Buddha
Thinker
One of my opponents produced a very informative post, I really appreciate that. He/she also wrote that the IEEE article that I mentioned earlier is an invited paper. I didn’t know much about the invited papers, so out of curiosity I contacted my college friend who works as an editor for IET Science, Measurement & Technology magazine. According to her, usually invited papers are written by the leading experts in the field.
See also https://www.biomedcentral.com/collections/invitedpapers and https://www.quora.com/What-is-an-invited-paper-to-a-scientific-journal
In rare instances invited papers deal with controversial topics. In this case the editors ask the researchers’ permission to inspect their lab. If permission is granted, two or three engineers check the equipment to make sure that there is no fraud.
Now I return to the discussion.
“Palmer draw attention to the fact that there no documentation regarding measures to prevent data tampering by subjects, and this is of some considerable importance since the subject was left alone in the room during the formal sessions along with the REG and recording equipment” Alcock.
Palmer is not an engineer, so he has no idea what such tampering entails. To start with, you would have to obtain the equipment documentation, which is very difficult to achieve, although not impossible. Them you would have to decide what to do next.
The equipment consists of three parts: the apparatus, the recording device and the connecting cable. Obviously, it is extremely difficult to make changes to a shielded cable without damaging it.
The recording device is a digital circuit. To change its state you would have to interact with it directly. But you cannot do that without special equipment and instructions written by its manufacturing team. However, you do not have access to their documentation, and they won’t send it to you upon the request because they do not want to reveal its design to their competitors.
The apparatus itself has weak points and you could try exploit them. But to do that you would have to identify them first, which is not easy, most likely its schematics do not provide the appropriate details because they are very general.
But let’s assume you had identified all possible entries of fraudulent data. So you make the changes and it appears that you have achieved the goal. But the results would be so outlandish that it would be very easy to spot them. To do a good tampering of the data you would have to experiment with the device, which takes time and effort. But all your attempts will be recorded, which makes tampering virtually impossible.
But let’s assume that you have achieved the desired results during the first trial. This is not enough, after you finish altering the data you would have to return the apparatus to its original state; otherwise all following experiments with other subjects will produce unrealistic results that contradict previous recordings. Once again, you would have to experiment with the device, which is unlikely to go unnoticed.
Next time I will be discussing the Palmer article.
See also https://www.biomedcentral.com/collections/invitedpapers and https://www.quora.com/What-is-an-invited-paper-to-a-scientific-journal
In rare instances invited papers deal with controversial topics. In this case the editors ask the researchers’ permission to inspect their lab. If permission is granted, two or three engineers check the equipment to make sure that there is no fraud.
Now I return to the discussion.
“Palmer draw attention to the fact that there no documentation regarding measures to prevent data tampering by subjects, and this is of some considerable importance since the subject was left alone in the room during the formal sessions along with the REG and recording equipment” Alcock.
Palmer is not an engineer, so he has no idea what such tampering entails. To start with, you would have to obtain the equipment documentation, which is very difficult to achieve, although not impossible. Them you would have to decide what to do next.
The equipment consists of three parts: the apparatus, the recording device and the connecting cable. Obviously, it is extremely difficult to make changes to a shielded cable without damaging it.
The recording device is a digital circuit. To change its state you would have to interact with it directly. But you cannot do that without special equipment and instructions written by its manufacturing team. However, you do not have access to their documentation, and they won’t send it to you upon the request because they do not want to reveal its design to their competitors.
The apparatus itself has weak points and you could try exploit them. But to do that you would have to identify them first, which is not easy, most likely its schematics do not provide the appropriate details because they are very general.
But let’s assume you had identified all possible entries of fraudulent data. So you make the changes and it appears that you have achieved the goal. But the results would be so outlandish that it would be very easy to spot them. To do a good tampering of the data you would have to experiment with the device, which takes time and effort. But all your attempts will be recorded, which makes tampering virtually impossible.
But let’s assume that you have achieved the desired results during the first trial. This is not enough, after you finish altering the data you would have to return the apparatus to its original state; otherwise all following experiments with other subjects will produce unrealistic results that contradict previous recordings. Once again, you would have to experiment with the device, which is unlikely to go unnoticed.
Next time I will be discussing the Palmer article.