1 Types of Academic Misconduct by Paper Authors
1.1 Plagiarism
1.1.1 Plagiarism of Ideas
Using others' ideas without citation or explanation and publishing them in one's own name should be defined as plagiarism of ideas. The manifestations of plagiarism of ideas include:
a) Directly using the arguments, viewpoints, conclusions, etc. in others' published literatures without citation.
b) Using others' arguments, viewpoints, conclusions, etc. without citation after paraphrasing them without changing their original meanings.
c) Using others' arguments, viewpoints, conclusions, etc. without citation after deleting some of their contents.
d) Using others' arguments, viewpoints, conclusions, etc. without citation after splitting or reorganizing them.
e) Using others' arguments, viewpoints, conclusions, etc. without citation after adding some contents to them.
1.1.2 Plagiarism of Data
Using others' published data without citation or explanation and publishing them in one's own name should be defined as plagiarism of data. The manifestations of plagiarism of data include:
a) Directly using the data in others' published literatures without citation.
b) Using the data in others' published literatures without citation after making slight modifications.
c) Using the data in others' published literatures without citation after adding some contents to them.
c) Using the data in others' published literatures without citation after deleting some of their contents.
d) Using the data in others' published literatures without citation after changing their original arrangement order.
f) Using the data in others' published literatures without citation after changing their presentation forms, such as converting charts into text descriptions or converting text descriptions into charts.
1.1.3 Plagiarism of Images, Audio and Video
Using others' published images, audio and video materials without citation or explanation and publishing them in one's own name should be defined as plagiarism of images, audio and video. The manifestations of plagiarism of images, audio and video include:
a) Directly using the images, audio and video materials, etc. in others' published literatures without citation or explanation.
b) Using the images, audio and video materials in others' published literatures without citation or explanation after making slight modifications.
c) Using the images, audio and video materials in others' published literatures without citation or explanation after adding some contents to them.
d) Using the images, audio and video materials in others' published literatures without citation or explanation after deleting some of their contents.
e) Using the images in others' published literatures without citation or explanation after enhancing some of their contents.
f) Using the images in others' published literatures without citation or explanation after weakening some of their contents.
1.1.4 Plagiarism of Research (Experimental) Methods
Using others' original research (experimental) methods without citation or explanation and publishing them in one's own name should be defined as plagiarism of research (experimental) methods. The manifestations of plagiarism of research (experimental) methods include:
a) Directly using others' original research (experimental) methods in published literatures without citation or explanation.
b) Using others' original research (experimental) methods in published literatures without citation or explanation after modifying some non-core elements of them.
1.1.5 Plagiarism of Textual Expressions
Using others' textual expressions with complete semantics in published literatures without citation and publishing them in one's own name should be defined as plagiarism of textual expressions. The manifestations of plagiarism of textual expressions include:
a) Directly using the textual expressions in others' published literatures without citation.
b) Using the textual expressions in others' published literatures in paragraphs. Although there is a citation, the used text is not put in quotation marks, or the font is not changed, or it is not displayed in a specific arrangement.
c) Using the textual expressions in a certain published literature in multiple places, but only citing in one or a few of these places.
d) Continuously using the textual expressions from multiple literatures, but only indicating the source of one or a few of these literatures.
e) Paraphrasing the textual expressions in others' published literatures without citation and without changing their original meanings, including summarizing and deleting the text in others' published literatures, or changing the sentence patterns of the textual expressions in others' published literatures, or making synonymous substitutions for the textual expressions in others' published literatures with similar words.
f) Using the textual expressions in others' published literatures without citation after adding some words and sentences to them.
g) Using the textual expressions in others' published literatures without citation after deleting some words and sentences from them.
1.1.6 Overall Plagiarism
Excessive or extensive citation of the content of others' published literatures in the main body of the paper or a certain part of the main body of the paper should be defined as overall plagiarism. The manifestations of overall plagiarism include:
a) Directly using all or most of the content of others' published literatures.
b) Publishing in one's own name after adding some contents to others' published literatures, such as supplementing some data or some new analyses, etc.
c) Publishing in one's own name after reducing all or most of the content of others' published literatures.
d) Publishing in one's own name after replacing the research objects in others' published literatures.
e) Publishing in one's own name after changing the structure and paragraph order of others' published literatures.
f) Patching together others' published literatures into one paper and then publishing it.
1.1.7 Plagiarism of Others' Unpublished Achievements
Using others' unpublished ideas, original research (experimental) methods, data, images, etc. without permission, or using them with permission but without explanation, should be defined as plagiarism of others' unpublished achievements. The manifestations of plagiarism of others' unpublished achievements include:
a) Using others' ideas, original research (experimental) methods, data, images, etc. that have been publicly disclosed but not formally published without permission.
b) Using others' ideas, original research (experimental) methods, data, images, etc. that have been publicly disclosed but not formally published with permission, but without citation or without indicating it in the form of an acknowledgment, etc.
1.2 Fabrication
The manifestations of fabrication include:
a) Fabricating data, images, etc. that are not obtained through actual investigation or experiment.
b) Fabricating samples, etc. that cannot be obtained again through repeated experiments.
c) Fabricating research methods, conclusions, etc. that do not conform to the facts or cannot be repeatedly verified.
d) Fabricating materials, annotations, references that can support the paper.
e) Fabricating the sources of funding for the relevant research in the paper.
f) Fabricating reviewer information and review comments.
1.3 Manipulation
The manifestations of manipulation include:
a) Using the original survey records, experimental data, etc. that have been arbitrarily modified, selected, deleted, or added, so that the original meanings of the original survey records, experimental data, etc. are changed.
b) Constructing untrue images by splicing different images.
c) Removing a part from the whole image or adding some fictional parts, so that the interpretation of the image is changed.
d) Enhancing, blurring, or moving specific parts of the image, so that the interpretation of the image is changed.
e) Changing the original meaning of the cited literature to make it beneficial to oneself.
1.4 Improper Authorship
The manifestations of improper authorship include:
a) Excluding people who have made substantial contributions to the research involved in the paper from the author list.
b) Listing people who have not made substantial contributions to the research involved in the paper as authors.
c) Adding others to the author list without their consent.
d) The author ranking does not match their actual contributions to the paper.
e) Providing false information about the author's professional title, affiliated unit, educational background, research experience, etc.
1.5 Multiple Submissions of the Same Manuscript
The manifestations of multiple submissions of the same manuscript include:
a) Submitting the same paper to multiple journals at the same time.
b) Submitting the paper to another journal within the agreed response period of the first submission.
c) Submitting the manuscript to another journal before receiving the formal notice of withdrawal confirmation from the journal.
d) Submitting multiple papers with only minor differences to multiple journals at the same time.
e) Submitting the paper to another journal after making slight modifications to it before receiving the response from the first submission journal or within the agreed period.
f) Submitting a paper that has been published (or in which oneself is one of the authors) again without any explanation, either in its original form or after making slight modifications.
1.6 Duplicate Publication
The manifestations of duplicate publication include:
a) Using the content of one's own (or in which oneself is one of the authors) published literature in the paper without citation or explanation.
b) Without any explanation, extracting parts of the content from multiple of one's own (or in which oneself is one of the authors) published literatures, patching them together into a new paper, and then publishing it again.
c) Not indicating the source of the first publication for the permitted secondary publication.
d) Repeatedly using the data of one survey, one experiment, etc. in multiple papers without citation or explanation.
e) Publishing papers with similar or identical methods, conclusions, etc. multiple times based on the same experiment or research, each time by supplementing a small amount of data or materials.
f) Collaborators publishing papers with obviously similar or identical data, methods, conclusions, etc. regarding the same survey, experiment, results, etc.
1.7 Violation of Research Ethics
If the research involved in the paper has not obtained the ethical approval as required, or exceeds the scope of the ethical approval, or violates the research ethics norms, it should be defined as a violation of research ethics. The manifestations of violating research ethics include:
a) The research involved in the paper has not obtained the corresponding ethical approval as required, or the corresponding approval certificate cannot be provided.
b) The research involved in the paper exceeds the scope of the ethical approval.
c) There are problems in the research involved in the paper that violate research ethics, such as improper harm to research participants, abuse of living experimental subjects, and violation of the principle of informed consent.
d) The paper reveals the privacy of the subjects or respondents.
e) The paper does not explain the conflicts of interest involved in the research as required.
1.8 Other Academic Misconduct Behaviors
Other academic misconduct behaviors include:
a) Including literatures in the references that have not actually been referred to.
b) Marking the citations quoted from other literatures as direct citations, including marking the citations quoted from translated works as quoted from the original works.
c) Not properly acknowledging and stating the research funds, experimental equipment, materials, data, ideas, unpublished materials, etc. provided by others (except in cases with special requirements).
d) Disclosing the key information of the paper to others or the society without permission, and infringing on the first publication right of the submitting journal.
e) Using copyrighted literature that requires permission without permission.
f) Using copyrighted literature jointly owned by multiple people without the consent of all copyright holders.
g) Using others' copyrighted literature with permission, but without citation or with incomplete citation information.
h) Using others' copyrighted literature with permission, but exceeding the permitted scope or purpose.
i) Interfering with journal editors and reviewers in the non-anonymous review process.
j) Recommending reviewers with interests related to oneself to the editor.
k) Entrusting a third-party institution or others unrelated to the content of the paper to write, submit, or revise the paper on one's behalf.
l) Publishing papers in violation of the confidentiality regulations.
2 Types of Academic Misconduct by Reviewers
2.1 Reviewing Against Academic Morality
Behaviors of tolerating academic misconduct in the paper review process, or reviewing based on non-academic factors, etc., should be defined as reviewing against academic morality. The manifestations of reviewing against academic morality include:
a) Turning a blind eye to the actual defects and academic misconduct behaviors in the manuscript found.
b) Putting forward review comments based on non-academic factors such as the author's nationality, gender, ethnicity, status, region, and the nature of the affiliated unit, rather than the scientific value, originality, writing quality of the paper, and its relevance to the scope and purpose of the journal.
2.2 Interfering with the Review Process
Deliberately delaying the review process, or influencing the publication decision in an improper way, should be defined as interfering with the review process. The manifestations of interfering with the review process include:
a) Failing to complete the review but not refusing the review in a timely manner or negotiating with the journal.
b) Unreasonably delaying the review process.
c) Directly contacting the author without the permission of the journal in the non-anonymous review process.
d) Privately influencing the editor and swaying the publication decision.
2.3 Violating the Conflict of Interest Regulations
Not disclosing or concealing the interest relationship with the author of the reviewed paper, or deliberately recommending other reviewers with an interest relationship with a specific manuscript, etc., should be defined as violating the conflict of interest regulations. The manifestations of violating the conflict of interest regulations include:
a) Not informing the editor of the conflict of interest that may exclude oneself from the review process as required.
b) Recommending other reviewers to the editor who have a possible or potential conflict of interest with a specific manuscript.
c) Unfairly reviewing the papers of authors with a conflict of interest.
2.4 Violating the Confidentiality Regulations
Sharing and using the content of the reviewed manuscript with others without permission, or disclosing the content of the unpublished manuscript, should be defined as violating the confidentiality regulations. The manifestations of violating the confidentiality regulations include:
a) Sharing the content of the reviewed manuscript with others outside the review process.
b) Unauthorizedly disclosing the content of the unpublished manuscript or research results.
c) Unauthorizedly using the content of the reviewed manuscript for purposes unrelated to the review process.
2.5 Appropriating Manuscript Content
Unauthorizedly using the content of the unpublished manuscript being reviewed, or using the content of the unpublished manuscript with permission but without citation or explanation, should be defined as appropriating the content of the reviewed manuscript. The manifestations of appropriating the content of the reviewed manuscript include:
a) Using the content of the unpublished manuscript being reviewed without the permission of the paper author and the editor.
b) Using the content of the unpublished manuscript being reviewed with the permission of the paper author and the editor, but without citation or explanation.
2.6 Seeking Unjust Enrichment
Using the confidential information in the review process and the review rights to seek personal benefits should be defined as seeking unjust enrichment. The manifestations of seeking unjust enrichment include:
a) Using the confidential information to obtain personal or professional benefits.
b) Using the review rights to seek unjust enrichment.
2.7 Other Academic Misconduct Behaviors
Other academic misconduct behaviors include:
a) Discovering research ethics issues in the reviewed paper but not notifying the journal in a timely manner.
b) Unauthorizedly asking others to review on one's behalf.
3 Types of Academic Misconduct by Editors
3.1 Putting Forward Editorial Opinions Against Academic and Ethical Standards
Putting forward editorial opinions without following academic and ethical standards and the purpose of the journal should be defined as putting forward editorial opinions against academic and ethical standards. The manifestations of putting forward editorial opinions against academic and ethical standards include:
a) Putting forward editorial opinions based on non-academic standards and beyond the scope and purpose of the journal.
b) Ignoring or intentionally overlooking the relevant ethical requirements of the journal papers when putting forward editorial opinions.
3.2 Violating the Conflict of Interest Regulations
Concealing the interest relationship with the submitting author, or deliberately selecting reviewers with an interest relationship with the submitting author, should be defined as violating the conflict of interest regulations. The manifestations of violating the conflict of interest regulations include:
a) Not informing the editor of the conflict of interest that may exclude oneself from the editorial process of a specific manuscript.
b) Intentionally selecting reviewers with a potential or actual conflict of interest to review the manuscript.
3.3 Violating the Confidentiality Requirements
Intentionally disclosing the relevant information of the paper author and the reviewer in the anonymous review process, or unauthorizedly disclosing, making public, or using the content of the edited manuscript, or causing the leakage of the manuscript information due to not complying with the relevant regulations, should be defined as violating the confidentiality requirements. The manifestations of violating the confidentiality requirements include:
a) Disclosing the relevant information of the paper author to the reviewer in the anonymous review process.
b) Disclosing the relevant information of the reviewer to the paper author in the anonymous review process.
c) Sharing the content of the edited manuscript with others outside the editorial process.
d) Unauthorizedly disclosing the content of the unpublished manuscript or research results.
e) Unauthorizedly using the content of the manuscript for purposes unrelated to the editorial process.
f) Violating the regulations on the safe storage or destruction of the manuscript, the electronic version of the manuscript document, and the relevant content, resulting in the leakage of information.
3.4 Appropriating Manuscript Content
Unauthorizedly using the content of the unpublished manuscript, or using the content of the unpublished manuscript with permission but without citation or explanation, should be defined as appropriating the manuscript content. The manifestations of appropriating the manuscript content include:
a) Using the content of the unpublished manuscript without the permission of the paper author.
b) Using the content of the unpublished manuscript with the permission of the paper author, but without citation or explanation.
3.5 Interfering with the Review
Influencing the review of the reviewer, or unreasonably denying or distorting the review comments of the reviewer, should be defined as interfering with the review. The manifestations of interfering with the review include:
a) Privately influencing the reviewer and swaying the review comments.
b) Ignoring or denying the review comments given by the reviewer without sufficient reasons.
c) Intentionally distorting the reviewer's comments and influencing the manuscript modification and publication decision.
3.6 Seeking Unjust Enrichment
Using the journal space, the confidential information
All copyright © Editorial department of the Journal of National University of Defense Technology Technical Support: Beijing frequently cloud technology development co., LTD 湘ICP备09019258号