A Position on Effective Peer Reviews -Rationale, Qualification, Process, and Policy-

Similar documents
College of Science Promotion & Tenure Guidelines For Use with MU-BOG AA-26 and AA-28 (April 2014) Revised 8 September 2017

Reference to Tenure track faculty in this document includes tenured faculty, unless otherwise noted.

Standards for Professional Practice

Success Factors for Creativity Workshops in RE

University of Waterloo School of Accountancy. AFM 102: Introductory Management Accounting. Fall Term 2004: Section 4

VI-1.12 Librarian Policy on Promotion and Permanent Status

SOAS Student Disciplinary Procedure 2016/17

Department of Communication Criteria for Promotion and Tenure College of Business and Technology Eastern Kentucky University

Article 15 TENURE. A. Definition

Aviation English Training: How long Does it Take?

Planning a research project

b) Allegation means information in any form forwarded to a Dean relating to possible Misconduct in Scholarly Activity.

PATTERNS OF ADMINISTRATION DEPARTMENT OF BIOMEDICAL EDUCATION & ANATOMY THE OHIO STATE UNIVERSITY

Policy for Hiring, Evaluation, and Promotion of Full-time, Ranked, Non-Regular Faculty Department of Philosophy

Program Change Proposal:

ACADEMIC POLICIES AND PROCEDURES

REQUEST FOR PROPOSALS SUPERINTENDENT SEARCH CONSULTANT

Handbook for Graduate Students in TESL and Applied Linguistics Programs

Delaware Performance Appraisal System Building greater skills and knowledge for educators

I. STATEMENTS OF POLICY

Australia s tertiary education sector

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT

The University of British Columbia Board of Governors

Higher education is becoming a major driver of economic competitiveness

Information Sheet for Home Educators in Tasmania

Friday, October 3, 2014 by 10: a.m. EST

Instructions and Guidelines for Promotion and Tenure Review of IUB Librarians

Key concepts for the insider-researcher

Promotion and Tenure Policy

Khairul Hisyam Kamarudin, PhD 22 Feb 2017 / UTM Kuala Lumpur

Proposal for an annual meeting format (quality and structure)

CLINICAL TRAINING AGREEMENT

Approved Academic Titles

Cognitive Thinking Style Sample Report

Faculty Schedule Preference Survey Results

PERFORMING ARTS. Unit 2 Proposal for a commissioning brief Suite. Cambridge TECHNICALS LEVEL 3. L/507/6467 Guided learning hours: 60

HDR Presentation of Thesis Procedures pro-030 Version: 2.01

School Leadership Rubrics

UCB Administrative Guidelines for Endowed Chairs

College of Arts and Science Procedures for the Third-Year Review of Faculty in Tenure-Track Positions

University of Michigan - Flint POLICY ON STAFF CONFLICTS OF INTEREST AND CONFLICTS OF COMMITMENT

ASSESSMENT REPORT FOR GENERAL EDUCATION CATEGORY 1C: WRITING INTENSIVE

Publication strategies

ACADEMIC AFFAIRS POLICIES AND PROCEDURES MANUAL

MBA 5652, Research Methods Course Syllabus. Course Description. Course Material(s) Course Learning Outcomes. Credits.

What Is a Chief Diversity Officer? By. Dr. Damon A. Williams & Dr. Katrina C. Wade-Golden

Unit 3. Design Activity. Overview. Purpose. Profile

PREP S SPEAKER LISTENER TECHNIQUE COACHING MANUAL

Educational Leadership and Administration

Academic Affairs Policy #1

Associate Professor of Electrical Power Systems Engineering (CAE17/06RA) School of Creative Arts and Engineering / Engineering

STRATEGIC LEADERSHIP PROCESSES

Ruggiero, V. R. (2015). The art of thinking: A guide to critical and creative thought (11th ed.). New York, NY: Longman.

Guidelines for the Use of the Continuing Education Unit (CEU)

Co-op Placement Packet

Infrastructure Issues Related to Theory of Computing Research. Faith Fich, University of Toronto

RESEARCH INTEGRITY AND SCHOLARSHIP POLICY

2013 Peer Review Conference. Providence, RI. Committee Member Session: Topics and Questions for Discussion

M.S. in Environmental Science Graduate Program Handbook. Department of Biology, Geology, and Environmental Science

ELDER MEDIATION INTERNATIONAL NETWORK

A CASE STUDY FOR THE SYSTEMS APPROACH FOR DEVELOPING CURRICULA DON T THROW OUT THE BABY WITH THE BATH WATER. Dr. Anthony A.

GENERAL UNIVERSITY POLICY APM REGARDING ACADEMIC APPOINTEES Limitation on Total Period of Service with Certain Academic Titles

STANISLAUS COUNTY CIVIL GRAND JURY CASE #08-04 LA GRANGE ELEMENTARY SCHOOL DISTRICT

Scoring Guide for Candidates For retake candidates who began the Certification process in and earlier.

College of Business University of South Florida St. Petersburg Governance Document As Amended by the College Faculty on February 10, 2014

Position Statements. Index of Association Position Statements

SME Academia cooperation in research projects in Research for the Benefit of SMEs within FP7 Capacities programme

Promotion and Tenure standards for the Digital Art & Design Program 1 (DAAD) 2

DEPARTMENT OF KINESIOLOGY AND SPORT MANAGEMENT

MANAGERIAL LEADERSHIP

UNI University Wide Internship

Lecturer Promotion Process (November 8, 2016)

Rottenberg, Annette. Elements of Argument: A Text and Reader, 7 th edition Boston: Bedford/St. Martin s, pages.

Myers-Briggs Type Indicator Team Report

TotalLMS. Getting Started with SumTotal: Learner Mode

flash flash player free players download.

Oklahoma State University Policy and Procedures

ADDIE: A systematic methodology for instructional design that includes five phases: Analysis, Design, Development, Implementation, and Evaluation.

POLICIES AND PROCEDURES

GRIT. The Secret to Advancement STORIES OF SUCCESSFUL WOMEN LAWYERS

Wildlife, Fisheries, & Conservation Biology

Accreditation of Prior Experiential and Certificated Learning (APECL) Guidance for Applicants/Students

PROMOTION and TENURE GUIDELINES. DEPARTMENT OF ECONOMICS Gordon Ford College of Business Western Kentucky University

Code of Practice on Freedom of Speech

Last Editorial Change:

FIELD PLACEMENT PROGRAM: COURSE HANDBOOK

Delaware Performance Appraisal System Building greater skills and knowledge for educators

University of Toronto

WHY GRADUATE SCHOOL? Turning Today s Technical Talent Into Tomorrow s Technology Leaders

Karla Brooks Baehr, Ed.D. Senior Advisor and Consultant The District Management Council

Surgical Residency Program & Director KEN N KUO MD, FACS

An Analysis of Career Building Tools for Online Adjunct Faculty: The Sustainable Affects of Adjunct Publishing

A cognitive perspective on pair programming

PSYCHOLOGY 353: SOCIAL AND PERSONALITY DEVELOPMENT IN CHILDREN SPRING 2006

UNIFORM COLLABORATIVE LAW ACT CONFERENCE ROUNDTABLE DISCUSSIONS

School of Earth and Space Exploration. Graduate Program Guidebook. Arizona State University

This Statement was adopted by the Executive Committee of the New York County Lawyers' Association at its regular meeting on March 29, 2004.

Master of Science (MS) in Education with a specialization in. Leadership in Educational Administration

Learning or lurking? Tracking the invisible online student

Department of Social Work Master of Social Work Program

Transcription:

A Position on Effective Peer Reviews -Rationale, Qualification, Process, and Policy- Rayford B. Vaughn, PhD Department of Computer Science and Engineering Mississippi State University Mississippi State, MS 39762 ABSTRACT This paper argues for the value of the conference peer review process given certain constraints that include a proper process, qualifications of the reviewers, policy used in the review, and the motivation of the reviewers. The paper also addresses how the lack of proper criteria can be harmful in a peer review process. The peer review process for journals is not addressed as this is a universally accepted practice in academia. An analogy to software engineering code review processes is briefly presented. Keywords: Peer Review, Knowledge Communication, Academic Publication 1. Introduction Academia has universally long relied on a community of peers for many important decisions made in the academic environment. While such peer review might be associated with the quality of a particular publication it is often used for other decision making purposes. For example, the long standing academic tenure process generally requires a committee of peers to review the credentials of a faculty member and to recommend to administrators whether or not the individual has excelled in their field. A similar process may be used when a faculty member is being considered for promotion again, a committee of peers generally reviews the application looking specifically at accomplishments in a narrow field of activity. Grievance processes, university faculty senates, curriculum reviews, grant proposals, and many other activities rely on peer reviews. Such reviews are not only associated with academia and can often be found in government processes and industrial practices. While more explanation can be found in subsequent sections of this paper, one can quickly think of examples of governmental or industrial peer review practices. Prior to releasing a new pharmaceutical formulary for public use, a prudent government oversight body will generally have the safety tests and experimental results reviewed by other experts in the field. A software engineering company will have programmer code reviewed by peers to discover errors prior to delivering to a customer. Accounting firms often exercise a two person, separation of duty process to insure proper fraud control. Many other examples certainly exist. Common factors in all these seemingly disparate reviews are that the reviews are chosen based on their competency, independence, objectivity, and willingness to put forth a credible effort in the review. If such characteristics are not present in a review, clearly the review is likely to fail. Such empirical observations seem obvious to most but we often fail to apply these factors properly for academic conferences. While the argument can be effectively made that such problems exist with journal publications, it is this paper s premise that such examples are far more infrequent than for conferences. Therefore, this paper focuses on conferences only and it is the author s hope to prompt discussion in this area. The remainder of this paper is organized as follows. The next section SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 5 - NUMBER 3 53

describes a generally accepted process for conducting a quality review. Section 3 will address policies that are useful for a peer review process. Section 4 discusses motivational factors for reviewers. We conclude with a brief summary and a cautionary note concerning process errors, shortcuts, and intentional damaging procedures. 2. Conference Peer Review Process In the large, the conference peer review process must be decided upon far in advance of the conference in order to allow enough time to actually review the credentials of the reviewers and to insure that there are enough reviewers to accommodate the papers that the conference expects. Every paper should have a minimum of three reviews by reviewers with competency in the field. This serves several purposes first it insures an objective review process in that similar reviews provide confidence in the quality of the paper and great discrepancy can indicate further review required. Reviews should be double blind meaning that the reviewer does not know who the author is and the author does not know who the reviewer is. Reviewers should be selected by the conference officials and not the authors. While this seems to be a simple process, it is often improperly implemented. There appear to be several reasons this occurs. First, reviewers backgrounds are often not known or reviewed by the conference organizers. This happens because not enough time is allowed in the preparation phase or the number of papers expected is large prompting a need for a large number of reviewers. Typically a notice is electronically distributed calling for reviewers to volunteer. Volunteers are generally taken without question. This process error leads to improper reviews, cursory reviews, and acceptance of poor quality papers. One can legitimately ask why a reviewer would volunteer to review papers if they were not qualified or could not dedicate the time necessary to conduct a proper review. This occurs for a number of reasons. First, many faculty are motivated to volunteer because benefit accrues to them for service to their profession. Almost universally, faculty are expected to serve the community by participating in activities such as conference/journal reviews, book editing, organizational activities, and other such functions. Conference review opportunities tend to be plentiful, often international, and seldom hold the reviewer accountable for their individual performance. Second, volunteers are often solicited for a generic conference without adequate descriptions of the technical nature of the papers to be reviewed and no process allowing the reviewer to decline a review due to a lack of proper background. Third, reviewers are often solicited from among those that have submitted papers to the conference with the thought that such a community of authors will naturally be competent in the subject matter being addressed by the conference. There is an obvious conflict of interest problem with this procedure. Conference organizers can easily be faced with the stresses of time management in addressing the myriad of activities associated with such an activity. This can lead to a hurried effort in the review process which may prohibit the identification and use of qualified reviewers and may tempt the organizers to shortcut the review process. Typical shortcuts include using the conference committee to review papers in addition to their other duties (an acceptable process when the number of papers is low); asking authors of a paper under consideration to review several other papers (a conflict of interest); asking authors to recommend reviewers for their paper (a suspect process); or, simply calling on as many potential reviewers as possible without regard to qualification (simply solving the numbers problem). Solutions to these pitfalls might include posting blind papers and/or abstracts on a protected web site allowing reviewers to select the papers that most closely match their expertise and interest. Grouping or categorizing papers into subspecialties within the general area being 54 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 5 - NUMBER 3

addressed by the conference. Using professional organizations to solicit reviewers in the field also helps, but is often not possible. Discounting conference attendance fees or providing proceedings to the reviewers can help to motivate reviewers to volunteer and to review more than the normal number of papers. Last, asking reviewers to provide brief background information on their credentials to aide in the selection process is not an unreasonable request. 3. The Peer Review Process Once reviewers have been located it is important to not abuse their time or burden them with requests to review extra papers beyond those originally assigned. The procedures expected of the reviewers need to be simple, effective, and straightforward. While this seems obvious, it is often not the case. The essentials of a review process are the following: understand the area being written about, be knowledgeable of other similar literature in the field, read the paper, comment on its technical contribution, comment on its professional characteristics (e.g., grammar, construction, and originality), and provide an overall assessment to the conference selection committee. A simple form that asks for overall ratings is needed (accept/reject) with room for referee comment on technical content, construction issues, and comments to the author is all that is needed. A web based review process is certainly acceptable and in many cases preferred. An important part of this process is for the selection officials to actually read the reviews as a second level of checking and to intervene when multiple reviews result in inconsistent results. Assuming that a minimum of three reviewers comment on a paper most papers will fall into either an accept or reject category. When split decisions result, additional review is necessary and should be performed either by the conference organizing committee or by another trusted reviewer in the field. Adequate time must be allotted for the review itself. While this varies from reviewer to reviewer a 30 day period is generally sufficient. Less than three weeks increases the change of a cursory review and more than 4 weeks can result in a lack of responsiveness on the reviewers part as they tend to forget tasks too far in the future. It is incumbent on the conference committee to periodically remind reviewers of the due date and to check with the reviewer to determine if the reviewer is comfortable with the assignment. Three papers for review seem to be an appropriate load assuming paper size of 6 to 15 pages. Shorter papers might allow reviewers to read four or five but such papers will not often contain significant technical content due to their page limitation. Finally, this author recommends that the papers submitted for review conform to the requirements for final paper submissions (in terms of format and length). Conferences sometimes review papers of 20 pages or so in length, accept or reject based on that review, and then ask the author to cut the paper in half for the proceedings. This results in papers that may not have much value to readers of the proceedings and in unpublished works for the authors. This occurs because the original work is not actually published and can be subsequently sent to another venue as an extension of the work published by the conference. This seems contrary to the purpose of the conference proceedings and should be avoided. What is refereed should be what is published. 4. Reviewer Motivational Factors So what gets a reviewer motivated to volunteer, review, and spend the necessary effort on a paper? Some thoughts are offered here mainly to prompt discussion. In academia, personal reputation is valuable and most take it very seriously. Reviews contribute to personal reputation but only when there is personal attribution associated with the review. While SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 5 - NUMBER 3 55

this may seem contradictory in a double blind review process, it can be accomplished. An interesting model can be found in the review process used by the Department of Defense journal titled CrossTalk the Journal of Defense Software Engineering [1]. Their standard review procedure for short papers is to obtain three reviews independently. The reviewers do not know who the other reviewers are while the 1 st phase of the review is taking place. All reviews are emailed to the editor who then reviews them and notes consistency or differences. All reviews (regardless of their outcome) are then sent to all reviewers with attribution. At this point, the editor summarizes the results on the paper and asks for any final changes to the individual reviews. During this second phase of the review, each reviewer knows the identity of the other two reviewers and can read all comments. Knowing this process going into the review causes reviewers to pay more attention to their choice of words, comments, and final recommendation. The second phase also assists in forming consensus on the final decision regarding the paper. Such a process can be implemented for conference publications also but likely for small conferences only. Reviews are also motivated when there is some gain to be achieved. Naturally the service being performed should be a reward in itself, but is often insufficient. Other rewards should be considered for reviewers that contribute the most such as discounted conference registration fees or a copy of the proceeding. Naturally, a published list of reviewers for the conference also helps to motivate reviewers. 5. Summary and Concluding Remarks In summary, process and policy in the review process is important to the successful review of submitted papers. It is the process and not the peer review itself that contributes to the quality of the paper. There is a significant body of work in the area of quality software production much of which espouses the value of code review by peers [2, 3,4, and many others]. The key to successful review is always contingent on the quality of the reviewer, the process being used, and sometimes the perspective of the reviewer [5, 6, 7 and others] which could be construed to be a motivational factor. While there are likely specific cases where peer reviews do not add significantly to the quality of the conference proceeding it is argued here that such cases are extremely limited and rare. It is also argued that a failed process will lead to poor reviews and is detrimental to the quality objective. 6. Acknowledgments The technical and editorial staff at CrossTalk, the Journal of Defense Software Engineering, are acknowledged for introducing me to their review process and for allowing me to serve on their editorial board. Additionally, I would like to acknowledge the financial support received from multiple NSF grants and NSA grants that have allowed me to participate in a variety of peer reviewed conferences, editorial boards, and text book production. It is from these experiences that I have been able to see the value of a good peer review process. 7. References [1] http://www.stsc.hill.af.mil/crosstalk. [2] N. R. Mead, and T. Stehney, "Security Quality Requirements Engineering (SQUARE) Methodology." Software Engineering for Secure Systems (SESS05), International Workshop on Requirements for High Assurance Systems, St. Louis, MO, May 15-16, 2005. [3] R. Pressman, Software Engineering: A Practitioner's Approach, 6th ed, McGraw Hill, New York, NY, 2005. [4] D. Verdon, and G. McGraw, Risk analysis in software design Security & Privacy Magazine, IEEE vol. 2, Issue 4, Jul-Aug 2004, pp. 79 84. [5] Carver, J., Shull, F. and Basili, V. "Can Observational Techniques Help Novices Overcome the Software Inspection Learning Curve? An Empirical Investigation." 56 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 5 - NUMBER 3

Empirical Software Engineering: An International Journal. (Accepted for publication 7/14/05). [6] Maldonado, J., Carver, J., Shull, F., Fabbri, S., Doria, E., Martimiano, L., Mendonça, M., and Basili, V. "Perspective-Based Reading: A Replicated Experiment Focused on Individual Reviewer Effectiveness." Empirical Software Engineering: An International Journal. Volume 11, Number 1, March 2006. [7] Shull, F., Mendonça, M., Basili, V., Carver, J., Maldonado, J., Fabbri, S., Travassos, G., and Ferreira, M. "Knowledge-Sharing Issues in Experimental Software Engineering." Empirical Software Engineering: An International Journal. Volume 9, Number 1, March 2004. SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 5 - NUMBER 3 57