How Many Scientific Papers Are Not Original? Michael Lesk1 Measurements by Sir Cyril Burt

Total Page:16

File Type:pdf, Size:1020Kb

How Many Scientific Papers Are Not Original? Michael Lesk1 Measurements by Sir Cyril Burt COMMENTARY How many scientific papers are not original? Michael Lesk1 measurements by Sir Cyril Burt. Burt had Department of Library and Information Science, Rutgers University, New Brunswick, NJ 08901 studied what seemed to be a remarkable number of identical twins raised apart. His Is plagiarism afflicting science? In PNAS, Given the incentives, it is hardly surprising data were challenged soon after his death as Citron and Ginsparg (1) count the number of that some authors are attempting to exploit too good to be true; the original notes were authors who are submitting articles contain- the system. This can be surprisingly easy. gone, and his coworkers could not be found. ing text already appearing elsewhere. They Delgado et al. (7) explain how they created Although there has been argument back and report disturbing numbers of authors resort- a half-dozen fake papers, with several hun- forth, even his supporters have been de- ing to copying, particularly in some countries dred citations. One of the authors saw his fending him by saying he was careless rather where 15% of submissions are detected as citation count go up by a factor of 2 and than fraudulent and that other people containing duplicated material. I am on the his h-index increased from 10 to 15. Fans studying genetics and intelligence have found editorial board of an Institute of Electrical of bicycle racing may smile on reading that about the same level of correlation (10). and Electronic Engineers (IEEE) magazine, the fake papers were attributed to Alberto More recently, two economists, Carmen which also finds it useful to run all of the Pantini-Contador. Reinhart and Kenneth Rogoff, published submissions through a plagiarism filter. What Refereeing, at least for some journals, a claim that economic growth slowed in can be done about this? is pretty shaky. As cited by Citron and countries whose national debt exceeded In 1830, Charles Babbage deplored unreli- Ginsparg, Bohannon (8) submitted a fake ar- 90% of gross domestic product. After 2 y, able science. He discussed hoaxes, forgeries, ticle to more than 300 open access journals, they gave their spreadsheet to researchers data trimming, and “cooking” (selecting data and more than half accepted it. Following at the University of Massachusetts, who to match a theory) (2). Today, doubtful up, he found that one of these journals found several errors; for example, the first few papers may be plagiarized, invented, or mis- had plagiarized its own description from a countries in alphabetical order had been taken. This paper documents problems left out of the calculation. A corrected at one extreme: straightforward pla- One bright spot in the spreadsheet did not show the same abrupt giarism within one publisher. More com- Citron and Ginsparg slowdown in growth, but the original pa- plex deceptions can be found at the site paper is that plagiarism per had already been used to justify a retractionwatch.com, which includes, among change to budget-balancing policies in major other examples, invented or fraudulent is concentrated: they economies (11). data. Mistaken research was highlighted note that a small number Returning to the simpler problem of in an important study by Begley and Ellis, of authors produce a plagiarism, it can extend beyond individual who found that it was impossible to repli- papers. In 2009, a conference in Hainan, “ cate 47 of 53 oncology studies that they disproportionate China, called itself the International Joint ” attempted to repeat (3). At a time when share of the doubtful Conference on Artificial Intelligence. That important scientific questions are under at- submissions. name is very familiar to artificial intelligence tack, we need to improve confidence in researchersasthetitleofamajorconference our publications. reputable journal in the same subject area. held regularly since 1969. However, the How can we increase our level of trust in The scholarlyoa.com site attempts to catalog conference with the long history met in the scientific literature? In 2012, more than 2 the doubtful publishers and their journals. Pasadena in 2009; the Hainan conference just million papers were published (4). They ap- Much more common than completely fake borrowed the name. Perhaps it is not sur- pear in publications ranging from highly papers is the boosting of publication count by prising that the Hainan conference in- dividing one’s reports into multiple short cluded several papers that had come from the competitive and prestigious journals such “ as Nature, Science, Lancet, and this journal, papers, an idea that has been called the least SCIGen chatterbot or some similar program. publishable unit” since the 1970s. Some pub- down to the predatory publishers listed in Here is a sentence from one abstract (since lishers or conference organizers join in the “ scholarlyoa.com who will print pretty much removed from IEEE Xplore): Furthermore, manipulation. Whilhite and Fong describe anything for a fee. University faculty, in par- it explored a pervasive tool for enabling an editor who asked prospective authors ticular, are encouraged to publish because the pasteurization, which is used to show that to add citations to his journal to their reward systems often depend on publication context-free grammar and B-trees are largely articles to increase the impact factor of ” andcitationcountsaswaysofevaluating compatible. Chatterbot output can now be the journal (9). merit. The h-index is the modern equivalent detected automatically (12) and publish- of the old saying “Deans can’t read, they can Consequences ers find themselves, regrettably, forced to only count.” In some countries, having a pa- Deception and mistake can have real con- per accepted in a top journal can mean a cash sequences outside of science. For decades, the Author contributions: M.L. wrote the paper. bonus, with Zhejiang University offering a UK educational system emphasized the “11- The author declares no conflict of interest. $30,000 payment to an author who publishes plus” examination, justified by a belief in the See companion article on page 25. in Science or Nature (5, 6). inheritability of intelligence that came from 1Email: [email protected]. 6–7 | PNAS | January 6, 2015 | vol. 112 | no. 1 www.pnas.org/cgi/doi/10.1073/pnas.1422282112 Downloaded by guest on October 2, 2021 use such software, as well as anti-copying with some combination of carrots and sticks, Some ignore the flag, and some say that what COMMENTARY utilities. encourage the institutions in all countries to they are doing is acceptable practice. These Plagarism would matter less if counting enforce standards? There are very few in- responses suggest that some additional articles was less significant than under- dividual scientists today, and approaching the response is needed (although Citron and standing them. ArXiv at least does not claim institutions might be the best way to affect Ginsparg do not say how many authors re- to referee submissions; anyone using it knows achangeinattitude. spond to the warning in which way). that they have to read and evaluate the con- For example, recently I received a request Nature published a discussion on plagia- tent for themselves. This, of course, trans- from someone in Asia who wanted to be a rism 2 y ago, and in it, Zhang and McIntosh fers the burden of judgment from a small postdoctoral researcher in our department in suggested keeping a blacklist of individuals number of referees to the much larger the United States. I took the first two para- (14). They note that this should be a number of potential readers. In addition, graphs of his research statement and found many of those readers may be students, or them on a commercial website of a US multipublisher effort and that it is unclear in a different discipline, and be less able company. Should I have told this to the head who would run it or pay for it (14). I would to evaluate a paper. This is why we have the of his institution? Right now, we don’tdo suggest one further step: identify depart- current publication system, but it is being that, partly out of politeness and partly out of ments, and perhaps institutions, where the abused by researchers who know that for fear of lawsuits. However, when Citron and problems are arising. Publishers should sug- some purposes, the main question being Ginsparg write that some of the people whose gest that they will blacklist the entire de- asked of a candidate for hiring or promo- plagiarism is detected reply by asking to be partment (or, if need be, the institution). tion is “how many articles?” told which parts were found to be copied, Intermediate forms of punishment are possi- Mere number of publications is not what presumably to learn how to evade detection ble, such as delaying publication rather than is really important. When challenged as a inthefuture,onedespairs. denying it entirely. “half-wit,” the Roman emperor Claudius, at For experimental studies, the move to re- In summary, this paper describes the scope least in the British Broadcasting Corpora- quiring data availability will be a step for- of plagiarism within arXiv. The good news tion version of his life, replied that it is ward. If an author did not actually write the is that the tools used to detect plagiarism quality rather than quantity of wits that paper under discussion, presumably that work effectively and efficiently, the copied matters (13). Similarly, the National Sci- author does not have the data behind it. The papers are concentrated by author and by ence Foundation asks those who submit data can be copied as well, but that offers country, and the copied papers are less cited. proposals to list five important and relevant another chance for automated tools to spot papers and not to attempt to drown the ref- the duplication, and one where paraphrasing The bad news is that the problem is real and erees in dozens (or hundreds) of articles.
Recommended publications
  • Click Here to View Or Download the Proceedings
    Computational Creativity 2007 Foreword The International Joint Workshop on Computational Creativity began life as two independent workshop series: the Creative Systems Workshops and the AISB Symposia on AI and Creativity in the Arts and Sciences. The two series merged in 2004, when the 1st IJWCC was held in Madrid, as a satellite workshop of the European Conference on Case Based Reasoning. Since then, two further satellite worshops have been held, at the International Joint Conference on Artificial Intelligence in Edinburgh, in 2005, and at the European Conference on Artificial Intelligence in Riva del Garda, in 2006. This workshop constitutes the workshop’s first attempts at independent existence, and the quality of the papers submitted suggests that the time is now ripe. This workshop received 27 submissions, all of which were subjected to rigorous peer review (at least 3 reviewers to each paper), and 17 full papers and 3 posters were accepted (one poster was subsequently withdrawn). We believe this volume represents a coming of age of the field of computational creativity. It contains evidence of not only improvements in the state of the art in creative systems, but also of deep thinking about methodology and philosophy. An exciting new development is the inclusion, for the first time, of a session on applied creative systems, demonstrating that the field is now ready and able to impinge on broader artificial intelligence and cognitive science research. As co-chairs, we would like to thank the programme committee and reviewers, our able local assistants, Ollie Bown and Marcus Pearce, and all those who submitted papers to make this a really exciting event.
    [Show full text]
  • Citation Performance of Indonesian Scholarly Journals Indexed in Scopus from Scopus and Google Scholar
    pISSN 2288-8063 Sci Ed 2018;5(1):53-58 eISSN 2288-7474 https://doi.org/10.6087/kcse.119 Case Study Citation performance of Indonesian scholarly journals indexed in Scopus from Scopus and Google Scholar Lukman Lukman1, Yan Rianto1, Shidiq Al Hakim1, Irene M Nadhiroh2, Deden Sumirat Hidayat3 1Research Center for Informatics, Indonesian Institute of Science, Cibinong; 2Research Center for Science and Technology Development Studies, Indonesian Institute of Science, Jakarta; 3Research Center for Biology, Indonesian Institute of Science, Cibinong, Indonesia Abstract Citation frequency is an important factor for estimating the quality of a scientific journal, and the number of citations that an academic paper receives is often used as a measure of its scientific impact. This study aimed to characterize the citation performance of scientif- ic journals published by Indonesian publishers that have been indexed in Scopus by ana- lyzing the number of citations available in the Scopus database and Google Scholar. The results of the study identified 30 Indonesian journals that have been Scopus-indexed, of which 22 were listed in SCImago Journal Rank up to October 2017. Journals in the engi- neering field were the most cited, with 2,427 citations, including 930 self-citations. A large proportion of the citations were of recently-founded journals. The mean proportional dif- ference in the citation frequency between Scopus and Google Scholar was 14.71%. Keywords Citation analysis; Google Scholar; Scholarly journal performance; Scopus Received: November 14, 2017 Accepted: January 9, 2018 Correspondence to Lukman Lukman [email protected] Introduction ORCID Scopus is a multidisciplinary database, with 67 million records (as of August 2017) and more Lukman Lukman http://orcid.org/0000-0001-9633-6964 than 22,794 peer-reviewed journal titles in the life sciences, social sciences, health sciences, and Yan Rianto physical sciences.
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • Tortured Phrases: a Dubious Writing Style Emerging in Science Evidence of Critical Issues Affecting Established Journals
    Open Call for Investigation Tortured phrases: A dubious writing style emerging in science Evidence of critical issues affecting established journals Guillaume Cabanac · Cyril Labbé · Alexander Magazinov Version: July 12, 2021 Abstract Probabilistic text generators have been used to produce fake scientific papers for more than a decade. Such nonsensical papers are easily detected by both human and ma- chine. Now more complex AI-powered generation techniques produce texts indistinguish- able from that of humans and the generation of scientific texts from a few keywords has been documented. Our study introduces the concept of tortured phrases: unexpected weird phrases in lieu of established ones, such as ‘counterfeit consciousness’ instead of ‘artificial intelligence.’ We combed the literature for tortured phrases and study one reputable journal where these concentrated en masse. Hypothesising the use of advanced language models we ran a detector on the abstracts of recent articles of this journal and on several control sets. The pairwise comparisons reveal a concentration of abstracts flagged as ‘synthetic’ in the journal. We also highlight irregularities in its operation, such as abrupt changes in editorial timelines. We substantiate our call for investigation by analysing several individual dubious articles, stressing questionable features: tortured writing style, citation of non-existent liter- ature, and unacknowledged image reuse. Surprisingly, some websites offer to rewrite texts for free, generating gobbledegook full of tortured phrases. We believe some authors used rewritten texts to pad their manuscripts. We wish to raise the awareness on publications containing such questionable AI-generated or rewritten texts that passed (poor) peer review. Deception with synthetic texts threatens the integrity of the scientific literature.
    [Show full text]
  • Hundreds of Gibberish Papers Still Lurk in the Scientific
    News in focus says Coudert. He had previously posted about says she was surprised and angry to learn that of Toulouse, France, came up with a new idea: the Nature story on Twitter; McNutt replied, scientists continued to collaborate with the searching for key grammatical phrases char- urging him to take action. astronomer, pointing out that manuscripts acteristic of SCIgen’s output. Last May, he and “The NAS has chosen a policy that is very posted on the arXiv preprint server in the past Cabanac searched for such phrases in millions weak and that protects them in a way,” says six months still listed Marcy as a co-author. of papers indexed in the Dimensions database. Coudert. “Where is the justice for women pushed out of After manually inspecting every hit, the The academy has said in the past that it does the field if people continue to work with him?” researchers identified 243 nonsense arti- not have the resources for formal investiga- Some of those papers point to Berkeley as cles created entirely or partly by SCIgen, tions, apart from for internal NAS business. Marcy’s affiliation. A Berkeley spokesperson they report in a study published on 26 May The group relies on publicly documented (G. Cabanac and C. Labbé J. Assoc. Inf. Sci. investigations carried out by other organiza- “Where is the justice for Technol. https://doi.org/gj7b8h; 2021). These tions to begin inquiries into its members. articles, published between 2008 and 2020, The NAS informed Coudert of Marcy’s ter- women pushed out of the appeared in various journals, conference pro- mination last month; the chemist says it is a field if people continue ceedings and preprint sites, and were mostly in preliminary step in the right direction.
    [Show full text]
  • Duplicate and Fake Publications in the Scientific Literature: How Many Scigen Papers in Computer Science?
    Duplicate and fake publications in the scientific literature: how many SCIgen papers in computer science? Cyril Labb´e,Dominique Labb´e To cite this version: Cyril Labb´e, Dominique Labb´e. Duplicate and fake publications in the scientific litera- ture: how many SCIgen papers in computer science?. Scientometrics, Springer Verlag, 2012, pp.10.1007/s11192-012-0781-y. HAL Id: hal-00641906 https://hal.archives-ouvertes.fr/hal-00641906v2 Submitted on 2 Jul 2012 HAL is a multi-disciplinary open access L'archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destin´eeau d´ep^otet `ala diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publi´esou non, lished or not. The documents may come from ´emanant des ´etablissements d'enseignement et de teaching and research institutions in France or recherche fran¸caisou ´etrangers,des laboratoires abroad, or from public or private research centers. publics ou priv´es. Duplicate and Fake Publications in the Scientific Literature: How many SCIgen papers in Computer Science? Cyril Labb´e Dominique Labb´e Universit´eJoseph Fourier Institut d’Etudes Politiques de Grenoble Laboratoire d’Informatique de Grenoble PACTE [email protected] [email protected] 22 june 2012 ; Scientometrics; DOI 10.1007/s11192-012-0781-y Abstract Two kinds of bibliographic tools are used to retrieve scientific publications and make them available online. For one kind, access is free as they store information made publicly available online. For the other kind, access fees are required as they are compiled on information provided by the major publishers of scientific literature.
    [Show full text]
  • Exposing the Predators Methods to Stop Predatory Journals
    Exposing the predators Methods to stop predatory journals Master Thesis Book and Digital Media Studies Leiden Universtity Margot Wehrmeijer 0775614 Supervisor and second reader prof. dr. A.H. van der Weel (chair) Leiden University mr. drs. P.A.F. Verhaar Leiden University 19,208 words August 15, 2014 Abstract The internet is greatly improving the impact of scholarly journals, but also poses new threats to their quality. Publishers have arisen that abuse the Gold Open Ac- cess model, in which the author pays a fee to get his article published, to make money with so-called predatory journals. These publishers falsely claim to con- duct peer review, which makes them more prone to publish fraudulent and plagia- rised research. This thesis looks at three possible methods to stop predatory journals: black- and white-lists, open peer review systems and new metrics. Black- and white- lists have set up rules and regulations that credible publishers and journals should follow. Open peer review systems should make it harder for predatory publishers to make false claims about their peer review process. Metrics should measure more aspects of research impact and become less liable to gaming. The question is, which of these three methods is the best candidate to stop predatory journals. As all three methods have their drawbacks, especially for new but high qual- ity journals, none of them stop predatory journals on its own can. Rather, we need a system in which researchers, publishers and reviewers communicate more openly about the research they create, disseminate and read. But above all, we need to find a way to take away incentives for researchers and publishers to en- gage in fraudulent practices.
    [Show full text]
  • Has WSEAS Been Ever Engaged in Predatory Publishing Practices?
    Has WSEAS been ever engaged in Predatory Publishing Practices? First of all, in WSEAS, we believe (this the culture that we cultivate since 1996), that Journals and Conferences without peer review cannot survive for a long period and disappear soon. Even if they eventually manage some good indexing, the academic community cannot recognize them as serious and valid academic outlets. To run Journals and Conferences without peer review is the absolute craze and a clear suicide for publishers or societies. According Wikipedia, Predatory publishing, sometimes called write-only publishing or deceptive publishing, is an exploitive academic publishing business model that involves charging publication fees to authors without checking articles for quality and legitimacy and without providing the other editorial and publishing services that legitimate academic journals provide, whether open access or not. But, has WSEAS been ever engaged in Predatory Publishing Practices? Absolutely, no. Here you can find databases containing all submitted articles to the WSEAS Journals for the past 5 years http://www.wseas.org/main/journals/JournalsDB.zip You can see what papers have been accepted and what papers have been rejected. Acceptance rates, which are apprx 20%, can be found within. Similar statistics are available for the conference databases. It is totally unfair and unethical to include publishers such as Biomed Central (part of the Springer-Nature group), Frontiers In, Bentham, Hindawi, MDPI etc in lists of predatory publishers and practices, all of which are thoroughly respected and reputable publishers. This does not mean that these 5 publishers are predatory, and the same rule applies here. WSEAS has promptly and clearly addressed all allegations in the past, of any predatory practices, and has duly satisfied its stakeholders and maintained their trust and association.
    [Show full text]
  • Predatory Online Technical Journals: a Question of Ethics
    Paper ID #8413 Predatory Online Technical Journals: A Question of Ethics Dr. Marilyn A. Dyrud, Oregon Institute of Technology Marilyn Dyrud has been an active member of ASEE since 1986. She has served as Pacific Northwest section chair, newsletter editor, Zone IV chair, and is currently the immediate past chair of the Engineering Ethics Division. She was her campus’s ASEE representative for 17 years and organized a conference there for 10 years. She is a regular annual conference presenter, moderator, and reviewer and serves as communications editor for the Journal of Engineering Technology, as well as a manuscript reviewer for several other technical journals. She has received a number of awards, including ASEE Fellow, the McGraw Award, and, most recently, the Berger Award. In addition to activity in the ethics division, she is also a member of the Engineering Technology Division’s executive board. She serves on several national committees. Marilyn is also active in the Association for Practical and Professional Ethics, serving as a moderator for the Ethics Bowl and proceedings editor, and the Association for Business Communication; she s a regional vice-president and a section editor for ABC’s pedagogical journal. c American Society for Engineering Education, 2014 Predatory Online Technical Journals: A Question of Ethics Introduction In 2009, Cornell University doctoral student Philip Davis embarked upon a bold venture: after receiving numerous hectoring emails from Bentham Science requesting articles for publication, he and fellow adventurer Kent Anderson, an executive at The New England Journal of Medicine, used the SCIgen paper generator, developed by MIT students “to maximize amusement” by randomly generating nonsensical computer science papers,1 to create a scholarly looking but preposterous manuscript and submitted the result to Bentham’s The Open Information Science Journal.
    [Show full text]
  • PREVALENCE of POTENTIALLY PREDATORY PUBLISHING in SCOPUS on the COUNTRY LEVEL 1 Prevalence of Potentially Predatory Publishing in Scopus on the Country Level
    PREVALENCE OF POTENTIALLY PREDATORY PUBLISHING IN SCOPUS ON THE COUNTRY LEVEL 1 Prevalence of Potentially Predatory Publishing in Scopus on the Country Level Tatiana Savinay∗ Ivan Sterligovy y National Research University Higher School of Economics, Moscow, Russia ∗Russian Foundation for Basic Research, Moscow, Russia. [email protected] [email protected] F Abstract—We present results of a large-scale study of po- of various degree of competence as well as by tentially predatory journals (PPJ) represented in the Scopus researchers themselves [Leydesdorff et al., 2016]. database, which is widely used for research evaluation. Both In short, research evaluation has become substan- journal metrics and country/disciplinary data have been evalu- tially more formalized relying on various indicators, ated for different groups of PPJ: those listed by Jeffrey Beall which are mostly based on publication and citation and those discontinued by Scopus because of “publication con- counts. This metrics explosion is partially attributed cerns”. Our results show that even after years of discontinuing, hundreds of active potentially predatory journals are still highly to the priorities of many nations and organizations visible in the Scopus database. PPJ papers are continuously to reproduce the success of world leaders in science produced by all major countries, but with different prevalence. and technology. Most ASJC (All Science Journal Classification) subject areas In this paper, we provide a bird’s eye view of the are affected. The largest number of PPJ papers are in engineer- growth of articles in potentially predatory journals ing and medicine. On average, PPJ have much lower citation (PPJ), a global phenomenon stemming from both metrics than other Scopus-indexed journals.
    [Show full text]
  • Infinite Monkey Theorem from Wikipedia, the Free Encyclopedia
    Infinite monkey theorem From Wikipedia, the free encyclopedia The infinite monkey theorem states that a monkey hitting keys at random on a typewriter keyboard for an infinite amount of time will almost surely type a given text, such as the complete works of William Shakespeare. In fact the monkey would almost surely type every possible finite text an infinite number of times. However, the probability that monkeys filling the observable universe would type a complete work such as Shakespeare's Hamlet is so tiny that the chance of it occurring during a period of time hundreds of thousands of orders of magnitude longer than the age of the universe is extremely low (but technically not zero). In this context, "almost surely" is a mathematical term with a precise meaning, and the "monkey" is not an actual monkey, but a metaphor for an abstract device that produces an endless random sequence of letters and symbols. One of the earliest instances of the use of the "monkey metaphor" is that of French mathematician Émile Borel in 1913,[1] but the first instance may have been even earlier. Given an infinite length of time, Variants of the theorem include multiple and even infinitely many typists, and the target text varies between an entire library and a a chimpanzee punching at single sentence. Jorge Luis Borges traced the history of this idea from Aristotle's On Generation and Corruption and Cicero's De natura random on a typewriter would deorum (On the Nature of the Gods), through Blaise Pascal and Jonathan Swift, up to modern statements with their iconic simians and almost surely type out all of typewriters.
    [Show full text]
  • The Crisis in Scientific Publishing and Its Effect on the Admissibility of Technical and Scientific Evidence
    UIC Law Review Volume 49 Issue 3 Article 3 Spring 2016 The Crisis in Scientific Publishing and its ffE ect on the Admissibility of Technical and Scientific vidence,E 49 J. Marshall L. Rev. 727 (2016) Kevin Hill Follow this and additional works at: https://repository.law.uic.edu/lawreview Part of the Evidence Commons, and the Science and Technology Law Commons Recommended Citation Kevin D. Hill, The Crisis in Scientific Publishing and its ffE ect on the Admissibility of Technical and Scientific vidence,E 49 J. Marshall L. Rev. 727 (2016) https://repository.law.uic.edu/lawreview/vol49/iss3/3 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Review by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. THE CRISIS IN SCIENTIFIC PUBLISHING AND ITS EFFECT ON THE ADMISSIBILITY OF TECHNICAL AND SCIENTIFIC EVIDENCE KEVIN D. HILL* I. INTRODUCTION .....................................................................727 II. DAUBERT .............................................................................728 III. THE PEER REVIEW PROCESS..................................................732 IV. THE CRISIS IN PEER REVIEWING ............................................735 A. Fraud ...........................................................................737 B. Hoaxes..........................................................................740 C. Faux Peer Review .........................................................742
    [Show full text]