Feeds

MS Word causes academic dust-up

Researchers RTFM, discover back-stabbers

5 things you didn’t know about cloud backup

Microsoft Word is causing problems in the catty world of peer reviewing, which ensures research is properly carried out, The Chronicle of Higher Education reports.

Academics are wising up to a relatively inconspicuous feature that allows authors to find out which of their rivals have rubbished their work, raising the possibility of some serious bunfighting at research conferences.

Word automatically gives every document an author tag based on information pulled from the computer when the file is saved. It remains in the document's preferences summary, so when journals return reviewed versions of articles, the details of everyone who amended it remain.

Because careers, funding, and long standing rivalries are at stake, publishers like to keep reviewers' identities anonymous. The promise of anonymity is also key to the reviewer making honest comments.

In the interest of objectivity, the reviewer is often not allowed to know who did the research.

Some publishing professionals have apparently been unaware of the author tag feature. One researcher reports a journal's editor being “horrified” when he alerted her after being contacted by the author of an article he'd reviewed.

Mur K Muchane, executive director of information technology services at Davidson College, said: “I would guess that the vast majority of folks just don't know that that's there.”

The publicising of this feature in the academic community is sure to see washed-up researchers reopening rejected articles to see who put them on the slippery slope to obscurity.

Microsoft says the next version of Office will come with a toolkit called Document Inspector which will help users strip out private data.

The Chronicle of Higher Education piece is here. ®

Bootnote

For an extreme example of when peer review goes bad, revisit the Hwang Woo-Suk saga, which got top journal Science in a whole world of trouble.

Boost IT visibility and business value

More from The Register

next story
Intel's Raspberry Pi rival Galileo can now run Windows
Behold the Internet of Things. Wintel Things
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux kernel devs made to finger their dongles before contributing code
Two-factor auth enabled for Kernel.org repositories
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.