Discussion about this post

User's avatar
James Heathers's avatar

"Dear Sylvain, I am waiting for your response. If not, I will put all your papers on PubPeer in order to obtain their retractions."

Oh dear.

Several points arise.

1. PubPeer does not work that way. It is not magic, nor is it a conduit straight into the black heart of nefarious career damage.

To do this, you would first have to (a) find something to say about all said papers, (b) go to the trouble of writing them all up and submitting to PubPeer, (c) hope the PubPeer moderators had lost their damned minds and forgot their usual standards of probity, (d) somehow navigate everyone laughing at your transparent ploy, (e) hope that the relevant journals / editors / co-authors et al. actually paid attention to whatever you'd manage to concoct, and then finally (f) wait probably one or two years. Long PubPeer records of REAL AND OBVIOUS problems persistently fail to reach the point where any formal research integrity action is taken!

Conclusion: this is not an *actionable* threat, even if it was a *real* threat.

2. I would never, ever, ever answer an email that literally contained the phrase "I don't like these researchers." I doubt anyone else would either. That's not how this works, and it's incredibly suspicious. I don't give a thimbleful of cold lemur piss who you like or don't like, and mentioning it instantly disqualifies you from being a reliable interlocutor.

3. Genuine requests for help look nothing like this. There's almost no information here. Real emails lay out inconsistencies and facts, or enquire about what might be done about a RI problem. They do NOT discuss motives and they certainly do not say 'I would be happy if the first author loses his job'.

Working in a space like this, there is often a conferral of trust *at some point* - whoever is in the 'whistleblower' role eventually starts to explain who they are, why they know what they know, and investigation becomes somewhat mutual.

In other words: when you bring something like this to any table, the process dictates you become involved in what essentially amounts to a research project on a local level - me and you, we talk. I know your name and where you work and what you do (and vice versa). This is a terrible situation to try to get away with hoodwinking some poor muffin in research integrity into doing your dirty work for you!

(It is possible, of course, to stay anonymous the whole time during an investigation... but that has happened to me *twice* out of dozens of emails like this. One of those cases is in the All Time Top 10 list, the other the researcher ended up being sanctioned for misconduct-adjacent reasons. In both cases, it was very, very, very obvious that there were massive amounts of real problems at play and the researcher involved was scared to death. I cannot fully express how utterly dissimilar both situations were to someone showing up yelling 'hurt who I say to hurt, or I'll hurt you!')

All of this aside, the point is still well taken. Every system is porous, every system is manipulable. Vigilance is always required on all levels when outcomes are serious. Even if this is not a good example of someone who is adept at exploitation.

Expand full comment

No posts