dc.contributor.author
Dimitriadis, Ilias
en
dc.date.accessioned
2015-05-29T19:35:21Z
dc.date.available
2015-09-27T05:56:29Z
dc.date.issued
2015-05-29
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/127
dc.rights
Default License
dc.title
Analysis of the Scopus dataset to discern unscrupulous publication practices
en
heal.license
http://creativecommons.org/licenses/by-nc/4.0
heal.recordProvider
School of Science and Technology, MSc in Information & Communication Technology Systems
heal.publicationDate
2014-12
heal.bibliographicCitation
Ilias Dimitriadis, 2014, Analysis of the Scopus dataset to discern unscrupulous publication practices, Master's Dissertation, International Hellenic University
en
heal.abstract
This dissertation was written as a part of the MSc in ICT Systems at the International Hellenic University.
Academic evaluation boards, universities, research centers, etc. across the globe have started incorporating publicly available bibliometric data for the formal assessment of academics and researchers. Scopus is one of the biggest web-accessible databases of abstracts and citations of peer-reviewed literature.
We describe some of the useful bibliometric information, the theory behind them, we analyze their advantages and drawbacks and we focus on some of the possible ways to manipulate these metrics.
We present our effort to validate the hypothesis that standard graph analysis techniques can unveil citation manipulation through author collusion, superficial referencing, fake paper generation and other academically unacceptable practices. What’s more, we will investigate the relationship, if there is any, between the imposition of bibliometric based assessment and the emergence of the above bad publication practices by the researchers.
No part of this research would have been completed without the help of my supervisor Professor Mihail Sirivianos. I am also really grateful to Konstantinos Ntonas, the inventor of DEiXTo who has been more than helpful and kind to help me retrieve all the data needed from Scopus using the DEiXTo tool. As stated below all the source code related to this part is completely programmed by Mr. Ntonas. Last but not least, I would like to thank Professor Christos Berberidis, who was more than eager to help me with any problem I have faced during this dissertation, providing me with advice and solutions.
en
heal.tableOfContents
1. Abstract ........................................................................................................................................... 4
2. Introduction .................................................................................................................................... 7
3. Literature Review .......................................................................................................................... 11
3.1. The Impact Factor .................................................................................................................. 11
3.2. The H-index ............................................................................................................................ 14
3.3. The Eigenfactor Metrics ......................................................................................................... 17
3.3.1. PageRank ......................................................................................................................... 17
3.3.2. Eigenfactor Score & Article Influence ............................................................................. 20
3.4. Variations & the Alternative Metrics ..................................................................................... 24
3.4.1. SNIP & SJR ....................................................................................................................... 24
3.4.2. Altmetrics ........................................................................................................................ 26
3.5 The Eigentrust Algorithm ........................................................................................................ 27
3.5.1 The Basic EigenTrust ........................................................................................................ 28
3.5.2. The distributed EigenTrust .............................................................................................. 29
3.5.3. Secure EigenTrust ............................................................................................................ 30
4. Problem Definition ........................................................................................................................ 33
4.1. Academic Hoaxes ................................................................................................................... 33
4.2. The Researchers' side ............................................................................................................. 35
5. Contribution .................................................................................................................................. 39
5.1. Introduction ........................................................................................................................... 39
5.2. Data Selection ........................................................................................................................ 40
5.3. Deixto Tool Personalization ................................................................................................... 43
5.4. Declaring the data as objects ................................................................................................. 45
5.5. XML Parsing ............................................................................................................................ 46
5.6. Network of Papers ................................................................................................................. 49
5.7. Graph Visualization ................................................................................................................ 52
5.8. Graph Analysis & Metrics ....................................................................................................... 53
5.9. Eigen Trust Implementation & Future Work .......................................................................... 53
5.10. The PagenTrust JAVA APP .................................................................................................... 54
5.11. Graph Analysis results .......................................................................................................... 56
5.12. The peer review problem ..................................................................................................... 74
6. Conclusion ..................................................................................................................................... 77
6
7. References ..................................................................................................................................... 79
8. Appendix ....................................................................................................................................... 83
8.1. Deixto Source Code – XML Patterns – XML results ................................................................ 83
8.2. JAVA Source Code .................................................................................................................. 98
8.3. Graphs .................................................................................................................................. 120
en
heal.advisorName
Sirivianos, Prof. Michail
en
heal.committeeMemberName
Sirivianos, Prof. Michail
en
heal.committeeMemberName
Tzortzis, C.
en
heal.committeeMemberName
Berberidis, C.
en
heal.academicPublisher
School of Science and Technology, MSc in Information & Communication Technology Systems
en
heal.academicPublisherID
ihu
heal.fullTextAvailability
true