DOI:10.1038/495421a - Corpus ID: 242583
Sham journals scam authors
@article{Butler2013ShamJS, title={Sham journals scam authors}, author={Declan Butler}, journal={Nature}, year={2013}, volume={495}, pages={421-422}, url={https://api.semanticscholar.org/CorpusID:242583}}Con artists are stealing the identities of real journals to cheat scientists out of publishing fees.
50 Citations
50 Citations
A Growing Threat for Academicians: Fake and Predatory Journals
- G. GunaydinN. Doğan
- 2015
Computer Science
The goal is to disseminate knowledge and awareness about predatory journals and offer some basic skills to the authors so that they avoid fake or predatory publishers.
Faculty Perceptions on Publishing Research
Today’s researchers have not only the traditional publications, but the open access publishing method whereby research papers can be published via the Internet as well as print publications.…
Hijacked scientific journals: a warning to researchers
- T. MartinsA. L. CostaFrancisco Javier Solano MoncadaR. Martins
- 2016
Computer Science
Einstein
Researchers are warned on how to identify hijacked scientific journals, which is an alarming practice: researchers may have their work stolen and editors the defamation of their journals’ prestige.
Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?
- M. JalalianH. Mahboobi
- 2014
Political Science
Some simple methods that can be used easily to identify the fake publishers as a short to midterm solution are introduced and a movement for designing a new model for assessing the quality of academic research is recommended.
Predatory Publishing, Open Access, and the Costs to Academia
- T. Rich
- 2016
Political Science, Education
ABSTRACT As publishing demands increase, so does the availability of open access predatory publishing options masquerading as reputable peer-review outlets. This article cautions against the broader…
The Proliferation of Hijacked Journals: Sensitizing Scholars in Nigerian Higher Education System
- D. OmonijoOnyekwere Oliver Chizaram UcheBernard C ChineM. AnyaegbunamT. GeorgeC. Awosope
- 2015
Education, Computer Science
The study concluded on the best way of discouraging scholars from patronizing hijack journals, pretending to be outlets indexed in Thomson Reuters and Impact Factor Ranked Journals by SCImago.
Decoding Correlations in Predatory Business Practices and Physicians’ Strategies Against Daily Predatory Emails
- Alessandro MartininoFrank W J M SmeenkValentina BasileJ. S. Scarano PereiraD. RamnarainS. Pouwels
- 2024
Medicine, Business
The results not only highlight patterns in predatory email reception based on age and academic status but also emphasize the importance of considering academic productivity in understanding the prevalence of predatory solicitations.
Rebranding of Predatory Journals and Conferences: Understanding Its Implication and Prevention Strategy
- Alessandro MartininoSurobhi ChatterjeeFrank W J M SmeenkS. Pouwels
- 2023
Law, Business
Academic conference participation and publications serve as a litmus test to evaluate researchers irrespective of their scientific discipline. Predatory or fake conferences and journals exploit this…
Predatory and fake scientific journals/publishers: A global outbreak with rising trend: A review
- T. LukićI. BlešićBiljana BasarinLjubica Ivanović-BibićD. MilosevicD. Sakulski
- 2014
Computer Science
This review article strives to recommend that the Beall's list of predatory publishers and journals should be consulted every time when an author plans to submit scientific work to some of the journals that are indexed by Thomson Reuters/Institute for Scientific Information-ISI and covered by the Journal Citation Report.
Predatory Publishing: The Downside of Open Access Publishing
- Satyabrata Garanayak
- 2017
Law, Business
This paper highlights the predatory publishing concept, its growth, main reason behind growing and what are the precautions that must be followed to control this fraud.
Related Papers
Showing 1 through 3 of 0 Related Papers