Author:
Lopez Daniel A.,Cardenas-Iniguez Carlos,Subramaniam Punitha,Adise Shana,Bottenhorn Katherine L.,Badilla Paola,Mukwekwerere Ellen,Tally Laila,Ahanmisi Omoengheme,Bedichek Isabelle L.,Matera Serena D.,Perez-Tamayo Gabriela Mercedes,Sissons Nicholas,Winters Owen,Harkness Anya,Nakiyingi Elizabeth,Encizo Jennell,Xiang Zhuoran,Wilson Isabelle G.,Smith Allison N.,Hill Anthony R.,Adames Amanda K.,Robertson Elizabeth,Boughter Joseph R.,Lopez-Flores Arturo,Skoler Emma R.,Dorholt Lyndsey,Nagel Bonnie J.,Huber Rebekah S.
Funder
National Institutes of Health
Reference53 articles.
1. HARKing, cherry-picking, p-hacking, fishing expeditions, and data dredging and mining as questionable research practices;Andrade;J. Clin. Psychiatry,2021
2. Control variable use and reporting in macro and micro management research;Atinc;Organ. Res. Methods,2012
3. 1,500 scientists lift the lid on reproducibility;Baker;Nature,2016
4. Why scientists must share their research code;Baker;Nature,2016
5. Publish your computer code: it is good enough;Barnes;Nature,2010