Current location - Education and Training Encyclopedia - Graduation thesis - Why are there academic misconduct?
Why are there academic misconduct?
It is not enough to control all the causes of academic misconduct only by relying on the internal control of colleges and universities.

First, the reasons for academic misconduct

(1) benefit-driven. Professional title promotion, scientific research evaluation and three major interest factors that lead to academic misconduct of scientific researchers.

(2) Lack of academic morality. The lack of academic ethics is particularly prominent in two kinds of academic misconduct: multiple contributions and false citations. These are all academic misconduct caused by the author's lack of academic morality.

(3) The evaluation index system of periodicals is not perfect. Core journals have become the vane of authors' input. Whether Evolution is the core periodical of science and technology in China or the core periodical of Chinese in China Institute of Science and Technology Information, there are some shortcomings in the evaluation index of the periodical. The utilization rate can not reflect the academic level of the paper more objectively and fairly, which greatly reduces the objectivity and fairness of some evaluation indicators.

Editors are lax in examining academic misconduct. In the process of the third review of manuscripts, periodical publishers have designated special responsible editors to review each manuscript-some periodical responsible editors only review the papers and send them to external review if they pass. This makes many academic misconduct escape the net. The lax review by the responsible editor makes this part of the papers with academic misconduct muddle through.

Second, the countermeasures and preventive measures of academic misconduct

(1) Multi-system and multi-stage duplicate checking. The academic misconduct detection system developed by China HowNet, Wanfang and Weipu uses a variety of academic misconduct detection systems and online search tools, which are influenced by exclusive authorization, making the detection results quite different. The results of duplicate checking should be carefully analyzed, and the repeated part is the discussion of methods and results, so we can't just look at repetition.