首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
【目的】 探讨第三方代投医学科研论文的作者基本信息及论文特点,提出防范建议。【方法】 调查《第三军医大学学报》2017年10—12月779篇来稿的作者注册信息、用户名、密码等基本信息,并分析疑似代投论文的特点。【结果】 本研究发现165篇疑似代投论文,其中72篇来稿正文无作者及单位署名(无署名),93篇来稿正文有作者及单位署名(有署名)。疑似代投论文的注册邮箱、手机号和用户名、密码均有一定规律性;无署名论文注册信息特征性较强,论文质量不高,以临床研究为主,更易识别;有署名论文相对规范,以基础研究为主,存在基金标注不当现象。【结论】 第三方代投具有各自规律的注册信息特征及论文特点。建议医学期刊编辑加强论文初审,重视审核作者投稿信息,并要求作者投稿时提供相关研究真实性证明材料,同时相关科研管理部门应加强科研人员的学术道德伦理教育和监管。  相似文献   

2.
【目的】 探讨代投论文的识别方法及遏制论文代投的策略。【方法】 基于编辑部稿件处理系统投稿论文作者的电子邮箱、联系电话、身份证号码、用户名等个人注册信息,挖掘疑似代投论文,结合专业知识服务平台(中国知网、维普资讯、万方数据、Web of Science等)与搜索引擎(百度、谷歌和360等)进行甄别。【结果】 从个人注册信息和投稿论文的可疑内容寻找论文代投线索;通过对信息源的多重交叉验证,成功锁定规模大、代投时间长、成功率高的第三方机构;基于编辑主体责任的防范措施可降低代投论文进入稿件处理流程的可能性,在一定程度上避免了各种深层次、强隐蔽性的衍生不端行为。【结论】 论文代投是论文代写、代修、买卖、有偿发表等灰色利益链上的关键环节;代投论文是编辑发现作者学术不端行为的重要切入点;严查代投论文,收紧入口是遏制学术不端行为的有效手段。  相似文献   

3.
【目的】 调查医学论文作者单位署名不当现象的几种典型方式,分析这些现象背后的原因,提出相应的建议和措施,并探讨其伦理规范。【方法】 对《第三军医大学学报》2016年10月26日—2016年12月31日545篇来稿及2015年同期444篇来稿中未标明作者和单位署名的论文进行调查,按照作者投稿时注册的信息打电话核实情况,并采用卡方检验对数据进行统计学分析。对《第三军医大学学报》收到的单位署名和论文内容不相关,病例资料来源与第一署名单位不一致的2篇论文进行案例调查,指出各自存在的伦理问题。【结果】 2016年所调查时间段共有53篇(9.7%)在初投稿中无作者和单位署名,明显高于2015年所调查时间段\[7篇(1.6%)\],且差异有统计学意义(χ2=28.51,P<0.01)。对2016年53篇未署名论文核实其登记的作者信息时,发现可能存在第三方代写、中介机构代投情况。对案例1作者单位署名和论文内容不相关,案例2病例资料来源与第一署名单位不一致的情况进行调查,经核实均属于作者隶属的机构单位与完成课题的机构单位不一致的单位署名不当。【结论】 编辑要提高警惕并核实单位署名不当的论文,采取适当对策,制定有针对性的伦理规范以约束作者署名行为。  相似文献   

4.
【目的】 为期刊编辑及时、准确地处理Meta分析类稿件提供参考依据,以期提高期刊编辑的工作效率和期刊来稿质量。【方法】 调查2011年11月1日—2017年11月1日《中国卫生统计杂志》在线投稿系统中Meta分析类稿件,深入分析119篇样本稿件的审理过程,归纳退稿原因并总结审稿策略。【结果】 119篇稿件中,仅33篇稿件已发表,20篇稿件仍在审理过程中,66篇稿件被退稿。退稿原因包括选题创新性差、文献检索不当、文献纳入与排除标准不严谨、流程图不规范、异质性分析不当、发表偏倚分析不当、讨论欠佳等。【结论】 编辑审读Meta分析类稿件时,应加强主题选取和相关文献的搜集、纳入文献的筛选方法及质量评价、数据的统计学处理和结果解释4个方面的审查,减少不合格文献的数量。  相似文献   

5.
【目的】 通过科学的办刊措施,预防互联网时代频发的伪审稿事件。【方法】 确立期刊的稿件评价标准,明确符合评价稿件的同行专家资格,在互联网投审稿平台系统各个环节中执行稿件的评价标准。【结果】 期刊疏于管理将引起伪审稿事件;为了淘汰低劣稿件,期刊编辑既要博学,又要善于管理和使用网络平台系统及各种先进的防伪工具;为了公平公正的评阅稿件,编辑必须以稿件评价标准严格初审稿件,充分权衡同行评审意见的有效性和合理性。 【结论】 同行评审是学术期刊出版的基石。预防伪审稿必须严格执行期刊的稿件评价标准,杜绝第三方代投、代评和代写稿件。  相似文献   

6.
【目的】分析国家卫生健康委员会(National Health Commission, NHC)通报的医学学术不端论文情况,探讨医学学术不端论文的有效防范对策。【方法】以2021年6月3日至12月31日NHC通报的309篇医学学术不端论文为研究对象,对其作者特征(职称、科室、工作单位、署名作者数)、论文特征(发表与撤回时间、被引用情况)、学术不端行为及处理措施等进行统计学分析。【结果】(1)309篇学术不端论文共有署名作者1378位,被通报作者数为1019位,共计被通报1168人次。除不知情作者(36位)外,有174位署名作者未被工作单位通报处罚。1019位被通报作者中,69.08%的作者工作单位在山东;81.24%的作者拥有中级或副高级职称;医师与护师分别占84.09%与11.49%;骨科领域作者最多(占7.85%)。(2)截至2022年1月31日,309篇学术不端论文的篇均被引频次为13.6次;有撤回声明并注明撤回日期的论文有201篇,撤回后其新增被引频次平均为3.9次/篇。仅30篇(14.93%)论文撤回后未再被引用。(3)论文涉及的学术不端行为主要包括数据造假(162篇,52.43%),第三方代写、代投或买卖论文(138篇,44.66%),编造研究过程(101篇,32.69%),不当署名(74篇,23.95%)与图片造假(31篇,10.32%)。【结论】NHC通报的医学学术不端论文中,学术不端行为主要包括数据造假,第三方代写、代投或买卖论文,编造研究过程;部分作者存在多次学术不端行为。我国医学学术不端论文防范与医学科研诚信建设任重道远,国家层面、医学科研机构、国内医学期刊等需要携手共筑抵抗医学学术不端行为的围墙,维护学术道德、净化科研环境。  相似文献   

7.
【目的】分析第三方网站“发表记”中作者对学术期刊的投稿评论,揭示作者对期刊的投稿认知和情感感知,为期刊改进工作效能提供参考。【方法】利用八爪鱼爬虫软件爬取作者评论数据,使用文本分析法并借助ROST CM 6.0软件进行分词和词频分析,构建语义网络并进行情感分析。【结果】大部分学术期刊并无投稿评论,大部分有评论的期刊是核心期刊,且社科期刊数量较多。作者关注的高频词包括投稿结果、审稿过程、稿件处理周期、与编辑部沟通、费用问题、选题偏好、学历职称偏好等。作者评论数据的语义网络呈现出“核心-边缘”的层级结构。作者评论内容以正向情感为主,中性情感居第二位,负向情感最少。【结论】期刊的审稿速度、出版时效、沟通态度、收费标准是最显著的投稿认知与作者评论的影响因素。期刊应当重视作者的投稿感受,建构良好的投稿形象,吸引并留住优秀作者群体;完善现有期刊管理体制,充分发挥学术共同体的作用;重视同行评议,保证期刊审稿质量;建立健全与作者的沟通机制,及时反馈审阅意见。  相似文献   

8.
【目的】 探究编辑部对作者投稿进行第一次学术不端检测(以下简称“初检”)后,稿件中学术不端检测结果发生动态变化的成因,探索初检后学术不端的主动控制措施。【方法】 从笔者的经历以及相关学者的研究文献入手,分析造成稿件在初检后复制比发生动态变化的原因。【结果】 稿件在初检后学术不端检测结果发生动态变化的原因是稿件之间的抄袭,并且抄袭与被抄袭的论文都未进入数据库,其中一篇稿件刊发并且进入数据库后,其他稿件的学术不端即刻表现出来;分布的主要群体是师生、学术团队、同事和学术研究合作者;大多数学术不端内容在投稿前就已经存在,少数为作者投稿后修改期间植入;检测软件自身算法缺陷以及比对数据库更新周期滞后都是造成学术不端的检测结果动态变化的原因。【结论】 为了大幅度降低初检后学术不端的出现概率,编辑部应当实行优先发表、缩短稿件的出版周期、刊发前复检和采用两种主流学术不端检测软件交叉检测来稿等措施;数据库公司应当保证数据的正确性,缩短数据库的更新周期;软件开发公司应当优化软件算法,最大程度地健全、完备数据库。  相似文献   

9.
【目的】 探讨科技期刊编辑部在出版伦理防控方面的责任与对策。【方法】 采用案例分析法对Light: Science & Applications在出版伦理防控方面的实践进行梳理,并对相关案例进行分析;同时,结合对理工类期刊遇到的其他相关案例的分析,探索期刊编辑部在出版伦理防控方面的对策与措施。【结果】 期刊编辑部应做好预防工作,制定详细的出版伦理相关规范来引导作者、审稿人、编委等利益相关方的行为,并通过提供必要的接口,进行必要的检查,给予必要的帮助等方式有效提醒相关方在论文写作、投稿、审稿、稿件处理等方面注意遵循伦理规范,严守学术诚信。【结论】 期刊编辑部在出版伦理防控方面应承担不可推卸的责任,应从政策上规范,技术上限制、警示。科学、客观地处理涉及出版伦理的事件,保持科学研究和学术交流的纯净。  相似文献   

10.
【目的】分析已经发表的学术不端论文的特征,尽量避免漏检情况的发生。【方法】利用科技期刊学术不端文献检测系统(AMLC)对《放射学实践》杂志2015年发表的301篇论文进行检测,并对认定为不端论文在发表之前的检测过程进行追踪、溯源。【结果】 6篇被认定为不端论文, 其中3篇论文的文字重合度≥40%;论文发表之前进行的两次检测中,6篇论文的文字重合度均<40%;5篇的发表时间与被抄袭文献的发表时间接近(不超过3个月); 4篇不端论文与被抄袭文献存在作者重合。【结论】 通过分析漏检不端论文的特征,做好以下三点:①检测者采取正确的检测策略,坚持在出刊前进行最后的检测;②AMLC及时更新对比数据库;③更多的期刊采用“稿件追踪”功能,AMLC对学术不端论文的漏检将大幅减少。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号