In academia, the pressure to publish is high and the competition intense. This can lead authors to follow unethical publication practices, such as salami slicing, duplicate publication, and simultaneous submission. This slide deck explains these malpractices and shares tips on how authors can avoid them.
In academia, the pressure to publish is high and the competition intense. This can lead authors to follow unethical publication practices, such as salami slicing, duplicate publication, and simultaneous submission. This slide deck explains these malpractices and shares tips on how authors can avoid them.
Predatory Publications and Software Tools for IdentificationSaptarshi Ghosh
Journals that publish work without proper peer review and which charge scholars sometimes huge fees to submit should not be allowed to share space with legitimate journals and publishers, whether open access or not. These journals and publishers cheapen intellectual work by misleading scholars, preying particularly early career researchers trying to gain an edge. The credibility of scholars duped into publishing in these journals can be seriously damaged by doing so. It is important that as a scholarly community we help to protect each other from being taken advantage of in this way.
Redundant, Duplicate and Repetitive publications are the most important concerns in the scientific research/literature writing. The occurrence of redundancy affects the concepts of science/literature and carries with it sanctions of consequences. To define this issue is much challenging because of the many varieties in which one can slice, reformat, or reproduce material from an already published study. This issue also goes beyond the duplication of a single study because it might possible that the same or similar data can be published in the early, middle, and later stages of an on-going study. This may have a damaging impact on the scientific study/literature base. Similar to slicing a cake, there are so many ways of representing a study or a set of data/information. We can slice a cake into different shapes like squares, triangles, rounds, or layers. Which of these might be the best way to slice a cake? Unfortunately, this may be the wrong question. The point is that the cake that is being referred to, the data/ information set or the study/findings, should not be sliced at all. Instead, the study should be presented as a whole to the readership to ensure the integrity of science/technology because of the impact that may have on patients who will be affected by the information contained in the literature/findings. Redundant, duplicate, or repetitive publications occur when there is representation of two or more studies, data sets, or publications in either electronic or print media. The publications can overlap partially or completely, such that a similar portion, major component(s), or complete representation of a previously/simultaneous ly or future published study is duplicated.
SALAMI SLICING: The slicing of research publication that would form one meaningful paper into several different papers is known as salami publication or salami slicing. Unlike duplicate publication, which involves reporting the exact same data in two or more publications, salami slicing involves breaking up or segmenting a large study into two or more publications. These segments are called slices of a study. As a general rule, as long as the slices of a broken-up study share the same hypotheses, population, and methods, this is not acceptable in general practice. The same slice should never be published more than once at all. According to the United States Office of Research Integrity (USORI), salami slicing can result in a distortion of the literature/findings by leading unsuspecting readers to believe that data presented in each salami slice (journal article) is derived from a different subject sample/source. Somehow this practice not only skews the scientific database but it creates repetition to waste reader's time as well as the time of editors and peer reviewers, who must also handle each paper separately.
Ethics in medical sciences research may not always translate into ethical publications.
Ethical violations in conducting medical research always promote unethical scientific publications.
Published research influences other researchers and establishes credibility for individual or journal.
I explain plainly what is salami silcing, a practice of fragmenting single research into as many publications as possible. Salami publishing and hazards
Ethical research and publication practices are essential for honest scholarly and scientific research. Most journals today are keenly aware of this: they publish policies on these issues and expect authors to “be aware of, and comply with, best practice in publication ethics”.This article discusses two widespread and related publishing practices that are considered unethical—duplicate publication and simultaneous submission. It draws on definitive international publication ethics guidelines.
Open Access (OA) is a system provide access to knowledge resources with free of cost and other restrictions. This PPT answer to the questions what, why, types, benefits etc. and also describes the creative commons licensing, concept of predatory journals, open access journals, and Sharpa RoMeO.
Selective Reporting and Misrepresentation of DataSaptarshi Ghosh
Research integrity means conducting research according to the highest professional and ethical standards, so that the results are trustworthy.
It concerns the behavior of researchers at all stages of the research life-cycle, including declaring competing interests; data collection and data management; using appropriate methodology; drawing conclusions from results; and writing up research findings.
Predatory Publications and Software Tools for IdentificationSaptarshi Ghosh
Journals that publish work without proper peer review and which charge scholars sometimes huge fees to submit should not be allowed to share space with legitimate journals and publishers, whether open access or not. These journals and publishers cheapen intellectual work by misleading scholars, preying particularly early career researchers trying to gain an edge. The credibility of scholars duped into publishing in these journals can be seriously damaged by doing so. It is important that as a scholarly community we help to protect each other from being taken advantage of in this way.
Redundant, Duplicate and Repetitive publications are the most important concerns in the scientific research/literature writing. The occurrence of redundancy affects the concepts of science/literature and carries with it sanctions of consequences. To define this issue is much challenging because of the many varieties in which one can slice, reformat, or reproduce material from an already published study. This issue also goes beyond the duplication of a single study because it might possible that the same or similar data can be published in the early, middle, and later stages of an on-going study. This may have a damaging impact on the scientific study/literature base. Similar to slicing a cake, there are so many ways of representing a study or a set of data/information. We can slice a cake into different shapes like squares, triangles, rounds, or layers. Which of these might be the best way to slice a cake? Unfortunately, this may be the wrong question. The point is that the cake that is being referred to, the data/ information set or the study/findings, should not be sliced at all. Instead, the study should be presented as a whole to the readership to ensure the integrity of science/technology because of the impact that may have on patients who will be affected by the information contained in the literature/findings. Redundant, duplicate, or repetitive publications occur when there is representation of two or more studies, data sets, or publications in either electronic or print media. The publications can overlap partially or completely, such that a similar portion, major component(s), or complete representation of a previously/simultaneous ly or future published study is duplicated.
SALAMI SLICING: The slicing of research publication that would form one meaningful paper into several different papers is known as salami publication or salami slicing. Unlike duplicate publication, which involves reporting the exact same data in two or more publications, salami slicing involves breaking up or segmenting a large study into two or more publications. These segments are called slices of a study. As a general rule, as long as the slices of a broken-up study share the same hypotheses, population, and methods, this is not acceptable in general practice. The same slice should never be published more than once at all. According to the United States Office of Research Integrity (USORI), salami slicing can result in a distortion of the literature/findings by leading unsuspecting readers to believe that data presented in each salami slice (journal article) is derived from a different subject sample/source. Somehow this practice not only skews the scientific database but it creates repetition to waste reader's time as well as the time of editors and peer reviewers, who must also handle each paper separately.
Ethics in medical sciences research may not always translate into ethical publications.
Ethical violations in conducting medical research always promote unethical scientific publications.
Published research influences other researchers and establishes credibility for individual or journal.
I explain plainly what is salami silcing, a practice of fragmenting single research into as many publications as possible. Salami publishing and hazards
Ethical research and publication practices are essential for honest scholarly and scientific research. Most journals today are keenly aware of this: they publish policies on these issues and expect authors to “be aware of, and comply with, best practice in publication ethics”.This article discusses two widespread and related publishing practices that are considered unethical—duplicate publication and simultaneous submission. It draws on definitive international publication ethics guidelines.
Open Access (OA) is a system provide access to knowledge resources with free of cost and other restrictions. This PPT answer to the questions what, why, types, benefits etc. and also describes the creative commons licensing, concept of predatory journals, open access journals, and Sharpa RoMeO.
Selective Reporting and Misrepresentation of DataSaptarshi Ghosh
Research integrity means conducting research according to the highest professional and ethical standards, so that the results are trustworthy.
It concerns the behavior of researchers at all stages of the research life-cycle, including declaring competing interests; data collection and data management; using appropriate methodology; drawing conclusions from results; and writing up research findings.
Most people learn ethical norms at home, school, church, or other social settings.
Although most people acquire their sense of right and wrong during childhood, moral
development occurs throughout life, and human beings pass through different stages of growth as they mature. Ethical norms are so ubiquitous that one might be tempted to regard them as simple
commonsense.
Research ethics are essential for several reasons. They promote the aims of the research, such as expanding knowledge. They support the values required for collaborative work, such as mutual respect and fairness. This is essential because scientific research depends on collaboration between researchers and groups.
Research ethics are moral principles that guide researchers to conduct and report research without deception or intention to harm the participants of the study or members of the society as a whole, whether knowingly or unknowingly. Practising ethical guidelines while conducting and reporting research is essential to establish the validity of your research.
The following is a rough and general summary of some ethical principles that various codes
address:
Honesty
Strive for honesty in all scientific communications. Honestly report data, results, methods and
procedures, and publication status.
Do not fabricate, falsify, or misrepresent data. Do not deceive
colleagues, research sponsors, or the public.
Objectivity
Strive to avoid bias in experimental design, data analysis, data interpretation, peer review, personnel decisions, grant writing, expert testimony, and other aspects of research where
objectivity is expected or required. Avoid or minimise bias or self-deception. Disclose personal
or financial interests that may affect research.
Integrity
Keep your promises and agreements; act with sincerity; strive for consistency of thought and action.
Carefulness
Avoid careless errors and negligence; carefully and critically examine your work and the
work of your peers. Keep good records of research activities, such as data collection, research
design, and correspondence with agencies or journals.
Openness
Share data, results, ideas, tools, and resources. Be open to criticism and new ideas.
Respect for Intellectual Property
Honour patents, copyrights, and other forms of intellectual property. Do not use unpublished data, methods, or results without permission. Give proper acknowledgement or credit for all
research contributions. Never plagiarise.
Confidentiality
Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and patient records.
Responsible Publication
Publish to advance research and scholarship, not to advance your career. Avoid wasteful and duplicative publication.
Responsible Mentoring
Help to educate, mentor, and advise students. Promote their welfare and allow them to make
their own decisions.
Respect for colleagues
Respect your colleagues and treat them fairly.
With the progress towards open science, scientific communication is facing a new wave of innovations towards more openness and speed of research publication which will deeply affect the way the peer review function is carried out and the overall role of journals in assuring quality and adding value to manuscripts.
Several initiatives are promoting the generalized adoption of open access preprints as a formal beginning stage of research publication, which has been common since the 90’s in the physics community. And, in the last decade, new ways to carry out the evaluation of manuscripts have emerged either to replace or to improve the traditional methods, which are widely criticized as being slow and expensive in addition to lacking transparency.
Quality nonprofit journals from emerging and developing countries have succeeded to follow the main innovations brought by the Internet. In addition to the technicalities of the digital publishing, there is a wide adoption of Open Access in the international flow of scientific information. The new wave of innovations that affect the peer review function and the changing role of journals pose new challenges to the emerging and developing countries in regard of scientific publishing. The adoption of these innovations is essential for progress of SciELO as a leading open access program to enhance scientific communication.
The scope of this workshop aims at an in-depth analysis and discussion of the state of art and main trends of the peer review function, the modalities of carrying it out as well as of the increasing adoption of mechanisms to speed publication such as preprints and how they affect and potentially renew the role of journals. These recommendations will guide SciELO policies on manuscript evaluation and on the adoption of preprint publications.
Moral principles that govern a person’s behavior or the conducting of an activity.
Ethics is the branch of philosophy that deals with morality. It is concerned with distinguishing between good and evil in the world, between right and wrong human actions, and between virtuous and nonvirtuous characteristics of people-The American Dictionary of Cultural Literacy(2005).
Ethics is the branch of philosophy that deals with morality. It is concerned with distinguishing between good and evil in the world, between right and wrong human actions, and between virtuous and non-virtuous characteristics of people— The American Dictionary of Cultural Literacy (2005).
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. Publication misconduct – Definition and concept
• Any unethical behavior relating to the publishing is called publication mis-conduct.
• Publication misconduct makes all time, money and efforts spent on research in vane and leads to detrimental
effects with a high possibility of non repairable damages in the research world.
• There is a zero tolerance policy towards papers associated with publication misconduct, which includes fabrication,
falsification, plagiarism, inappropriate authorship, duplicate submission, overlapping publication, salami
publication.
• Publishing is an important process after scientific research on a particular topic or a creative work.
• A researcher or a scholar has to publish his work to get scientific communication among peers and to get the
attention of the public.
• A research paper called article has to be published only after completing the systematic and scientific research
process.
3. Need for study
• Research work is not confined to the boundaries of a country. It has universal scope.
• The countries like United States of America and China are publishing more than 800000 technical
and scientific journals.
• Several other countries are also focusing on increasing the number of articles publishing in a year.
• This increases the need of understanding ethical guidelines and several misconducts that may be
linked with the research work and publication process.
4. Objectives / learning outcomes
• To examine various forms of misconduct in publishing.
• To brief on the effect of mis-conduct in publications.
• To make awareness about the different ways to prevent mis-conduct.
Publication misconduct is one of the serious problems in connection with the research
ethics which arises due to disrespect of intellectual property right of others who genuinely work for
raising the academic and living standards.
5. Problems that lead to unethical behavior – an overview / introduction
• Improves writing skill
• Helps in knowledge up-gradation
• Keeps me updated
• Teaches me about literature survey
• Makes happy
• Creates a set of knowledge for others
• Keeps alive as a researcher
• Motivate others to research
• Publicity to work
6. Reasons for Unethical misconduct
• Career pressures
• Researcher’s personal psychology
• Lack of appropriate training and skills
• Insufficient supervision or mentoring
• Inadequate knowledge
• Competency with colleagues
7. Consequence of Publication misconduct
• End to career as a researcher
• Academic achievement taken away
• Huge loss
• Destroy public trust on researchers
8. Identification of publication misconduct
• Plagiarism / Text recycling (‘self-plagiarism’)
• Duplicate/redundant publication
• Authorship issues
• Disputes, gift authorship, ghost authorship
• Data fabrication/falsification
• Image manipulation
• Undisclosed competing interests
• Lack of ethics approval – animal or human
• Unethical treatment of participants
• Lack of consent
10. • Fabrication is making up data or results and recording or reporting them.
• Falsification is manipulating research materials, equipment or processes or changing or
omitting data or results such that the Research is not accurately represented in the
Research record.
• Plagiarism is the appropriation of another person’s ideas, processes, results or words
without giving appropriate credit.
• Inappropriate authorship: Authorship is not appropriately assigned based on their
contributions.
• Duplicate submission / multiple submission: It refers to the practice of submitting the
same manuscript or several manuscript with minor differences to two or more journals at
the same time, or submitting to another journal within an agreed or stipulated period.
11. Contd.,
• Overlapping publication: It refers to the practice of publishing a paper that overlaps substantially
with one already published.
• Salami publication: Salami publication refers to the practice of slicing data from a large study,
could have been reported in a single paper, into different pieces and publishing them in two or
more articles, all of which covers the same population methods and question.
• Deliberate interference is intentionally causing material harm to the research work or scholarly
work of others and may include damaging or destroying the property of others, such as research
equipment or supplies; disrupting active experiments; or altering or deleting products of research
including data.
12.
13.
14. Conclusions
• Scientific misconduct is a serious problem that can have a significant impact on the integrity of research.
• Retractions are a way of notifying the scientific community that an article has been withdrawn because it contains serious
problems, such as fabrication, falsification, or plagiarism.
• One limitation of retractions is that they are often incomplete or inaccurate. For example, retractions may not always
specify the nature of the misconduct that led to the retraction, or they may not identify all of the authors who were involved
in the misconduct.
• Another limitation of retractions is that they may not be widely disseminated. Retraction notices are typically published in
the journal in which the retracted article was originally published, but they may not be picked up by other journals or
databases. This can make it difficult for researchers to be aware of retracted articles.
• Despite their limitations, retractions can still play an important role in making scientific misconduct visible. Retraction
notices can alert the scientific community to problems with a particular study, and they can help to deter future instances
of misconduct.
• In a 2017 study, Felicitas Hesselmann and colleagues reviewed the literature on retracted journal articles. They found that
the number of retracted articles has been increasing in recent years, and that the most common reasons for retraction are
fabrication, falsification, and plagiarism.
15. • More needs to be done to make scientific misconduct more visible, so that it can be prevented and
addressed effectively.
• Here are some of the steps that can be taken to make scientific misconduct more visible:
• Journals should be more transparent about the reasons for retractions.
• Retraction notices should be disseminated more widely.
• Researchers should be more vigilant in detecting and reporting misconduct.
• Universities and other research institutions should have strong policies in place to prevent and
address misconduct.
• By taking these steps, we can help to ensure that scientific misconduct is made more visible, and
that it is prevented and addressed effectively
16. References
• How to avoid misconduct in research and publishing (elsevier.com)
• Publication misconduct – Yogita Talwar, Dr.S.Aravind – Emperor
international journal of Library and Information Technology research
• Types of publication misconduct | SAGE India (sagepub.com)
• Research Misconduct | MIT Office of the Vice President for Research
• Fundamentals of ethics for scientists and engineers – Edmund G
Seebauer, Robert L Barry
• Research and publication ethics – class notes
17. CONTRIBUTIONS
• Mr.S.Subbiah – Publication misconduct definition and concept
• Mr.P.Sakthivel – Problems that leads to unethical behavior
• Mr.V.Suresh – Publication misconduct types