Adam DayImpossible to ignoreIt’s 1 January 2021. Dozing in bed, floating in that warm & fuzzy limbo between dreams and reality, and that’s where it hits him. That…Oct 1
Adam DayDetecting genAI: beside the point?TL;DR: AI-generated-text detection ceased to be a good indicator of research fraud at the exact time that it became a good tool for…Sep 231
Research FeaturesThe Archaeologists Guide to Good Practice Handbook: A blueprint for a successful digThe UK’s HS2 high-speed rail project has prompted a surge in interest in archaeology.Jul 24Jul 24
Adam DayThe Papermill AlarmThere’s this phrase used by some technologists: ‘epistemic security’. Epistemic security has to do with things like the spreading of…Jan 101Jan 101
Adam DayPredicting retractions with the Papermill AlarmTL;DR: The current version of the Papermill Alarm detects signals in 98.9% of the Hindawi retractions conducted over the last 12 months.**…May 281May 281
Adam DayImpossible to ignoreIt’s 1 January 2021. Dozing in bed, floating in that warm & fuzzy limbo between dreams and reality, and that’s where it hits him. That…Oct 1
Adam DayDetecting genAI: beside the point?TL;DR: AI-generated-text detection ceased to be a good indicator of research fraud at the exact time that it became a good tool for…Sep 231
Research FeaturesThe Archaeologists Guide to Good Practice Handbook: A blueprint for a successful digThe UK’s HS2 high-speed rail project has prompted a surge in interest in archaeology.Jul 24
Adam DayThe Papermill AlarmThere’s this phrase used by some technologists: ‘epistemic security’. Epistemic security has to do with things like the spreading of…Jan 101
Adam DayPredicting retractions with the Papermill AlarmTL;DR: The current version of the Papermill Alarm detects signals in 98.9% of the Hindawi retractions conducted over the last 12 months.**…May 281
Bentham Science Publishers9 Core Values of Research Integrity | Bentham ScienceResearch is a collaborative process. Researchers conduct studies, and publishers — including Bentham Science — make these findings public…Oct 3, 2023
Adam DayKeystone: detecting bad actors with network analysisTL;DR: We can detect individuals with a high probability of being involved in milling papers. The question is: how should we respond?Apr 3
Adam DayPapermills: What’s wrong with duplicate submission?You want to submit a paper to a journal for consideration. It takes, say, 3 months on average for a paper to go through peer-review, so if…Jun 22, 2022