Research Ethics in Computer Science Publications C
Research Ethics in Computer Science Publications C
net/publication/348321738
CITATIONS READS
0 2,610
5 authors, including:
All content following this page was uploaded by Intan Mutia on 06 February 2021.
ABSTRACT
Ethics is one of the attitudes that academics need to have in the world of education. Ethics also has a very
important role as a determining philosophy for researchers, especially in the field of computer science, in
making decisions about right and wrong. The world of academia seems to be experiencing moral
degradation or decline in terms of both teaching and publication of scientific works. The number of
scientific violations committed by parties involved in organizing scientific publication publications seems
to prove that moral values are no longer important and tend to be ignored. Research carried out in this
journal is not a “judgmental” nature of researchers in the field of computer science, but rather to identify
what aspects make researchers commit violations in the publication of scientific papers along with the
motivation behind these violations. Then the discussion in this paper will also look at the impact of
violations committed by researchers. This research also seeks to assist researchers in increasing awareness
in minimizing the occurrence of violations of academic values in terms of ethics and morals in the rules of
the world of scientific publications both offline and especially online. So that in the end there is an increase
in the moral value of each researcher to be accountable for the results of his work to the public and certain
communities.
improve their writing skills and also to publish scientific 3. Publication of scientific papers without the
papers both at the national level and on a different scale. correct peer-review process (Predator Journals).
more broadly namely international publications). A form
of serious government attention to the number of This paper is divided into several sub-chapters,
scientific publications of lecturers in Indonesia is the namely: theoretical basis of computer science research
construction of the Indonesian Indexation and Citation ethics, types of violations of scientific publication
System (SINTA) which was initiated by the Ministry of publications, research methodology, discussion, and
Research, Technology, and Higher Education and was conclusions.
launched for the first time on January 30, 2017. With the
presence of SINTA, the number of scientific papers 1.1. Research Ethics in the Field of Computer
published by lecturers as well as researchers in Indonesia Science
can easily be searched online anywhere and anytime.
The most visible result of the existence of SINTA is The issue of code of ethics in the field of computer
the positive motivation of lecturers and researchers in science and information technology research has existed
Indonesia in conducting research and also writing since the early 1980s, this is indicated by the existence of
scientific papers both in the form of paper conferences an American institution known as The Institute of
and also in the form of journals. Then, the next positive Electrical and Electronics Engineers (IEEE) [2].
thing is an increase in Indonesia's ranking in the ASEAN Returning to the discussion or topic regarding research
region in the whole of international scientific ethics, this relates directly to all true, wrong, good, and
publications indexed by SCOPUS, beating Singapore and bad research activities or activities, and also touches on
Thailand based on the latest data that researchers got the moral aspects of each researcher who is involved
until the end of 2018. either directly or indirectly in the field of computer
science research [3]. Then, research ethics is also related
to scientific truth that can be accounted for from the
research results carried out by lecturers and researchers
alike.
The code of ethics in the field of computer science
research has a very useful purpose to educate researchers,
especially in terms of increasing knowledge on issues
that are closely related in the field of computer science
and also as a moral foundation for the profession of a
researcher [4]. The application of a code of ethics in the
field of computer science research is based on Ethical
Decision Making Models [4], in which this model is
developed and used to analyze problems related to
Figure 1 Ranking of the Number of Scientific Paper various types of code of conduct violations committed by
Publications in the Asian Region Source: SINTA [1]. researchers in the field of computer science. Some
examples of violations that are often or rife in both IT
The positive things that have been written before by professionals and academics (lecturers and researchers)
researchers are also unfortunately accompanied by are copyright infringement of an idea, thought, concept,
several negative things that have been done by lecturers or even piracy of software that is claimed by
and researchers in Indonesia. On this occasion, the irresponsible parties [5]. Then for cases of violations in
researchers also apologized once again because there was terms of the publication of scientific papers is the
no bad intention at all to demonize or judge fellow manipulation of the author or author written on a paper or
lecturers and researchers in Indonesia. The data and facts journal that will be sent to the journal manager.
speak that there are indications and evidence that frauds A good understanding and understanding of the code
are occurring in the publication of scientific papers of ethics in the world of publication of scientific papers
carried out by some lecturers and researchers in in the field of computer science will provide additional
Indonesia. These matters will be the main concern and motivation for lecturers and researchers to think and act
discussion in writing this paper with ethical violations well and also be positive about the attitudes that should
that occur in the publication of scientific papers by be done or not necessary to avoid the occurrence.
lecturers and researchers. Then the researcher will also violation of ethics of publication of scientific papers. The
discuss the factors or motivations that cause ethical following are important points related to the ethical code
violations of the publication of scientific papers in the contained in the field of computer science research that
world of higher education in Indonesia. The following every researcher must have and understand properly [6] :
are the main points of discussion in writing this paper 1. Honesty is the main asset that a person must have in
related to the types of ethical violations that occur in the conveying data, using research methods, and also in
publication of scientific papers by some lecturers and disseminating research results.
researchers: 2. Objectivity in analyzing data, interpreting data, and
1. Plagiarism and duplication of scientific papers assessing the results of a scientific paper.
are still rife. 3. Have integrity in maintaining ongoing or completed
2. Collaboration manipulation of authors or research commitments.
researchers (co-authorship) in a scientific paper. 4. Open with new things, public presentation of research
results. And open to accepting criticism and
319
Advances in Social Science, Education and Humanities Research, volume 512
suggestions that can be used to improve research to So far, plagiarism has generally been synonymous
make it even better. with the activity of "taking" other people's ideas or
5. Respect the intellectual property rights of other writings and then claiming or acknowledging the idea or
researchers in terms of ideas, thoughts, work as private property without mentioning or
formulations, and also the results of research that mentioning the real identity of the real creator. However,
have been carried out so that they do not claim the it turns out that the "science" of plagiarism has also
work of other researchers to be their own because developed into several new variations that are still
this is tantamount to committing the stealing. included in the plagiarism category, namely [8]:
6. Be responsible for the research that is being carried 1. Duplication of scientific papers.
out and can also be responsible for the results of the 2. Submission of scientific paper documents in the
research, such as having the awareness not to form of papers or journals to many publishers.
manipulate multiple publications or fabricate the 3. Resend scientific papers that have been received
data. and published and then it is said that the paper
7. Respect colleagues or other researchers by not has never been published before. This is known
"attacking" or overly criticizing scientific papers as self-plagiarism.
that are in the process of being written or have been 4. Inconsistencies in identifying all names of
published. authors (authors or co-authors) involved in
8. Avoiding acts of discrimination against fellow research and preparation of scientific papers.
researchers or parties who are directly or indirectly
involved in the research. Research proves that plagiarism is one of the highest
and most frequent violations of ethical codes in the field
of computer science research [8]. One of the most
1.1.1. Plagiarism common factors in plagiarism in the field of computer
science research is the stealing of scientific papers from
Actions of plagiarism have become a very frightening other researchers and removing or disguising the identity
thing in the world of higher education as well as among of the original researcher and turning it into one's work,
academics. However, plagiarism is not something new or this is where the ethical role of a researcher in citing or
"strange" in the world of education, especially in the giving credit for real researchers as a form of
world of higher education. Problems related to plagiarism appreciation or respect for the results of research work
occur in many countries, especially in higher education that has been done by previous researchers. Because
institutions which require a lot of academicians in it to be without the proper ethics and understanding to respect
involved in the publication of scientific works starting the work or ideas of a researcher, plagiarism is included
from making papers or reports on ordinary assignments, in the act of "stealing" from a work of intellectual
theses, theses, dissertations, papers, books and also property produced by previous researchers. The
publications journal. Especially with the existence of an interesting point for the types of plagiarism that will be
internet network that makes it easier to send and share the focus of writing and research from this paper is point
files between one user and another on a computer number 3, namely self-plagiarism.
network, with the internet network, access to digital data Where the definition or meaning of self-plagiarism
and information can be done easily and without limits. can occur when a researcher has finished writing a
Therefore, the field of computer science research is one scientific paper that has been published in either a paper
of the fields of research that provides the largest or journal form, then the paper or journal is reused in his
"contribution" in terms of plagiarism compared to other “newest” research repeatedly in the future. Maybe a
research fields [7]. question like this will arise "then what is the problem
Plagiarism is defined by several institutions or with the actions taken by the researcher?" or "where is
publishers as follows: the fault?". The act of self-plagiarism will produce a
1. “Take ideas, methods or writing (partially or sufficient number of “new” journals or papers in a short
completely) from someone's work without time, but these scientific works do not have a significant
mentioning or giving credit to the source”, or sufficient contribution. Because there is nothing that
(American Association of University Professors) has been recently conveyed or written on the papers
2. The University of Oxford defines plagiarism as a which are the result of the act of self-plagiarism [9]. The
form or act of presenting the work or ideas of location of the "error" of a researcher's actions in
others and recognizing it as the result of one's conducting self-plagiarism is more directed at the moral
work, where the action is consciously or that will happen to a researcher because by doing self-
unconsciously by the original owner or source. plagiarism, the researcher or scientist is actually
3. The American Psychological Association (APA) "deceiving" himself and also deceiving others by
defines plagiarism as a form of effort made by a dishonest actions in publishing scientific works which are
person in terms of showing the results of other the results of old research but repackaged in a form as if
people's thoughts or work as the result of one's they were “new” research.
thoughts. Where the results of this thought can be Then the most important question is what underlies or
partially or completely to be claimed as "their what factors lead researchers to take self-plagiarism. The
own". following is a statement regarding the main factors that
cause self-plagiarism among researchers in the form of
hypotheses made by researchers based on data, facts, and
320
Advances in Social Science, Education and Humanities Research, volume 512
also observations made based on valid sources and can be writings on his weblog page were also published and
justified: widely distributed to researchers and various institutions
1. Money, because everything will come back to or universities around the world to become very
money which is the root of the main problem. Why important information and very useful in identifying
money? The answer is very clear and simple various types of characteristics of a journal that are
because research activities in any field of science considered suspicious or fall into the category "Predatory
certainly require money or funds for research journal" [11] :
activities. Where the money that is meant here can 1. The peer-review process is fast and easy, this is
be obtained from the personal funds of researchers because there is no peer-review process carried out
or funding obtained from third parties. The third- by journal publishers. The peer-review process that
party referred to in the last sentence, can mean the is "carried out" is only a camouflage, which shows
campus or university where the researcher is that each submitted document will be processed
sheltering or an external party (private or according to the "procedure" of each journal
government) who wants to provide research funding manager. This is evidenced by the high acceptance
assistance to researchers to assist the completion of rate (more than 80 percent) for every journal
research and research conducted by researchers. document sent to problem publishers or considered
Research money that has been obtained by a predatory journal [12].
researchers will be one of the sources that make 2. Almost every journal-title will be accepted even
researchers "willing" to commit despicable acts though it does not match the scope of the journal
because the money can be misused for things that because the most important thing is that the
have nothing to do with the research being carried researcher is willing to pay a certain amount of
out. money to the publisher if the journal manuscript
2. Publicity, this becomes "important" for enough document is "accepted".
researchers to get attention or attention widely in 3. Obliged to pay a “publication fee” for researchers or
the field of research and publication of scientific writers, where this fee is camouflaged as a fee used
papers. If a scientific work gets enough citation, for the peer-review process, certificates (print or
then by itself the scientific work will have a high digital), administrative fees, and others. Where the
Impact Factor (IF). What's more, if the scientific determined publication costs vary from cheap
work gets a prestigious award in its field, then the (affordable) to high, as if it shows that the journal's
researcher will get even higher attention from other publisher is credible and has a high reputation.
researchers or leading research institutions. 4. Minimal or no copy-editing process for any
3. Pressure, this is quite interesting to discuss. Why is documents accepted for publication online.
pressure a factor for researchers to take self- 5. Publish paper documents or journals that have no
plagiarism? An article written by Shashok [10] relevance to research activities, for example writing
explains that in several countries, both developing personal essays.
and developed countries, it is as if it "obliges" 6. Does not have a clear editorial and reviewer board
researchers to produce an idea or work. Indeed, structure or sometimes the names of the editors and
scientific work is an inseparable part of the life of a reviewers that are listed on the journal page are fake
researcher, but the obligation that is meant here is or fictitious.
the demands or pressure placed on researchers 7. Making false confessions or claims related to the
periodically to be able to make research that will be value of the Impact Factor (IF) and the indexation
published in the form of scientific papers. In the system used in journal publishing [12].
end, the scientific writing can be produced, but
what happens is that the work is often not under the The interesting thing is that although there are quite
scientific field of the researcher because it is done clear and specific criteria regarding predator journals, the
poorly, namely through research that has been done use of the term predator journal itself does not have a
previously being republished repeatedly using only clear meaning. In the sense that the definition of a
different titles, but most of the content remains the predatory journal itself is again only a term used for
same and there is no novelty at all. Then the naming journals or publishers that are considered
additional problem is that the research has been suspicious or problematic [13], the existence of predatory
conducted and published before, but some journals has only been limited to the notion that a journal
researchers can "carefully" package it into a "new" or publisher has doubts its validity in terms of its
study without mentioning the work of previous implementation or management. On the contrary, the list
research that has been made by the same researcher. of predatory journals published by Jeffrey Beall itself is
doubtful on validity and accuracy by many researchers
1.1.2. Predatory Journals and higher education institutions. Therefore, the
"standardization" of a journal or publisher can be said to
The term predatory journal became very well known
be a predatory journal, but it does not have a clear and
by academics when a librarian named Jeffrey Beall, an
strong foundation [13]. Also, with the absence of clear
associate professor at the University of Colorado, made a
and concrete evidence that says journal a, journal b, or
very interesting article on his weblog page in 2010. His
journal c, are journals that fall into the category of
article contained a list of journals which were considered
predatory journals, this will make an accusation or
problematic or have “other” motivations that are oriented
assumption that these journals are predatory journals, it is
only to money and not to science. Then Jeffrey Beall's
321
Advances in Social Science, Education and Humanities Research, volume 512
322
Advances in Social Science, Education and Humanities Research, volume 512
also have the same indicators used in writing and The following is a list of journal names that are used
researching this paper, namely : as examples in the data collection found based on the
1. Using fake ISSN and even stealing of ISSN from classification model used in this study, where 11 journal
legitimate (legal) publishers but reused by junk names are strongly indicated to be classified as predatory
journal publishers. journals, where the examination is carried out by
2. The scope of research in the journal is unclear and is checking the ISSN number owned by whether registered
not even mentioned. or indexed in the Scimago Journal Ranks (SJR) as an
3. Low academic standards for writing journal indexed journal:
documents, for example, the use of data fabrication in
journals or the use of words and sentences that have Table 1 List of Predatory Journal
no meaningful information in them. No Journal Name ISSN
ISSN
4. The pursuit of profit solely uses the same mechanism Valid
as predatory journals, namely the existence of a very International Journal on Recent
1 and Innovation Trends in 2321-8169 X
high (unreasonable) APC fee for each journal Computing and Communication
received and to be published. International Journal for Scientific
2 2321-0613 X
5. Lack of and no peer-review process. Research & Development
6. The rate of journal acceptance is very high, where the International Journal of Advanced
rejection of journal documents is less than 5 percent. 3 Research in Computer 2278-1323 X
Engineering & Technology
This means that the journal acceptance rate is very International Journal of Advanced
high, which is more than 95 percent (higher than 4 0976-3945 X
Engineering Technology
India). International Journal of Trend in
5 Scientific Research and 2456-6470 X
Development
International Journal of
3. DISCUSSION 6 Engineering Research and 2248-9622 X
Applications
Tracing predatory journals using data collection aims
International Journal of Scientific
to analyze the existence of predator journals along with 7
& Engineering Research
2229-5518 X
the working scheme of the predator journal itself. Where International Journal of Applied
8 2249-0868 X
the data collection used by researchers is by using a Information Systems
combined combination of Jeffrey Beall's predatory International Research Journal of
9 2395-0072 X
journal list catalog, Cabells Version Blacklist, Directory Engineering and Technology
International Journal of Computer
of Open Access Journal (DOAJ), and Scimago Journal 10
Science & Communication
0973-7391 X
Ranks (SJR). Then for the data collection that has been Imperial Journal of
obtained from several sources, samples will be taken in 11 2454-1362 X
Interdisciplinary Research
the form:
1. Journal Name. Based on the results of the ISSN observation, it can
2. ISSN. be seen that none of the ISSN numbers of each journal
3. Indexation System. are registered on the SJR.
4. Article Processing Charge (APC).
5. Peer-Review Process.
4. CONCLUSION
Research activities carried out by researchers,
especially in the academic world, require ethics, morals
and also responsibility starting from the initial stages of
research, then the research process carried out until the
final result of the research to be achieved. Without an
understanding of ethics in a research activity, there will
be many problems that will occur in the future. Real
examples of several violations of research ethics
discussed in this paper are Plagiarism and Predator
Journals. Both of these are examples of frightening things
and will threaten the essential meaning of the world of
education and academics who still uphold the values of
truth and honesty from research activities. In the end, the
role of ethics in the field of computer science research is
beneficial for researchers to play its role properly so that
they can appreciate the process of a research activity that
will make a meaningful contribution and also benefit the
development of the world of computer science and
information technology.
Figure 2 Schematic model of Journal Examination
Classification
323
Advances in Social Science, Education and Humanities Research, volume 512
324
View publication stats