Francesco Lo-Coco.

Consolidation Therapy A total of 146 of 152 patients in hematologic comprehensive remission proceeded to consolidation therapy. However, the individual with the process violation could be evaluated for the principal end point. Three individuals went off protocol after consolidation therapy owing to withdrawal of consent, a major protocol violation, and a toxic effect. Two patients did not complete maintenance therapy because of prolonged myelosuppression . In two of the seven individuals with disease recurrence, a relapse was detected at the molecular level before detection of the hematologic relapse, resulting in early administration of salvage therapy.There are several lessons to be learned from these cases of peer-reviewer and peer-review fraud. One is normally that the electronic manuscript-handling systems that a lot of journals use are as susceptible to exploitation and hacking as various other data systems. Moon and Chen, for example, both abused a feature of ScholarOne: the e-mail messages sent to scholars inviting them to examine a manuscript include log-in information, and whoever receives those messages can sign into the system. Most other digital manuscript submission systems have similar loopholes that can easily be hacked. The most crucial lesson is that incentives work. This pressure exists almost everywhere but is particularly intense in China.