2022
DOI: 10.31234/osf.io/xy2dk
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Big Little Lies: A Compendium and Simulation of p-Hacking Strategies

Abstract: In many research fields, the widespread use of questionable research practices has jeopardized the credibility of scientific results. One of the most prominent questionable research practices is p-hacking. Typically, p-hacking is defined as a compound of strategies targeted at rendering non-significant hypothesis testing results significant. However, a comprehensive overview of these p-hacking strategies is missing, and current meta-scientific research often ignores the heterogeneity of strategies. Here, we co… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 72 publications
1
16
0
Order By: Relevance
“…It can also be a product of human fallibility (e.g., one's conveniently forgetting about previous attempts to test the same hypothesis by alternative means) Nevertheless, p-hacking does often have important (and detrimental) consequences for the quality of research (cf. Stefan & Schönbrodt, 2022) and should therefore be examined during the hiring process. Ultimately, it is the responsibility of each individual scientist to guard against the possible influence of p-hacking on her or his own research findings, and scientists who take that responsibility more seriously should be rewarded for that.…”
Section: Identification Of Additional "Red Flags" When Evaluating Res...mentioning
confidence: 99%
“…It can also be a product of human fallibility (e.g., one's conveniently forgetting about previous attempts to test the same hypothesis by alternative means) Nevertheless, p-hacking does often have important (and detrimental) consequences for the quality of research (cf. Stefan & Schönbrodt, 2022) and should therefore be examined during the hiring process. Ultimately, it is the responsibility of each individual scientist to guard against the possible influence of p-hacking on her or his own research findings, and scientists who take that responsibility more seriously should be rewarded for that.…”
Section: Identification Of Additional "Red Flags" When Evaluating Res...mentioning
confidence: 99%
“…Data and relevant code for this research work are stored in GitHub: and have been archived within the Zenodo repository: [120].…”
Section: Data Accessibilitymentioning
confidence: 99%
“…Data accessibility. Data and relevant code for this research work are stored in GitHub: https://github.com/astefan1/phacking_ compendium and have been archived within the Zenodo repository: https://doi.org/10.5281/zenodo.7510292 [120].…”
mentioning
confidence: 99%
“…However, a common concern to meta-analysis is the overestimation of effect size due to publication bias, the preferential publishing of statistically significant studies (Masicampo & Lalande, 2012;Rosenthal & Gaito, 1964;Rothstein et al, 2005a;Scheel et al, 2021;Wicherts, 2017). In addition, this effect size exaggeration can be further increased by questionable research practices, that is, researchers' tendency to manipulate their data in a way that increases the effect size and the evidence for an effect (e.g., Simmons et al, 2011;Stefan & Schönbrodt, 2022). Indeed, descriptive surveys find that both problems are remarkably common.…”
Section: Robust Bayesian Meta-analysis: Model-averaging Across Comple...mentioning
confidence: 99%