Identifying fabricated networks within authorship-for-sale enterprises.

Simon J Porter, Leslie D McIntosh
Author Information
  1. Simon J Porter: Digital Science, London, GB, UK. s.porter@digital-science.com. ORCID
  2. Leslie D McIntosh: Digital Science, London, GB, UK. ORCID

Abstract

It is estimated that 2% of all journal submissions across all disciplines originate from paper mills, both creating significant risk that the body of research that we rely on to progress becomes corrupted, and placing undue burden on the submission process to reject these articles. By understanding how the business of paper mills-the technological approaches that they adopt, as well as the social structures that they require to operate-the research community can be empowered to develop strategies that make it harder, or ideally impossible for them to operate. Most of the contemporary work in paper-mill detection has focused on identifying the signals that have been left behind inside the text or structure of fabricated papers that result from the technological approaches that paper mills employ. As technologies employed by paper mills advance, these signals will become harder to detect. Fabricated papers do not just need text, images, and data however, they also require a fabricated or partially fabricated network of authors. Most 'authors' on a fabricated paper have not been associated with the research, but rather are added through a transaction. This lack of deeper connection means that there is a low likelihood that co-authors on fabricated papers will ever appear together on the same paper more than once. This paper constructs a model that encodes some of the key characteristics of this activity in an 'authorship-for-sale' network with the aim to create a robust method to detect this type of activity. A characteristic network fingerprint arises from this model that provides a robust statistical approach to the detection of paper-mill networks. The model suggested in this paper detects networks that have a statistically significant overlap with other approaches that principally rely on textual analysis for the detection of fraudulent papers. Researchers connected to networks identified using the methodology outlined in this paper are shown to be connected with 37% of papers identified through the tortured-phrase and clay-feet methods deployed in the Problematic Paper Screener website. Finally, methods to limit the expansion and propagation of these networks is discussed both in technological and social terms.

References

  1. Sci Eng Ethics. 2023 Nov 22;29(6):39 [PMID: 37991609]
  2. Nature. 1998 Jun 4;393(6684):440-2 [PMID: 9623998]
  3. Front Res Metr Anal. 2022 Mar 28;7:779097 [PMID: 35419503]
  4. FEBS Lett. 2020 Feb;594(4):583-589 [PMID: 32067229]
  5. Environ Eng Sci. 2017 Jan 1;34(1):51-61 [PMID: 28115824]
  6. mBio. 2016 Jun 07;7(3): [PMID: 27273827]
  7. Proc Natl Acad Sci U S A. 2012 Oct 16;109(42):17028-33 [PMID: 23027971]
  8. PLoS One. 2022 Dec 13;17(12):e0278362 [PMID: 36512587]
  9. Nature. 2023 Jun;618(7964):222-223 [PMID: 37258739]
  10. BMJ Open. 2016 Nov 23;6(11):e012047 [PMID: 27881524]
  11. Front Res Metr Anal. 2022 Apr 26;7:835139 [PMID: 35558165]
  12. Front Res Metr Anal. 2021 Apr 14;6:656233 [PMID: 33937619]
  13. PLoS One. 2015 Jun 17;10(6):e0127556 [PMID: 26083381]
  14. Proc Natl Acad Sci U S A. 2018 Mar 13;115(11):2557-2560 [PMID: 29487213]
  15. Nature. 2022 Dec 5;: [PMID: 36474052]
  16. PLoS Med. 2013 Dec;10(12):e1001563 [PMID: 24311988]
  17. Life Sci Alliance. 2022 Jan 12;5(4): [PMID: 35022248]
  18. Science. 2018 Mar 2;359(6379): [PMID: 29496846]
  19. Science. 2015 Sep 4;349(6252):1036 [PMID: 26339005]
  20. BMJ. 2005 Jul 30;331(7511):267-70 [PMID: 16052019]

Word Cloud

Created with Highcharts 10.0.0paperfabricatedpapersnetworksmillsresearchtechnologicalapproachesdetectionnetworkmodelsignificantrelysocialrequireharderpaper-millsignalstextwilldetectactivityrobustconnectedidentifiedmethodsestimated2%journalsubmissionsacrossdisciplinesoriginatecreatingriskbodyprogressbecomescorruptedplacingundueburdensubmissionprocessrejectarticlesunderstandingbusinessmills-theadoptwellstructuresoperate-thecommunitycanempowereddevelopstrategiesmakeideallyimpossibleoperatecontemporaryworkfocusedidentifyingleftbehindinsidestructureresultemploytechnologiesemployedadvancebecomeFabricatedjustneedimagesdatahoweveralsopartiallyauthors'authors'associatedratheraddedtransactionlackdeeperconnectionmeanslowlikelihoodco-authorseverappeartogetherconstructsencodeskeycharacteristics'authorship-for-sale'aimcreatemethodtypecharacteristicfingerprintarisesprovidesstatisticalapproachsuggesteddetectsstatisticallyoverlapprincipallytextualanalysisfraudulentResearchersusingmethodologyoutlinedshown37%tortured-phraseclay-feetdeployedProblematicPaperScreenerwebsiteFinallylimitexpansionpropagationdiscussedtermsIdentifyingwithinauthorship-for-saleenterprises

Similar Articles

Cited By (1)