According to the U.S. Federal Research Misconduct Policy, fabrication involves:
Making up data or results and recording or reporting them.
Which
... [Show More] of the following is most likely to be considered plagiarism?
Using materials from a source without proper citation.
Which of the following is the most effective strategy for preventing research misconduct?
Good mentoring
Which of the following is true regarding the U.S. Federal Research Misconduct Policy?
To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly.
Which type of research misconduct most likely occurred if someone intentionally removes data points on a graph in order to generate a deceptive conclusion?
Falsification
According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?
Good mentoring
In response to a research misconduct allegation, what is the next main phase that takes place after the inquiry if there is sufficient evidence to proceed?
An investigation
According to the U.S. Federal Research Misconduct Policy, falsification involves:
Manipulating research materials, equipment, or processes, or changing or omitting data.
What is the primary responsibility of oversight bodies such as an IRB or an IACUC?
To detect compliance with regulatory requirements, including those relating to protecting research subjects.
What are the three main goals of data lifecycle management?
Confidentiality, availability, and integrity
In the research context, the term validity most commonly refers to:
Whether operationalized concepts actually measure what they purport to measure.
Which of the following statements is true concerning data selection?
Establishing a data selection strategy prior to collecting data decreases the chance of a biased outcome.
Which of following is most likely to own the data resulting from a research project?
The institution where a federally-funded project takes place.
Which of the following is true regarding data sharing and stewardship?
Agencies that fund research may include data sharing requirements in their funding contracts.
Which of the following most accurately describes the practice of ghost authorship?
It is a situation where the individual who wrote the manuscript is not listed as an author.
Which of the following is a responsibility of each author?
Confirming that data have been accurately presented.
Which of the following is an example of plagiarism?
Presenting someone else's ideas or words and claiming them as one's own.
Which of the following is true regarding an acknowledgments section?
The contributions of students and technicians are often listed in the acknowledgments section if they do not meet all of the criteria for authorship.
Which of the following is true regarding publishing the same content in multiple papers?
Using the same content in multiple papers is deceptive if it is not properly disclosed.
Which author is normally responsible for sharing reprints of a publication with readers?
The corresponding author.
Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?
Individuals who do not meet the criteria for authorship but who have made a noteworthy contribution are normally listed in the acknowledgments section.
Which of the following is the primary criterion for authorship?
Having made a significant intellectual contribution to the work.
Which of the following statements is true regarding authorship practices?
Different disciplines have different practices about who should be included as an author.
Which of the following statements most accurately describes the review process for grant proposals?
Funding agencies usually have committees, often with external reviewers, that assess the quality of the proposal.
A reviewer's main responsibility is to:
Be professional and prompt. [Show Less]