key: cord-0555363-dqz3xyp6 authors: Chen, Thomas Y. title: PreDefense: Defending Underserved AI Students and Researchers from Predatory Conferences date: 2022-01-26 journal: nan DOI: nan sha: 761c67fb7916fa2dc95fc9ad5032d85ddc3d9319 doc_id: 555363 cord_uid: dqz3xyp6 Mentorship in the AI community is crucial to maintaining and increasing diversity, especially with respect to fostering the academic growth of underserved students. While the research process itself is important, there is not sufficient emphasis on the submission, presentation, and publication process, which is a cause for concern given the meteoric rise of predatory scientific conferences, which are based on profit only and have little to no peer review. These conferences are a direct threat to integrity in science by promoting work with little to no scientific merit. However, they also threaten diversity in the AI community by marginalizing underrepresented groups away from legitimate conferences due to convenience and targeting mechanisms like e-mail invitations. Due to the importance of conference presentation in AI research, this very specific problem must be addressed through direct mentorship. In this work, we propose PreDefense, a mentorship program that seeks to guide underrepresented students through the scientific conference and workshop process, with an emphasis on choosing legitimate venues that align with the specific work that the students are focused in and preparing students of all backgrounds for future successful, integrous AI research careers. The existence and continued propagation of predatory scientific conferences and journals is a concerning development for all those that have an interest in scientific integrity. The idea of "predatory" journals and conferences was first introduced to the mainstream by Jeffrey Beall, a librarian. Predatory conferences are "thought to primarily seek profits, in a pay-to-play model where researchers give money to speak at an event" and the organizers harbor "little concern for the quality or rigor of the abstracts they accept or the speakers they invite" Cobey et al. (2017) . Therefore, the sole purpose of these events, which have troublingly short review periods, is to generate revenue. This has led to amplified criticism of open-access publishing models in general Cortegiani et al. (2020) . In 2012, Beall created Beall's List, a registry of journals, conferences, and publishers he deemed to be predatory or likely so; at the time, he was also an associate professor at the University of Colorado Denver Beall (2012 Beall ( , 2015 . While the list was not perfect and received a range of criticism, such as that Beall engaged in discrimination against publishers originating in developing countries, it brought an important topic of discussion to the forefront and was praised by many academics as the gold standard for the identification of bogus publishers Kimotho (2019); Somoza-Fernández et al. (2016) ; Strielkowski (2017) . Other lists have since been developed (e.g. Kscien's List) to tackle this problem Kakamad et al. (2019) . It has been documented that even many high-level academics are not fully aware of "predatory science," and that therefore there must be more education and awareness brought to the matter Lang et al. (2019) . As these conferences do not incorporate robust peer-review systems, they can promote pseudoscience and are a threat to scientific integrity as a whole; however, specifically in terms of underserved students, they pose a unique threat. Unfortunately, these predatory venues often target early-career researchers and underserved students, who do not know any better than to submit work and are tempted by the opportunity to boost their curricula vitae Mouton and Valentine (2017) . For example, the organizers often send e-mail invitations soliciting submissions Asadi (2019). These unsuspecting victims end up paying steep prices for extremely low-quality or even nonexistent conferences. Predatory conferences often target researchers in low-income areas and developing countries, and they have become more adept at designing websites and other material that give them a guise of legitimacy; at first glance, they may not seem predatory Memon and Azim (2018); Mouton and Valentine (2017) . In this paper, we focus on predatory conferences specifically and propose a mechanism to combat their success in deceiving well-intentioned students. These conferences largely relate to machine learning and artificial intelligence, as these fields often prioritize presenting at conferences and publishing in their proceedings. The seeming pressure and need to present at "prestigious" venues perpetuates the cycle of students being drawn into predatory conferences. Predatory venues have the consequence of decreasing diversity in the field of AI because those in underrepresented populations attend low-quality conferences and are discouraged from further research. By not being able to present at and participate in mainstream ML conferences such as NeurIPS, ICML, ICLR, etc. and instead continuing to be trapped in and solicited by conferences with practically 100% acceptance rates, they do not have the opportunity to improve their work and obtain valuable feedback. However, it must also be noted that some academics and students are aware of the illegitimacy and possible illegality of particular venues and instead utilize them to bolster their credentials and inflate their CVs: harming both themselves and the entire scientific community by presenting and "publishing" work with no scientific merit Darbyshire et al. (2020) . This alternative mindset also hurts underrepresented students because when they consistently submit to conferences with no standards for scientific rigor, they do not have motivation to improve and continue to inflate their CVs while not gaining any valuable insights, perpetuating the cycle. In the absence of immediate legal mechanisms to prosecute these publishers and organizers, it is important that we educate underserved students, particularly, on the most accurate and realistic conferences and workshops to submit their machine learning and artificial intelligence research papers to: both for the benefit of their scientific and professional careers and for the integrity and implications of computer science research. To that end, we propose a mentoring program targeted at underrepresented communities to primarily guide them through the conference submission and publication process. It is focused on late-stage research paper development and the entire submission, review, acceptance, presentation, and publication process. The proposed mentoring program is named PreDefense (with the first "e" being pronounced as a soft vowel). The aim is to maintain and increase a sense of belonging among students from underserved populations while simultaneously limiting research misconduct perpetuated by predatory conferences at-large. Before introducing PreDefense, we examine one example of a predatory publisher and distributor of scientific conferences. Namely, we discuss the so-called World Academy of Science, Engineering, and Technology (WASET) 1 , which is a confirmed predatory organizer Cress (2017). On its website, the organization advertises thousands of conferences at various locations across the world. In fact, in each location, there are hundreds of conferences occurring during the same two day period. For example, during January 14th and 15th of 2021 in Singapore, there are "conferences" being held with focuses in topics as disparate as water treatment for hospitals, agronomy, and Islamic architecture. Most notably, there are a wide variety of conferences listed that relate to computer science, machine learning, and AI in general. In Zurich on the same two dates, listed are two dubiously named conferences named "Deep Learning for Pattern Recognition Conference" and "Deep Learning Technologies for Pattern Recognition Conference" -almost identical in name. WASET is only one example of predatory organizing, though it is more high-profile. PreDefense will be offered as a mentorship program that institutions, particularly ones that involve undergraduates, can sign up for. It will start with universities located in lowincome and underrepresented areas, as students there will be more likely to not be aware of predatory conferences and why they are problematic. PreDefense will also be particularly directed towards interested institutions in developing countries. Students will be able to subsequently sign up for the program, whenever they are nearing the culmination of the research and paper-writing process. The mentorship program would be a part of a nonprofit organization, and underserved students would be able to participate at no cost of their own. Mentors will be educated in and well-versed in not only in the identification of bogus conferences but also the entire conference submission and acceptance process from start to end. There are a number of factors that aid the mentors in identifying fake conferences and recommending appropriate venues. For instance, advertisement emails, virtual conferences without presentation requirements, broad topic areas, changes in dates, mystery regarding committeemembers as well as geographic homogeneity among them, free offers, and dubious payment methods are all signs of a predatory conference Asadi et al. (2018) . Mentors will be familiar with these signs and be able to navigate the students. However, the role of the mentor extends far beyond simply recommending conferences. Firstly, the mentors will aid mentees in finalizing their papers. Especially for students in developing countries that have more limited skills in technical writing in English, mentors will have the expertise to guide them in this way. Then, the mentors will gain a solid grasp on the material that the research paper incorporates and recommend any changes. Furthermore, they will begin the process of searching for applicable conferences and workshops. Mentees will be given a wide variety of choices and mentors will explain the benefits and specialties of each. At this time, mentees will be taught specifically how to avoid predatory conferences; this is an important skill they will need to retain after the program in order to succeed academically in the future, as well as to not lend credibility to illegitimate organizers. This is perhaps the most crucial juncture in the mentorship process, due to the ever-increasing pervasiveness of fake conferences. Subsequently, mentors will guide mentees through the submission procedure, which is useful especially if these are the mentees' first times. The mentor and mentee remain in contact during the review period. Upon acceptance, mentors will guide mentees through devising a professional presentation. This is also helpful for underserved students that speak English as a second language. Additionally, the conference registration procedure is covered. By the conclusion of the session, the primary goal is for mentees to have submitted to a reputable conference, even if their paper was rejected. They are to have learned how to differentiate between predatory conferences and legitimate ones. If they were fortunate to have the opportunity to present, that is yet another skill they carry forward following the closure of the mentorship program. We expect that this will be an 8-month process at the most, particularly for large conferences such as NeurIPS. In other circumstances, the individual program for the mentee can last as short as 3 months. This is especially true for some workshops, such as the AI for Earth Sciences 2 workshop at NeurIPS. The interaction between the mentor and mentee will aspirationally be in-person in a post-COVID-19 world, principally due to previous literature highlighting the shortfalls of virtual mentorship, including cultural differences and disparities in internet access Pillon and Osmun (2013) ; Kafai et al. (2013) ; Naggita (2020). Following preliminary success, the program will expand to universities that may not be traditionally considered "underserved." This remains an important objective because, as previously mentioned, even many high-profile academics do not have sufficient knowledge regarding predatory conferences, given that it is a relatively new development. It has been found that even researchers from top-tier universities like Stanford, Yale, and Harvard submit to predatory journals, due to the organizers' ever-improving mechanisms to seem legitimate McCrostie (2020). In any case, the prevalence of predatory organizers is only increasing, and the need for such mentorship programs and targeted education systems specifically on this topic is needed now more than ever McCrostie (2018). The outsized importance of conferences and workshops in AI research, in comparison to journals alone, motivates this solution. The proposed mentorship program, PreDefense, has the principle aim of increasing diversity in AI, which is increasingly under threat from the prevalence of "predatory" conferences. Because there must be mentorship directed towards this issue specifically, PreDefense provides the best proposed service to date. When early-stage researchers, especially students, are encouraged to submit their work to legitimate venues and are educated on the im-2. https://ai4earthscience.github.io/neurips-2020-workshop/ portance of doing so in a healthy manner, the overall state of AI research is promoted. Simultaneously, students from a wide range of backgrounds will be brought into the field by being presented with a clear pipeline for presentation and publication, relieved of the confusion sown by malicious organizers. Invitation to speak at a conference: The tempting technique adopted by predatory conferences' organizers Fake/bogus conferences: Their features and some subtle ways to differentiate them from real ones Beall's list of predatory publishers 2013. Scholarly Open Access Predatory journals and the breakdown of research cultures. Information development Is this conference for real? navigating presumed predatory conference invitations Predatory journals and conferences: why fake counts. Current Opinion in Are predatory conferences the dark side of the open access movement Hitting rock bottom: The descent from predatory journals and conferences to the predatory phd A cascading mentoring pedagogy in a cs service learning course to broaden participation and perceptions Kscien's list; a new strategy to hoist predatory journals and publishers The storm around beall's list: a review of issues raised by beall's critics over his criteria of identifying predatory journals and publishers An approach to conference selection and evaluation: advice to avoid "predatory" conferences Predatory conferences: a case of academic cannibalism. International Higher Education Our predatory conference problem Predatory conferences: Addressing researchers from developing countries The extent of south african authored articles in predatory journals Code for research papers (c4rp) Mentoring in a digital age Presence of alleged predatory journals in bibliographic databases: Analysis of beall's list. El profesional de la información Predatory journals: Beall's list is missed