Addressing researcher fraud: retrospective, real-time, and preventive strategies-including legal points and data management that prevents fraud.

Frontiers in research metrics and analytics Pub Date : 2024-06-27 eCollection Date: 2024-01-01 DOI:10.3389/frma.2024.1397649
James E Kennedy
{"title":"Addressing researcher fraud: retrospective, real-time, and preventive strategies-including legal points and data management that prevents fraud.","authors":"James E Kennedy","doi":"10.3389/frma.2024.1397649","DOIUrl":null,"url":null,"abstract":"<p><p>Researcher fraud is often easy and enticing in academic research, with little risk of detection. Cases of extensive fraud continue to occur. The amount of fraud that goes undetected is unknown and may be substantial. Three strategies for addressing researcher fraud are (a) retrospective investigations after allegations of fraud have been made, (b) sting operations that provide conclusive evidence of fraud as it occurs, and (c) data management practices that prevent the occurrence of fraud. Institutional and regulatory efforts to address researcher fraud have focused almost exclusively on the retrospective strategy. The retrospective approach is subject to controversy due to the limitations of <i>post-hoc</i> evidence in science, the difficulty in establishing who actually committed the fraud in some cases, the application of a legal standard of evidence that is much lower than the usual standards of evidence in science, and the lack of legal expertise by scientists investigating fraud. The retrospective strategy may be reliably effective primarily in cases of extensive, careless fraud. Sting operations can overcome these limitations and controversies, but are not feasible in many situations. Data management practices that are effective at preventing researcher fraud and unintentional errors are well-established in clinical trials regulated by government agencies, but appear to be largely unknown or unimplemented in most academic research. Established data management practices include: archiving secure copies of the raw data, audit trails, restricted access to the data and data collection processes, software validation, quality control checks, blinding, preregistration of data processing and analysis programs, and research audits that directly address fraud. Current discussions about data management in academic research focus on sharing data with little attention to practices that prevent intentional and unintentional errors. A designation or badge such as <i>error-controlled data management</i> could be established to indicate research that was conducted with data management practices that effectively address intentional and unintentional errors.</p>","PeriodicalId":73104,"journal":{"name":"Frontiers in research metrics and analytics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11236558/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in research metrics and analytics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/frma.2024.1397649","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2024/1/1 0:00:00","PubModel":"eCollection","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Researcher fraud is often easy and enticing in academic research, with little risk of detection. Cases of extensive fraud continue to occur. The amount of fraud that goes undetected is unknown and may be substantial. Three strategies for addressing researcher fraud are (a) retrospective investigations after allegations of fraud have been made, (b) sting operations that provide conclusive evidence of fraud as it occurs, and (c) data management practices that prevent the occurrence of fraud. Institutional and regulatory efforts to address researcher fraud have focused almost exclusively on the retrospective strategy. The retrospective approach is subject to controversy due to the limitations of post-hoc evidence in science, the difficulty in establishing who actually committed the fraud in some cases, the application of a legal standard of evidence that is much lower than the usual standards of evidence in science, and the lack of legal expertise by scientists investigating fraud. The retrospective strategy may be reliably effective primarily in cases of extensive, careless fraud. Sting operations can overcome these limitations and controversies, but are not feasible in many situations. Data management practices that are effective at preventing researcher fraud and unintentional errors are well-established in clinical trials regulated by government agencies, but appear to be largely unknown or unimplemented in most academic research. Established data management practices include: archiving secure copies of the raw data, audit trails, restricted access to the data and data collection processes, software validation, quality control checks, blinding, preregistration of data processing and analysis programs, and research audits that directly address fraud. Current discussions about data management in academic research focus on sharing data with little attention to practices that prevent intentional and unintentional errors. A designation or badge such as error-controlled data management could be established to indicate research that was conducted with data management practices that effectively address intentional and unintentional errors.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
解决研究人员欺诈问题:回顾、实时和预防战略--包括法律要点和防止欺诈的数据管理。
在学术研究中,研究人员的欺诈行为往往很容易被发现,而且诱惑力很大。大量欺诈案件仍在发生。未被发现的欺诈数量尚不清楚,但可能相当可观。解决研究人员欺诈问题的三项策略是:(a) 在提出欺诈指控后进行追溯调查;(b) 在欺诈发生时采取刺探行动,提供确凿证据;(c) 采取数据管理措施,防止欺诈发生。机构和监管部门为解决研究人员欺诈问题所做的努力几乎都集中在追溯策略上。由于事后证据在科学领域的局限性、在某些情况下难以确定欺诈行为的实际实施者、适用的法律证据标准远低于科学领域的通常证据标准,以及调查欺诈行为的科学家缺乏法律专业知识,追溯法备受争议。追溯策略可能主要在大范围、粗心大意的欺诈案件中可靠有效。刺探行动可以克服这些限制和争议,但在许多情况下并不可行。在由政府机构监管的临床试验中,有效防止研究人员欺诈和无意失误的数据管理方法已经非常成熟,但在大多数学术研究中,这些方法似乎大多不为人知或未得到实施。成熟的数据管理实践包括:原始数据的安全副本归档、审计跟踪、限制访问数据和数据收集过程、软件验证、质量控制检查、盲法、数据处理和分析程序的预先注册,以及直接针对欺诈行为的研究审计。目前有关学术研究数据管理的讨论主要集中在数据共享方面,而很少关注防止有意和无意错误的做法。可以设立一个称号或徽章,如 "错误可控数据管理",以表明研究是在有效解决有意和无意错误的数据管理实践中进行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.50
自引率
0.00%
发文量
0
审稿时长
14 weeks
期刊最新文献
Navigating algorithm bias in AI: ensuring fairness and trust in Africa. The ethics of knowledge sharing: a feminist examination of intellectual property rights and open-source materials in gender transformative methodologies. Complexity and phase transitions in citation networks: insights from artificial intelligence research. Designing measures of complex collaborations with participatory, evidence-centered design. Patent data-driven analysis of literature associations with changing innovation trends.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1