Now you have to pay! A deeper look at publishing practices of predatory journals

IF 2.2 3区 管理学 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE
Mark R. Freiermuth
{"title":"Now you have to pay! A deeper look at publishing practices of predatory journals","authors":"Mark R. Freiermuth","doi":"10.1002/leap.1583","DOIUrl":null,"url":null,"abstract":"<p>In this study, by using Beall's (Scholarly open-access, 2014; Beall's list of predatory journals and publishers, 2018) predatory journal lists as well as direct e-mail solicitations from journals, we intentionally submitted a poorly written manuscript to 58 open-access journals using counterfeit names and affiliations. Although there have been several studies examining the practices of questionable journals, there is a lack of research investigating the interactive processes in detail. Our analysis, then, was to provide a more comprehensive view of the underlying reasoning for the acceptance or rejection of a manuscript. Of the 31 journals acknowledging receipt of our manuscript, 21 accepted it either unexpurgated or asked only for cosmetic revisions. Regarding ‘positive responses’, we point to five common flaws associated with such journals, namely that (1) they lack any interest in the researchers who are submitting manuscripts; (2) they do not judge academic writing in accordance with expected conventions; (3) they appear to be indifferent to scholarship including research design, plagiarism issues, and citation quality; (4) their review process is opaque and overly hasty, and (5) the tone they use in correspondence e-mail messages is highly inappropriate. Based upon the investigation, it is clear that such journals' primary aim is in securing the article processing fee. Our findings paint a more comprehensive picture of questionable journal practices with the hope of disseminating such information to the broader scholarly community.</p>","PeriodicalId":51636,"journal":{"name":"Learned Publishing","volume":null,"pages":null},"PeriodicalIF":2.2000,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Learned Publishing","FirstCategoryId":"91","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/leap.1583","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 1

Abstract

In this study, by using Beall's (Scholarly open-access, 2014; Beall's list of predatory journals and publishers, 2018) predatory journal lists as well as direct e-mail solicitations from journals, we intentionally submitted a poorly written manuscript to 58 open-access journals using counterfeit names and affiliations. Although there have been several studies examining the practices of questionable journals, there is a lack of research investigating the interactive processes in detail. Our analysis, then, was to provide a more comprehensive view of the underlying reasoning for the acceptance or rejection of a manuscript. Of the 31 journals acknowledging receipt of our manuscript, 21 accepted it either unexpurgated or asked only for cosmetic revisions. Regarding ‘positive responses’, we point to five common flaws associated with such journals, namely that (1) they lack any interest in the researchers who are submitting manuscripts; (2) they do not judge academic writing in accordance with expected conventions; (3) they appear to be indifferent to scholarship including research design, plagiarism issues, and citation quality; (4) their review process is opaque and overly hasty, and (5) the tone they use in correspondence e-mail messages is highly inappropriate. Based upon the investigation, it is clear that such journals' primary aim is in securing the article processing fee. Our findings paint a more comprehensive picture of questionable journal practices with the hope of disseminating such information to the broader scholarly community.

现在你得付钱了!深入研究掠夺性期刊的出版行为
在这项研究中,通过使用Beall的(学术开放获取,2014;Beall的掠夺性期刊和出版商列表,2018)掠夺性期刊列表以及期刊的直接电子邮件邀请,我们故意使用伪造的名称和从属关系向58家开放获取期刊提交了一份写得不好的手稿。尽管已经有几项研究对可疑期刊的做法进行了研究,但缺乏对互动过程进行详细调查的研究。因此,我们的分析是为了对接受或拒绝手稿的根本原因提供更全面的看法。在确认收到我们稿件的31家期刊中,有21家要么未删节,要么只要求进行表面修改。关于“积极回应”,我们指出了与此类期刊相关的五个常见缺陷,即(1)它们对提交手稿的研究人员缺乏任何兴趣;(2) 他们没有按照预期的惯例来评判学术写作;(3) 他们似乎对学术漠不关心,包括研究设计、剽窃问题和引文质量;(4) 他们的审查过程不透明且过于草率,(5)他们在信件电子邮件中使用的语气极不恰当。根据调查,很明显,这类期刊的主要目的是确保文章处理费。我们的发现更全面地描述了有问题的期刊实践,希望将这些信息传播给更广泛的学术界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Learned Publishing
Learned Publishing INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
4.40
自引率
17.90%
发文量
72
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信