{"id":9117,"date":"2024-04-07T17:57:51","date_gmt":"2024-04-07T17:57:51","guid":{"rendered":"https:\/\/blogs.lshtm.ac.uk\/library\/?p=9117"},"modified":"2024-04-07T17:57:53","modified_gmt":"2024-04-07T17:57:53","slug":"p-hacking-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/","title":{"rendered":"P-hacking and how to prevent it."},"content":{"rendered":"<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"306\" src=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\" alt=\"\" class=\"wp-image-9119\" srcset=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg 602w, https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1-300x152.jpg 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/figure>\n<p>P-Hacking or data dredging is the practice of analyzing data until you find the results needed to back up your hypothesis.&nbsp; However, in many cases this practice is unintentional and researchers follow the P-hacking route without fully realizing they are doing it.<\/p>\n<p>The scientific method is built on formulating a hypothesis, designing the study, running the study, analyzing the data and then publishing the study (1).&nbsp; Through the strict adherence to these steps in a transparent and clear manner, what is published will provide evidence for the initial hypothesis or not. &nbsp;In most cases, the published results are positive and this is where the issue of P-hacking comes in. During the analysis stage, researchers can identify positive results when there isn\u2019t any. &nbsp;As Munafo, et al. states, whilst scientists should be open to new and important insights they need to simultaneously avoid being led astray by the tendency to see structure in randomness (2).<\/p>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking-1024x554.png\" alt=\"\" class=\"wp-image-9120\" srcset=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking-1024x554.png 1024w, https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking-300x162.png 300w, https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking-768x415.png 768w, https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/p-hacking.png 1342w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<p>P-hacking can derive from apophenia, confirmation bias and hindsight bias. Apophenia is when people pick up patterns in random data, they are looking for a significant result and will keep looking until it is \u2018discovered\u2019.\u00a0 The inbuilt basis is amplified by the makeup of data analysis, there are a multitude of ways in analyzing the same data, making it more likely to identify false positives.\u00a0 Hypotheses may emerge that fit the data and are then reported without indication or recognition that you are hypothezing after the results (3)<\/p>\n<h2 class=\"wp-block-heading\"><strong>How then can we prevent P-hacking?\u00a0\u00a0<\/strong><\/h2>\n<p>To avoid cognitive bias you can introduce a blinding element into the process, such as between the data analysis and key parts of the data. Improved statistical training and being able to replicate the result from the same sample size. Research reproducibility is key to ensuring that identifying a significant result can be reproduced with a clear and transparent methodology and study design. Preregistration was introduced to tackle publication bias, ensuring that papers are published regardless of the final outcome of the study, it can also be used against P-hacking by preventing the outcome being switched during data analysis, as the proposed study has already been registered and needs to be followed all the way through. There is a wider issue around research culture which sways towards competitiveness rather than collaboration.\u00a0 Researchers are under pressure to publish papers and with most journals, publication is tied to positive and not negative or null results.\u00a0 Until there is less push and pull to publish papers that confirm a novel hypothesis rather than through robust scientific method, then p-hacking will be difficult to avoid.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/haystack.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"255\" src=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/haystack.jpg\" alt=\"\" class=\"wp-image-9121\" style=\"width:640px;height:auto\" srcset=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/haystack.jpg 602w, https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/haystack-300x127.jpg 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/figure>\n<\/div>\n<p><strong>References<\/strong><\/p>\n<ol class=\"wp-block-list\">\n<li>Bezak, et al. The Open Science Training Book. TIB, Hannover Germany (2018) <a href=\"https:\/\/doi.org\/10.5281\/zenodo.1212496\">https:\/\/doi.org\/10.5281\/zenodo.1212496<\/a> &nbsp;<\/li>\n<li>Munaf\u00f2, M., Nosek, B., Bishop, D. <em>et al.<\/em> A manifesto for reproducible science. <em>Nat Hum Behav<\/em> <strong>1<\/strong>, 0021 (2017). <a href=\"https:\/\/doi.org\/10.1038\/s41562-016-0021\">https:\/\/doi.org\/10.1038\/s41562-016-0021<\/a><\/li>\n<li>&nbsp;Kerr, N. L., HARKing: hypothesizing after the results are known.&nbsp;<em>Pers. Soc. Psychol. Rev.<\/em>&nbsp;<strong>2<\/strong>, 196\u2013217 (1998).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>P-Hacking or data dredging is the practice of analyzing data until you find the results&#8230;<\/p>\n","protected":false},"author":117,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81944],"tags":[],"class_list":["post-9117","post","type-post","status-publish","format-standard","hentry","category-open-research","odd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog\" \/>\n<meta property=\"og:description\" content=\"P-Hacking or data dredging is the practice of analyzing data until you find the results...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Library, Archive &amp; Open Research Services blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-07T17:57:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-07T17:57:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\" \/>\n<meta name=\"author\" content=\"Christopher Manning\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LSHTMlibrary\" \/>\n<meta name=\"twitter:site\" content=\"@LSHTMlibrary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christopher Manning\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\"},\"author\":{\"name\":\"Christopher Manning\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56\"},\"headline\":\"P-hacking and how to prevent it.\",\"datePublished\":\"2024-04-07T17:57:51+00:00\",\"dateModified\":\"2024-04-07T17:57:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\"},\"wordCount\":493,\"image\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\",\"articleSection\":[\"Open Research\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\",\"url\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\",\"name\":\"P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\",\"datePublished\":\"2024-04-07T17:57:51+00:00\",\"dateModified\":\"2024-04-07T17:57:53+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage\",\"url\":\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\",\"contentUrl\":\"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg\",\"width\":602,\"height\":306},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/#website\",\"url\":\"https:\/\/blogs.lshtm.ac.uk\/library\/\",\"name\":\"Library, Archive &amp; Open Research Services blog\",\"description\":\"News &amp; features from LAORS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.lshtm.ac.uk\/library\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56\",\"name\":\"Christopher Manning\",\"url\":\"https:\/\/blogs.lshtm.ac.uk\/library\/author\/alibcman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/","og_locale":"en_GB","og_type":"article","og_title":"P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog","og_description":"P-Hacking or data dredging is the practice of analyzing data until you find the results...","og_url":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/","og_site_name":"Library, Archive &amp; Open Research Services blog","article_published_time":"2024-04-07T17:57:51+00:00","article_modified_time":"2024-04-07T17:57:53+00:00","og_image":[{"url":"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg","type":"","width":"","height":""}],"author":"Christopher Manning","twitter_card":"summary_large_image","twitter_creator":"@LSHTMlibrary","twitter_site":"@LSHTMlibrary","twitter_misc":{"Written by":"Christopher Manning","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/"},"author":{"name":"Christopher Manning","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56"},"headline":"P-hacking and how to prevent it.","datePublished":"2024-04-07T17:57:51+00:00","dateModified":"2024-04-07T17:57:53+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/"},"wordCount":493,"image":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg","articleSection":["Open Research"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/","url":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/","name":"P-hacking and how to prevent it. - Library, Archive &amp; Open Research Services blog","isPartOf":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg","datePublished":"2024-04-07T17:57:51+00:00","dateModified":"2024-04-07T17:57:53+00:00","author":{"@id":"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/2024\/04\/07\/p-hacking-and-how-to-prevent-it\/#primaryimage","url":"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg","contentUrl":"https:\/\/blogs.lshtm.ac.uk\/library\/files\/2024\/04\/random_pattern-1.jpg","width":602,"height":306},{"@type":"WebSite","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/#website","url":"https:\/\/blogs.lshtm.ac.uk\/library\/","name":"Library, Archive &amp; Open Research Services blog","description":"News &amp; features from LAORS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.lshtm.ac.uk\/library\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/blogs.lshtm.ac.uk\/library\/#\/schema\/person\/684aaba3b1d90af76a8a19bec679ea56","name":"Christopher Manning","url":"https:\/\/blogs.lshtm.ac.uk\/library\/author\/alibcman\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/posts\/9117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/comments?post=9117"}],"version-history":[{"count":1,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/posts\/9117\/revisions"}],"predecessor-version":[{"id":9122,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/posts\/9117\/revisions\/9122"}],"wp:attachment":[{"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/media?parent=9117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/categories?post=9117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.lshtm.ac.uk\/library\/wp-json\/wp\/v2\/tags?post=9117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}