2020
DOI: 10.12688/f1000research.26594.1
|View full text |Cite
|
Sign up to set email alerts
|

Improving open and rigorous science: ten key future research opportunities related to rigor, reproducibility, and transparency in scientific research

Abstract: Background: As part of a coordinated effort to expand research activity around rigor, reproducibility, and transparency (RRT) across scientific disciplines, a team of investigators at the Indiana University School of Public Health-Bloomington hosted a workshop in October 2019 with international leaders to discuss key opportunities for RRT research. Objective: The workshop aimed to identify research priorities and opportunities related to RRT. Design: Over two-days, workshop attendees gave presentations and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 83 publications
0
3
0
Order By: Relevance
“…In the context of mobile security, bug bounty programs play a significant role in addressing vulnerabilities in mobile applications and operating systems, particularly in combating the latest mobile malware, such as mobile banking trojans, cryptocurrency mining, and ransomware ( [14]; [15]). These programs are also likened to "red teams" in scientific research, where methodologists, statisticians, and subject-matter experts critique study designs and analyses, offering incentives akin to bug bounty programs in computer software development [16].…”
Section: B Bug Bounty Programs (Bbps) and Vulnerabilities Relatedmentioning
confidence: 99%
“…In the context of mobile security, bug bounty programs play a significant role in addressing vulnerabilities in mobile applications and operating systems, particularly in combating the latest mobile malware, such as mobile banking trojans, cryptocurrency mining, and ransomware ( [14]; [15]). These programs are also likened to "red teams" in scientific research, where methodologists, statisticians, and subject-matter experts critique study designs and analyses, offering incentives akin to bug bounty programs in computer software development [16].…”
Section: B Bug Bounty Programs (Bbps) and Vulnerabilities Relatedmentioning
confidence: 99%
“…Research is being conducted into why researchers may not be following high RRT standards. Reasons are, for instance, pressure to publish, lack of funding, lack of training in scientific methods, peer-review pressure to acknowledge legacy findings and similar (Anderson et al 2007;Valdez et al 2020). Other researchers systematically outline reasons for why it is difficult to retract and correct published results (Allison et al 2016).…”
Section: Introductionmentioning
confidence: 99%
“…A significant amount of the current medical literature -systematic reviews-has a limited capacity to produce credible evidence and generalizable conclusions. This can be attributed to flawed original studies [5] or unjustified generalizations by authors of systematic reviews [6]. And is another indicator of inadequate research communication skills.…”
Section: Introduction and Background Medical Writing: An Overlooked Research Dimensionmentioning
confidence: 99%