Plagiarism, Data Fabrication and Image Manipulation

Plagiarism, Data Fabrication and Image Manipulation

Plagiarism is not acceptable in BIA journals. Plagiarism includes copying text, ideas, images, or data from another source, even from your own publications, without giving credit to the original source.

Reuse of text that is copied from another source must be between quotation marks and the original source must be cited. If a study's design or the manuscript's structure or language has been inspired by previous studies, these studies must be explicitly cited.

All BIA submissions are checked for plagiarism using the industry standard software iThenticate. If plagiarism is detected during the peer review process, the manuscript may be rejected. If plagiarism is detected after publication, an investigation will take place and action taken in accordance with our policies.

Image files must not be manipulated or adjusted in any way that could lead to misinterpretation of the information provided by the original image. Irregular manipulation includes 1) introduction, enhancement, moving, or removing features from the original image, 2) grouping of images that should obviously be presented separately (e.g., from different parts of the same gel, or from different gels), or 3) modifying the contrast, brightness or color balance to obscure, eliminate or enhance some information.

If irregular image manipulation is identified and confirmed during the peer review process, we may reject the manuscript. If irregular image manipulation is identified and confirmed after publication, we may correct or retract the paper.

Data presented must be original and not inappropriately selected, manipulated, enhanced, or fabricated. This includes 1) exclusion of data points to enhance significance of conclusions, 2) fabrication of data, 3) selection of results that support a particular conclusion at the expense of contradictory data, 4) deliberate selection of analysis tools or methods to support a particular conclusion (including p-hacking). We strongly recommend preregistration of methods and analysis.