{"title":"图书馆情报学掠夺性出版物垃圾邮件分析","authors":"B. Lund, Ting Wang","doi":"10.3138/jsp.52.1.03","DOIUrl":null,"url":null,"abstract":"Abstract:Predatory journals pose a significant threat to the quality of scholarly publication across disciplines, including in library and information science (LIS). These publications are known to target researchers in developing countries and researchers for whom English is not their primary language. Such publications threaten the legitimacy of researchers who may already face an uphill battle to establish a name for themselves in their field. How predatory publishers target researchers in LIS through spam invitations is the subject of this study, which partly replicates a 2017 study by Clemons et al., who examined spam invitations in the field of oncology. The data set of the present study consists of ninety-eight spam invitations from predatory publishers received by the two co-authors over a six-week period. Data analysis shows the frequency of problematic elements of content in these invitations.","PeriodicalId":44613,"journal":{"name":"Journal of Scholarly Publishing","volume":"37 1","pages":"35 - 45"},"PeriodicalIF":1.2000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"An Analysis of Spam from Predatory Publications in Library and Information Science\",\"authors\":\"B. Lund, Ting Wang\",\"doi\":\"10.3138/jsp.52.1.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract:Predatory journals pose a significant threat to the quality of scholarly publication across disciplines, including in library and information science (LIS). These publications are known to target researchers in developing countries and researchers for whom English is not their primary language. Such publications threaten the legitimacy of researchers who may already face an uphill battle to establish a name for themselves in their field. How predatory publishers target researchers in LIS through spam invitations is the subject of this study, which partly replicates a 2017 study by Clemons et al., who examined spam invitations in the field of oncology. The data set of the present study consists of ninety-eight spam invitations from predatory publishers received by the two co-authors over a six-week period. Data analysis shows the frequency of problematic elements of content in these invitations.\",\"PeriodicalId\":44613,\"journal\":{\"name\":\"Journal of Scholarly Publishing\",\"volume\":\"37 1\",\"pages\":\"35 - 45\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2020-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Scholarly Publishing\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://doi.org/10.3138/jsp.52.1.03\",\"RegionNum\":4,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"0\",\"JCRName\":\"HUMANITIES, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Scholarly Publishing","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.3138/jsp.52.1.03","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"0","JCRName":"HUMANITIES, MULTIDISCIPLINARY","Score":null,"Total":0}
An Analysis of Spam from Predatory Publications in Library and Information Science
Abstract:Predatory journals pose a significant threat to the quality of scholarly publication across disciplines, including in library and information science (LIS). These publications are known to target researchers in developing countries and researchers for whom English is not their primary language. Such publications threaten the legitimacy of researchers who may already face an uphill battle to establish a name for themselves in their field. How predatory publishers target researchers in LIS through spam invitations is the subject of this study, which partly replicates a 2017 study by Clemons et al., who examined spam invitations in the field of oncology. The data set of the present study consists of ninety-eight spam invitations from predatory publishers received by the two co-authors over a six-week period. Data analysis shows the frequency of problematic elements of content in these invitations.
期刊介绍:
For more than 40 years, the Journal of Scholarly Publishing has been the authoritative voice of academic publishing. The journal combines philosophical analysis with practical advice and aspires to explain, argue, discuss, and question the large collection of new topics that continually arise in the publishing field. JSP has also examined the future of scholarly publishing, scholarship on the web, digitization, copyright, editorial policies, computer applications, marketing, and pricing models. It is the indispensable resource for academics and publishers that addresses the new challenges resulting from changes in technology and funding and from innovations in production and publishing.