Click Here to View Or Download the Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

Click Here to View Or Download the Proceedings Computational Creativity 2007 Foreword The International Joint Workshop on Computational Creativity began life as two independent workshop series: the Creative Systems Workshops and the AISB Symposia on AI and Creativity in the Arts and Sciences. The two series merged in 2004, when the 1st IJWCC was held in Madrid, as a satellite workshop of the European Conference on Case Based Reasoning. Since then, two further satellite worshops have been held, at the International Joint Conference on Artificial Intelligence in Edinburgh, in 2005, and at the European Conference on Artificial Intelligence in Riva del Garda, in 2006. This workshop constitutes the workshop’s first attempts at independent existence, and the quality of the papers submitted suggests that the time is now ripe. This workshop received 27 submissions, all of which were subjected to rigorous peer review (at least 3 reviewers to each paper), and 17 full papers and 3 posters were accepted (one poster was subsequently withdrawn). We believe this volume represents a coming of age of the field of computational creativity. It contains evidence of not only improvements in the state of the art in creative systems, but also of deep thinking about methodology and philosophy. An exciting new development is the inclusion, for the first time, of a session on applied creative systems, demonstrating that the field is now ready and able to impinge on broader artificial intelligence and cognitive science research. As co-chairs, we would like to thank the programme committee and reviewers, our able local assistants, Ollie Bown and Marcus Pearce, and all those who submitted papers to make this a really exciting event. Am´ıilcar Cardoso & Geraint A. Wiggins Workshop co-chairs Programme Committee and Reviewers Barnden, John A – University of Birmingham Bown, Oliver – Goldsmiths, University of London Brown, David – Worcester Polytechnic Institute Cardoso, Amilcar – University Of Coimbra Collomosse, John – University of Bath Colton, Simon – Imperial College London Gervas,´ Pablo – Universidad Complutense de Madrid Gomes, Paulo – University of Coimbra Keller, Robert – Harvey Mudd College Leite, Joao˜ – New University of Lisbon Lopez,´ Jesus´ – University of Southern Queensland Lopez´ de Mantaras,` Ramon – IIIA-CSIC Machado, Penousal – University of Coimbra Magnani, Lorenzo – University of Pavia Moffat, David C. – Glasgow Caledonian University O’Donoghue, Diarmuid P. – NUI Maynooth University Pearce, Marcus T. – Goldsmiths, University of London Pease, Alison – University of Edinburgh Pereira, Francisco Camaraˆ – University of Coimbra Perez´ y Perez,´ Rafael – Autonomous Metropolitan University of Mexico Rauchas, Sarah – Goldsmiths, University of London Ritchie, Graeme – University of Aberdeen Saunders, Rob – University of Sydney Seco, Nuno – University of Coimbra Stock, Oliviero – ITC-irst Veale, Tony – University College, Dublin Widmer, Gerhard – University of Linz Wiggins, Geraint A. – Goldsmiths, University of London i Computational Creativity 2007 ii Computational Creativity 2007 Contents Keynote Text representation of music: from word processing to rule-based composition/improvisation . 1 Bernard Bel, University of Aix-Marseille Creativity in Narrative A Computer Model that Generates Biography-like Narratives. 5 Samer Hassan, Pablo Gervas,´ Carlos Leon,´ Raquel Hervas,´ Complutense University, Madrid, Spain On the Fly Collaborative Story-Telling: Revising Contributions to Match a Shared Partial Story Line . 13 Pablo Gervas,´ Universidad Complutense de Madrid, Spain; Rafael Perez´ y Perez,´ Ricardo Sosa, National Autonomous University of Mexico Narrative Inspiration: Using Case Based Problem Solving to Support Emergent Story Generation . 21 Ivo Swartjes, Joost Vromen, University of Twente, The Netherlands Analogy & Language Evaluating Computer-Generated Analogies . 31 Diarmuid P. O’Donoghue, NUI Maynooth University, Ireland A Generative Grammar for Pre-Hispanic Production: The Case of El Taj´ın Style . 39 Manuel alvarez´ Cos, Rafael Perez´ y Perez,´ Atocha Aliseda, National Autonomous University of Mexico Tra-la-Lyrics: An approach to generate text based on rhythm . 47 Hugo Oliveira, Am´ılcar Cardoso, Francisco Camaraˆ Pereira, University of Coimbra, Portugal Musical Creativity A Hybrid System for Automatic Generation of Style-Specific Accompaniment . 57 Ching-Hua Chuan, Elaine Chew, University of Southern California, USA On the Meaning of Life (in Artificial Life Approaches to Music). 65 Oliver Bown, Geraint A. Wiggins, Goldsmiths, University of London, UK Evaluating Cognitive Models of Musical Composition . 73 Marcus T. Pearce, Geraint A. Wiggins, Goldsmiths, University of London, UK Systematic Evaluation and Improvement of Statistical Models of Harmony . 81 Raymond Whorley, Geraint A. Wiggins, Marcus T. Pearce, Goldsmiths, University of London, UK Applied Creative Systems A practical application of computational humour . 91 Graeme Ritchie, University of Aberdeen, UK; Ruli Manurung, Helen Pain, University of Edinburgh, UK; Annalu Waller, Rolf Black, Dave OMara, University of Dundee, UK Automatizing Two Creative Functions for Advertising . 99 Carlo Strapparava, Alesandro Valitutti, Oliviero Stock, ITC-irst, Italy iii Computational Creativity 2007 Frameworks for Creativity Algorithmic Information Theory and Novelty Generation . 109 Simon McGregor, University of Sussex, UK How Thinking Inside the Box can become Thinking Outside the Box . 113 Chris Thornton, University of Sussex, UK Minimal creativity, evaluation and fractal pattern discrimination . 121 Jon Bird, Dustin Stokes, University of Sussex, UK Creative Ecosystems . 129 Jon McCormack, Monash University, Australia Towards a General Framework for Program Generation in Creative Domains . 137 Marc Hull, Simon Colton, Imperial College London, UK Posters From DNA to 3D Organic Art Forms - FormGrow Revisited . 147 William Latham, Miki Shaw, Stephen Todd, Fred´ edric´ Fol Leymarie, Goldsmiths, University of London, UK Towards Creative Visual Expression in Virtual Humans . 148 Celso de Melo, Ana Paiva, Technical University of Lisbon, Portugal iv Computational Creativity 2007 Keynote Text representation of music: from word processing to rule-based composition/improvisation Bernard Bel, University of Aix-Marseille The Bol Processor project originated in 1980 as a word processor facilitating the transcription of quasi- onomatopoeic syllables used as an oral notation system for Indian drumming. It grew up as an expert system (BP1) mimicking the ability to compose variations on a musical theme or assess their acceptability. Pattern grammars (a subset of type-2 formal grammars) proved appropriate for modelling the musical system under study. A stochastic learning device was implemented to infer weights from sets of examples accepted by the grammar, with the effect of enhancing the aesthetic quality of productions. None the less, field work revealed limitations inherent to the expert system approach when it comes to modelling sophisticated human improvisation skills. In 1989 a numeric-symbolic learning device (QAVAID) was implemented in Prolog II for inferring grammars from examples. However, it has never been used in fieldwork because of its slow operation on portable computers of that time. The next implementation of Bol Processor (BP2) addressed the issue of music composition and impro- visation in the MIDI and Csound environments of electronic music. A new challenge was to deal with su- perimposed sequences of events (polyphony) within the framework of text-oriented rewriting systems. This was achieved by means of polymetric representation. Minimal descriptions of polyphonic/polyrhythmic structures may be “expanded” by the system to produce arbitrarily complex musical scores. This represen- tation makes it possible to produce sophisticated time-patterns from information comprehensively imbed- ded in compositional rules, thereby maintaining the consistency of interpretation. This is a major discovery for computer music, as “human-like” phrasing is no longer achieved by randomness nor “interpretation rules”. Producing the actual performance requires additional information which the Bol Processor encapsulates in metrical/topological properties of “sound-object prototypes”. A time-setting algorithm modifies sound- objects taking into account physical timing and their adjacent sound-objects, much in a similar way human speakers modify the articulatory properties of speech sounds with respect to the speaking rate and influence of adjacent segments (coarticulation). Many composers and music teachers support the Bol Processor approach because of its underlying paradigm of text representation, i.e. “composing with pen and paper”. It found its way long before the invention of markup languages, at a time only graphic interfaces were expected to capture the sophistication of compositional processes. BP2 is currently implemented for MacOS 9 and MacOS X. The project has been open-sourced by Sourceforge at http://sourceforge.net/projects/bolprocessor/ with the help of An- thony Kozar. Bernard Bel is a computer scientist with background in electronics. In 1979 he started collaborating with anthropologists, musicologists and musicians on a scientific study of North Indian melodic and rhythmic systems. In 1981 he built the first accurate real-time melodic movement analyser (MMA) for the analysis of raga music. In 1986 he joined the French National Centre for Scientific Research (CNRS) in Marseille to continue a research on the rule-based modelling of training methods
Recommended publications
  • Citation Performance of Indonesian Scholarly Journals Indexed in Scopus from Scopus and Google Scholar
    pISSN 2288-8063 Sci Ed 2018;5(1):53-58 eISSN 2288-7474 https://doi.org/10.6087/kcse.119 Case Study Citation performance of Indonesian scholarly journals indexed in Scopus from Scopus and Google Scholar Lukman Lukman1, Yan Rianto1, Shidiq Al Hakim1, Irene M Nadhiroh2, Deden Sumirat Hidayat3 1Research Center for Informatics, Indonesian Institute of Science, Cibinong; 2Research Center for Science and Technology Development Studies, Indonesian Institute of Science, Jakarta; 3Research Center for Biology, Indonesian Institute of Science, Cibinong, Indonesia Abstract Citation frequency is an important factor for estimating the quality of a scientific journal, and the number of citations that an academic paper receives is often used as a measure of its scientific impact. This study aimed to characterize the citation performance of scientif- ic journals published by Indonesian publishers that have been indexed in Scopus by ana- lyzing the number of citations available in the Scopus database and Google Scholar. The results of the study identified 30 Indonesian journals that have been Scopus-indexed, of which 22 were listed in SCImago Journal Rank up to October 2017. Journals in the engi- neering field were the most cited, with 2,427 citations, including 930 self-citations. A large proportion of the citations were of recently-founded journals. The mean proportional dif- ference in the citation frequency between Scopus and Google Scholar was 14.71%. Keywords Citation analysis; Google Scholar; Scholarly journal performance; Scopus Received: November 14, 2017 Accepted: January 9, 2018 Correspondence to Lukman Lukman [email protected] Introduction ORCID Scopus is a multidisciplinary database, with 67 million records (as of August 2017) and more Lukman Lukman http://orcid.org/0000-0001-9633-6964 than 22,794 peer-reviewed journal titles in the life sciences, social sciences, health sciences, and Yan Rianto physical sciences.
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • Tortured Phrases: a Dubious Writing Style Emerging in Science Evidence of Critical Issues Affecting Established Journals
    Open Call for Investigation Tortured phrases: A dubious writing style emerging in science Evidence of critical issues affecting established journals Guillaume Cabanac · Cyril Labbé · Alexander Magazinov Version: July 12, 2021 Abstract Probabilistic text generators have been used to produce fake scientific papers for more than a decade. Such nonsensical papers are easily detected by both human and ma- chine. Now more complex AI-powered generation techniques produce texts indistinguish- able from that of humans and the generation of scientific texts from a few keywords has been documented. Our study introduces the concept of tortured phrases: unexpected weird phrases in lieu of established ones, such as ‘counterfeit consciousness’ instead of ‘artificial intelligence.’ We combed the literature for tortured phrases and study one reputable journal where these concentrated en masse. Hypothesising the use of advanced language models we ran a detector on the abstracts of recent articles of this journal and on several control sets. The pairwise comparisons reveal a concentration of abstracts flagged as ‘synthetic’ in the journal. We also highlight irregularities in its operation, such as abrupt changes in editorial timelines. We substantiate our call for investigation by analysing several individual dubious articles, stressing questionable features: tortured writing style, citation of non-existent liter- ature, and unacknowledged image reuse. Surprisingly, some websites offer to rewrite texts for free, generating gobbledegook full of tortured phrases. We believe some authors used rewritten texts to pad their manuscripts. We wish to raise the awareness on publications containing such questionable AI-generated or rewritten texts that passed (poor) peer review. Deception with synthetic texts threatens the integrity of the scientific literature.
    [Show full text]
  • Hundreds of Gibberish Papers Still Lurk in the Scientific
    News in focus says Coudert. He had previously posted about says she was surprised and angry to learn that of Toulouse, France, came up with a new idea: the Nature story on Twitter; McNutt replied, scientists continued to collaborate with the searching for key grammatical phrases char- urging him to take action. astronomer, pointing out that manuscripts acteristic of SCIgen’s output. Last May, he and “The NAS has chosen a policy that is very posted on the arXiv preprint server in the past Cabanac searched for such phrases in millions weak and that protects them in a way,” says six months still listed Marcy as a co-author. of papers indexed in the Dimensions database. Coudert. “Where is the justice for women pushed out of After manually inspecting every hit, the The academy has said in the past that it does the field if people continue to work with him?” researchers identified 243 nonsense arti- not have the resources for formal investiga- Some of those papers point to Berkeley as cles created entirely or partly by SCIgen, tions, apart from for internal NAS business. Marcy’s affiliation. A Berkeley spokesperson they report in a study published on 26 May The group relies on publicly documented (G. Cabanac and C. Labbé J. Assoc. Inf. Sci. investigations carried out by other organiza- “Where is the justice for Technol. https://doi.org/gj7b8h; 2021). These tions to begin inquiries into its members. articles, published between 2008 and 2020, The NAS informed Coudert of Marcy’s ter- women pushed out of the appeared in various journals, conference pro- mination last month; the chemist says it is a field if people continue ceedings and preprint sites, and were mostly in preliminary step in the right direction.
    [Show full text]
  • New Challenges for Pacific Security a Comparative Examination of Illicit Drugs and Insecurity Between Pacific and Caribbean States: an Evolving Parallel?
    New Challenges for Pacific Security A Comparative Examination of Illicit Drugs and Insecurity between Pacific and Caribbean States: An Evolving Parallel? A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Arts in History in the University of Canterbury by Timothy David Milne University of Canterbury 2008 1 Acknowledgements First and foremost, I would like to express my gratitude to all the support that I received from my family and friends throughout the duration of this thesis. Without their words of encouragement, I could not have endured those difficult times when the ideas that inspired this thesis were not forthcoming. Secondly, I wish to thank my supervisor, John Henderson, for his academic support and his unwavering belief in the importance of my thesis topic. Lastly, I wish to express my appreciation to the Peace and Disarmament Eduction Trust for their generous support that made this thesis possible. 2 Table of Contents Chapter One: Literature Review Page The Pacific Region and the Paucity of Illicit Drug Research ....................................12 The Changing Security Discourse: New and Traditional Paradigms in Security.....15 Transnational Crime, Weak States and Sovereignty: The Maintenance of an Enabling Environment ..............................................................................................18 The Contemporary Face of Conflict: Accounting for New Conflict Environments and Conflict Dynamics—Or—Relearning Forgotten Lessons? ........22 Chapter Two: Theoretical Framework
    [Show full text]
  • A Personalized System for Conversational Recommendations
    Journal of Artificial Intelligence Research 21 (2004) 393-428 Submitted 07/03; published 03/04 A Personalized System for Conversational Recommendations Cynthia A. Thompson [email protected] School of Computing University of Utah 50 Central Campus Drive, Rm. 3190 Salt Lake City, UT 84112 USA Mehmet H. G¨oker [email protected] Kaidara Software Inc. 330 Distel Circle, Suite 150 Los Altos, CA 94022 USA Pat Langley [email protected] Institute for the Study of Learning and Expertise 2164 Staunton Court Palo Alto, CA 94306 USA Abstract Searching for and making decisions about information is becoming increasingly dif- ficult as the amount of information and number of choices increases. Recommendation systems help users find items of interest of a particular type, such as movies or restau- rants, but are still somewhat awkward to use. Our solution is to take advantage of the complementary strengths of personalized recommendation systems and dialogue systems, creating personalized aides. We present a system – the Adaptive Place Advisor –that treats item selection as an interactive, conversational process, with the program inquir- ing about item attributes and the user responding. Individual, long-term user preferences are unobtrusively obtained in the course of normal recommendation dialogues and used to direct future conversations with the same user. We present a novel user model that influ- ences both item search and the questions asked during a conversation. We demonstrate the effectiveness of our system in significantly reducing the time and number of interactions required to find a satisfactory item, as compared to a control group of users interacting with a non-adaptive version of the system.
    [Show full text]
  • Duplicate and Fake Publications in the Scientific Literature: How Many Scigen Papers in Computer Science?
    Duplicate and fake publications in the scientific literature: how many SCIgen papers in computer science? Cyril Labb´e,Dominique Labb´e To cite this version: Cyril Labb´e, Dominique Labb´e. Duplicate and fake publications in the scientific litera- ture: how many SCIgen papers in computer science?. Scientometrics, Springer Verlag, 2012, pp.10.1007/s11192-012-0781-y. HAL Id: hal-00641906 https://hal.archives-ouvertes.fr/hal-00641906v2 Submitted on 2 Jul 2012 HAL is a multi-disciplinary open access L'archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destin´eeau d´ep^otet `ala diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publi´esou non, lished or not. The documents may come from ´emanant des ´etablissements d'enseignement et de teaching and research institutions in France or recherche fran¸caisou ´etrangers,des laboratoires abroad, or from public or private research centers. publics ou priv´es. Duplicate and Fake Publications in the Scientific Literature: How many SCIgen papers in Computer Science? Cyril Labb´e Dominique Labb´e Universit´eJoseph Fourier Institut d’Etudes Politiques de Grenoble Laboratoire d’Informatique de Grenoble PACTE [email protected] [email protected] 22 june 2012 ; Scientometrics; DOI 10.1007/s11192-012-0781-y Abstract Two kinds of bibliographic tools are used to retrieve scientific publications and make them available online. For one kind, access is free as they store information made publicly available online. For the other kind, access fees are required as they are compiled on information provided by the major publishers of scientific literature.
    [Show full text]
  • Exposing the Predators Methods to Stop Predatory Journals
    Exposing the predators Methods to stop predatory journals Master Thesis Book and Digital Media Studies Leiden Universtity Margot Wehrmeijer 0775614 Supervisor and second reader prof. dr. A.H. van der Weel (chair) Leiden University mr. drs. P.A.F. Verhaar Leiden University 19,208 words August 15, 2014 Abstract The internet is greatly improving the impact of scholarly journals, but also poses new threats to their quality. Publishers have arisen that abuse the Gold Open Ac- cess model, in which the author pays a fee to get his article published, to make money with so-called predatory journals. These publishers falsely claim to con- duct peer review, which makes them more prone to publish fraudulent and plagia- rised research. This thesis looks at three possible methods to stop predatory journals: black- and white-lists, open peer review systems and new metrics. Black- and white- lists have set up rules and regulations that credible publishers and journals should follow. Open peer review systems should make it harder for predatory publishers to make false claims about their peer review process. Metrics should measure more aspects of research impact and become less liable to gaming. The question is, which of these three methods is the best candidate to stop predatory journals. As all three methods have their drawbacks, especially for new but high qual- ity journals, none of them stop predatory journals on its own can. Rather, we need a system in which researchers, publishers and reviewers communicate more openly about the research they create, disseminate and read. But above all, we need to find a way to take away incentives for researchers and publishers to en- gage in fraudulent practices.
    [Show full text]
  • An Investigation Into the Militarisation of Artificial Intelligence
    An Investigation into the Militarisation of Artificial Intelligence A dissertation submitted in partial fulfilment of the requirements for the degree of Bachelor of Science (Honours) in Software Engineering By Daniel Edwards Department of Computing & Information Systems Cardiff School of Management Cardiff Metropolitan University April 2017 Declaration I hereby declare that this dissertation entitled An Investigation into the Militarisation of Artificial Intelligence is entirely my own work, and it has never been submitted nor is it currently being submitted for any other degree. Candidate: Daniel Edwards Signature: Date: Ethics Approval ID Number: 2016D0316 Supervisor: Dr Simon Thorne Signature: Date: ii Abstract This dissertation gained an understanding of the public’s perception of Artificial Intelligence and Artificial Intelligence that have a military application. Major General Clive ‘Chip’ Chapman kindly gave his consent to be interviewed for the dissertation to give his insight from an ex forces point of view and share his own expertise on the matter. The literature reviewed for the dissertation provides definitions and research into the existing research areas of artificial intelligence, existing militarised technologies and insight into Artificial Intelligence within popular culture. Primary Research was undertaken in the form as an online survey to understand the public’s perception and knowledge of Artificial Intelligence and Artificial Intelligence within the military. Another primary research method was used, an interview with Major General Clive Chapman which will be used to evaluate the results gained from the survey. An overall conclusion will then be drawn from the results gathered about the public’s perception of Artificial Intelligence within the Military. Keywords: Artificial Intelligence, Militarisation, Perception, Drones, Counter Terrorism, Warfare iii Acknowledgments I would like to thank Dr Simon Thorne for being my supervisor and helping me through the project and four years at Cardiff Met.
    [Show full text]
  • Has WSEAS Been Ever Engaged in Predatory Publishing Practices?
    Has WSEAS been ever engaged in Predatory Publishing Practices? First of all, in WSEAS, we believe (this the culture that we cultivate since 1996), that Journals and Conferences without peer review cannot survive for a long period and disappear soon. Even if they eventually manage some good indexing, the academic community cannot recognize them as serious and valid academic outlets. To run Journals and Conferences without peer review is the absolute craze and a clear suicide for publishers or societies. According Wikipedia, Predatory publishing, sometimes called write-only publishing or deceptive publishing, is an exploitive academic publishing business model that involves charging publication fees to authors without checking articles for quality and legitimacy and without providing the other editorial and publishing services that legitimate academic journals provide, whether open access or not. But, has WSEAS been ever engaged in Predatory Publishing Practices? Absolutely, no. Here you can find databases containing all submitted articles to the WSEAS Journals for the past 5 years http://www.wseas.org/main/journals/JournalsDB.zip You can see what papers have been accepted and what papers have been rejected. Acceptance rates, which are apprx 20%, can be found within. Similar statistics are available for the conference databases. It is totally unfair and unethical to include publishers such as Biomed Central (part of the Springer-Nature group), Frontiers In, Bentham, Hindawi, MDPI etc in lists of predatory publishers and practices, all of which are thoroughly respected and reputable publishers. This does not mean that these 5 publishers are predatory, and the same rule applies here. WSEAS has promptly and clearly addressed all allegations in the past, of any predatory practices, and has duly satisfied its stakeholders and maintained their trust and association.
    [Show full text]
  • Predatory Online Technical Journals: a Question of Ethics
    Paper ID #8413 Predatory Online Technical Journals: A Question of Ethics Dr. Marilyn A. Dyrud, Oregon Institute of Technology Marilyn Dyrud has been an active member of ASEE since 1986. She has served as Pacific Northwest section chair, newsletter editor, Zone IV chair, and is currently the immediate past chair of the Engineering Ethics Division. She was her campus’s ASEE representative for 17 years and organized a conference there for 10 years. She is a regular annual conference presenter, moderator, and reviewer and serves as communications editor for the Journal of Engineering Technology, as well as a manuscript reviewer for several other technical journals. She has received a number of awards, including ASEE Fellow, the McGraw Award, and, most recently, the Berger Award. In addition to activity in the ethics division, she is also a member of the Engineering Technology Division’s executive board. She serves on several national committees. Marilyn is also active in the Association for Practical and Professional Ethics, serving as a moderator for the Ethics Bowl and proceedings editor, and the Association for Business Communication; she s a regional vice-president and a section editor for ABC’s pedagogical journal. c American Society for Engineering Education, 2014 Predatory Online Technical Journals: A Question of Ethics Introduction In 2009, Cornell University doctoral student Philip Davis embarked upon a bold venture: after receiving numerous hectoring emails from Bentham Science requesting articles for publication, he and fellow adventurer Kent Anderson, an executive at The New England Journal of Medicine, used the SCIgen paper generator, developed by MIT students “to maximize amusement” by randomly generating nonsensical computer science papers,1 to create a scholarly looking but preposterous manuscript and submitted the result to Bentham’s The Open Information Science Journal.
    [Show full text]
  • PREVALENCE of POTENTIALLY PREDATORY PUBLISHING in SCOPUS on the COUNTRY LEVEL 1 Prevalence of Potentially Predatory Publishing in Scopus on the Country Level
    PREVALENCE OF POTENTIALLY PREDATORY PUBLISHING IN SCOPUS ON THE COUNTRY LEVEL 1 Prevalence of Potentially Predatory Publishing in Scopus on the Country Level Tatiana Savinay∗ Ivan Sterligovy y National Research University Higher School of Economics, Moscow, Russia ∗Russian Foundation for Basic Research, Moscow, Russia. [email protected] [email protected] F Abstract—We present results of a large-scale study of po- of various degree of competence as well as by tentially predatory journals (PPJ) represented in the Scopus researchers themselves [Leydesdorff et al., 2016]. database, which is widely used for research evaluation. Both In short, research evaluation has become substan- journal metrics and country/disciplinary data have been evalu- tially more formalized relying on various indicators, ated for different groups of PPJ: those listed by Jeffrey Beall which are mostly based on publication and citation and those discontinued by Scopus because of “publication con- counts. This metrics explosion is partially attributed cerns”. Our results show that even after years of discontinuing, hundreds of active potentially predatory journals are still highly to the priorities of many nations and organizations visible in the Scopus database. PPJ papers are continuously to reproduce the success of world leaders in science produced by all major countries, but with different prevalence. and technology. Most ASJC (All Science Journal Classification) subject areas In this paper, we provide a bird’s eye view of the are affected. The largest number of PPJ papers are in engineer- growth of articles in potentially predatory journals ing and medicine. On average, PPJ have much lower citation (PPJ), a global phenomenon stemming from both metrics than other Scopus-indexed journals.
    [Show full text]