fbpx
Connect with us

The Conversation

When scientific citations go rogue: Uncovering ‘sneaked references’

Published

on

theconversation.com – Lonni Besançon, Assistant Professor in Data Visualization, Linköping University – 2024-07-09 07:22:58

Science is a process of collaboration that depends on accurate citations.

AlexRaths/iStock via Getty Images

Lonni Besançon, Linköping University and Guillaume Cabanac, Institut de Recherche en Informatique de Toulouse

A researcher working alone – apart from the world and the rest of the wider scientific community – is a classic yet misguided image. Research is, in reality, built on continuous exchange within the scientific community: First you understand the work of others, and then you share your findings.

Advertisement

Reading and writing articles published in academic journals and presented at conferences is a central part of being a researcher. When researchers write a scholarly article, they must cite the work of peers to provide context, detail sources of inspiration and explain differences in approaches and results. A positive citation by other researchers is a key measure of visibility for a researcher's own work.

But what happens when this citation system is manipulated? A recent Journal of the Association for Information Science and Technology article by our team of academic sleuths – which includes information scientists, a computer scientist and a mathematician – has revealed an insidious method to artificially inflate citation counts through metadata manipulations: sneaked references.

Hidden manipulation

People are becoming more aware of scientific publications and how they work, their potential flaws. Just last year more than 10,000 scientific articles were retracted. The issues around citation gaming and the harm it causes the scientific community, including damaging its credibility, are well documented.

Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors' names, publication year, journal or conference name, and page numbers of the cited publication. These details are stored as metadata, not visible in the article's text directly, but assigned to a digital object identifier, or DOI – a unique identifier for each scientific publication.

Advertisement

References in a scientific publication allow authors to justify methodological choices or present the results of past studies, highlighting the iterative and collaborative nature of science.

However, we found through a encounter that some unscrupulous actors have added extra references, invisible in the text but present in the articles' metadata, when they submitted the articles to scientific databases. The result? Citation counts for certain researchers or journals have skyrocketed, even though these references were not cited by the authors in their articles.

Chance discovery

The investigation began when Guillaume Cabanac, a professor at the University of Toulouse, wrote a post on PubPeer, a website dedicated to postpublication peer , in which scientists discuss and analyze publications. In the post, he detailed how he had noticed an inconsistency: a Hindawi journal article that he suspected was fraudulent because it contained awkward phrases had far more citations than downloads, which is very unusual.

The post caught the attention of several sleuths who are now the authors of the JASIST article. We used a scientific search engine to look for articles citing the initial article. Google Scholar found none, but Crossref and Dimensions did find references. The difference? Google Scholar is likely to mostly rely on the article's main text to extract the references appearing in the bibliography section, whereas Crossref and Dimensions use metadata provided by publishers.

Advertisement

A new type of fraud

To understand the extent of the manipulation, we examined three scientific journals that were published by the Technoscience Academy, the publisher responsible for the articles that contained questionable citations.

Our investigation consisted of three steps:

  1. We listed the references explicitly present in the HTML or PDF versions of an article.

  2. We these lists with the metadata recorded by Crossref, discovering extra references added in the metadata but not appearing in the articles.

  3. We checked Dimensions, a bibliometric platform that uses Crossref as a metadata source, finding further inconsistencies.

In the journals published by Technoscience Academy, at least 9% of recorded references were “sneaked references.” These additional references were only in the metadata, distorting citation counts and giving certain authors an unfair advantage. Some legitimate references were also lost, meaning they were not present in the metadata.

In addition, when analyzing the sneaked references, we found that they highly benefited some researchers. For example, a single researcher who was associated with Technoscience Academy benefited from more than 3,000 additional illegitimate citations. Some journals from the same publisher benefited from a hundred additional sneaked citations.

Advertisement

We wanted our results to be externally validated, so we posted our study as a preprint, informed both Crossref and Dimensions of our findings and gave them a link to the preprinted investigation. Dimensions acknowledged the illegitimate citations and confirmed that their database reflects Crossref's data. Crossref also confirmed the extra references in Retraction Watch and highlighted that this was the first time that it had been notified of such a problem in its database. The publisher, based on Crossref's investigation, has taken action to fix the problem.

Implications and potential solutions

Why is this discovery important? Citation counts heavily influence research , academic promotions and institutional rankings. Manipulating citations can to unjust decisions based on false data. More worryingly, this discovery raises questions about the integrity of scientific impact measurement , a concern that has been highlighted by researchers for years. These systems can be manipulated to foster unhealthy competition among researchers, tempting them to take shortcuts to publish faster or achieve more citations.

To combat this practice we suggest several measures:

  • Rigorous verification of metadata by publishers and agencies like Crossref.

  • Independent audits to ensure data reliability.

  • Increased transparency in managing references and citations.

This study is the first, to our knowledge, to a manipulation of metadata. It also discusses the impact this may have on the evaluation of researchers. The study highlights, yet again, that the overreliance on metrics to evaluate researchers, their work and their impact may be inherently flawed and wrong.

Advertisement

Such overreliance is likely to promote questionable research practices, including hypothesizing after the results are known, or HARKing; splitting a single set of data into several papers, known as salami slicing; data manipulation; and plagiarism. It also hinders the transparency that is key to more robust and efficient research. Although the problematic citation metadata and sneaked references have now been apparently fixed, the corrections may have, as is often the case with scientific corrections, happened too late.

This article is published in collaboration with Binaire, a blog for understanding digital issues.

This article was originally published in French.The Conversation

Lonni Besançon, Assistant Professor in Data Visualization, Linköping University and Guillaume Cabanac, Professeur des universités, Institut de Recherche en Informatique de Toulouse

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement

Read More

The post When scientific citations go rogue: Uncovering ‘sneaked references' appeared first on .com

The Conversation

Space missions are getting more complex − lessons from Amazon and FedEx can inform satellite and spacecraft management in orbit

Published

on

theconversation.com – Koki Ho, Associate Professor of Aerospace Engineering, Georgia Institute of Technology – 2024-08-21 07:14:32

As companies develop satellite constellations as shown in this illustration, they'll need to repair satellites in orbit.

NOIRLab/NSF/AURA/P. Marenfeld, CC BY-ND

Koki Ho, Georgia Institute of Technology and Mariel Borowitz, Georgia Institute of Technology

Most mission historically have used one spacecraft designed to complete an entire mission independently. Whether it was a weather satellite or a human-crewed module like Apollo, nearly every spacecraft was deployed and performed its one-off mission completely on its own.

Advertisement

But today, space industry are exploring missions with many satellites working together. For example, SpaceX's Starlink constellations include thousands of satellites. And new spacecraft could soon have the capabilities to link up or engage with other satellites in orbit for repairs or refueling.

Some of these spacecraft are already operating and serving customers, such as Northrop Grumman's mission extension vehicle. This orbiting craft has extended the lives of multiple communications satellites.

Northrup Grumman's mission extension vehicle is one example of a craft designed to service other satellites and spacecraft while in orbit.

These new design options and in-orbit capabilities make space missions look more like large logistics operations on Earth.

We're researchers who have studied the space industry for years. We've studied how the space sector could learn lessons from companies like Amazon or FedEx about managing complex fleets and coordinating operations.

Advertisement

Lessons from the ground transportation network

Space mission designers plan their routes in order to deliver their payloads to the Moon or Mars, or orbit efficiently within a set of cost, timeline and capacity constraints. But when they need to coordinate multiple space vehicles working together, route planning can get complicated.

Logistics companies on the ground solve similar problems every day and transport goods and commodities across the globe. So, researchers can study how these companies manage their logistics to help space companies and agencies figure out how to successfully plan their mission operations.

One NASA-funded study in the early 2000s had an idea for simulating space logistics operations. These researchers viewed orbits or planets as and the trajectories connecting them as routes. They also viewed the payload, consumables, fuel and other items to transport as commodities.

This approach helped them reframe the space mission problem as a commodity flow problem – a type of question that ground logistics companies work on all the time.

Advertisement

Lessons from ground logistics infrastructure

New capabilities for refueling and repairing spacecraft in orbit create new opportunities as well as challenges.

Namely, space operators don't usually know which satellite will be the next one to fail or when that will happen. For these new technologies to be useful, space mission designers would need to up with an infrastructure system. That could look like a fleet of service vehicles and depots in space that quickly respond to any unpredictable events.

Fortunately, space mission designers can learn from operations on the ground. City planners and emergency response organizations think through these types of challenges while determining where to locate hospitals or fire departments. They also consider these facilities' capacities to respond to unpredictable calls.

We can draw an analogy between a ground logistics system design and an in-space servicing system design. This way, researchers can leverage theories developed for ground logistics to improve the space mission design practice.

Advertisement

One study published in November 2020 developed a framework for servicing spacecraft on orbit using what logistics experts call spatial queuing theory. Researchers most commonly use this modeling theory to analyze the performance of a ground logistics system.

Lessons from ground warehouse management

In the past, individual spacecraft carried out their missions independently, so if a satellite failed, its mission engineers had to develop and send a replacement.

Now, for missions with multiple satellites, such as the Iridium satellite constellation, operators often maintain one or more spares on orbit.

This becomes complicated for constellations made up of hundreds or thousands of spacecraft. Mission designers want to ensure they have enough spare satellites in orbit so they don't have to interrupt the mission if one breaks. But sending too many spare satellites gets expensive.

Advertisement

When dealing with these types of large constellations, mission designers can learn from the methods Amazon and other ground companies use to manage their warehouses. Amazon puts these warehouses in specific places and stocks them with certain items to make sure the deliveries are handled efficiently.

An overhead view of a fright yard, with a forklift driving between rows of large containers.

Supply chain managers on the ground deal with some of the same questions that mission designers in the space industry are starting to tackle, like how to manage their inventory.

Suriyapong Thongsawang/Moment via Getty Images

Inventory management theories on the ground can help inform how space companies tackle these challenges.

A study published in November 2019 developed an approach that space companies could use to manage their spare strategies. This approach can help them decide where in orbit to allocate their spare satellites to meet their needs while minimizing any service interruptions.

Advertisement

International dimensions

Spacecraft operate in a complex and rapidly changing . Operators need to know where other missions are operating and what rules they should follow when refueling or repairing in space. In space, however, nobody has defined these rules yet.

Ships, aircraft and ground vehicles all have clear rules of the road to follow when interacting with other vehicles. For example, civilian ships and aircraft have to share their location with other vehicles and to help manage traffic.

Some researchers are examining what similar rules could look like for space. One study examined how developing rules based on a spacecraft's size, age or other attributes might help future space operations more smoothly. For example, one rule might be that the spacecraft that launched most recently should take responsibility for maneuvering when there's another craft in its path.

With more satellites and spacecraft launching now than ever, companies and agencies will need new technologies and policies to coordinate them. As space activity becomes more complex, researchers can continue to apply what they've learned on the ground to new missions in space.The Conversation

Koki Ho, Associate Professor of Aerospace Engineering, Georgia Institute of Technology and Mariel Borowitz, Associate Professor of International Affairs, Georgia Institute of Technology

Advertisement

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post Space missions are getting more complex − lessons from Amazon and FedEx can inform satellite and spacecraft management in orbit appeared first on .com

Advertisement
Continue Reading

The Conversation

China leans into using AI − even as the US leads in developing it

Published

on

theconversation.com – Shaoyu Yuan, Dean's Fellow at the Division of Global Affairs, Rutgers – Newark – 2024-08-21 07:14:47

The Chinese has made extensive use of existing AI technologies, for surveillance.

Peter Parks/AFP via Getty Images

Shaoyu Yuan, Rutgers University – Newark

In the competitive arena of global technology, China's ambitions in artificial intelligence stand out – not just for their scale but for their distinct strategic approach.

Advertisement

In 2017, the Chinese Communist Party declared its intent to surpass the United States to become the world leader in AI by 2030. This plan, however, is less about pioneering novel technologies and more about strategically adapting existing ones to serve economic, political and social objectives.

While both China and the United States are actively pursuing AI technologies, their approaches differ significantly. The U.S. has traditionally led in fundamental AI research and innovation, with institutions such as Institute of Technology and Stanford and tech giants such as Google and Microsoft driving breakthroughs in machine learning. This innovation-first approach contrasts with China's focus on adaptation and application of existing technologies for specific state objectives.

The United States' AI development is primarily driven by a decentralized network of academic institutions, private companies and government agencies, often with competing interests and a focus on commercial applications. In contrast, China's AI strategy is more centralized and state directed, with a clear focus on supporting government initiatives such as social control and economic planning.

AI for ideological control

At the heart of China's AI strategy lies its effort to embed the technology in the machinery of the government's ideological control. A prime example is the Xue Xi chatbot developed by researchers at China's top-ranked university, Tsinghua University. Unlike Western AI models designed to foster open-ended dialogue, Xue Xi was trained in part on “Xi Jinping Thought” to indoctrinate users – likely initially to be party members in government – with Communist Party ideology.

Advertisement

China's large language model chatbots are a step ahead of the likes of ChatGPT in one respect: political censorship.

This isn't just a singular initiative but part of a broader trend. AI-driven surveillance systems, like the facial recognition technology deployed across the Xinjiang region of China, enable the government to maintain tight control over the area's minority Muslim Uyghur population.

These technologies are not groundbreaking. They build on existing innovations but are finely tuned to serve the Communist Party's efforts to maintain social order and prevent dissent. China's AI prowess comes not by creating the newest technology but by mastering and deploying AI in ways that align with its ideological imperatives.

AI for economic control

China's AI strategy is also deeply intertwined with its economic ambitions. with slowing growth, the Communist Party views technology as the essential tool for pulling the country out of its economic slowdown. This is particularly evident in sectors such as manufacturing and logistics, where AI is used to efficiencies and maintain China's competitive edge in global supply chains. For example, companies such as online retail giant Alibaba have developed AI-driven logistics platforms that optimize delivery routes and manage warehouse operations, ensuring that China remains the factory of the world.

Additionally, China's social credit system, which rates citizens on their civic and financial behavior, represents a significant strategic initiative where AI plays an increasingly crucial role. China's system is designed to monitor and influence citizen behavior on a massive scale. Although AI is not yet fully implemented across the entire social credit system, it is being integrated to track and analyze vast amounts of data, such as financial transactions, online interactions and social relationships in real time.

Advertisement

This data is then used to assign scores that can affect various aspects of life, from loan approvals to travel permissions. As AI becomes increasingly embedded in the system, it is likely, I believe, to further reinforce state control and ensure societal compliance, prioritizing government oversight over personal autonomy.

Strategic exports

On the international stage, China is exporting its AI technologies to expand its influence, particularly in developing nations. Through the Belt and Road Initiative, Chinese tech giants such as Huawei and ZTE are providing AI-driven surveillance systems to governments in Africa, Southeast Asia and Latin America. These systems, often framed as tools for improving public safety, are part of a larger strategy to export China's governance model.

For instance, in Zimbabwe, Chinese firms have helped implement a nationwide facial recognition system under the guise of combating . Political activists in Zimbabwe fear that technology is being used to monitor political opponents and activists, mirroring its use in China. By exporting AI technologies that are tightly integrated with state control, China is not only expanding its market share but also promoting its authoritarian model as a viable alternative to Western democracy.

AI for strategic military advantage

China's military ambitions are also tightly linked to its AI strategy. The People's Liberation Army, China's military, is investing heavily in AI-driven autonomous systems, including drones and robotic platforms. These technologies are not necessarily the most advanced in the world, but China is adapting them to fit its strategic needs.

Advertisement

China is developing AI systems to its naval operations in the South China Sea, a region of significant geopolitical tension. China is deploying autonomous submarines and surveillance drones to monitor and potentially disrupt foreign military activities in the region. This strategic use of AI in military applications highlights China's focus on using existing technologies to achieve specific geopolitical objectives, rather than seeking innovation for its own sake.

China and the U.S. are racing to develop – and deploy – AI-powered military drones.

Calculated strategy

China's approach to AI is a calculated strategy of adaptation and application, rather than raw innovation. By mastering the use of existing technologies and aligning them with state objectives, China is not only bolstering its domestic control but also reshaping global power dynamics.

Whether through ideological indoctrination, economic control, strategic exports or military advancements, China's AI playbook is a powerful reminder that in the realm of technology, how tools are used can be just as transformative as the tools themselves.The Conversation

Shaoyu Yuan, Dean's Fellow at the Division of Global Affairs, Rutgers University – Newark

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement

Read More

The post China leans into using AI − even as the US leads in developing it appeared first on .com

Continue Reading

The Conversation

Squid have tiny teeth in their suckers − scientists could use their unique properties to make self-healing materials

Published

on

theconversation.com – Abdon Pena-Francesch, Assistant Professor of Materials Science and Engineering, of Michigan – 2024-08-21 07:14:14

An electron-microscopy image of the teeth inside a squid sucker.

Abdon Pena-Francesch

Abdon Pena-Francesch, University of Michigan

When you think of a fearsome, sharp-toothed predator, a squid probably isn't the first animal that to mind. But these complex creatures have sophisticated eyesight, a strong beak to crush shells and agile tentacles that them snatch up prey.

Advertisement

Oh, and they have teeth in their suckers. The serrated teeth inside the suction cups on their tentacles allow them to latch onto prey.

While most hard tissues in animals are mineralized, with calcium fortifying their bones, shells or teeth, the squids' sucker teeth are instead composed of structural proteins. Scientists don't really understand how these teeth are made.

By looking inside a squid sucker using an electron microscope, our team of scientists captured an image that shows the cell tissue that grows the teeth. The cells located in the inside walls of the suction cup secrete proteins that bind to each other and form complex teethed-ring structures.

Two white rings with teeth coming off them.

The teeth structures inside squid suckers.

Abdon Pena-Francesch

Advertisement

High-strength proteins in squid sucker teeth

Squid sucker teeth have some outstanding properties. They're resistant to compression, yet they're flexible and can conform to the shape of their prey. Our team's research tries to understand not only how these teeth are made, but also where their unique properties from.

The teeth are composed of a of structural proteins, which have a mechanical function rather than a biological function. Some examples include keratin, which makes up hair and nails, or silk, which gives structure to spider webs and silkworm cocoons. In squids, these sucker teeth catch and grip onto prey.

Proteins are made of amino acids arranged in a specific order, and that order defines their structure. Sucker teeth proteins have amino acids that form hard, tiny crystals called nanocrystals in the material. These nanocrystals connect the protein strands in a network – similar to knots in a fishing net.

These nanocrystals come together to form nanotubes inside the material, like tiny honeycomb structures. When we look at them through an electron microscope, we can see a tooth cut in half, revealing the intricate internal structure with long but tiny nanotubes. Thanks to these nanostructures, the squid protein teeth have strength, toughness and a flexibility that outperforms many synthetic polymers and modern materials.

Advertisement

Long, thin tube structures put together.

An electron-microscopy image of the cross section of a squid sucker ring's teeth, which reveals the nanotubes.

Abdon Pena-Francesch

Squid-inspired new materials

Scientists and engineers can take inspiration from biology and use unique natural structures to model and develop new types of materials. For example, squid sucker ring teeth have inspired the of self-healing materials that can repair their own cuts, punctures or scratches.

The nanocrystals that hold together the squid teeth proteins can reform after they break. Materials made in our lab inspired by squid nanocrystals could to self-repairing medical devices or robots. These materials would last longer and require less upkeep, which would be useful in dangerous environments or inside the human body.

These squid-inspired materials could also assemble and disassemble by themselves. Materials with this property could be recycled or degraded without leaving behind any waste. That would make this sort of material a promising bio-based alternative to single-use plastic.The Conversation

Abdon Pena-Francesch, Assistant Professor of Materials Science and Engineering, University of Michigan

Advertisement

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Read More

The post Squid have tiny teeth in their suckers − scientists could use their unique properties to make self-healing materials appeared first on .com

Advertisement
Continue Reading

Trending