation of the results up to some degree merit authorship.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Confidentiality and Conflict of Interest You need to respect each other’s privacy Access to somebody else’s data doesn’t mean you are allowed to use it or disclose these results to other people You must disclose your commercial relationships that may affect a paper When refereeing papers or grant proposals you must reveal any conflicts of interest Examples: papers by a recent advisor, student or co-author of the referee, paper replicating your current work, etc. In any case contact the editor ASAP.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Confidentiality and Conflict of Interest Also, papers are submitted in confidence and are not in the public domain. –You are liable if research is released. Papers you are reviewing should not be shown to colleagues, except as part of the review process.

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Ethics Checklist Is all text yours? Are you the copyright holder for all figures and illustrations? Have any authors been listed without their knowledge? Have other potential authors been omitted? Do they know the publication is proceeding without them? Is any of the material confidential? Was clearance obtained for any human studies? Is the scope of citation and attribution clear? Is there a clear distinction between new work and previous knowledge? Has other work with similar results been appropriately cited and discussed?

Source: G. Stylianou - Writing for Computer Science, Justin Zobel Ethics Checklist If any material is shared with another paper, has the sharing been explained to the reader? Has it been explained to the editor? Does the paper include material recycled from your earlier work? Are other papers accurately described? Do you know which version of the code was used to run the experiments? Could you run the experiments again and get the same outcome? Are there any weaknesses or limitations in the experiments that need to be described? Would you be prepared to show other researchers the raw experimental materials? Are any claims overstated?