Biometrics in Security and Privacy: A Comprehensive Report (AI Module)
VerifiedAdded on 2025/04/16
|16
|3598
|253
AI Summary
Desklib provides past papers and solved assignments. This report analyzes the role of biometrics in enhancing security and privacy.

Role of Biometrics in enhancing security and privacy
Student ID:
Student Name:
1
Student ID:
Student Name:
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Summary..........................................................................................................................................3
Literature Review............................................................................................................................4
Review of a key paper.....................................................................................................................6
Evaluation and Outcomes................................................................................................................8
Recommendations............................................................................................................................9
Legal, Social, Ethical, Professional Issues and Academic Misconduct........................................10
Dealing with the Issues..................................................................................................................12
References......................................................................................................................................14
2
Summary..........................................................................................................................................3
Literature Review............................................................................................................................4
Review of a key paper.....................................................................................................................6
Evaluation and Outcomes................................................................................................................8
Recommendations............................................................................................................................9
Legal, Social, Ethical, Professional Issues and Academic Misconduct........................................10
Dealing with the Issues..................................................................................................................12
References......................................................................................................................................14
2

Summary
Technology and computers have been advancing in last two decades form developing large sized
super and mainframes to the palmtops and smartphones that can help you to find out information
about anything with the help of just a single click. With raising the technological advancements,
the use of passwords for security purpose is also declining and the use of biometric technologies
like facial, voices and fingerprint recognition is being considered more safe and secure. This
mode of safety, security, and identification are more effective and hard to replicate as this is
related to a single person only. This report is related to find out the security trend used by most
of the organizations to protect data and important information from unauthorized use and
leakage. A number of papers published related to the field of security by using biometrics have
been analyzed and discussed with their major findings. Along with the major findings, their
limitations have also been discussed to know the issued faced by the businesses and
organizations to maintain and implementing biometrics technologies in their day to day working.
Further, a key paper is selected which is very close this topic and contains major and important
information is reviewed and discussed which can provide a deep understanding about the topic
and the current features and limitations of biometric-related technologies. This report is
developed on the basis of secondary research and includes qualitative measures. All the
information is derived for the journal articles, conference papers, and authenticated websites. In
conducting research related to the biometric technologies and related devices, the organizations
have to face a number of legal, ethical, social and professional issues and their related
consequences. A major section of this report discusses the same of the basis of information found
from journal articles and papers. This discussion also includes the steps that can be taken to deal
with such issues and ignore the academic misconduct. The aim and objectives of this research
can be defined as follows:
Aims and Objectives
To find out the use of biometrics in enhancing security
Reviewing the key findings available related to research in this field.
Finding out the best biometric technology that can be used by the organizations to
improve the level of security and privacy on the basis of literature review.
3
Technology and computers have been advancing in last two decades form developing large sized
super and mainframes to the palmtops and smartphones that can help you to find out information
about anything with the help of just a single click. With raising the technological advancements,
the use of passwords for security purpose is also declining and the use of biometric technologies
like facial, voices and fingerprint recognition is being considered more safe and secure. This
mode of safety, security, and identification are more effective and hard to replicate as this is
related to a single person only. This report is related to find out the security trend used by most
of the organizations to protect data and important information from unauthorized use and
leakage. A number of papers published related to the field of security by using biometrics have
been analyzed and discussed with their major findings. Along with the major findings, their
limitations have also been discussed to know the issued faced by the businesses and
organizations to maintain and implementing biometrics technologies in their day to day working.
Further, a key paper is selected which is very close this topic and contains major and important
information is reviewed and discussed which can provide a deep understanding about the topic
and the current features and limitations of biometric-related technologies. This report is
developed on the basis of secondary research and includes qualitative measures. All the
information is derived for the journal articles, conference papers, and authenticated websites. In
conducting research related to the biometric technologies and related devices, the organizations
have to face a number of legal, ethical, social and professional issues and their related
consequences. A major section of this report discusses the same of the basis of information found
from journal articles and papers. This discussion also includes the steps that can be taken to deal
with such issues and ignore the academic misconduct. The aim and objectives of this research
can be defined as follows:
Aims and Objectives
To find out the use of biometrics in enhancing security
Reviewing the key findings available related to research in this field.
Finding out the best biometric technology that can be used by the organizations to
improve the level of security and privacy on the basis of literature review.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Provide recommendations for conducting future research related to the role of biometrics.
Literature Review
(Geethanjali and Thamaraiselvi, 2013) states that biometrics-based authentication systems have a
number of advantages in comparison to other methods of authentication. It has a major role in
replacing token and password based authentication. This technology plays an important role in e-
commerce, automated teller machines, passports, and online banking. There is an increasing
demand for accurate authentication and identification of users due to an increased number of
electronic transactions. The authors have also discussed the unimodal biometrics used in ATM
machines along with defining their advantages and limitations. Further, they have also discussed
multimodal biometrics and conducted a study on the basis of primary research methods. The
research concluded that multimodal biometrics can provide high-level security along with using
two-tier security. The rated of errors like False Reject Rate and False Acceptance Rate should be
decreased which can avoid numerous type of attacks in the system. The chances that can be used
by the authors to use fake biometrics is strictly evaded. One of the major limitations of this study
is that the proposed system by the authors is very expensive to develop as compared to the
existing biometric systems used in the ATM systems.
Further, a study has been conducted by (Subban and Mankame, 2013) have conducted a study on
biometric technology using fingerprint recognition. In the paper, the authors have summarized
research results carried out in the area of fingerprint matching techniques, methods of
recognition and the analysis of their performance. The summary of this study shows that
fingerprint technology having an edge in comparison to the other traits of biometric systems.
This is shown with the help of a comparison table among face, fingerprint, Iris, hand geometry,
voice and keystrokes on the basis of certain parameters like EER, FAR, and FRR. The evaluation
of performance is done on the basis of conducted surveys on existing methods and different
parameters. On the basis of results of such surveys, the authors have stated that privacy and
security issues are required to be considered. The findings of this study conclude that automatic
fingerprint recognition is the best suitable option available for fulfilling the explosive security
and requirements such as usability, security, size, privacy, form factor, and operational
temperature range.
4
Literature Review
(Geethanjali and Thamaraiselvi, 2013) states that biometrics-based authentication systems have a
number of advantages in comparison to other methods of authentication. It has a major role in
replacing token and password based authentication. This technology plays an important role in e-
commerce, automated teller machines, passports, and online banking. There is an increasing
demand for accurate authentication and identification of users due to an increased number of
electronic transactions. The authors have also discussed the unimodal biometrics used in ATM
machines along with defining their advantages and limitations. Further, they have also discussed
multimodal biometrics and conducted a study on the basis of primary research methods. The
research concluded that multimodal biometrics can provide high-level security along with using
two-tier security. The rated of errors like False Reject Rate and False Acceptance Rate should be
decreased which can avoid numerous type of attacks in the system. The chances that can be used
by the authors to use fake biometrics is strictly evaded. One of the major limitations of this study
is that the proposed system by the authors is very expensive to develop as compared to the
existing biometric systems used in the ATM systems.
Further, a study has been conducted by (Subban and Mankame, 2013) have conducted a study on
biometric technology using fingerprint recognition. In the paper, the authors have summarized
research results carried out in the area of fingerprint matching techniques, methods of
recognition and the analysis of their performance. The summary of this study shows that
fingerprint technology having an edge in comparison to the other traits of biometric systems.
This is shown with the help of a comparison table among face, fingerprint, Iris, hand geometry,
voice and keystrokes on the basis of certain parameters like EER, FAR, and FRR. The evaluation
of performance is done on the basis of conducted surveys on existing methods and different
parameters. On the basis of results of such surveys, the authors have stated that privacy and
security issues are required to be considered. The findings of this study conclude that automatic
fingerprint recognition is the best suitable option available for fulfilling the explosive security
and requirements such as usability, security, size, privacy, form factor, and operational
temperature range.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

(Tatepamulwar et al., 2019) have discussed a different type of biometric applications and their
working and usefulness in maintaining a high level of security. This research paper discussed
two main categories of biometrics named as physiological biometrics and behavioral biometrics.
Physiological metrics include fingerprints, face recognition, gesture recognition, iris recognition,
speech recognition, gait recognition, palm print recognition, handwriting recognition, and ear
shape recognition. The second type of category of biometric includes keystroke recognition,
signature recognition, and voice recognition.
In addition to this, (Tonge et al., 2013) have conducted their study on emerging trends of cyber
security along with adopting new technologies which includes cloud computing, mobile
computing, social networking, and e-commerce. The authors have also discussed the challenges
and issued faced between critical information technology infrastructure and security agencies
due to lack of coordination. The use of biometrics is considered as one of the most useful
technologies to be used for cybersecurity. Face and fingerprint recognition is a major used in
preventing cyber-attacks and thus increasing the security and privacy of data.
(Serrano et al., 2010) have conducted research in the area of current advancements in face
biometrics with the help of Gabor wavelets. The authors have stated that analytical approaches
are based on the representation of face a face with the responses received from Gabor computed
with the help of specific landmarks. Opposite to this, traditional methods are based on the
recognition of a face as a whole. The authors have major used secondary research in the paper.
However, some findings are also derived from the primary research which has been carried out
by some experiments and surveys.
(Gavrilova et al., 2016) have investigated in their research paper the methods by using which,
existing biometric research can be progressive by combining it along with social behavioral
information. The discussions have been carried out in this research report on the extraction of
biometrics and their applications in the various type of security. Some insights have also been
analyzed and discussed in the domain of multimodal biometric.
5
working and usefulness in maintaining a high level of security. This research paper discussed
two main categories of biometrics named as physiological biometrics and behavioral biometrics.
Physiological metrics include fingerprints, face recognition, gesture recognition, iris recognition,
speech recognition, gait recognition, palm print recognition, handwriting recognition, and ear
shape recognition. The second type of category of biometric includes keystroke recognition,
signature recognition, and voice recognition.
In addition to this, (Tonge et al., 2013) have conducted their study on emerging trends of cyber
security along with adopting new technologies which includes cloud computing, mobile
computing, social networking, and e-commerce. The authors have also discussed the challenges
and issued faced between critical information technology infrastructure and security agencies
due to lack of coordination. The use of biometrics is considered as one of the most useful
technologies to be used for cybersecurity. Face and fingerprint recognition is a major used in
preventing cyber-attacks and thus increasing the security and privacy of data.
(Serrano et al., 2010) have conducted research in the area of current advancements in face
biometrics with the help of Gabor wavelets. The authors have stated that analytical approaches
are based on the representation of face a face with the responses received from Gabor computed
with the help of specific landmarks. Opposite to this, traditional methods are based on the
recognition of a face as a whole. The authors have major used secondary research in the paper.
However, some findings are also derived from the primary research which has been carried out
by some experiments and surveys.
(Gavrilova et al., 2016) have investigated in their research paper the methods by using which,
existing biometric research can be progressive by combining it along with social behavioral
information. The discussions have been carried out in this research report on the extraction of
biometrics and their applications in the various type of security. Some insights have also been
analyzed and discussed in the domain of multimodal biometric.
5

Review of a key paper
The author has conducted theoretical research in this paper. There are some common approaches
in biometric recognition approaches such as iris recognition, DNA matching, face recognition,
retina recognition, finger geometry recognition, fingerprint recognition, hand geometry
recognition, signature recognition, olfactory or odor biometric, typing recognition etc. Most of
the approaches reworking in an effective manner but there are some major drawbacks and
loopholes which are required to be corrected. Some of the robust techniques are required to be
applied to such approaches to make them more protected and secure. Thus (Sharma et al, 2017)
have reviewed some methodologies in biometrics used by a majority of the institutions and firms
and also have reviewed some unknown approaches which can assist in boosting up the same.
Some of such techniques are presented in this paper includes emotion sensing, mind reading,
personality development, Vein architecture recognition in related to thumb impression.
In this paper, authors have conducted a literature review of some most important authentication
systems based on biometrics. These authentication systems play an important role in our day to
day life as well as are a major part to maintain security in the organizations and business
enterprises.
Use of biometric signal as a factor for authentication can also be beneficial. The biometric signal
can be defined as a pattern describing physiological behaviors of a person or an individual. A
biological signal is something which can never be manipulated or influenced. The process for
author authentication is a three-step process. At the first step, the user enters his/her password or
user id in the network layer to access. The second step demands the biometrics or pin number to
transfer the information to the server.
An autoregressive modeling technique is also being discussed by the author who is largely based
on the time series. An ear shape has been sued as a foundation for the implication of the AR
model. Canny Edge Detection Algorithm has been used to detect ear edge.
The author has provided this solution after considering all ethical legal, social and professional
issues related to the topic. The work of other authors has been reviewed and references
appropriately to follow the academic and professional code of conducts.
6
The author has conducted theoretical research in this paper. There are some common approaches
in biometric recognition approaches such as iris recognition, DNA matching, face recognition,
retina recognition, finger geometry recognition, fingerprint recognition, hand geometry
recognition, signature recognition, olfactory or odor biometric, typing recognition etc. Most of
the approaches reworking in an effective manner but there are some major drawbacks and
loopholes which are required to be corrected. Some of the robust techniques are required to be
applied to such approaches to make them more protected and secure. Thus (Sharma et al, 2017)
have reviewed some methodologies in biometrics used by a majority of the institutions and firms
and also have reviewed some unknown approaches which can assist in boosting up the same.
Some of such techniques are presented in this paper includes emotion sensing, mind reading,
personality development, Vein architecture recognition in related to thumb impression.
In this paper, authors have conducted a literature review of some most important authentication
systems based on biometrics. These authentication systems play an important role in our day to
day life as well as are a major part to maintain security in the organizations and business
enterprises.
Use of biometric signal as a factor for authentication can also be beneficial. The biometric signal
can be defined as a pattern describing physiological behaviors of a person or an individual. A
biological signal is something which can never be manipulated or influenced. The process for
author authentication is a three-step process. At the first step, the user enters his/her password or
user id in the network layer to access. The second step demands the biometrics or pin number to
transfer the information to the server.
An autoregressive modeling technique is also being discussed by the author who is largely based
on the time series. An ear shape has been sued as a foundation for the implication of the AR
model. Canny Edge Detection Algorithm has been used to detect ear edge.
The author has provided this solution after considering all ethical legal, social and professional
issues related to the topic. The work of other authors has been reviewed and references
appropriately to follow the academic and professional code of conducts.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The findings of this article suggest that fingerprints are the most popular biometric traits due to
less complexity and cost-effectiveness. However, there is a need to counterfeit some more
measures to increase security.
7
less complexity and cost-effectiveness. However, there is a need to counterfeit some more
measures to increase security.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Evaluation and Outcomes
On the basis of the above research, following evaluations and outcomes can be framed:
The findings of the researcher are justified as these are based on the primary as well as
secondary research after appropriate evaluation and analysis.
The author has used Canny Edge Detection Algorithm to find out the ear edge and
provided recommendations on the basis of results. The author has advised that fingerprint
is the most relevant, cheaper and secure biometrics system which is linked to the findings
and the objectives set by the author.
Outcome Findings
Positive: This paper is developed on the basis of secondary research and thus any new
technology or system has not been proposed. It is prepared for analyzing the role and importance
of biometrics in security and privacy and to review the current literature available. Therefore,
detained research should be done on the basis of analyzing each and every biometric technology.
The primary research is necessary for proposing the best suitable technology. Interviews,
questionnaires, and surveys are required to be conducted to increase the accuracy of the results.
Negative: This paper is lacking behind in proposing any new idea or system process related to
biometrics and thus results cannot be justified on the basis or practical implication and
evaluation.
Inconclusive: To find the most appropriate biometric technology can be difficult and cannot be
justified for every type of business organization and enterprise.
There can be ethical issues related to using the information provided by the participants and the
information presented y researchers. To deal with these issues, the ethical code of conducts and
practices are required to be followed by the researchers.
8
On the basis of the above research, following evaluations and outcomes can be framed:
The findings of the researcher are justified as these are based on the primary as well as
secondary research after appropriate evaluation and analysis.
The author has used Canny Edge Detection Algorithm to find out the ear edge and
provided recommendations on the basis of results. The author has advised that fingerprint
is the most relevant, cheaper and secure biometrics system which is linked to the findings
and the objectives set by the author.
Outcome Findings
Positive: This paper is developed on the basis of secondary research and thus any new
technology or system has not been proposed. It is prepared for analyzing the role and importance
of biometrics in security and privacy and to review the current literature available. Therefore,
detained research should be done on the basis of analyzing each and every biometric technology.
The primary research is necessary for proposing the best suitable technology. Interviews,
questionnaires, and surveys are required to be conducted to increase the accuracy of the results.
Negative: This paper is lacking behind in proposing any new idea or system process related to
biometrics and thus results cannot be justified on the basis or practical implication and
evaluation.
Inconclusive: To find the most appropriate biometric technology can be difficult and cannot be
justified for every type of business organization and enterprise.
There can be ethical issues related to using the information provided by the participants and the
information presented y researchers. To deal with these issues, the ethical code of conducts and
practices are required to be followed by the researchers.
8

Recommendations
On the basis of above discussion, it can be recommended that instead of analyzing the
common traits of the biometrics devices, the traits which are not yet known to the society
and the organizations are required to be researched and analyzed along with their features
and limitations.
The reason behind such recommendation is that the common traits like fingerprint and
face recognition are known to all and there are some alternative techniques are available
which are easy cheap and safer in while used for the identification of an individual.
Investigating such type of technologies would be interesting as well as new sources and
knowledge and research would be identified.
There are chances of arising new legal, ethical, professional and social issues as every
research is conducted with certain objectives. The research in the field of the role of
biometrics would contain primary as well as secondary research which would need a
collection of and analyzing of which may create professional and ethical issues.
There would be more material available and more information would be collected which
can help the biometrics research filed in a positive manner. The research questions and
queries would be generated which would help in enhancing the knowledge in analyzing
the role of biometrics in increasing security.
The future investigation can impact the business organization in adopting new
technologies and system which are more secure and easy to use, The organizations may
able to analyze, evaluate and compare the different type of biometrics system for making
an investment for the security of their data, information and important material.
9
On the basis of above discussion, it can be recommended that instead of analyzing the
common traits of the biometrics devices, the traits which are not yet known to the society
and the organizations are required to be researched and analyzed along with their features
and limitations.
The reason behind such recommendation is that the common traits like fingerprint and
face recognition are known to all and there are some alternative techniques are available
which are easy cheap and safer in while used for the identification of an individual.
Investigating such type of technologies would be interesting as well as new sources and
knowledge and research would be identified.
There are chances of arising new legal, ethical, professional and social issues as every
research is conducted with certain objectives. The research in the field of the role of
biometrics would contain primary as well as secondary research which would need a
collection of and analyzing of which may create professional and ethical issues.
There would be more material available and more information would be collected which
can help the biometrics research filed in a positive manner. The research questions and
queries would be generated which would help in enhancing the knowledge in analyzing
the role of biometrics in increasing security.
The future investigation can impact the business organization in adopting new
technologies and system which are more secure and easy to use, The organizations may
able to analyze, evaluate and compare the different type of biometrics system for making
an investment for the security of their data, information and important material.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Legal, Social, Ethical, Professional Issues, and Academic Misconduct
Any type of research is subject to ethical, social, legal and professional issues either it is based
on technology, human or animal material. Thus, it is required to fulfill all requirements with the
help of appropriate applications of methods and strategies.
Legal issues
While conducting research in any filed, some legal factors are always required to be considered
and if they are not considered then it becomes a major issue for the researcher and can create
consequences.
The lay may affect the whole process of carrying out a research project. The copyright and patent
act, data protection, human right acts, the equality acts, health and safety act and laws related to
technological advancements can affect this research paper in a potential manner. The areas which
are likely to be affected include the information storage process collected from the secondary
research. The most important issues that can impact this research is the application and comply
with the copyright and patent act.
Along with this, any type of misuse of the information collected during the research can also
create big issues for this research. If the individuals and organizations do not share information
paper then they should not be influenced in any way. It may also affect the quality of information
provided by them (Harriss and Atkinson, 2015).
Social issues
This research may need to coordination and cooperation from the society as well as outside
organizations using biometric devices. The issues can be faced in collecting data and the
responses were given by different organizations. Some of the organizations and authority may
feel uncomfortable to share the accurate data of successful implantation of the biometric
technology. The main reason behind this is the loss of privacy measures that are adopted by the
organizations. Along with this, the issues can also be created if research is carried out on a
particular community or organization using this technology. It can be presented in such a manner
that if the researcher is criticizing the other communities which is a big social issue.
10
Any type of research is subject to ethical, social, legal and professional issues either it is based
on technology, human or animal material. Thus, it is required to fulfill all requirements with the
help of appropriate applications of methods and strategies.
Legal issues
While conducting research in any filed, some legal factors are always required to be considered
and if they are not considered then it becomes a major issue for the researcher and can create
consequences.
The lay may affect the whole process of carrying out a research project. The copyright and patent
act, data protection, human right acts, the equality acts, health and safety act and laws related to
technological advancements can affect this research paper in a potential manner. The areas which
are likely to be affected include the information storage process collected from the secondary
research. The most important issues that can impact this research is the application and comply
with the copyright and patent act.
Along with this, any type of misuse of the information collected during the research can also
create big issues for this research. If the individuals and organizations do not share information
paper then they should not be influenced in any way. It may also affect the quality of information
provided by them (Harriss and Atkinson, 2015).
Social issues
This research may need to coordination and cooperation from the society as well as outside
organizations using biometric devices. The issues can be faced in collecting data and the
responses were given by different organizations. Some of the organizations and authority may
feel uncomfortable to share the accurate data of successful implantation of the biometric
technology. The main reason behind this is the loss of privacy measures that are adopted by the
organizations. Along with this, the issues can also be created if research is carried out on a
particular community or organization using this technology. It can be presented in such a manner
that if the researcher is criticizing the other communities which is a big social issue.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Ethical issues
Study design and approval: If the study design does not get approved form the concerned ethics
committee, it may result in creating issues after completion of the entire work.
Data Analysis: It is the first and most important duty of the researcher to analyze the data using
accurate and appropriate techniques. Since this research is based on the secondary methods,
analysis of the collected information is required to provide a significant result of the research.
Authorship: the substantial contribution is required to be made to the intellectual content,
containing designing and conceptualizing the study, interpreting, acquiring and analyzing the
information.
Conflict of Interest: This issue is related to the issue of the researchers which may result in
influencing the judgments of the final material published. Such conflicts can occur in the areas of
commercial, personal, academic, financial or funding. Further financial interests include research
funding, employment, payment for travel and lecture, stock ownership, company support
payment and payments made to consultancies.
Professional Issues
Maintaining the confidentiality of the information and data collected can be resulted in creating
major u issues when it is not taken seriously. The records should be accessible by only the
authenticated person and the details of the research and related guidelines should not be shared
with anyone.
Academic Misconduct
Misconduct in carrying out research in the academic field includes falsification, fabrication and
deception or plagiarism in framing the results. It also includes reporting influenced results of the
research, negligent or dangerous deviations from the appropriate and accurate practices in the
process of research (Ali et al., 2017).
Plagiarism: The copy of the text, data, and ideas or any other work deliberately without granting
acknowledgment and permission.
11
Study design and approval: If the study design does not get approved form the concerned ethics
committee, it may result in creating issues after completion of the entire work.
Data Analysis: It is the first and most important duty of the researcher to analyze the data using
accurate and appropriate techniques. Since this research is based on the secondary methods,
analysis of the collected information is required to provide a significant result of the research.
Authorship: the substantial contribution is required to be made to the intellectual content,
containing designing and conceptualizing the study, interpreting, acquiring and analyzing the
information.
Conflict of Interest: This issue is related to the issue of the researchers which may result in
influencing the judgments of the final material published. Such conflicts can occur in the areas of
commercial, personal, academic, financial or funding. Further financial interests include research
funding, employment, payment for travel and lecture, stock ownership, company support
payment and payments made to consultancies.
Professional Issues
Maintaining the confidentiality of the information and data collected can be resulted in creating
major u issues when it is not taken seriously. The records should be accessible by only the
authenticated person and the details of the research and related guidelines should not be shared
with anyone.
Academic Misconduct
Misconduct in carrying out research in the academic field includes falsification, fabrication and
deception or plagiarism in framing the results. It also includes reporting influenced results of the
research, negligent or dangerous deviations from the appropriate and accurate practices in the
process of research (Ali et al., 2017).
Plagiarism: The copy of the text, data, and ideas or any other work deliberately without granting
acknowledgment and permission.
11

Piracy: The exploitation of the other's ideas in the absence of proper and appropriate
acknowledgment.
Abusing to resources of research: It is related to the failure in observing the legal norms related
to the moral rights of the authors and copyright.
Abusing to intellectual property rights: It is related to a failure in observing and following legal
norms related to copyright and the moral privileges of the authors.
Misinterpretation: This act can be defined as an attempt to present the ideas unfairly or falsely
of using the work of others without using their identity, whether it is done for personal
enhancement or gain.
Fraud and Fabrication: The intervention and falsification of data, qualifications, citations or
information in writing the information especially while conducting a literature review.
12
acknowledgment.
Abusing to resources of research: It is related to the failure in observing the legal norms related
to the moral rights of the authors and copyright.
Abusing to intellectual property rights: It is related to a failure in observing and following legal
norms related to copyright and the moral privileges of the authors.
Misinterpretation: This act can be defined as an attempt to present the ideas unfairly or falsely
of using the work of others without using their identity, whether it is done for personal
enhancement or gain.
Fraud and Fabrication: The intervention and falsification of data, qualifications, citations or
information in writing the information especially while conducting a literature review.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.