Feeds

Stob latest: IEEE flags dodgy paper

Cleaning up after peer review

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

After a series of emails with IEEE board member and the institute's director of products and services, Evan Butterworth, we received this statement:

First, after a review of IEEE publication policies and procedures, we've determined that it would be appropriate to flag the article in our database. We are currently addressing that, and the flag should appear the next time we do a download of articles into the database - some time within the next 5 to 10 days. The flag will clearly alert researchers that the content of the article may not be reliable. I've appended the full text of the flag below my signature.

Second, it is our practice to regularly review and revise our policy manual, and we intend to consider what we have learned from this situation as part of that process.

Again, thank you for your diligence in bringing this situation more broadly to our attention. The IEEE is committed to ensuring the integrity of our scholarly publishing process, and the soundness of our research database.

And here's the new text appended to the Madanmohan and De' paper:

Notice of Violation of IEEE Publication Principles

“Open Source Reuse in Commercial Firms” by T.R. Madanmohan and Rahul De in IEEE Software, Vol. 21, Issue 6, November/December 2004, pp. 62-69

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains portions of original text from the sources cited below. Text from Paper 1) was reused without attribution. Text from Paper 2) was reused with attribution but without being clearly delineated from the above authors’ own text.

1) "Open-Source CMS: Prohibitively Fractured?" by Tony Byrne in CMS Watch, http://www.cmswatch.com/Feature/89-Open-Src 14 May 2003, pp 94-99

2) “The Amos Project: An Approach to Reusing Open Source Code” by Manuel Carro, Germán Puebla and Carlo Daffara in Presente y futuro de la ingeniería del software libre URJC, Madrid, May 21, 2003

As Verity noted, the paper continues to be widely cited.

Stay tuned - there's much more to follow. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Sin COS to tan Windows? Chinese operating system to debut in autumn – report
Development alliance working on desktop, mobe software
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.