Abstract:
One of the main concerns of scholars is the observance of intellectual property rights in the production of knowledge content. Data and knowledge derived from the results of research need to be produced based on ethical issues in order to provide context for solving problems through innovation, scientific accuracy and relevance on the basis of ethical principles. In this research, the intelligent knowledge audit model was designed for Islamic Azad University. The present research is applied and in the first stage due to the recognition of the dimensions of the model, is exploratory, in the second phase, the comparative study of the selected models, and in the third stage is analytical. The data gathering tool were a researcher-made questionnaire and interview. In the present research, a questionnaire was distributed through a sample of 205 professors and PhD candidates in the field of information technology management. The questionnaire was analyzed using structural equation modeling, and the conformity between the independent variables and the dependent variable was presented. In the following, a comparative study of the selected models was performed and after analyzing the interviews with the experts, the final model was designed. As a result, the use of structural and semantic analysis methods in sequence can lead to the prevention of repetitive content. This is heavily needed in order to achieve a systematic ethical responsibility.
Machine summary:
A Summary of the Comparative Study of Research done Differently from the Features and Tasks Involved Article title and year of publication Name of Author(s) Method / technique Method: Comparison ofToward the discovery of reuse of the 1 multilingual codebook Enrique Flores, Alberto Barron, Code no, Paolo Rosso, Lidia Moreno N-Grams Features Model Method used in: Comments and saved / 2011 words Method: Natural languageDiscovery source code reuse multiple 2 programming Enrique Flores, Alberto Barron, Code no, Paolo Rosso, Lidia Moreno processing Tools: Compare source code in terms of functions languages / 2012 and method The discovery of software plagiarism 3 with a graph approach / Dong-Kuy, Chae giwoon Ha, sang-Wook, Kim, Boo Joong, Kang, Elu API Tag and Control flow Graph (A-CFG) 2013 Gyulm Experience of discovering the 4 division of codes in Yin Gong Dang, Song Ge, Ray, Huang and Tools: XIAO tools were created by Microsoft researchers and was Microsoft / 2011 Dong mei Zhang shared for testing Plagiarism discovery 5 engine for Java source: an approach based on clustering / 2007 Ameera Jadalla, Ashraf Elnagar Technique: Data analysis, Clustering, Tokenization, N-Gram Journal of System Management (JSM) Ebrahim Nazari161 6(2), Summer 2020, pp.
It is suggested that the result of the study of the structural similarity with the result obtained by examining the degree of semantic similarity be considered in the form of a model design and Journal of System Management (JSM) Ebrahim Nazari166 6(2), Summer 2020, pp.