首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 45 毫秒
1.
Similar to a study by Nelson and Huffman on the presence of predatory journals in aggregator databases, this study presents the results of a comparison between Jeffrey Beall’s List of Standalone Journals and a group of six commercial publisher and open access journal packages. A subject analysis of the predatory journals listed on Beall’s standalone journal list was also conducted along with an analysis of the trend in predatory publisher and journal growth. In the end, only a small number of predatory journals were found to exist within the publisher packages. The subject analysis of the journals on Beall’s standalone journal list revealed that most of the journals on his list were either multidisciplinary in nature or allied with science, medicine/health, and technology subjects. However, because the number of predatory journals discovered in the publisher packages was too small, a meaningful statement about the predominant subject areas of the predatory content found in the publisher packages could not be made. Finally, within the context of the publishing world at large, based on the historical development of predatory publishers and their journals, a dramatic increase in their growth is forecast. Because Beall’s lists of predatory publishers and standalone journals were often used by authors for guidance but are no longer available, several tools for evaluation of publisher and journal quality are summarized.  相似文献   

2.
A total of 966 allegedly ‘predatory’ open access publishers were examined to determine the nature of their ethical or unethical practices and the extent to which Australian academics were included on the editorial boards of their journals. An estimated 4,000 Australian academics (ca. 7% of the academic population) are on these journal boards. Of the publishers, 240 proved to be overtly fraudulent, the ethical status of the others remaining unresolved. About 86% of the Australian academics identified appeared on the editorial boards of journals belonging to those 240 publishers. Despite two decades of advocacy from librarians, there remains widespread ignorance of the existence of such fraudulent publishers, and more severe action is required. Reform proposals include naming the publisher in all references and in academic profiles and curriculum vitae. Universities are encouraged to take responsibility for publishing journals that replace those currently causing the problem. Institutions are urged to augment their current warnings and advice with formal policies, which will probably require a blacklist of unacceptable publishers. New formal policies for dealing with predatory publishers are currently being developed in some Australian universities.  相似文献   

3.
Recently, there has been an alarming increase in the number of “academic” papers published in vanity journals and publishers. Such journals, dubbed predatory because their main objective is making money out of authors, compromise or completely abandon the peer review system. An increase in publishing with such journals, which is common in developing counties, will affect the quality of science, excellence, development, and individual researchers' and institutions' professional reputation. In this article, the author discusses strategies for individual researchers and institutions for identifying and discouraging publishing in predatory journals. Moreover, suggestions on how to deal with faculty who have published and already bestowed positions on the grounds of papers published in predatory journals are also given. Strategies and suggestions discussed in this article can provide insights to librarians and publication officers on how to curb the problem of predatory publications.  相似文献   

4.
掠夺性科技期刊与科技期刊中掠夺性现象的特征研究   总被引:1,自引:0,他引:1  
张俊 《编辑学报》2020,32(4):376-379
近年来,由于开放存取(OA)出版模式的兴起,掠夺性科技期刊的出现也引起国内外学者的关注。国内科技期刊中也存在着类似的管理和学术信誉差、商业利益至上的现象,并对正常的科研成果和出版资源形成了干扰和掠夺。本文将这些存在于国内外科技期刊中的掠夺现象一并回顾和总结,认为一方面国内科技期刊从业者,应重视和适应新兴OA期刊的发展趋势,另一方面相关科研管理部门也应逐步建立措施,完善掠夺性期刊预警制度。  相似文献   

5.
Not all the journals included in credible indices meet the ethical rules of COPE, DOAJ, OASPA, and WAME, and there may also be trustworthy journals excluded from these indices, which means they cannot be used as whitelists for trustworthy journals. Equally, the many methods suggested to determine trustworthiness are not reliable because they include questionable criteria. The question arises whether valid criteria for identifying an untrustworthy journal can be determined and whether other assessment procedures are necessary. Since 2017, the Masaryk University Campus Library has been developing a suitable evaluation method for journals. A list of 19 criteria based on those originally suggested by Beall, COPE, DOAJ, OASPA, and WAME were reduced to 10 objectively verifiable criteria following two workshops with librarians. An evaluation of 259 biomedical journals using both the list of 19 and then 10 criteria revealed that 74 journals may have been incorrectly assessed as untrustworthy using the longer list. The most common reason for failure to comply was in the provision of sufficient editorial information and declaration of article processing charges. However, our investigation revealed that no criteria can reliably identify predatory journals. Therefore, a complex evaluation is needed combining objectively verifiable criteria with analysis of a journal's content and knowledge of the journal's background.  相似文献   

6.
Jeffrey Beall, a US librarian, coined the term “predatory publishing” specifically to describe a movement or phenomenon of open access (OA) journals and publishers that he and others believed displayed exploitative and unscholarly principles. Using a blog to transmit those ideas, and profiling specific cases using blacklists, one of the most polemic aspects of Beall's blog was its tendency to attract and incite academic radicalism. Beall targeted both publishers and standalone journals, but how he precisely determined that an OA journal or a publisher was predatory was in many cases an ambiguity. Beall's deficient and highly subjective criteria, as well as those blacklists' incapacity to clearly distinguish low quality OA publishers from predatory ones, may have negatively impacted the operations of several Beall-blacklisted OA journals and publishers. Freedom of speech that embraces prejudice, via Beall's blog, and the establishment of “predatory” blacklists, are enhanced discriminatory ideologies that continue to be carried downstream from Beall to and by other like-minded individuals and groups who proliferate academic divisiveness and may also be formalizing and institutionalizing a culture of discriminative philosophies by cloning Beall's blacklists and encouraging their continued use.  相似文献   

7.
Having found a business opportunity in exploiting the open access publishing model, predatory journals and publishers have been spamming authors with emails, inviting them to submit articles for publication. Authors may be misled by the names of prestigious authors and editors that predatory journals and publishers use to advertise their publishing services, either by claims that those scientists serve on the editorial boards or by sending invitations in their names. Given the fact that detailed knowledge of a journal is required to make an informed decision of whether the inviting journal is predatory or not, junior scientists are not likely to possess the knowledge or skill to make such decisions. In addition, analysis of the details of new suspicious journals and publishers can be a lengthy process or even a waste of time. Therefore, in this paper, we provide an analysis of a likely scenario that many authors are facing nowadays when they take on the difficult task of studying the details of suspicious journals as possible venues for the publication of their research findings. The analysis takes the form of an analysis of the Kenkyu Publishing Group, which is listed on Jeffrey Beall’s list of “predatory” open access publishers.  相似文献   

8.
Questionable publications have been accused of “greedy” practices; however, their influence on academia has not been gauged. Here, we probe the impact of questionable publications through a systematic and comprehensive analysis with various participants from academia and compare the results with those of their unaccused counterparts using billions of citation records, including liaisons, i.e., journals and publishers, and prosumers, i.e., authors. Questionable publications attribute publisher-level self-citations to their journals while limiting journal-level self-citations; yet, conventional journal-level metrics are unable to detect these publisher-level self-citations. We propose a hybrid journal-publisher metric for detecting self-favouring citations among QJs from publishers. Additionally, we demonstrate that the questionable publications were less disruptive and influential than their counterparts. Our findings indicate an inflated citation impact of suspicious academic publishers. The findings provide a basis for actionable policy-making against questionable publications.  相似文献   

9.
10.
This paper presents the bibliometric characteristics of 32 biomedical open access journals published by Academic Journals and International Research Journals – the two Nigerian publishers in Jeffery Beall's list of 23 predatory open access publishers in 2012. Data about the journals and the authors of their articles were collected from the websites of the publishers, Google Scholar and Web of Science. As at December 2012, the journals had together produced a total of 5,601 papers written by 5,599 authors, and received 12,596 citations. Authors from Asia accounted for 56.79% of the publications; those from Africa wrote 28.35% while Europe contributed 7.78%. Authors from Africa accounted for 18.25% of the citations these journals received, and this is about one‐third the number of citations by authors in Asia (54.62%). At country level, India ranks first in the top 10 citer countries, while Nigeria, the host country of the journals, ranked eighth. More in‐depth studies are required to develop further information about the journals such as how much scientific information the journals contain, as well as the science literacy of the authors and the editorial.  相似文献   

11.
12.
BackgroundThe number of predatory journals is constantly growing and creating a major threat. Researchers in biomedical sciences should be aware of predatory publishers and be able to recognize them.ObjectiveThe aim of this study is to assess biomedical researchers' knowledge about predatory journals both before and after showing them an infographic explaining these journals and their publishing model.MethodsThis study was conducted with a sample of biomedical researchers and students. Subjects answered two questionnaires, one before explaining a designed infographic to each participant through a direct face-to-face interview.ResultsA total of 158 participants were included in this study, with a mean age of 22.6 (±1.72) years. They were 122 (77.2%) undergraduates and 36 (22.8%) graduate students. The median number of research projects our subjects participated in was 1 (0–5), and the median number of published projects was 0 (0–3). Awareness of predatory journals or Beall's List improved from 7% and 2.5%, respectively, before the infographic to 97.5% and 94.9% after the infographic.ConclusionOur results indicate the beneficial use of the designed infographic to improve young researchers' awareness of predatory journals. We encourage research institutions and universities to effectively spread awareness of predatory journals.  相似文献   

13.
Predatory journals and publishers are a growing concern in the scholarly publishing arena. As one type of attempt to address this increasingly important issue, numerous individuals, associations, and companies have begun curating journal watchlists or journal safelists. This study uses a qualitative content analysis to explore the inclusion/exclusion criteria stated by scholarly publishing journal watchlists and safelists to better understand the content of these lists, as well as the larger controversies that continue to surround the phenomenon that has come to be known as predatory publishing. Four watchlists and ten safelists were analyzed through an examination of their published mission statements and inclusion/exclusion criteria. Notable differences that emerged include the remaining influence of librarian Jeffrey Beall in the watchlists, and the explicit disavowal of his methods for the safelists, along with a growing recognition that the “list” approach may not fully address systemic aspects of predatory publishing that go beyond the individual author's ethical decision-making agency.  相似文献   

14.
Scholarly publishing scams and predatory journals are emerging threats to academic integrity. During the last few years, the number of bogus journals has dramatically increased, defraud authors by promising fast review and prompt publishing. The current research investigates the contribution of Iranian researchers in predatory open-access journals in 2014. In this research, a total of 21,817 articles published by 265 journals from Beall’s list of predatory standalone journals were investigated. Although Beall’s weblog was taken offline on January 15, 2017, data was collected between January and March 2016 when his weblog was accessible. Results of the study revealed that Iranian researchers have contributed to 1449 papers from 265 journals, ranked this country as having the second largest contributor after India. Surprisingly, institutions with the highest share of publication in predatory journals are among the most reputable and well-known universities of the country. Un-vetted papers published in predatory journals can hurt individuals’ reputation and be a base for future low-quality research in Iran and other world countries. To avoid being victimized by questionable journals, researchers should be more familiar with scholarly publishing literacy skills to recognize and avoid publishing scams.  相似文献   

15.
16.
Given the recent proliferation of fee charging open access journals, unwary authors may not be able to differentiate between legitimate peer-review journals and those with fake peer review. Therefore, this paper proposes measures that if implemented would provide protection to junior and/or unwary authors against predatory journals and publishers whose sole purpose of existence is to exploit unsuspecting authors and institutions by collecting article processing charges.  相似文献   

17.
The purchase ‘en bloc’ by library consortia of all journals published by one publisher – the so‐called ‘Big Deal’ – is bad for small publishers and for large libraries even if – in the short term – good for large publishers and for small libraries. The publishing and library communities need to find alternative purchasing models that provide better deals for those disadvantaged by the prevalence of the ‘Big Deal’ while retaining the benefit of scale in negotiation and supply.  相似文献   

18.
[目的/意义] 期刊从订阅模式转向开放获取模式有多种途径,其中"为开放而订阅(S2O)"是一种新兴模型,正越来越受到向开放获取过渡的传统出版商的认可与接纳。[方法/过程] 运用文献调研法与内容分析法,梳理S2O模型的背景、发展,比较9家出版商采用S2O模型的75种期刊的情况。[结果/结论] 指出S2O模型的潜在问题包含订阅机构的流失、图书馆/文献中心的财政预算审查障碍、订阅费用透明度较差;解决措施包括经费补充机制及提供S2O模型期刊的使用数据。从为出版商提供开放获取转换的新途径、有利于保障非营利性出版商的发展两个方面提出S2O开放获取模式,为我国开放获取的理论与实践带来重要启示。  相似文献   

19.
20.
Predatory publishers—those who do not adhere to rigorous standards of academic practice such as peer review—are increasingly infiltrating biomedical databases, to the detriment of the wider scientific community. These publishers frequently send unsolicited ‘spam’ emails to generate submission to their journals, with early career researchers (ECR) particularly susceptible to these practices because of pressures such as securing employment and promotion. This analysis sought to record and characterize the emails received over the course of a PhD and post-doctoral position (~8 years), as well as attempts to unsubscribe from such emails, using a progressive and step-wise manner. A total of 1,280 emails identified as academic spam were received (990 journal invitations, 220 conference invitations, 70 ‘other’). The first email was received 3 months after registration for an international conference. Attempts at unsubscribing were somewhat effective, whereby implications of reporting to respective authorities resulted in a 43% decrease in emails, although did not eliminate them completely, and therefore alternative approaches to eliminating academic spam may be needed. Ongoing education about predatory publishers, as well as action by key academic stakeholders, should look to reduce the impact these predatory publishers have upon the wider literature base.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号