The Chinese University of Hong Kong places very high importance on honesty in academic work submitted by students, and adopts a policy of zero tolerance on academic dishonesty. While "academic dishonesty" is the overall name, there are several sub-categories as follows:

  1. Plagiarism
  2. Undeclared multiple submissions
  3. Employing or using services provided by a third party to undertake ones’ submitted work, or providing services as a third party
  4. Distribution/ Sharing/ Copying of teaching materials without the consent of the course teachers to gain unfair academic advantage in the courses
  5. Violating rules 15 or 16 of the University's Examination Rules (Annex 1) or rule 9 or 10 of the University's Online Examination Rules (Annex 2)
  6. Cheating in tests and examinations (including violation of rules 17 or 18 of the University’s Examination Rules or rule 11, 12, 13, 14 or 16 of the University's Online Examination Rules)
  7. Impersonation fraud in tests and examinations (including violation of rule 19 of the University's Examination Rules or rule 15 of the University's Online Examination Rules)
  8. All other acts of academic dishonesty

Last updated in July 2025

Print full pdf version

1. What is plagiarism

Plagiarism is the act of using the work of others (in particular the writing of others) as one's own.

The most obvious and substantial type of plagiarism is copying whole articles, sections, paragraphs or whole sentences from other publications without acknowledgement. This is clearly unacceptable.

However, even the use of a few words or paraphrasing (without actually copying any words at all) may constitute plagiarism if the source is not acknowledged. Students sometimes unintentionally plagiarize because they are not aware of the very stringent rules that apply. Students must read the guidelines provided.

If material is taken from a source, there shall be proper quotes and acknowledgements. For reference styles, see the examples provided.

2. Proper use of source material

In academic writing, including open-book assessment, all types of source materials, including online resources, such as websites, electronic journals or articles in an online newspaper, must be properly acknowledged. All cases of failure to acknowledge, especially where there appears to be the intention to mislead the reader about the originality, would constitute plagiarism.

  • This section illustrates and explains cases for which source material must be acknowledged. For the moment do not worry about the citation style. The examples in this section are drawn from different disciplines, and therefore adopt various styles.
  • The next section explains how the acknowledgement can be presented.

A simple account is given here, and more detailed guidelines and examples are given in Appendix A and Appendix B.

For other reference styles see the next section.

Here we give examples of what must be acknowledged. In general, there shall be three elements to a citation or acknowledgement.

  1. Setting the relevant text apart by quotation marks, or in some cases by using a separate indented paragraph. (This is not needed if the text is not a verbatim quote but a paraphrase.)
  2. A reference to the original source. For the moment, this will be indicated by a numeral such as [1], which indicates that the source is to be given in the reference list. Other styles of citation are of course allowed. Please refer to Appendix B for citations from online resources.
  3. A bibliography, giving the list of references. This is usually given at the end of the article/paper, but may sometimes be given at the end of each page.

It is important to note that just (3) alone is NOT enough. In other words, just listing the source in the bibliography is no defence against a charge of plagiarism. The reason is that inclusion in the bibliography only means that the item was consulted; it does not indicate that the item was copied or used verbatim.

  • A direct quote must be acknowledged.
  • Karl Marx said "Religion is the opiate of the masses." [1]

  • Even a paraphrase must be acknowledged.
  • Religion has been likened to opium [1]

  • A citation should be given for any information that is not obvious (i.e., that the author probably had to look up)
  • The population of Hong Kong in 2003 was 6.78 million [1] and the per capita GDP was US$25,432 [2]

  • But if the information is generic and can be expected to be known to the readers, then no citation is necessary.
  • The population of Hong Kong was nearly 7 million and the per capita GDP is one of the highest in Asia.

  • However, precision is generally recommended in academic writing.
  • In the same way, original work that is not universally known should be cited.
  • Semiconductor triodes were invented by Bardeen [1] .

  • But if the fact is very well known, then there is no need to cite the source – nobody would imagine that you claim originality.
  • Nuclear energy is based on the formula E = mc².

  • Suppose an original source A is quoted in B, and you only read B. Then both the primary source A and the secondary source B should be cited, to indicate honestly that you have not actually read A. In so doing, you also absolve yourself of any responsibility for the accuracy of the quote by B.
  • The GDP of Guangdong increased at 10.2% per annum [1] .

    1. The Government of Guangdong, Guangdong Provincial Government Annual Report 2000 (Guangdong Government Press, Guangzhou, 2001), cited in A Chan, Economic Development in China (Chinese University Press, Hong Kong, 2003).

  • The same holds for sources for which you relied on a translation, or for which the reader might have to rely on a translation. In the following example, JETP(Journal of Experimental and Theoretical Physics) is the English translation of the Russian journal Zh. Eksp. Teor. Fiz.
  • The correction involves a regularized integral [1] .

    1. Ya B Zeldovich, Zh. Eksp. Teor. Fiz. 39, 776 (1960) [Sov. Phys. JETP 12, 542 (1961)].

3. Citation styles

There are two levels in acknowledging source material.

  • The last section explained cases for which source material must be acknowledged.
  • This section explains how an acknowledgement can be presented.
3-1. Numbered references

A number is given sequentially in the text, and the reference is given at the end. Some examples are given below. The styles differ slightly across disciplines, and are therefore mixed in the examples below; students should consult their departments or refer to the discipline-specific websites for advice.

he laws of motion were first given by Newton [1], while the extension to high speeds was first proposed by Einstein [2].

  1. I Newton, Philosophiae Naturalis Principia Mathematica, 1st ed. (Streater, London 1687); see also the modern English translation, A Motte (later revised by A Cajori), Sir Isaac Newton's Mathematical Principles of Natural Philosophy (Univ of California Press, Berkeley and Los Angeles, 1934; paperback 1962).
  2. A Einstein, Ann. Phys. (Germany), 17, 891-921 (1905).

One of the most widely used collections of canned programs is the Statistical Package for the Social Sciences (SPSS) [1].

  1. Nie, N.H., Hull, C.H., Jenkins, J.G., Steinbrenner, K., & Bent, D.H. Statistical Package for the Social Sciences (2nd ed.). New York: McGraw-Hill, 1975.

Social members experience various modes of control exerted over them. According to Berger, "Where human beings live or work in compact groups, in which they are personally known and to which they are tied by feeling of personal loyalty (the kind that sociologists call primary groups), very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the actual or potential deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium" [1].

  1. P Berger. Invitation to Sociology (London: Penguin, 1991), p 87.

「在西洋社會裏,國家社會這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,..... 在我們傳統裏群的極限是模糊不清的‘天下'..... 界線從來就是不清不楚的,..... 所以可以著手的,具體的只有己 .....」[1]

  1. 費孝通。《鄉土中國》(香港:三聯。1986), 第28 頁。

Main variations

Different styles and formats for referencing have been adopted by different publishers and learned societies; they are all correct, but be sure to stick to single convention in any piece of writing. Also, consult the main journals in your field or your department's guidelines and follow the mainstream conventions.

  • The reference number can be given in square or round brackets, or as a superscript with or without brackets, e.g.,

    The laws of motion were first given by Newton [1].
    The laws of motion were first given by Newton (1).
    The laws of motion were first given by Newton1.
    The laws of motion were first given by Newton(1).

  • The reference number can also be given before or after the punctuation.

    The laws of motion were first given by Newton [1].
    The laws of motion were first given by Newton. [1]

  • The list of references may be provided either at the end of each page (footnotes) or at the end of the paper (endnotes).
  • The name of the author may be cited as "I Newton", "I. Newton", "Newton, I" or "Newton, I." etc.
  • The names of books and/or journals may be shown in italics.
  • In the citation of journal articles, (a) sometimes only the volume is cited, sometimes both the volume and issue number are cited; (b) either the beginning page number is given, or both the beginning and ending page numbers are given; (c) the volume and number, page number and year may be cited in different orders, and the volume number in particular may be shown in italics, bold face or underlined; (d) the title of the journal article may or may not be included.
  • For books, the publisher, place of publication and year may be shown in different orders.

Comments

The main difficulty with this style is that numbering is completely disrupted whenever a reference is added or removed. As word processing software usually can handle such numbering automatically, the style is increasingly used.

3-2. Harvard style

Numbers are not used. Instead references are cited and ordered by the name of the author and the year of publication. Examples:

The laws of motion were first given by a long time ago (Newton, 1687), while the extension to high speeds was first proposed by Einstein (1905).

Einstein, A (1905). Ann. Phys. (Germany), 17, 891-921.
Newton, I (1687). Philosophiae Naturalis Principia Mathematica, 1st ed. (Streater, London); see also the modern English translation, A Motte (later revised by A Cajori), Sir Isaac Newton's Mathematical Principles of Natural Philosophy (Univ of California Press, Berkeley and Los Angeles, 1934; paperback 1962).

In this example note that "Einstein" is part of the sentence, so the name is not repeated inside the brackets.

Social members experience various modes of control exerted over them. According to Berger, "Where human beings live or work in compact groups, in which they are personally known and to which they are tied by feeling of personal loyalty (the kind that sociologists call primary groups), very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the actual or potential deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium" (Berger 1991:87).

Berger, Peter (1991). Invitation to Sociology. London: Penguin

在西洋社會裏,國家社會這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,..... 在我們傳統裏群的極限是模糊不清的‘天下’..... 界線從來就是不清不楚的,..... 所以可以著手的,具體的只有己 .....」(費孝通 1986:28)

費孝通。(1986)。《鄉土中國》。香港:三聯。

Comments

  • Sometimes the page number is given immediately when the source is cited; see the second and third examples above.
  • The list of references is placed at the end of the article (endnote) and not at the end of each page.
  • The list of references is ordered by the name of the (first) author, with family name written first; the year of publication always comes next.
  • Usually a hanging format is adopted, so that the name of the (first) author stands out.
  • If the name of the author already occurs in the text, then it is not repeated in the bracket; see the reference to Einstein in the above example.
  • A publication by several co-authors is cited as, e.g.,

    Nucleosynthesis was studied more than 50 years ago (Alpher, Bethe and Gamow, 1948).

  • When there are more than three co-authors, name only the first and cite the others as "et al."

    The hypothesis was further studied by a large collaboration (Alpher et al., 1950).

  • If several sources from the same author and the same year are cited, they are distinguished by a, b, c, ..

    Einstein published three important papers in one year: on relativity (Einstein, 1905a), brownian motion (Einstein, 1905b) and the photoelectric effect (Einstein, 1905c).

3-3. Citation in the text

The reference is embedded in the text within parentheses.

The laws of motion were first given by Newton a long time ago (I Newton, Principia Mathematica, 1687), while the extension to high speeds was first proposed by Einstein (A Einstein, Ann. Phys, 1905).

This style should only be used for non-academic writing, e.g., a casual article in a newspaper column. In such citations, only the most essential bibliographic information is provided.

3-4. Information for each discipline

Citation styles and conventions vary across disciplines (and even among different publishers / journals within the same discipline). In the following, links are given to the guidelines provided by a typical professional society or journal in each major discipline, as recommended by the department or faculty concerned. Many of these guidelines contain hints about manuscript preparation that go beyond citations.

Disciplines

Business Administration
Education
DisciplineSociety / Journal
EducationEducation Journal
Law
DisciplineSociety / Journal
LawLegal Citation Style Guide

4. Plagiarism and copyright infringement

Plagiarism and copyright infringement are both offences liable to punishment. They are closely related, yet not completely the same.

  Plagiarism Copyright violation
Nature Intellectual dishonesty Legal offence
Who enforces it Intellectual peers, e.g., Senate, professional society The courts
How to avoid it Cite the original author Get the authorization from the copyright owner
Threshold of violation* Very stringent Fair dealing allowed

* This is probably a source of confusion, and a reason why students sometimes commit plagiarism without realizing it.

  • Plagiarism. To avoid plagiarism, there are very strict rules. Sometimes using only a few words, or even adopting some concepts without using any of the exact words, could amount to plagiarism. See the last section for details.
  • Copyright infringement. There is the principle of fair dealing: it is possible to use a reasonable amount of a published work without violating copyright.

Several (extreme and perhaps silly) examples will illustrate the difference between plagiarism and copyright infringement.

Example 1

Student A copies a sonnet from Shakespeare and submits it as his own work. This is plagiarism. However this is not an infringement of copyright, because the law only protects copyright for a certain period of time. In the case of Shakespeare, copyright has lapsed and anybody can re-publish the original texts of Shakespeare for free.

Example 2

Professor A has published a book of 300 pages. Student B publishes another book, the content of which is

Professor A has written "(copy 300 pages)". This is a wonderful book.

This would not constitute plagiarism, because Student B has made it very clear, by the use of quotation marks, that the material is not his own original work. But this would be an infringement of copyright, and the publisher of Professor A's book will sue Student B.

Example 3

Professor A has written a book, and assigned the copyright to Publisher B (in return for royalty payments). He subsequently uses one chapter of the book in another publication. In this instance he would not be guilty of plagiarism, since it is his own work intellectually; but he would have infringed copyright – the copyright is legally owned by Publisher B.

In terms of copyright, extracts from the Laws of Hong Kong may be useful to read.

5. CUHK regulations on honesty in academic work

The extracts below appear in the General Regulations applicable to students in various programmes:

  • Full-time Undergraduate Studies: 15.1(d)

    A student who violates any rule or regulation and/or commits any misconduct, including but not limited to the following non-exhaustive list of potential violation committed:

    (d) academic dishonesty; ...

    shall be disciplined by the Senate Committee on Student Discipline, or other disciplinary committees as appropriate, including Board of Faculty and College Assembly of Fellows, as shall be vested with authority in handling matters pertaining to the discipline of students, in accordance with the nature and gravity of the offence.

  • Postgraduate Studies: 16.1(d)

    The University may take disciplinary action against a student who violates any rule or regulation prescribed by the University authorities, and/or commits any misconduct, including but not limited to the following non-exhaustive list of potential violation committed:

    (d) academic dishonesty;...

  • Associate Students: 8.1(d)

    A student who violates any rule or regulation and/or commits any misconduct, including but not limited to the following non-exhaustive list of potential violation committed:

    (d) academic dishonesty; ...
    shall be disciplined by the Senate Committee on Student Discipline, or other disciplinary committees as appropriate, including Board of Faculty and College Assembly of Fellows, as shall be vested with authority in handling matters pertaining to the discipline of students, in accordance with the nature and gravity of the offence.

6. CUHK disciplinary guidelines and procedures

Procedures for Handling Cases of Academic Dishonesty

As approved by the Senate Committee on Student Discipline, the following procedures for handling student discipline cases are adopted:

  1. all academic-related discipline cases of undergraduate and postgraduate students, including cases of academic dishonesty in course work shall be handled by the faculties/colleges/offices/centres that offer the courses concerned instead of the students’ major programmes/faculties, and in the case of MBChB students, if the relevant courses are offered by the Faculty of Medicine, the cases shall be handled by the Fitness To Practice (FTP) Committee formed under the Faculty of Medicine;
  2. students suspected of academic dishonesty shall be given the opportunity to meet with members of the disciplinary committee concerned/the FTP Committee, irrespective of whether the course teachers concerned have already done so;
  3. in making recommendations, disciplinary committees/the FTP Committee shall take into account factors such as the amount of work that is problematic, and whether the cases pertain to students who plagiarize or allow others to copy their own work. In the case of a group project, all members of the group should be held responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents.
  4. In handling cases involving group projects, all members of the group should be held responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents.

I. Undergraduates

Cases to be handled by each faculty/college/office/centre/the FTP Committee

  1. Teachers shall report all cases of suspected academic dishonesty immediately to the disciplinary committee of the faculty/college/office/centre concerned/the FTP Committee, e.g. teachers of engineering and international asian studies courses shall report respectively to the Engineering Faculty and Office of Academic Links. The disciplinary committee concerned/the FTP Committee will look into the case, and meet with the student if the student so requested. The penalty guidelines are as follows:
    1. Minimum penalties for different categories of offences
        Categories Minimum Penalties
      (i) Plagiarism First offence
      (i) one demerit;
      (ii) a mark of zero for that component, and cap the grade for the course cancerned at "D" or "Pass"; and
      (iii) completion of relevant training in academic honesty.
      Second or further offence (and a first offence that is serious as decided by the disciplinary committee concerned/the FTP Committee)
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable); and
      (ii) a failure grade for the course concerned.
      (ii)

      Undeclared multiple submissions

      First offence
      (i) one demerit;
      (ii) a mark of zero for that component, and cap the grade for the course cancerned at "D" or "Pass"; and
      (iii) completion of relevant training in academic honesty.
      Second or further offence (and a first offence that is serious as decided by the disciplinary committee concerned/the FTP Committee)
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable); and
      (ii) a failure grade for the course concerned.
      (iii)

      Employing or using services provided by a third party [Note 1] to undertake the examinations/ final year projects/ papers/ essays/ dissertations, or providing services as a third party, including any one of the following aspects:

      1. employing or using services provided by a third party;
      2. providing services as a third party;
      3. sharing of any materials obtained from the employment or use of services provided by a third party to other students; and
      4. knowingly using materials obtained by anyone who has employed or used the services provided by a third party.
      (i) three demerits (of which one will remain in the University’s record permanently and two are reviewable);
      (ii) a failure grade for the course concerned (not applicable to the student who is the third party to provide the services but not taking the same course or not taking it in the same term);
      (iii) suspension from the University for one term [Note 2]; and
      (iv) lowering the degree classification by one level upon graduation (not applicable to undergraduate students who graduate with a Pass Degree, MBChB students and postgraduate students) [Note 3].
      (iv)

      Employing or using services provided by a third party [Note 1] to undertake all other submitted work not covered by category (iii) above, or providing services as a third party, including any one of the following aspects:

      1. employing or using services provided by a third party;
      2. providing services as a third party;
      3. sharing of any materials obtained from the employment or use of services provided by a third party to other students; and
      4. knowingly using materials obtained by anyone who has employed or used the services provided by a third party.
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable); and
      (ii) a failure grade for the course concerned (not applicable to the student who is the third party to provide the services but not taking the same course or not taking it in the same term).
      (v)

      Distribution/ Sharing/ Copying of teaching materials without the consent of the course teachers to gain unfair academic advantage in the courses

      (i) two demerits.
      (vi) Violating rule 15 or 16 of the University’s Examination Rules (Annex 1) or rule 9 or 10 of the University's Online Examination Rules (Annex 2) First offence
      (i) one demerit.
      Second or further offence (and a first offence that is serious as decided by the disciplinary committee concerned/the FTP Committee)
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable).
      (vii)

      Cheating in tests and examinations (including violation of rule 17 or 18 of the University’s Examination Rules or rule 11, 12, 13, 14 or 16 of the University's Online Examination Rules)

      First offence
      (i) one demerit (which will remain in the University’s record permanently); and
      (ii) a failure grade for the course concerned.
      Second or further offence (and a first offence that is serious as decided by the disciplinary committee concerned/the FTP Committee)
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable); and
      (ii) a failure grade for the course concerned.
      (viii)

      Impersonation fraud in tests and examinations (including violation of rule 19 of the University's Examination Rules or rule 15 of the University's Online Examination Rules)

      (i) three demerits (of which one will remain in the University’s record permanently and two are reviewable);
      (ii) a failure grade for the course concerned;
      (iii) suspension from the University for one term [Note 2]; and
      (iv) lowering the degree classification by one level upon graduation (not applicable to undergraduate students who graduate with a Pass Degree, MBChB students and postgraduate students) [Note 3].
      [The same penalties apply to the student who asks/allows someone to assume his/her identity to sit for a test/an examination as well as to the student who sits for a test/an examination if both parties are students of the University, except that penalty (ii) will not apply to the latter.]  
      (ix)

      All other acts of academic dishonesty

      First offence
      (i) one demerit;
      (ii) a mark of zero for that component of the course; and
      (iii) completion of relevant training in academic honesty.
      Second or further offence (and a first offence that is serious as decided by the disciplinary committee concerned/the FTP Committee)
      (i) two demerits (of which one will remain in the University’s record permanently and one is reviewable); and
      (ii) a failure grade for the course concerned.

      Notes:

      1. A third party shall include all parties external to CUHK, including but not limited to online platforms, companies providing tutoring services or essay/ dissertation mills, private tutors, past teachers, alumni of the University, relatives and friends of the student concerned, as well as members of CUHK.
      2. According to the University’s Regulations, suspension can only be imposed with the approval of the Senate Committee on Student Discipline.  Any cases of suspension should be submitted to the Senate Committee on Student Discipline.
      3. Not applicable to degrees without honours classification, including MBChB and higher degrees.

       

    2. For cases where a student committed two or more offences of plagiarism/undeclared multiple submissions in the same term and at almost the same time, the following lower penalty can be recommended by the disciplinary committee concerned/the FTP Committee, after careful consideration of all factors including inter alia the amount of work plagiarized, the attitude of the student and whether the student is aware of the mistake before committing the same offence a second time:

      For such offences altogether, a minimum penalty of (i) two demerits; (ii) a mark of zero for the component(s) and cap the grade for the course(s) concerned at "D" or "Pass"; and (iii) completion of relevant training in academic honesty.

      In recommending such penalty, full justifications must be provided by the disciplinary committee concerned/the FTP Committee.
    3. The submission of a piece of work, or a part of a piece of work, for more than one purpose (e.g., to satisfy the requirements in two different courses) without declaration to this effect shall be regarded as having committed undeclared multiple submissions and may lead to the penalty of a zero mark for all assignments concerned and cap the grade for the course(s) concerned at "D" or "Pass" apart from the penalties of demerits, as decided by the disciplinary committee/the FTP Committee.
    4. For cases where a student allowed others to copy his/her work, the disciplinary committee concerned/ the FTP Committee can consider giving demerit(s) without affecting the mark and grade of the student in the course concerned.
    5. For cases that are deemed serious or when the penalty of a failure grade is not applicable, the disciplinary committee concerned/ the FTP Committee can consider imposing a heavier penalty, such as more demerits or suspension from University.

  2. The disciplinary committee concerned/the FTP Committee can consider a penalty of giving more demerits or, where applicable, a failure grade for the entire course, for cases that are deemed more serious by taking into account factors such as the amount of work that is problematic.
  3. Where applicable, the disciplinary committee concerned/the FTP Committee shall decide whether the demerit(s) will remain in the University's record permanently; or the demerits will be reviewed no earlier than the final term of the normative study period of the student concerned; or the demerits will be removed from the University's record by the time of graduation of the student concerned if no further offence is committed, unless otherwise specified.
  4. If zero marks are earned for that component of the course, the grade for the course may end up as a failure.
  5. The disciplinary committee concerned/the FTP Committee shall notify the student of its decision. In the case where the disciplinary committee/the FTP Committee comes up with a decision that is substantially different from the initial findings of the faculty/department/ college to which the student concerned belongs, the disciplinary committee/the FTP Committee shall first convey its decision to the faculty/department/college concerned before the student concerned is formally notified of the decision.
  6. Appeals in writing with full justifications may be lodged to the Senate Committee on Student Discipline through the disciplinary committee/the FTP Committee that deals with the case in the first instance, against the decision/recommendation made by the disciplinary committee/the FTP Committee, within seven working days after the student has received the notification. The appeal shall be handled in accordance with the "Procedures for Handling Student Disciplinary Cases" of the Senate Committee on Student Discipline. Late appeals shall not be considered. The case is closed if no appeal is received after the specified period.

  7. The disciplinary committee concerned/the FTP Committee shall report the case, together with its decision, to the Senate Committee on Student Discipline by completing Form A issued by the Senate Committee, irrespective of whether the student concerned is found guilty or not, a copy of which shall be sent to the student’s major programme/department, faculty and college for record and necessary follow up actions.
  8. Cases to be handled by the Senate Committee on Student Discipline

  9. Cases that are exceptionally serious, or where extenuating circumstances are put forward for a lower penalty, shall be referred to the Senate Committee on Student Discipline for decision, to ensure consistency across the University.
    1. If, after serious consideration, the disciplinary committee concerned/the FTP Committee recommends a heavier penalty as follows according to Regulation 15.2 of the General Regulations Governing Full-time Undergraduate Studies, then the case will be referred to the Senate Committee on Student Discipline for further consideration:
      (i)  Suspension from the University for a specified period of time; or
      (ii) Termination of studies at the University.
    2. If the disciplinary committee concerned/the FTP Committee after reviewing the case recommends a penalty lower than those specified in these guidelines, the case shall also be referred to the Senate Committee on Student Discipline for decision.

  10. The student shall be notified in writing of the decision, and appeals in writing with full justifications may be lodged to the Senate Committee on Student Discipline, within seven working days after the student has received the notification. The appeal shall be handled in accordance with the "Procedures for Handling Student Disciplinary Cases" of the Senate Committee on Student Discipline. Late appeals shall not be considered. The case is closed if no appeal is received after the specified period.
  11. Documentation

  12. After each case is closed, the disciplinary committee concerned/the FTP Committee or the Senate Committee on Student Discipline (as the case may be) shall inform the faculty/department/programme/college concerned of the details of the case for record and follow-up, and report the case, together with its decision, to the Senate Committee on Student Discipline by completing Form A issued by the Senate Committee, irrespective of whether the student concerned is found guilty or not. As recommended by the Senate Committee on Teaching and Learning, such case records on academic dishonesty shall be included in the self-evaluation documents of programmes for regular internal programme reviews.
  13. II. Postgraduates

  14. The procedures in respect of postgraduate students are the same as those of undergraduate students described above, except that the Graduate School Office shall provide the administrative support relating to student records/status checking/updating to the disciplinary committees. The procedures will also apply to academic dishonesty found in theses, which may be failed as a result, in the case of which the student concerned has to re-submit the thesis, unless otherwise specified.
  15. Under circumstances where students concurrently registered for two programmes, the number of offences and number of demerits accumulated are person specific rather than programme specific. For example, if a student committed plagiarism in a course of Programme A and in another course of Programme B, he/she will be considered as having committed a total of two counts of plagiarism. Under normal circumstances, he/she shall have accumulated a total of three demerits, and he/she may risk termination of studies for both programmes he/she registered. Under the circumstance where a student committed two or more offences of plagiarism/undeclared multiple submissions in the same term and at almost the same time, Paragraph 1(b) shall apply.
  16. [Approved by the Senate Committee on Student Discipline at its Fourth Meeting (2024-25) for implementation with effect from 2025-26.]

7. Guide for teachers and departments in handling cases of academic dishonesty

  1. Each Department or Programme shall ensure that new students (especially undergraduates) learn and understand the expected standards of academic honesty.
  2. At the beginning of each course, the teacher shall draw the attention of the class to these guidelines by citing this specific website.
  3. It is recommended that a short statement to this effect shall be incorporated into the course outline. A version suitable for downloading is available.
  4. Teachers shall insist that every assignment, in particular term papers and projects, be accompanied by a signed declaration of originality, and not to grade assignments without the receipt. For group projects, all members of the group shall be asked to sign on the declaration. For assignments in the form of a computer-generated document that is principally text-based and submitted via VeriGuide, the statement, in the form of a receipt, will be issued by the system upon students' uploading of the soft copy of the assignment. Only the final version of assignments shall be submitted via VeriGuide, unless prior approval is obtained from the course teachers. The template can be found here.
  5. Soon after receipt of the submission, VeriGuide will produce comparison reports showing the major similarities found between assignments and with other available sources, in order to provide data for teachers to decide, in the context of the particular subjects, course and assignment, whether the relevant parts identified are original.
  6. Upon reading the report, the teacher shall judge if there is a case. If he/she so judged, he/she shall inform the student(s) of his/her decision and give the student(s) concerned access to the relevant portion of the report before the case is taken to any committee concerned. For group projects, all members of the group should be held responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents. As such, all members of the group should be notified of the decision and granted access to the report. The matter shall not be handled by the teacher alone, since this will lead to inconsistent treatment.
  7. Teachers shall then report all cases to the disciplinary committee concerned (with effect from 2008-09, the disciplinary committees of the faculties/colleges/offices/centres that offer the course concerned will be the authority for handling the case instead of the students' major programmes/faculties; and in the case of MBChB students, if the relevant courses are offered by the Faculty of Medicine, the cases shall be handled by the Fitness To Practice (FTP) Committee formed under the Faculty of Medicine) by providing any supporting information/materials, in addition to the VeriGuide report. The disciplinary committee concerned/the FTP Committee shall handle such cases in accordance with the guidelines established by the Senate Committee on Student Discipline. See University guidelines for details.
  8. On the other hand, the teacher shall also send an alert to the relevant coordinators of the Programme/Department/Faculty/College Offices of the case by using the function available in VeriGuide, so that the relevant coordinators can keep track of the development of the cases.
  9. At the end of each term, a summary report shall be made available for Programme/Department/Faculty/College Offices so that they can take appropriate actions to ensure that suspected cases are properly dealt with. Also, the Deans/Associate Deans/College Heads/Masters (or their representatives) will also be given access to the statistic and management pages.
  10. The Senate Committee on Teaching and Learning requires that implementation of the use of VeriGuide be included as one element of future programme reviews, starting from the year 2009, and that all records of the handling of cases of possible academic dishonesty be documented and included in the self-evaluation documents of programmes for regular internal programme reviews.

8. Recommended statement to be included in course outlines

It is recommended that every course outline should include a statement such as the following:

Attention is drawn to University policy and regulations on honesty in academic work, and to the disciplinary guidelines and procedures applicable to breaches of such policy and regulations. Details may be found at http://www.cuhk.edu.hk/policy/academichonesty/.

With each assignment, students will be required to submit a signed declaration that they are aware of these policies, regulations, guidelines and procedures.

  • In the case of group projects, all members of the group should be asked to sign the declaration, each of whom is responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents.

  • For assignments in the form of a computer-generated document that is principally text-based and submitted via VeriGuide, the statement, in the form of a receipt, will be issued by the system upon students' uploading of the soft copy of the assignment. 
  • Students are fully aware that their work may be investigated by AI content detection software to determine originality.
  • Students are fully aware of the AI approach(es) adopted in the course. In the case where some AI tools are allowed, students have made proper acknowledgment and citations as instructed by the course teacher.  

Assignments without the properly signed declaration will not be graded by teachers.

Only the final version of the assignment should be submitted via VeriGuide.

The submission of a piece of work, or a part of a piece of work, for more than one purpose (e.g. to satisfy the requirements in two different courses) without declaration to this effect shall be regarded as having committed undeclared multiple submissions. It is common and acceptable to reuse a turn of phrase or a sentence or two from one’s own work; but wholesale reuse is problematic. In any case, agreement from the course teacher(s) concerned should be obtained prior to the submission of the piece of work.

The copyright of the teaching materials, including lecture notes, assignments and examination questions etc., produced by staff members/ teachers of The Chinese University of Hong Kong (CUHK) belongs to CUHK. Students may download the teaching materials produced by the staff members/ teachers from the Learning Management Systems, e.g. Blackboard adopted by CUHK for their own educational use, but shall not distribute/ share/ copy the materials to a third-party without seeking prior permission from the staff members/ teachers concerned.

A download version can be found here.

9. Electronic submission of assignments via VeriGuide

The Senate Committee on Teaching and Learning decided that all student assignments in undergraduate and postgraduate programmes should be submitted via VeriGuide with effect from September 2008. This applies to assignments in the form of a computer-generated document that is principally text-based (i.e.,excluding calculations in science, brief laboratory reports, drawings in fine arts and architecture, etc.) VeriGuide is developed by teachers in the Department of Computer Science and Engineering, Faculty of Engineering, on behalf of the Senate Committee on Teaching and Learning. It will archive all papers (in English or Chinese) and provide comparisons with web resources, previous term papers and term papers submitted in the current or other assignments, as data for the teachers to evaluate the originality of the submission. It will also generate alerts for the teacher and where appropriate the thesis committee.

Why has CUHK decided to employ VeriGuide?

Introduction

Given the ever greater availability and manipulation of e-format text sources, educational institutions around the world are experiencing a growing need to discern the difference between original and unattributed work submitted by students for academic credit. CUHK is no different and has, in order to meet this need, adopted its own system VeriGuide. VeriGuide is similar to commercial systems adopted by many universities, but has two major advantages: first, it is bilingual; and second, by linking to CUHK's Registry system, it does not require input from the course teacher.

Why does CUHK employ VeriGuide as an aid to measure the originality of student work?

Plagiarism detection engines can all too often be viewed as a negative step taken to 'police' students. However, VeriGuide and its counterparts should instead be experienced by educational institutions and their students as a learning tool and a force for quality assurance.

The various benefits arising from the adoption of a system such as VeriGuide can be set out as follows:

  1. Fairness: VeriGuide ensures that all students are treated in the same way. Assessments are judged on the basis that students have submitted their own work. It would be unfair to the students who have worked hard and presented their own work for assessment, if the University did not distinguish between students who have worked hard to comply with the assessment rules and those who have not complied with the assessment rules. VeriGuide protects students who have done what was asked of them in the assessment.
  2. Learning experience: By ensuring the submission of students' own work, VeriGuide encourages students to engage in deep learning, resulting in true consideration and understanding of the topic, rather than a surface appraisal of sources.
  3. Good scholarship: In addition to promoting deep learning, VeriGuide requires students to demonstrate their scholarship self-consciously by organizing and attributing relevant sources, thus encouraging students to develop good research and presentation skills.
  4. The good reputation and the prestige of the degree earned by our graduates: By putting in place a system such as VeriGuide which ensures that students engage in deep learning, demonstrate their good scholarship and create their own responses to assessment questions, the reputation and the prestige of the degree earned by our graduates are enhanced.

What about privacy?

  1. Students should ensure that their names appear on the paper only in a designated place on the front page. This will then be removed when the paper is stored for future reference.
  2. Students should discuss with their course teachers the appropriate way to handle writing assignments that may contain personal information, for example, personal accounts and self-reflections. In most such cases, the teachers would be expected to exempt such assignments from VeriGuide, since personal accounts and self-reflections are unlikely to be plagiarized.
  3. Students should exercise care in protecting the privacy of third parties that may be cited. For example, clinical studies should identify patients not by name, but say as 'a 35 year-old male'. Social Work field placement reports should identify the agency as 'Agency A'. If identifying information is needed by the teacher, that should be separately provided on a sheet attached to the hard copy of the paper, submitted to the teacher but not to VeriGuide.

Guidelines on the use of VeriGuide for both students and teachers

10. Declaration to be attached to assignments

Every assignment handed in should be accompanied by a signed declaration as below.

  • For group projects, all members of the group should be asked to sign the declaration, each of whom is responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents.
  • For assignments in the form of a computer-generated document that is principally text-based and submitted via VeriGuide, the statement, in the form of a receipt, will be issued by the system upon students' uploading of the soft copy of the assignment.

Assignments without the properly signed declaration will not be graded by teachers.

Only the final version of assignment should be submitted via VeriGuide.

I am submitting the assignment for:

□ an individual project or

□ a group project on behalf of all members of the group. It is hereby confirmed that the submission is authorized by all members of the group, and all members of the group are required to sign this declaration.

I/We declare that: (i) the assignment here submitted is original except for source material explicitly acknowledged/all members of the group have read and checked that all parts of the piece of work, irrespective of whether they are contributed by individual members or all members as a group, here submitted are original except for source material explicitly acknowledged; (ii) the piece of work, or a part of the piece of work has not been submitted for more than one purpose (e.g. to satisfy the requirements in two different courses) without declaration; and (iii) the submitted soft copy with details listed in the is identical to the hard copy(ies), if any, which has(have) been / is(are) going to be submitted. I/We also acknowledge that I am/we are aware of the University's policy and regulations on honesty in academic work, and of the disciplinary guidelines and procedures applicable to breaches of such policy and regulations, as contained in the University website Section 6.

In the case of a group project, we are aware that all members of the group should be held responsible and liable to disciplinary actions, irrespective of whether he/she has signed the declaration and whether he/she has contributed, directly or indirectly, to the problematic contents.

I/we declare that I/we have not distributed/ shared/ copied any teaching materials without the consent of the course teacher(s) to gain unfair academic advantage in the assignment/ course.

I/we declare that I/we have read and understood the University’s policy on the use of AI for academic work. I/we confirm that I/we have complied with the instructions given by my/our course teacher(s) regarding the use of AI tools for this assignment and consent to the use of AI content detection software to review my/our submission.

I/We also understand that assignments without a properly signed declaration by the student concerned and in the case of a group project, by all members of the group concerned, will not be graded by the teacher(s).

Signature(s)
Date
Name(s)
Student ID(s)
Course code
Course title

A download version can be found here.

Appendix A: Detailed guidelines on proper use of source material

Many examples in this section are adapted from the guidelines developed and published by the Department of Sociology, CUHK.

Mild cases of failure to acknowledge would be regarded as poor academic writing. Serious cases of failure to acknowledge, especially where there appears to be the intention to mislead the reader, would constitute plagiarism.

1. Verbatim use of source material
Original source (Example 1)
Peter Berger, Invitation to Sociology (London: Penguin, 1991), p 87

Student A copies a sonnet from Shakespeare and submits it as his own work. This is plagiarism. However this is not an infringement of copyright, because the law only protects copyright for a certain period of time. In the case of Shakespeare, copyright has lapsed and anybody can re-publish the original texts of Shakespeare for free.

Improper use (Example 1)
Except for the first sentence, the rest is a verbatim copy of the original, without quotation marks and without acknowledgement. This is a clear case of plagiarism.

Social members experience various modes of control exerted over them. Where human beings live or work in compact groups, in which they are personally known and to which they are tied by feeling of personal loyalty (the kind that sociologists call primary groups), very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the actual or potential deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium.

Improper use (Example 1)
The following extract, again without quotation marks and without acknowledgement, also constitutes plagiarism.

Where human beings live or work in primary groups, very potent and subtle mechanisms of control are brought to bear upon the deviant members. These are the mechanisms of persuasion, ridicule and gossip.

Proper use (Example 1)
The material used word for word should be enclosed in quotes, and the source should be specified by a bibliographic reference such as [1].

Social members experience various modes of control exerted over them. “Where human beings live or work in compact groups, in which they are personally known and to which they are tied by feeling of personal loyalty (the kind that sociologists call primary groups), very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the actual or potential deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium” [1].

Proper use (Example 1)
If only an extract is quoted, the omitted portion should be indicated by ellipsis (i.e., a series of dots). The material quoted should still be enclosed in quotes, and the source should be specified by a bibliographic reference such as [1].

Where human beings live or work in ... primary groups, ... very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the ... deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium” [1].

原著(例2)
孝通《鄉土中國》(香港:三聯 。1986),第28頁

在西洋社會裏,國家這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,像一根柴捆在一束裏,他們不能不把國家弄成個為每個分子謀利益的機構,於是他們有革命、有憲法、有法律、有國會等等。在我們傳統裏群的極限是模糊不清的天下,國是皇帝之家,界線從來就是不清不楚的。不過是從自己這個中心裏推出去的社會勢力裏的一圈而已。所以可以著手的,具體的只有己,克己就成了社會生活中最重要的德性,他們不會去克群,使群不致侵略個人的權利。

不正確引用(例2)
以下是逐字抄錄上文的例子,屬於抄襲。

西洋社會及中國傳統社會中的群己關係截然不同。在西洋社會裏,國家這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,像一根柴捆在一束裏,他們不能不把國家弄成個為每個分子謀利益的機構,於是他們有革命、有憲法、有法律、有國會等等。在我們傳統裏群的極限是模糊不清的天下,國是皇帝之家,界線從來就是不清不楚的。不過是從自己這個中心推出去的社會勢力裏的一圈而已。所以可以著手的,具體的只有己,克己就成了社會生活中最重要的德性,他們不會去克群,使群不致侵略個人的權利。

不正確引用(例2)
以下是摘錄的例子,也屬於抄襲。

在西洋社會裏,國家這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外。在我們傳統裏群的極限是模糊不清的天下,界線從來就是不清不楚的,所以可以著手的,具體的只有己。

正確引用(例2)
以下是逐字抄錄上文的例子,提及原作者原著, 並加上了引號「 」和附註,例如 〔1〕, 乃屬正確引用。

費孝通在《鄉土中國》一文中指出在西洋社會裏,國家這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,像一根柴捆在一束裏,他們不能不把國家弄成個為每個分子謀利益的機構,於是他們有革命、有憲法、有法律、有國會等等。在我們傳統裏群的極限是糢糊不清的天下,國是皇帝之家,界線從來就是不清不楚的,不過是從自己這個中心推出去的社會勢力裏的一圈而已。所以可以著手的,具體的只有己,克己就成了社會生活中最重要的德性,他們不會去克群,使群不致侵略個人的權利。」〔1〕

正確引用(例2)
以下是摘錄的例子,加上了引 號「 」和附註,例如〔1〕, 乃屬正確引用。

在西洋社會裏,國家社會這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,..... 在我們傳統裏群的極限是模糊不清的‘天下’..... 界線從來就是不清不楚的,..... 所以可以著手的,具體的只有己 .....」〔1〕

2. Paraphrase and translation
Original source (Example 1)
Peter Berger, Invitation to Sociology (London: Penguin, 1991), p 87

Where human beings live or work in compact groups, in which they are personally known and to which they are tied by feeling of personal loyalty (the kind that sociologists call primary groups), very potent and simultaneously very subtle mechanisms of control are constantly brought to bear upon the actual or potential deviant. These are the mechanisms of persuasion, ridicule, gossip and opprobrium.

Improper use (Example 1)
In the following example, the exact words are changed; even the sentence structure is changed, but the sense of the original is kept. This is called a paraphrase. If the original source is not acknowledged, this still constitutes plagiarism.

In primary groups, in which people knows each other personally, deviants (actual or potential) are restrained by delicate mechanisms of social control, including persuasion, ridicule, gossip, opprobrium, etc.

Improper use (Example 1)
In the following example, the source is paraphrased and also translated. If the original source is not acknowledged, this still constitutes plagiarism.

在社會學家稱為初級團體的群體中,越軌者承受著極細微但強而有力的社會控制,例如說服、嘲笑、閒話及侮辱等。

Proper use (Example 1)
A paraphrase should be indicated by a bibliographic reference such as [1], but quotes are not required.

In primary groups, in which people knows each other personally, deviants (actual and potential) are restrained by delicate mechanisms of social control, including persuasion, ridicule, gossip, opprobrium, etc. [1]

Proper use (Example 1)
費孝通《鄉土中國》(香港:三聯 。1986),第28頁

在西洋社會裏,國家這個團體是一個明顯的也是唯一特出的群己界線。在國家裏做人民的無所逃於這團體之外,像一根柴捆在一束裏,他們不能不把國家弄成個為每個分子謀利益的機構,於是他們有革命、有憲法、有法律、有國會等等。在我們傳統裏群的極限是模糊不清的天下,國是皇帝之家,界線從來就是不清不楚的。不過是從自己這個中心裏推出去的社會勢力裏的一圈而已。所以可以著手的,具體的只有己,克己就成了社會生活中最重要的德性,他們不會去克群,使群不致侵略個人的權利。

原著(例2)
以下是意譯的例子,未有附註,屬抄襲行為。

西方社會中團體與個人之關係是清晰的,這尤其反映在國家這團體與個人的關係上。而中國傳統社會中團體與個人的關係從來都是含糊不清的,國家是皇帝的家族的延伸,因此不存在西方所謂的個人從團體中解放的問題,孔子所稱道的「克己」是唯一的社會道德。

不正確引用(例2)
以下是意譯的例子,加上附註,屬正確引用。

西方社會中團體與個人之關係是清晰的,這尤其反映在國家這團體與個人的關係上。而中國傳統社會中團體與個人的關係從來都是含糊不清的,國家是皇帝的家族的延伸,因此不存在西方所謂的個人從團體中解放的問題,孔子所稱道的「克己」是唯一的社會道德。〔1〕

3. Change of order and/or conversion to/from point form

Suppose the source material is in point form.

Original source (Example 3)
Anthony Giddens, Sociology (Cambridge: Polity Press. 2nd ed., 1993) p 529-30

The European powers acquired colonies for a number of reasons:

  1. Colonial possessions added to the political influence and power of the parent country and provided sites for military bases.
  2. Most Westerners also saw colonialism as a civilizing enterprise, helping upgrade native peoples from their "primitive" conditions...
  3. There was an important economic motive. From the early years of Western expansion, food, raw materials and other goods were taken from the colonized areas to full western economic development ...
Improper use (Example 3)
The following paraphrase which alters the orders of the three points constitutes plagiarism if the source is not acknowledged.

The European powers acquired colonies for

  1. economic expansion;
  2. exercise of political influence;
  3. civilization of the "native" people
Improper use (Example 3)
The following paraphrase which converts the point form to running text still constitutes plagiarism if the source is not acknowledged.

The colonization of "primitive" societies by Europe serves several purposes: economic expansion, exercise of political influence and civilization of the "native" peoples.

4. Use of special terms or concepts
Original source (Example 4)
Erving Goffman, Asylums: Essays on the Social Situation of Mental Patients and other Inmates. (1968, Harmondsworth, Middlesex: Penguin), p 15-16

Every institution captures something of the time and interest of its members and provides something of a world for them; in brief, every institution has encompassing tendencies. When we review the different institutions in our Western society, we find some that are encompassing to a degree discontinuously greater than the ones next in line. Their encompassing or total character is symbolized by the barrier to social intercourse with the outside and to departure that is often built right into the physical plant, such as locked doors, high walls, barbed wire, cliffs, water, forests, or moors. These establishments I am calling total institutions [italics original], and it is their general characteristics I want to explore.

Improper use (Example 4)
The following uses the special term "total institutions" without attribution, and constitutes plagiarism if the source is not acknowledged.

Hospitals are total institutions, the public access to which is strictly denied.

Proper use (Example 4)
The special term should be acknowledged by naming the original author, adding quotation marks and a bibliographic reference such as [1].

Hospitals are what Goffman calls "total institutions", which is "symbolized by the barrier to social intercourse with the outside…" [1].

Proper use (Example 4)
Another legitimate form could be as follows.

Hospitals are, in Goffman’s famous term, total institutions, the public access to which is strictly denied [1].

5. Attribution of key concepts
Original source (Example 5)
Lau, Siu-kai. Society and Politics in Hong Kong. (1982, Hong Kong: The Chinese University Press).

(The original source first introduced some key concepts.)

Improper use (Example 5)
The following paragraph summarizes the key concepts from the original source, but gives the impression that the writer developed these concepts. This constitutes plagiarism.

Hong Kong people can meet their economic needs mainly through supports from their familial groups. As such, they have no needs to press the government for provision of social welfare, and this accounts for the political apathy of Hong Kong people and thereby the political stability of Hong Kong.

Proper use (Example 5)
There should be an indication that the key concepts are taken from the original source.

According to Lau [1], Hong Kong people can meet their economic needs mainly through supports from their familial groups. As such, they have no needs to press the government for provision of social welfare, and their accounts for the political apathy of Hong Kong people and thereby the political stability of Hong Kong.

Proper use (Example 5)
Here is another legitimate form; even though the author is not named in the text, the bibliographical reference already indicates that the idea is taken from somewhere else.

Hong Kong people can meet their economic needs mainly through supports from their familial groups. As such, they have no needs to press the government for provision of social welfare, and their accounts for the political apathy of Hong Kong people and thereby the political stability of Hong Kong [1].

6. Citing facts or research findings of others
Proper use (Example 6)
When facts are cited (which are not obvious), the source should be indicated.

A total of 58 agreements guaranteeing paid holidays had been signed by the unions in Britain in 1920. By the mid-20’s there were 16-17 percent of the labour-force who received paid holidays [1].

Original source (Example 7)
Thomas T. P. Wong and Lui Tai-lok. From One Brand of Politics to One Brand of Political Culture. Hong Kong: occasional paper no. 10. (1992, Hong Kong Institute of Asia-Pacific Studies, Chinese University of Hong Kong). p 26

When asked if they feel themselves belonging to a class, 79% of our respondents said 'yes'; 19 said 'no', and only 2% answered 'don't know'.

Proper use (Example 7)
The source should be given when this research finding is cited.

Wong and Lui [1] demonstrate that nearly 80% of their respondents feel themselves belonging to a class.

Proper use (Example 8)
Even if the research finding does not involve quantitative data, the source should be acknowledged.

In countries where the religiously orthodox differ from modernists in their economic beliefs, the orthodox are far more likely to be to the left of modernists than to be right [1].

7. Data for tables and graphs

When a table or a graph contains data that are not collected by the writer himself/herself, the source must be given.

Proper use (Example 9)
When facts are cited (which are not obvious), the source should be indicated.

Table 2.6. Growth in the value of world exports by major product groups, 1985-93.
[table]
Source: Ref [1]

Proper use (Example 10)
Thomas T. P. Wong and Lui Tai-lok. From One Brand of Politics to One Brand of Political Culture. Hong Kong: occasional paper no. 10. (1992, Hong Kong Institute of Asia-Pacific Studies, Chinese University of Hong Kong). p 26

[graph]

Figure 6. The annual GDP growth in Hong Kong, 1960-1990.
Source: Ref [1].

Appendix B: Proper use of online resources

Apart from printed material such as books and journals, source material from online resources should also be properly acknowledged in academic writing.

Mild cases of failure to acknowledge would be regarded as poor academic writing. Serious cases of failure to acknowledge, especially where there appears to be the intention to mislead the reader about the originality, would constitute plagiarism.

Examples of different citation styles are available at the website of the CUHK Library for reference.  Again the most important point about citing electronic source materials is not the format per se but the inclusion of all information necessary for identifying the source being cited. There is one important difference from printed works. The same web site (as identified by its URL) may change its contents from day to day; therefore the date of retrieval should always be included.

Appendix E: Information on Training on Academic Honesty

Questions and Comments

Any questions regarding the use of the VeriGuide System can be directed to the VeriGuide Technical Support Team: veriguide@cuhk.edu.hk.

Comments on the policy and procedures stipulated in the webpage can be directed to the Academic and Quality Section: aqs@cuhk.edu.hk.