Graduate Catalog

Other Forms of Academic Dishonesty

Cheating

Using or attempting to use unauthorized materials and/or assistance in any academic assignment, exercise, examination, project, presentation, report, etc. This includes the possession of a mobile phone or any other unauthorized electronic devices during a test or an examination.

Collusion

Collusion includes cooperation of student(s) with faculty or staff personnel in securing confidential information/material (tests, examinations, etc.); bribery by student(s) to change examination grades and/or grade point average(s); cooperative efforts by student(s) and student assistant(s) to gain access to examinations or answers to examinations for distribution; seeking, obtaining, possessing, or giving to another person an examination or portions of an examination (not yet given), without permission of the instructor.

Fabrication of Data

Falsifying or inventing research, citations, or any information on any academic assignment, exercise, examination, project, presentation, report, etc.

Falsifying Signatures

Forging monograms, imprimaturs and other forms of authorization or identification – whether handwritten, electronic or otherwise – on official forms or documents, attendance lists or any academic assignment, exercise, examination, project, presentation, report, etc.

Falsification of Results

This means the alteration, modification, or misrepresentation of results (including selective inclusion or exclusion of results).

Recycling

Recycling is the submission of one’s previous work to count as new work. For example, submission of a student’s work that has previously counted in another unit of study is not allowed, unless explicitly authorized by the faculty members of both study units. In such case, students must reference their previous work.

Sabotage

Destruction of, or deliberate inhibition of, the progress of another student’s work related to a course is considered sabotage and is viewed as academically dishonest. This includes the destruction or hiding of shared resources such as library materials and computer software and hardware to tampering with another person’s laboratory experiments.