CFP last date
20 June 2024
Reseach Article

Knowledge Discovery in Research Security Practices among Scientists using Machine Learning Techniques (A Case Study of Faculty of Science, University of Ibadan)

by O. Osunade, I.T. Ayorinde, B.I. Ayinla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 9
Year of Publication: 2024
Authors: O. Osunade, I.T. Ayorinde, B.I. Ayinla
10.5120/ijca2024923441

O. Osunade, I.T. Ayorinde, B.I. Ayinla . Knowledge Discovery in Research Security Practices among Scientists using Machine Learning Techniques (A Case Study of Faculty of Science, University of Ibadan). International Journal of Computer Applications. 186, 9 ( Feb 2024), 19-28. DOI=10.5120/ijca2024923441

@article{ 10.5120/ijca2024923441,
author = { O. Osunade, I.T. Ayorinde, B.I. Ayinla },
title = { Knowledge Discovery in Research Security Practices among Scientists using Machine Learning Techniques (A Case Study of Faculty of Science, University of Ibadan) },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2024 },
volume = { 186 },
number = { 9 },
month = { Feb },
year = { 2024 },
issn = { 0975-8887 },
pages = { 19-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number9/knowledge-discovery-in-research-security-practices-among-scientists-using-machine-learning-techniques-a-case-study-of-faculty-of-science-university-of-ibadan/ },
doi = { 10.5120/ijca2024923441 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-29T03:28:39.338703+05:30
%A O. Osunade
%A I.T. Ayorinde
%A B.I. Ayinla
%T Knowledge Discovery in Research Security Practices among Scientists using Machine Learning Techniques (A Case Study of Faculty of Science, University of Ibadan)
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 9
%P 19-28
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The burgeoning digitization of scientific research and the concurrent proliferation of sensitive data emphasize the pressing need to investigate and enhance research security practices among scientists. This study outlines a comprehensive knowledge discovery endeavor that leverages machine learning techniques to analyze a survey designed to uncover insights into the current state of research security practices within the scientific community. The study focuses on a survey conducted among scientists in the Faculty of Science, University of Ibadan to gain insights into their awareness, adoption, and perceptions of research security measures. It seeks to identify the prevailing trends, challenges, and gaps in security practices that may compromise the integrity and confidentiality of scientific research. Through analysis, machine learning and visualization techniques, the study uncovered valuable patterns and correlations within the survey data. The knowledge discovery process in this study involved examining factors such as researchers’ status, years of experience, knowledge of dual-use research, medium of data storage, collaboration experience, training on research security and risk identification among others. The outcomes of this research encompass the identification of common security vulnerabilities, best practices, and potential areas for improvement in safeguarding scientific research data. Hence, the results of this study is a potential tool to inform policy development, enhance security awareness initiatives, and guide the scientific community in strengthening its defenses against threats to research integrity.

References
  1. U.S. Office of Science and Technology Policy, 2022
  2. Sandia National Laboratories (SNL). 2023. “Research Security Webinar Series: An Introduction. Powerpoint Slide, page 31.
  3. Government of Canada. (2023). Why Safeguard Your Research. (https://science.gc.ca/site/science/en/safeguarding-your-research/general-information-research-security/why-safeguard-your-research)
  4. Security and Integrity of the Global Research Ecosystem (SIGRE) Working Group. 2023. G7 Best Practices For Secure & Open Research.https://www8.cao.go.jp/cstp/kokusaiteki/g7_2023/2023_bestpracticepaper.pdf
  5. Priyad H. (2023) What is machine learning and how does it work? Online Tutorial retrieved from https://www.simplilearn.com/tutorials/machine-learning-tutorial/what-is-machine-learning
  6. Ayorinde, I. T. and Osofisan, A. O. (2010). Application of Artificial Neural Networks in Classifying Medical Database. Journal of Science Research Vol. 9: 12-18.
  7. Ayinla B. I. (2023). Index Mapped Ordinal Encoding Method for Federated Machine Learning in Crime Detection. University of Ibadan Journal of Science and Logics in ICT Research (UIJSLICTR) Vol. 9. No. 1:6-20.
  8. Wilson P. F. (2020). Academic Fraud: Solving the Crisis in Modern Academia. Exchanges: The Interdisciplinary Research Journal· June 2020. 7(3), pp. 14-44 DOI:10.31273/eirj.v7i3.546
  9. National Co-ordinating Centre for Public Engagement (NCCPE). (2020). www.publicengagement.ac.uk
  10. Linkedin (2023). How can you collaborate with other researchers while minimizing risks? https://www.linkedin.com/advice/3/how-can-you-collaborate-other-researchers-while-minimizing
  11. Texas Tech University (TTU). (2023). What are Some Best Practices for Researchers to Protect Research Data? https://www.ttu.edu/it4faculty/research/
  12. Ayorinde, I. T. and Badmos, Z. O. (2019). Development of Deep Learning Model on Mushroom Dataset towards Classifying Poisonous Mushroom with Feature Selection. In Odumuyiwa, V., Onifade, O., David, A. and Uwadia, C. (Eds.). Transition from Observation to Knowledge to Intelligence. Lagos, ISKO-Nigeria. 225-237pp. ISBN: 978-978-976-000-8.
Index Terms

Computer Science
Information Sciences
Knowledge Discovery with Machine Learning Techniques.

Keywords

Research security Dual-use technology Machine learning Best practices Bootstrapping