Detection of metadata manipulations:
Finding sneaked references in the scholarly literature
Submitted to Journal of the Association for Information Science and Technology)
Abstract
We report evidence of a new set of sneaked references discovered in the scientific literature. Sneaked references are references registered in the metadata of publications without being listed in reference section or in the full text of the actual publications where they ought to be found. We document here references sneaked in metadata of the International Journal of Innovative Science and Research Technology (IJISRT). These sneaked references are registered with Crossref and all cite—thus benefit—this same journal. Using this dataset, we evaluate three different methods to automatically identify sneaked references. These methods compare reference lists registered with Crossref against the full text or the reference lists extracted from PDF files. In addition, we report attempts to scale the search for sneaked references to the scholarly literature.
1 Introduction
Citation-based indices or metrics like the -index (Hirsch, \APACyear2005), the Journal Impact Factor (Garfield, \APACyear1994) or the Field-Weighted Citation Impact (FWCI) (Purkayastha \BOthers., \APACyear2019) are cornerstones to many rankings: Clarivate’s ‘Highly Cited Researchers’ list888https://clarivate.com/highly-cited-researchers/, the Shanghai Ranking999http://www.shanghairanking.com/, Times Higher Education World University Rankings101010https://www.timeshighereducation.com/world-university-rankings, QS World University Rankings111111https://www.topuniversities.com/qs-world-university-rankings, or U.S. News Education Rankings121212https://www.usnews.com/best-colleges/rankings/. These citation-based performance metrics are provided by various scientometrics services: Google Scholar (-index), OpenAlex (-index), Scopus (-index and FWCI), and the Web of Science (-index and Journal Impact Factor); Dimensions provides the Field Citation Ratio (FCR) and Relative Citation Ratio (RCR)(Bode \BOthers., \APACyear2023).
Practically speaking, the computation of these indicators requires processing of the metadata describing scientific publications: authors, institutions, reference lists, registration dates, attributing fields to journals and publications, and–critical to the research presented here–reference lists. Crossref131313https://www.crossref.org/ provides infrastructure for registering metadata for scholarly works, including a DOI. To use this infrastructure, organisations join Crossref as members. In many cases, the metadata registered by Crossref members include reference lists. The identifiers of cited works are either provided by Crossref members or automatically added where matching is possible. Crossref is one of the major sources of scholarly data for publishers, authors, librarians, funders, and researchers (Hendricks \BOthers., \APACyear2020). Various scientometrics services like Dimensions, OpenAlex, or SpringerLink make use of metadata deposited with Crossref.
Citation gaming to artificially boost citation-based metrics occurs in various forms (Biagioli \BBA Lippman, \APACyear2020). While most of them involve simply adding references to the research papers directly through a varied set of methods and actors (see, e.g. Beel \BBA Gipp, \APACyear2010; Davis, \APACyear2016; Foley \BBA Valkonen, \APACyear2012; Franck, \APACyear1999; Heathers \BBA Grimes, \APACyear2022; Kojaku \BOthers., \APACyear2021; Labbé, \APACyear2010), sneaked references offer a different pathway to citation gaming (Besançon \BOthers., \APACyear2024). The underlying strategy behind sneaked references is to inject irrelevant and undue citations into the metadata of an accepted article at the time of its registration with scientific repositories. Sneaked references are only present in the metadata of the article and are not part of the actual reference list of this document where they should be found. This malpractice generates undue citations that artificially inflate citation counts.
In this article, we report Crossref records spoiled with at least references sneaked into their metadata reference lists. All sneaked references benefit the same journal, namely, the journal in which the reference lists were published. The paper benefiting the most from sneaked references received a total of undue citation counts, some of which did make their way into various scientometrics services (see Figure 1 and 2).
We designed and evaluated two different methods to automatically identify sneaked references by comparing references registered with Crossref against either the raw text or the reference lists extracted from PDF files. Both methods assume that references registered with Crossref are registered with enough information that they can be found in the extracted text (e.g., unstructured attribute).
The first method identifies in the list registered with Crossref. This method depends on an identical order of elements in the two lists and assumes that sneaked references appear at the end of the list registered with Crossref.
The second method automatically identifies each and every reference registered with Crossref in the raw text extracted from the PDF file. The rationale behind this method is that a particular reference field in a Crossref record reflects closely the text of this reference in the PDF file.
These two new methods are compared to an existing approach, presented in (Besançon \BOthers., \APACyear2024), which relies on a comparison of reference lists lengths. This approach was found to be effective in providing a lower bound to the number of sneaked references, by comparing reference lists retrieved from HTML document versions to the reference lists registered with Crossref.
These methods work only at the document level. To identify sneaked references in the scientific literature as a whole, one of these methods must be applied to each and every document, individually. We report here the result of an attempt to identify sneaked references at a large scale by applying method on 47,170,721 documents previously processed by Dimensions, published since the year 2000. For each of these documents, the reference list was extracted from the PDF file and stored in a database to be compared with metadata registered with Crossref.
Previous work (Besançon \BOthers., \APACyear2024) has mentioned that in data registered with Crossref, duplicated references sometimes appear together with sneaked references. We therefore attempted to identify duplicated references in Crossref metadata in the hopes of identifying new cases of sneaked references. Section 2 presents the dataset and explains in detail and . The proposed methods are assessed using the collected dataset. Section 3 gives precise information about the references sneaked in metadata of the International Journal of Innovative Science and Research Technology (IJISRT): when and where they were sneaked in, to the benefit of which document, and so on. Section 4 provides insight from attempts to detect sneaked references at a larger scale, including the systematic challenges that inhibit these efforts. Section 5 concludes with a discussion of some of the known routes to erroneous references, the actors involved, and some recommended actions which could address the problem of sneaked references.
2 Dataset and comparison Methods
Section 2.1 presents the information upon which the dataset was identified and details about how it was retrieved. Sections 2.2 and 2.3 give a detailed descriptions of the proposed methods (, respectively). Sections 2.4, 2.5 and 2.6 provide performances results.
2.1 The International Journal of Innovative Science and Research Technology (IJISRT)
Visual inspection of several PDF files of the International Journal of Innovative Science and Research Technology (IJISRT), and their corresponding Crossref json records reveals that, in some cases, references are sneaked in at the end of the Crossref reference-list attribute.
On 24 July 2024, Cristian Consonni alerted some of the authors about an entry of the Problematic Paper Screener (Cabanac \BOthers., \APACyear2022) that highlighted tortured phrases in a certain IJISRT article (DOI: 10.38124/ijisrt/ijisrt24apr2410 – PubPeer). He further noted that the article had 237 citations, which was unusually high for an article published in April 2024, only 3 months earlier. Further inspection revealed that there were a significant number of other articles in IJISRT with a seemingly disproportionate number of citations and that most—if not all—citations had come from the same journal. As a result of this discovery, we sought citations in the actual text of the citing articles in vain, which indicates a pattern of sneaked references.
On the same day (24 July 2024), we queried Dimensions for all articles in IJISRT and retrieved the resulting CSV file, including the list of corresponding DOIs. For each retrieved DOI, the corresponding PDF file was downloaded from the publisher website (29 August 2024). Additionally, for all DOIs, Crossref records were downloaded from Crossref using the relevant API (28–29 August 2024). This served as a development dataset, and on 25 November 2024 we downloaded the final dataset presented here.
In this final dataset, the observed sneaked references are always benefiting papers with DOIs prefixed with 10.38124/ijisrt. This prefix identifies the International Journal of Innovative Science and Research Technology (IJISRT). All observed sneaked references appear in Crossref records after the expected references, as an irrelevant addendum to the reference list. We used these two properties (journal-level self-citation and position at the bottom of the sneaked references in Crossref metadata, reference-list attribute) to study to which extent sneaked references occur.
2.2 : Comparing Crossref records with references extracted from PDFs
The idea is to extract a reference list from the PDF files for them to be compared with the ones registered with Crossref. Extracting the reference list from a PDF file can be done using a tool that transforms PDF files into XML files. In XML format, the reference list is clearly identified and can be automatically analysed.
Our process was the following for each collected DOI:
-
•
The reference list registered with Crossref is built from the json file provided by Crossref. In the following, denotes the last element of the list .
-
•
A reference list, (in XML format) is extracted from the PDF file using Grobid (\APACcitebtitleGROBID, \APACyear2008–2023) (default configuration). Unfortunately, Grobid, while being quite reliable, sometimes skips some references. This results in missing references in . Items might be missing in bulk, either at the beginning, end or middle of the reference list. In very exceptional cases, Grobid inserts hallucinated references: might contain references that do not appear in the PDF. We spotted cases where Grobid added the biography of an author as the last item of . This can happen when the bibliography appears, in the PDF, just after the last entry of the reference section (see the left panel in Figure 3). Nevertheless, we’ll use the last reference of , which we denote .
Comparing to gives information about both sneaked references and Grobid’s capability to identify correctly the last reference in the PDF’s reference list. Let us consider the three following cases:
-
Case 1.
If we conclude that is correct with regards to the PDF version. The Crossref record does not contain any sneaked references.
-
Case 2.
If such that we conclude that references appearing after in are sneaked references, forming a list denoted . In the specific dataset of 10.38124/ijisrt, close analysis of instances reveal that, from time to time, the first items are not sneaked references. This happens when Grobid omits to extract from the PDF the end of the reference section, resulting in a truncated . Considering that in all inspected cases, all the sneaked references concerned DOIs starting with , we decided to remove from all elements preceding the first appearance of a DOI starting with . In other words, we skipped the references at the top of the list when they are not prefixed by . Without this cleaning operation, some of the legitimate references would have been wrongly considered as sneaked references.
-
Case 3.
If such that we can conclude that is an artifact created by Grobid. is a hallucinated reference that does not appear, neither in nor in the PDF file. In that case no conclusion can be drawn. Nevertheless, in the specific dataset of 10.38124/ijisrt, a close analysis reveals that—sometimes—sneaked references can be found at the end of . Again, in all inspected cases, the sneaked references are benefiting DOIs starting with . We decided to build with all elements of appearing after the last element that has not a DOI starting with . Without this backward check (iterating over the list from the bottom to the first non DOI), some of the sneaked references would have been wrongly considered as sneaked references.
Figure 3 illustrates a Case 3 situation. For a DOI like this, the list is built from the trailing references with DOIs starting with . This method could be used for every DOI. Identifying Case 1 and Case 2 is a way to evaluate how precise the extraction of sneaked references using Grobid can be.
2.3 : Comparing Crossref records with the full text extracted form PDFs
The rationale behind this method is that the field unstructured of a particular reference entry in a Crossref record reflects closely the text of this reference in the PDF file. As a consequence, the character string found at this field must appear in the text extracted from the PDF file. There is even no need to restrict the search of to the reference section. As shown in Section 2.2, identifying correctly the reference section is challenging. Unstructured references are quite long, thus the search of in is unlikely to generate false positive.
More specifically, the following steps were performed for every DOI:
-
1.
The reference list registered with Crossref is built from the json file provided by Crossref. In the following, denotes an element of the list .
-
2.
The full text is extracted from the PDF file using the pypdf Python library.
-
3.
, a search of in is performed. The goal is to identify the substring of that is the closest to according to the normalized Levenstein distance141414partialratio method from the RapidFuzz Python library. The similarity is ranging from 0 (totally different) and 100 (entirely similar).
-
4.
If this means that no character string highly similar to could be found in . This most probably happens when the reference does not exist in the document, revealing that is a sneaked reference. On the contrary, if a character string quite similar to exists in . In that case is not a sneaked reference. The threshold was set experimentally, after manual examination of several cases.
2.4 Measuring the performance of the detection method using the ‘last’ element of reference lists
We consider here the records with and that contain a total of sneaked references. These records are distributed among the three identified cases (see 2) as follows:
-
Case 1.
DOIs () with no sneaked references where correctly identified because .
-
Case 2.
When such that then is composed of references appearing after in . A cleaning operation (item) might be needed.
-
–
No Cleaning needed: For () DOIs, was correct. This represents a total of () sneaked references.
-
–
Cleaning needed: For DOIs (), contains potential false positives: references that would have been classified as sneaked without the cleaning operation. This represents a total of references ().
-
–
-
Case 3.
For DOIs, such that . A backward check (item) might be needed to identify sneaked references. For the instances of this case, the backward check identifies sneaked references. Without this check sneaked references would have been undetected ().
2.5 Comparing and
Method relies to a high extent on the tool use to extract the reference list from the PDF. We did implement this method using Grobid. Performances of the method is thus dependant of the ability of Grobid to accurately extract the reference list. Since this task is not trivial, and Grobid occasionally makes mistakes, we had to use additional assumptions about the sneaked references to get reliable results: sneaked references appear after the last genuine reference extracted from the PDF file. This means that this method might not generalize easily to other instances of the sneaked references problem.
Method is not dependant on identifying the reference list in the PDF file and does not make any assumptions about where sneaked references are. As such, this method should generalize better than the first one. Nevertheless, in some corner cases in the text extracted from the PDF, additional text fragments like headers or footers might appear in the middle of a reference, thus making the reference identification impossible.
One common drawback of both methods is that the field unstructured must be correctly deposited with Crossref by publisher for the methods to work properly: one could imagine cases where only reference DOIs are provided.
For every DOI with references in the metadata and available PDF, we compared the numbers of sneaked references reported by both methods (see Table 1). For this dataset, among compared DOIs, the methods disagreed in 233 (7.3%) cases. Among these, for only 11 DOIs a difference greater than 10 is observed for the number of sneaked references reported. This explains why the total numbers of sneaked references detected by the methods differ only by ().
It seems that most discrepancies are due to cases where the first method underestimated the number of sneaked references.
| Total processed DOIs | 4,077 |
| – DOIs with no references in JSON | 855 |
| – DOIs with no PDF | 36 |
| – DOIs where methods agreed | 2,953 |
| – DOIs where methods disagreed | 233 |
| Method | DOIs manipulated | sneaked references |
| 2,782 | 80,205 | |
| 2,787 | 80,909 |
2.6 Measuring the performance of that uses the lengths of registered and extracted reference lists
Comparing the list lengths, (adapting (Besançon \BOthers., \APACyear2024) that uses HTML reference lists and Crossref reference lists) would give sneaked references. This is an overestimation of () of the total number of sneaked references.
For some DOIs the error can be quite high (max = 465). Relying solely on lists length comparison will generates many false positive.
This an important drawback of method when implemented using Grobid. It suggests that reference lists extracted using Grobid tend to be shorter than the ones actually existing in documents.
Using a length comparison method will thus overestimate the number of sneaked references. Using either the last element method or the raw comparison method is a more accurate way detect sneaked references.
The next section provides a detailed description of the results obtained using the systematic comparison of Grobid output vs Crossref records ().
3 Characteristics of the sneaked references found in IJISRT
We review the characteristics related to the IJISRT dataset: When and where the sneaked references were inserted and to whom they benefit?
Detailed examination of sneaked references properties aims at delineating the source and the nature of their existences.
3.1 Broad overview: How many? Where and when references were sneaked in? Who are the beneficiaries?
-
•
The corpus is composed of DOIs prefixed by 10.38124/ijisrt.
-
•
For DOIs, a non-empty reference list was downloaded from api.crossref. An empty result can reflect the fact that a document does not contain any reference list. But it also happens when the publisher did not register any reference list for this particular DOI. This means that the references listed in the real document are lost \faSkullCrossbones (see Besançon \BOthers., \APACyear2024). Despite being present in the PDF, they are not registered with Crossref and are not credited to the cited document. Consequently, for DOIs the number of sneaked references is zero, as strictly no references are registered with Crossref.
-
•
For DOIs, a non-empty reference list has been extracted by Grobid from the PDF files. An empty list is generated either when the document does not contain any reference list or when Grobid failed to identify the reference section.
-
•
The records for DOIs have both and . They contain a total of sneaked references.
-
•
Overall, the sneaked references were found in Crossref records. The number of sneaked references in a single paper ranges from to , with an average of sneaked references par paper (see distributions in Figure 4).
-
•
The sneaked references are benefiting different DOIs. The most extreme case is a single DOI benefiting from undue citations.
-
•
DOIs with sneaked references were created with Crossref between March 2024 and November 2024.
3.2 Per beneficiary analysis
A total of sneaked references are benefiting different DOIs. The average count of undue citations per benefiting DOI is . Nevertheless, the distribution is very unbalanced as show in Figure 5. The overwhelming majority of DOIs () are credited with only a single undue citation. On the other hand, a small number of DOIs benefit from a significant number of undue citations.
The DOIs that benefit the most from sneaked references are shown in Figure 6. The figure also shows the count of undue citations that these DOIs benefit from. The DOI benefiting the most (10.38124/ijisrt/ijisrt24apr651) from sneaked references is credited with undue citations. Consequently, this particular DOI is incorrectly credited with and 1.7k citations by OpenAlex and Dimensions, respectively (See Figure 1 and Figure 2). This shows that some of the sneaked references effectively made their way through the counting processes onto some scientometric platforms.
3.3 Time Analysis
The information available from Crossref includes the date on which a DOI was first registered: creation date. For sneaked references, we decided to compare the creation date of the citing DOI and the creation date of the cited DOI.
3.3.1 When were benefiting DOIs created?
The oldest unduly cited DOI is 10.38124/volume4issue7 which is the identifier of a volume published in April 2020 (See 7(a)). It seems that this citation does not benefit any individual papers of the volume.
All but nine of the benefiting DOIs have been created between 2024-03-08 at 12:14 and 2024-11-07 at 12:54. The DOI that benefits the most from sneaked references ( undue citations) has been published in April 2024 (see 7(b)).
3.3.2 When were DOIs with sneaked references created?
According to Crossref metadata, DOIs with sneaked references were created between the 2024-03-14 and the 2024-11-25 (see Figure 8).
The first 14 records featuring sneaked references have been registered with only one of them, on 2024-03-14. These individual sneaked references benefit different DOIs.
The number of sneaked references per DOI increased quite rapidly to reach a maximum of 71. The 6 DOIs with 71 sneaked references were all created on either 2024-10-28 or 2024-10-18.
3.3.3 Coherence between citing and cited creation date
Since sneaked references began to be included on 2024-03-14, and all but one of the beneficiaries started to be created 5 days earlier (2024-03-09), it is important to check the temporal coherence between the creation dates of the citing and cited works.
Figure 9 shows the number of days between the ‘citing’ creation date and the ‘cited’ creation date. This number is always positive showing that, for all sneaked references, the citing DOIs were created after the cited ones.
Nevertheless, time differences are quite small, starting from days (one instance on 2024-05-22), and are slowly increasing as times passes by (see 9(b)).
10(b) shows the time difference distribution ( in days). The most frequent (with 800 occurrences) value is a difference of six days between citing and cited DOIs… Half of the sneaked references are citing DOIs that were created less than 73 days (median) before their own creation.
3.4 Summarizing evidence
As a result it can be said that sneaked references were first added in small numbers in April 2024. At that time only a handful of references were unduly added at registration time. The number of sneaked references increased little by little reaching a maximum of sneaked references per paper in November 2024.
The sneaked references are all benefiting the journal they are sneaked in and thus benefiting the publisher that registered them.
The time difference between the cited and the citing paper, for sneaked references, is often surprisingly small. It is also worth noting that sneaked references are not benefiting to cited papers in a very unbalanced way. Most of the papers are only benefiting from one single sneaked reference, while a few are benefiting for hundreds of undue citation.
In the light of these data, it is hard to find definitive evidence that differentiates intentional manipulation from genuine malfunctions in the meta-data registration process.
Nevertheless, awkward metadata registered with Crossref might help to identify venues where references are sneaked in. The next section investigates this hypothesis.
4 Attempts to detect sneaked references at a large scale
Section 4.1 explains how sneaked references can be discovered when they occur together with duplicated references. Section 4.2 discuses results of an attempt to identify sneaked references at a large scale by applying method on 47,170,721 documents.
4.1 Duplicate based Heuristic to circumscribe sneaked references
We hypotheses that sneaked references appear together with duplicated references. Therefore, we try to detect groups of duplicated references in the hope to circumscribe sneaked references.
A bibliography should not contain the same DOI multiple times. The approach we adopted is to consider only the DOI of references to identify duplicates. Thus, two references in a same citing article pointing to the same DOI is considered as a duplicate reference. Working at the DOI level to spot duplicates is imperfect. We noticed that some DOIs occur multiple times in a Crossref record of a bibliography that does not feature duplicates. This can happen when a DOI of a book is used to identify different chapters of this book. For this reason, we excluded books and book chapters from our analysis.
We used the latest Crossref snapshot downloaded on 23 November 2023. It contains a total of 991,206,078 reference entries including duplicates. 3,755,847 () of these are duplicated 1+ times. Thus, the dump contains a total of 986,772,474 distinct references. Overall, 4,433,404 () reference entries are duplicates; and there is an average of 1.18 duplicates per duplicated reference.
Our goal is to identify entities that benefit the most from duplicated references. The entities we consider are either publishers, authors, articles, or journals. Let us introduce the following notations:
-
•
Let be the set of documents (limited to articles),
-
•
be the set of authors,
-
•
be the set of publishers
-
•
and be the set of journals.
Authors are authoring documents that are published in journals and documents are referencing other documents. To denote this, we’ll use the following notations:
-
•
For and , “” means: is author of
-
•
For and , “” means: is published in
-
•
For ,
“” means: ’s metadata contains exactly references to .
“” means: ’s metadata contains at least one reference to .
We also consider the following sets:
-
•
the set of the documents published in journal : .
-
•
the set of the references of document : .
-
•
the set of references of document , that are duplicated 1+ times:
. Note that .
-
•
the set of the documents citing document :.
To measure how much a registered DOIs contains duplicated references or how much a paper benefit from duplicated references, the following measure are defined:
-
•
denotes the number of times contains a reference to .
-
•
is the number of duplicated references benefiting and
is the number of 1+ duplicated references . -
•
is the number of duplicated references in metadata registered for document ,
is the number of reference duplicated 1+ times, in metadata registered for document .
| DOI of the cited document | ||
| 10.17265/2159-5313/2016.09.003 | ||
| 10.1109/geoinformatics.2015.7378602 | ||
| 10.1038/scientificamerican0703-56 | ||
| 10.1089/glre.2016.201011 | ||
| 10.4064/fm-146-3-215-238 |
| DOI of the citing document | ||
| 10.1190/segam2016-full | ||
| 10.2903/sp.efsa.2017.en-1246 | ||
| 10.1190/segam2016-full2 | ||
| 10.14412/1995-4484-2020-191-197 | ||
| 10.4236/abb.2012.324065 |
Some articles ‘benefit’ from an impressive number of duplications. The top 5 is shown in Table 2). Quite interestingly, the landing page (using doi.org) for the first row is currently a generic error page. Table 3 provide the top 5 papers for which metadata contains a lot of duplicated references. Again the landing page for the first DOI leads to a Page not Found error. Visual inspection of Crossref records for these five DOI reveal simple duplicated references without any obvious sneaked references.
To measure how much a journal does contain duplicated references, the following measures are computed:
-
•
the number of duplicated references found in the metadata of a journal .
-
•
the number of documents registered for journal that contain at least one duplicated reference.
| Journal | |||
| SSRN Electronic Journal | |||
| Journal of Behavioral Addictions | |||
| RSC Advances | |||
| The Journal of Contemporary Dental Practice | |||
| Internationa Journal of Sports Physiology and Performance | |||
| Health | |||
| Scientific Reports | |||
| PLOS ONE | |||
| American Journal of Plant Sciences | |||
| Creative Education |
Table 4 lists journals for which the highest number of duplicated references are found. Such journals push a great amount of duplicated reference metadata to Crossref. It is important to note that, despite the name, SSRN Electronic Journal is a platform for pre-prints. The first position might be explained by the high number of papers the platform register with Crossref. In second position, the Journal of Behavioral Addictions did register an average of 37 duplicated references over articles. Again, close inspection of some examples reveals only simple duplicated references without any obvious sneaked references.
Previous work (Besançon \BOthers., \APACyear2024) showed that sneaked references are sometimes benefiting to particular authors. Thus, identifying authors that benefit from duplicated references may also be the ones that benefit from sneaked references.
We note the proportion of references found in journal that cite a paper authored by :
refers to the proportion of duplicated references found in journal that cite a paper authored by :
Hypothesising duplications occur randomly because they are mistakes, we should observe . If is far greater than this mean that duplicated references in journal are benefiting in an abnormal proportion to author .
That is why we compute an estimation of the number of duplicated references in journal that are statistically speaking unexpected for authors :
| Journal | Author | No. dupli. in journal to author | No. dupli. in journal | No. ref. from journal to author | No. ref. in journal | Score |
| Econometrics: Alchemy or Science? | david f hendry | |||||
| Construction and Architecture | timofey krakhmalnyy | |||||
| International Journal of Scientific Research in Science and Technology | harikriishna b jethva | |||||
| International Journal of Scientific Research in Science and Technology | bhavesh kataria | |||||
| International Journal of Laser Dentistry | a l mckenzie | |||||
| Construction and Architecture | sergej evtushenko | |||||
| International Journal on Disability and Human Development | daniel t l shek | |||||
| International Journal on Applied Engeneering and Management Letters | p s aithal | |||||
| Berichte der deutschen chemischen Gesellschaft | h staudinger | |||||
| An Introduction to Community and Primary Health Care | elizabeth halcomb | |||||
| Cambridge Handbook of Multimedia Learning | richard e mayer | |||||
| Bears of the World | jon e swenson |
Computing this score (Table 5) can reveal statistical anomalies that may (or may not) reflect citation gaming.
The computed leaderboard features Harikrishna B. Jethva and Bhavesh Kataria together with the International Journal of Scientific Research in Science and Technology from the Technoscience Academy publisher. This case being the one described in (Besançon \BOthers., \APACyear2024). This result is coherent with our hypothesis that duplicated references might be correlated with sneaked references. At the time of the Crossref snapshot was created metadata were not yet corrected. Since then, when asked by Crossref, the publisher did correct the records and removed sneaked references.
Some other authors in this list are suspected to manipulate their index (e.g., P. S. Aithal151515https://www.researchgate.net/post/Excessiveself-citationinhisresearchpaperswhichhasartificiallyinflatedhisH-indexscore).
We did not check all the articles published by the journal–author pairs of this leaderboard, and further analysis might give new interesting results. Nevertheless, the case of the pair International Journal of Laser Dentistry and A. L. McKenzie is of some interest. we indeed found sneaked references benefiting to A. L. McKenzie’s articles. For example, 10.5005/jp-journals-10022-1031 contains a duplicated sneaked reference to 10.1109/geoinformatics.2015.7378602). Deeper investigations reveal that these sneaked references are not resulting from intentional manipulations but most probably are the consequence of genuine errors. This sneaked reference might be unintentional as its seems that this journal always sent the same reference list for all the metadata of its articles, except for the first references of each list that are replaced by the references of the current published article. This reference list contains the expected list of references (found in the PDF file) but are always padded up to with the same set of sneaked references. This journal is no more active and for each and every published article the website (landing page) is providing a list of exactly references that are the ones registered at Crossref.
4.2 Scaling the detection of sneaked references to the entire scientific literature
Hoping that a combination of methods might enable the detection and validation of sneaked references at scale, we compared the length of the reference list extracted from PDFs using Grobid () with the references registered with Crossref. For articles published since 2000, the number of reference items identified by Grobid were compared to the number of references provided by Crossref. In order to account for a reported Grobid uncertainty rate of 0.05, we allowed for a margin of error, comparing the length of references identified by the full-text Grobid processing to 0.95 times the Crossref references count. A total of 4,172,499 articles out of 47,170,721 processed were found to have fewer references than 95 percent of the Crossref reference count.
In order to determine which publications had been added and which authors or journals had been inserted erroneously, we attempted to match the references extracted by Grobid with the identifiers supplied by Crossref. This approach turns out to be challenging, partially as a result of the inconsistency of reference formatting in the PDFs (many were missing DOIs) but also highlighted an error in the initial approach: references which are provided in supplementary attachments were not counted in the original Grobid-processed PDFs.
Although this attempt to systematically identify erroneous references was not effective, there remain a total of 1,564,408 publications with between 5 and 500 additional references reported to Crossref beyond those identified by Grobid processing. The possibility remains that this approach may work for a subset of the total dataset (see Section 2.6 for more details on the limitations of the precision of the extraction of references using Grobid).
5 Conclusions
We investigated three ways (, , and ) to automatically identify sneaked references by comparing references registered with Crossref and the ones extracted from PDF files using the Grobid software.
The first one (Besançon \BOthers., \APACyear2024), based the direct comparison between list lengths, leads to an overestimation (7%) of the number of sneaked references.
The second one relies on the last items of each list (Section 2.2). It supposes than the order of the two lists is the same, which is quite a strong assumption. If we conclude that is correct with regards to the PDF version. This is always the case in this specific dataset. But it could be that some references were still sneaked in, although that cannot be checked without a thorough manual analysis.
The third one (Section 2.3) seems to provide the more accurate results. It does not require any complex reference extraction from the PDF file,
The current state of full text data prevents from working at large scale.
Computing expensive so tried to limit the search using heuristic (duplication).
5.1 Corrections and updates to references
We identified a new set of sneaked references that benefit a single journal: IJISRT. The sneaked references are registered with Crossref along with the metadata for this journal. As a result, sneaked references inflate citations counts for this journal and for some of its articles.
Crossref provides infrastructure for registering metadata for scholarly works, including a DOI. To use this infrastructure, organisations join Crossref as members, taking on related obligations161616https://www.crossref.org/membership/terms/. At the most basic level, Crossref members are responsible for depositing accurate metadata for each content item they produce.
When a serious issue with the metadata is detected, Crossref contacts the member to investigate the situation and work with them to rectify the problem where applicable. In some rare cases, the member’s access to register new scholarly works or update their existing records might be temporarily suspended or their membership permanently revoked.
The Crossref records for DOIs from the International Journal of Innovative Science and Research Technology require corrections to remove the sneaked references. In November 2024, Crossref contacted the member responsible for the International Journal of Innovative Science and Research Technology to ask for an explanation. Based on the member’s replies to the enquiries, it was clear there was an intention to manipulate the citation record, and as such Crossref have started the process to revoke this organization’s membership.
More information on Crossref’s membership revocation process can be found here 171717https://www.crossref.org/operations-and-sustainability/membership-operations/revocation/. The most up-to-date list of revoked Crossref members is available here.181818https://docs.google.com/spreadsheets/d/1cCkdvtqEM1urmrUQZ4-LGzOmf5812aVkRFJc5UryHw/edit This member will appear on the list if their revocation is ratified by the Crossref board.
Crossref encourages the community to report cases via the dedicated ”metadata quality improvements” channel191919https://community.crossref.org/c/tech-support/metadata-quality-improve/45 on its forum.
5.2 Implications
There are a number of possible sources of erroneous references, not all of which are nefarious. The identification of publications whose reference count fails to match the references actually listed in the references section (which may differ, in turn, from the in-text citations), is only the first, judgment neutral, step. There are some patterns detectable in the erroneous references, which hint at the source.
For example, in one situation there were several publications with a valid list of references which seemed to have been written on top of a constant, longer list of references in identical order. The number of total references was constant, while the number of valid references varied. This situation suggests to us an error in pasting, where a shorter list of references pasted over, rather than replaced, a longer list of references from an earlier metadata submission. In other cases, we found multiple identical references pasted at the end of the list of valid references. This behavior suggests a less technical source, and less benign intentions.
There are different methods for members to register scholarly metadata with Crossref. These range from plugins integrated into publishing platforms to registration forms with different metadata fields for members to fill. XML files can also by directly sent using HTTPS POST. On the member side, during the publishing process different actors might have different kind of access to the metadata records, providing different kinds of opportunities to sneak references in or register erroneous metadata.
Sneaked references remain one of many possibilities to practice citation gaming (see Section 1). More of such gaming will continue to prevail as long as academic value is tightly coupled to specific metrics.
Given the variety of reasons for erroneous references, there are multiple approaches that could be taken to improve the situation, which include improving the tools by which editors submit reference lists, the automated deduplication of reference lists after submission, and systematically cross-checking publications using Grobid in collections (proprietary or otherwise) which contain full-text PDFs. Deliberate efforts, which measure the rate of success of these approaches, are advisable.
5.3 Future work
Beyond this specific data set, the extent to which sneaked references are distorting citation counts is unknown. It might remain a very limited phenomenon but this needs to be verified by further investigations.
Identifying those journals or authors which have been most frequently associated with erroneous references, at scale, may allow us to identify the beneficiaries of sneaked references. This could act as a heuristic device to search for additional sneaked references (see Section 4.1), and to distinguish between erroneous and sneaked references.
Future work will attempt to identify erroneous references at a larger scale. We will continue to attempt to define patterns that can be used to flag sneaked references. This big data approach will help us determine whether the sneaked reference would have had a bibliometric effect, resulting in any increase in the Journal Impact Factor (or other journal-based metrics).
Data and code availability
Along with the source code implementing and we are releasing the dataset, which can be found at 10.5281/zenodo.14319568. The code can be found at 10.5281/zenodo.14291988.
Conflicts of interest
Two of the authors are employed by the providers of the data used in the analysis: Dimensions (KWB) and Crossref (DT). GC is an AE at JASIST.
Acknowledgement
CL and GC acknowledge the NanoBubbles project that has received Synergy grant funding from the European Research Council (ERC), within the European Union’s Horizon 2020 program, grant agreement no. 951393, doi:10.3030/951393. LB was supported, in part by the Knut and Alice Wallenberg Foundation (grant KAW 2019.0024). KWB would like to thank Balbir Thomas and Ruth Whittam for their participation in discovery and coding.
References
- Beel \BBA Gipp (\APACyear2010) \APACinsertmetastarBeelAndGipp2010{APACrefauthors}Beel, J.\BCBT \BBA Gipp, B. \APACrefYearMonthDay2010. \BBOQ\APACrefatitleOn the robustness of Google Scholar against spam On the robustness of Google Scholar against spam.\BBCQ \BIn \APACrefbtitleHT’10: Proceedings of the 21st ACM conference on Hypertext and hypermedia HT’10: Proceedings of the 21st ACM conference on Hypertext and hypermedia (\BPGS 297–298). \APACaddressPublisherACM. {APACrefDOI} 10.1145/1810617.1810683 \PrintBackRefs\CurrentBib
- Besançon \BOthers. (\APACyear2024) \APACinsertmetastarBesan2024Sneaked{APACrefauthors}Besançon, L., Cabanac, G., Labbé, C.\BCBL \BBA Magazinov, A. \APACrefYearMonthDay2024. \BBOQ\APACrefatitleSneaked references: Fabricated reference metadata distort citation counts Sneaked references: Fabricated reference metadata distort citation counts.\BBCQ \APACjournalVolNumPagesJournal of the Association for Information Science and Technology75121368–1379. {APACrefDOI} 10.1002/asi.24896 \PrintBackRefs\CurrentBib
- Biagioli \BBA Lippman (\APACyear2020) \APACinsertmetastarbiagioli2020gaming{APACrefauthors}Biagioli, M.\BCBT \BBA Lippman, A. (\BEDS). \APACrefYear2020. \APACrefbtitleGaming the metrics: Misconduct and manipulation in academic research Gaming the metrics: Misconduct and manipulation in academic research. \APACaddressPublisherMIT Press. \PrintBackRefs\CurrentBib
- Bode \BOthers. (\APACyear2023) \APACinsertmetastarBodeEtAl2023{APACrefauthors}Bode, C., Christian Herzog, R\BPBIM., Daniel Hook\BCBL \BBA Wade, A. \APACrefYearMonthDay2023. \BBOQ\APACrefatitleA Guide to the Dimensions Data Approach A Guide to the Dimensions Data Approach.\BBCQ \APACjournalVolNumPagesDimensions Report. {APACrefDOI} 10.6084/m9.figshare.5783094 \PrintBackRefs\CurrentBib
- Cabanac \BOthers. (\APACyear2022) \APACinsertmetastarcabanac:hal-03829578{APACrefauthors}Cabanac, G., Labbé, C.\BCBL \BBA Magazinov, A. \APACrefYearMonthDay2022\APACmonth05. \BBOQ\APACrefatitleThe ‘Problematic Paper Screener’ automatically selects suspect publications for post-publication (re)assessment The ‘Problematic Paper Screener’ automatically selects suspect publications for post-publication (re)assessment.\BBCQ \BIn \APACrefbtitle7th World Conference on Research Integrity (WCRI 2022). 7th World Conference on Research Integrity (WCRI 2022). \APACaddressPublisherCape Town, South Africa. {APACrefURL} https://hal.science/hal-03829578 \APACrefnoteThe theme of the conference is ‘Fostering Research Integrity in an Unequal World’ {APACrefDOI} 10.48550/arXiv.2210.04895 \PrintBackRefs\CurrentBib
- Davis (\APACyear2016) \APACinsertmetastarDavis2016{APACrefauthors}Davis, P. \APACrefYearMonthDay2016\APACmonth0926. \APACrefbtitleVisualizing Citation Cartels. Visualizing citation cartels. {APACrefURL} https://wp.me/peaj1R-cdk \APACrefnoteScholarly Kitchen \PrintBackRefs\CurrentBib
- Foley \BBA Valkonen (\APACyear2012) \APACinsertmetastarFoleyAndValkonen2012{APACrefauthors}Foley, J\BPBIA.\BCBT \BBA Valkonen, L. \APACrefYearMonthDay2012. \BBOQ\APACrefatitleAre higher cited papers accepted faster for publication? [Editorial] Are higher cited papers accepted faster for publication? [Editorial].\BBCQ \APACjournalVolNumPagesCortex486647–653. {APACrefDOI} 10.1016/j.cortex.2012.03.018 \PrintBackRefs\CurrentBib
- Franck (\APACyear1999) \APACinsertmetastarFranck1999{APACrefauthors}Franck, G. \APACrefYearMonthDay1999. \BBOQ\APACrefatitleScientific Communication—A Vanity Fair? [Essays on Science and Society] Scientific communication—A vanity fair? [Essays on science and society].\BBCQ \APACjournalVolNumPagesScience286543753–55. {APACrefDOI} 10.1126/science.286.5437.53 \PrintBackRefs\CurrentBib
- Garfield (\APACyear1994) \APACinsertmetastarGarfield1994{APACrefauthors}Garfield, E. \APACrefYearMonthDay1994June20. \BBOQ\APACrefatitleThe impact factor The impact factor.\BBCQ \APACjournalVolNumPagesCurrent Contents253-7. \PrintBackRefs\CurrentBib
- \APACcitebtitleGROBID (\APACyear2008–2023) \APACinsertmetastarGROBID\APACrefbtitleGROBID. Grobid. \APACrefYearMonthDay2008–2023. \APAChowpublishedhttps://github.com/kermitt2/grobid. \APACaddressPublisherGitHub. \PrintBackRefs\CurrentBib
- Heathers \BBA Grimes (\APACyear2022) \APACinsertmetastarHeathersAndGrimes2022{APACrefauthors}Heathers, J\BPBIA.\BCBT \BBA Grimes, D\BPBIR. \APACrefYearMonthDay2022. \APACrefbtitleImpact Factor Manipulation — The Mechanics Behind A Precipitous Rise In Impact Factor: A Case Study From the British Journal of Sports Medicine. Impact Factor manipulation — the mechanics behind a precipitous rise in Impact Factor: A case study from the British Journal of Sports Medicine. \APACrefnoteOSF preprint {APACrefDOI} 10.17605/osf.io/4c6xa \PrintBackRefs\CurrentBib
- Hendricks \BOthers. (\APACyear2020) \APACinsertmetastarHendricksEtAl2020{APACrefauthors}Hendricks, G., Tkaczyk, D., Lin, J.\BCBL \BBA Feeney, P. \APACrefYearMonthDay2020. \BBOQ\APACrefatitleCrossref: The sustainable source of community-owned scholarly metadata Crossref: The sustainable source of community-owned scholarly metadata.\BBCQ \APACjournalVolNumPagesQuantitative Science Studies11414–427. {APACrefDOI} 10.1162/qssa00022 \PrintBackRefs\CurrentBib
- Hirsch (\APACyear2005) \APACinsertmetastarHIndex{APACrefauthors}Hirsch, J\BPBIE. \APACrefYearMonthDay2005. \BBOQ\APACrefatitleAn index to quantify an individual’s scientific research output An index to quantify an individual’s scientific research output.\BBCQ \APACjournalVolNumPagesProceedings of the National Academy of Sciences1024616569-16572. {APACrefURL} https://www.pnas.org/doi/abs/10.1073/pnas.0507655102 {APACrefDOI} 10.1073/pnas.0507655102 \PrintBackRefs\CurrentBib
- Kojaku \BOthers. (\APACyear2021) \APACinsertmetastarKojaku2021{APACrefauthors}Kojaku, S., Livan, G.\BCBL \BBA Masuda, N. \APACrefYearMonthDay2021. \BBOQ\APACrefatitleDetecting anomalous citation groups in journal networks Detecting anomalous citation groups in journal networks.\BBCQ \APACjournalVolNumPagesScientific Reports111. {APACrefDOI} 10.1038/s41598-021-93572-3 \PrintBackRefs\CurrentBib
- Labbé (\APACyear2010) \APACinsertmetastarLabbe2010{APACrefauthors}Labbé, C. \APACrefYearMonthDay2010. \BBOQ\APACrefatitleIke Antkare, one of the great stars in the scientific firmament Ike Antkare, one of the great stars in the scientific firmament.\BBCQ \APACjournalVolNumPagesISSI Newsletter6248–52. {APACrefURL} https://www.issi-society.org/media/1126/newsletter22.pdf \PrintBackRefs\CurrentBib
- Purkayastha \BOthers. (\APACyear2019) \APACinsertmetastarPURKAYASTHA2019635{APACrefauthors}Purkayastha, A., Palmaro, E., Falk-Krzesinski, H\BPBIJ.\BCBL \BBA Baas, J. \APACrefYearMonthDay2019. \BBOQ\APACrefatitleComparison of two article-level, field-independent citation metrics: Field-Weighted Citation Impact (FWCI) and Relative Citation Ratio (RCR) Comparison of two article-level, field-independent citation metrics: Field-weighted citation impact (fwci) and relative citation ratio (rcr).\BBCQ \APACjournalVolNumPagesJournal of Informetrics132635-642. {APACrefURL} https://www.sciencedirect.com/science/article/pii/S1751157718303559 {APACrefDOI} https://doi.org/10.1016/j.joi.2019.03.012 \PrintBackRefs\CurrentBib
6 Appendix