Abstract
In recent years, scholarly publishing has been faced with many distractive phenomena. Generally, most researchers are unaware of fraudulent practices now common to scholarly publishing and are at risk of becoming a victim of them. Editors also need to have sufficient knowledge about these practices. There are papers that try to increase awareness of authors about fraud in scholarly publishing, but it seems that there is no good academic resource to direct editors. In this paper, we try to present a general guideline for increasing journal quality by discussing the emerging threats to scholarly publishing and methods to avoid being victimized.
Keywords
Academic ethic, Bogus metric, Journal quality, Predatory journals, Scholarly publishing.
...
(ProQuest: ... denotes non-US-ASCII text omitted.)
Introduction
Along with its many advantages, the emerging open-access publishing model has led to problems for scholarly publishing. Some people having only a strict business view of scholarly publishing tend to dismiss academic ethics. They have created predatory journals, hijacked legitimate journal websites, and fashioned bogus metrics in support. Predatory publishers may use the open-access model, have exorbitant page charges, and publish papers with low quality or nonexistent peer review (Nolfi et al., 2015). Like other internet-related swindles involving spam and phishing activities, the phenomenon is relatively new. The "predatory" term was introduced by Jeffrey Beall in 2010 (Beall, 2013), resulting in an academic sub discipline that confronts the problem.
Recent papers warn about predatory publishers and present general criteria for their detection. Some discuss misleading metrics and impact factors and provide lists of known bogus metrics (Jalalian and Mahboobi, 2013; Jalalian, 2013; Gutierrez et al., 2015). Designed to make predatory journals look legitimate, these metrics generally are without merit. The distractive effects on science produced by fake publishers and journals have been studied (Jalalian and Mahboobi, 2014). There have been valuable papers directing authors on writing and selecting suitable journals for publishing manuscripts, but these did not consider emerging issues in scholarly publishing (Huth, 1986; Klingner et al., 2005; Moher, 2010).
Guidelines for Authors
Our inspection of Beall's list of predatory journals (2015b) shows that there were 67 such journals in the field of management alone. These will publish papers without satisfactory review, leading to misleading or bogus advice in management science. Although editors comprise our audience for this paper, we must be concerned with authors as well.
Also, research institutes must include emerging issues in scholarly publishing to their criteria for journal selection when advising the authors they support. Table 1 presents steps that authors should consider before submitting a manuscript.
Guidelines for Editors
In this section, we present general guidelines for increasing journals quality and protecting them against emerging issues in scholarly publishing. Our guidelines are based on Beall's criteria (Beall, 2015a; Dadkhah and Bianciardi; 2016) for predatory journal detection, but we tried to expand them and present some details based on our own observations.
Contact Address and Emails
All journals should provide email addresses or contact forms for author queries. General email addresses are insufficient because authors need to verify that they are dealing with the original website of the journal, not a hijacked one. Authors must be reassured that all editors are real and their target journal does not abuse the names of standout researchers. Without authorization, predatory and hijacked journals sometimes include the names of standout researchers on their editorial boards, being careful to avoid using official email addresses. To prevent spam, some authentic journals do not use official email addresses. We recommend that editors use official email addresses at least for the managing editor or editor in chief. Much spam email can be prevented using an image instead of text for the official email address on the journal website.
Editorial Board Affiliation
Science is becoming so specialized that journals should avoid using only board members from a single country. International advisory members can help to attract and manage papers from their respective countries. In addition to English, various languages might well be represented. Otherwise, a special language editor may be necessary for evaluating technical aspects and checking the possibility of plagiarism.
Call for Papers and Spam Emails
Fraudulent journals commonly send laudatory spam emails to receive papers from researchers. At the very least, sending such calls for papers to prospective authors without their permission is not honorable. With the seemingly exponential growth of fraudulent journals, some researchers may be inundated with such emails. Nonetheless, reputable journals reserve the right to send calls for papers. All journal websites should allow researchers the option to subscribe to newsletters and email lists that send those calls only to those interested.
User-Friendly Websites
At minimum, journal websites should have the following:
1. They should be up to date, with the very latest information.
2. All dead links should be removed.
3. The aim and scope should be on the first page.
4. The name of the editor in chief, ISSN of the journal, current issue number, and impact factor of the journal (for indexed journals) should be on the first page.
5. The list of editorial board members, contact options, and links to published issues must be easily accessible.
6. The submission process must be explained in a detailed set of author's guidelines.
Publication Charges
The business model for fraudulent journals, of course, requires publication charges. In the past, reputable journals, especially those published by scientific societies and well-funded institutions avoided charging for publication. That would have been considered a conflict of interest. Today, with the tremendous growth in public and corporate funding for science, private businesses have gotten involved. That business model includes subscription fees, pay-wall fees, page charges, and open access fees.
Publication fees are different from open access fees. With open access (OA), authors can decide to pay the entire cost of publication, thus making their work free to all in electronic form. Some journals publish all papers in the open access model, with all authors paying the OA fees. In such OA journals, peer review is similar to other reputable journals. On the other hand, fraudulent journals abuse the OA model by publishing papers without adequate peer review. Like many reputable journals, some charge both authors and readers (Beall, 2015a).
Impact Factors and Journal Metrics
The impact factor for evaluating scientific journals was proposed by Dr. Eugene Garfield in 1955. It was adopted by Thomson Reuters and published as the Journal Citation Reports® (Gutierrez et al., 2015). SCImago Journal Rank is another metric that was created by a Spanish research group based on the Scopus database (Jalalian, 2015). Impact factors and the SCImago Journal Rank are metrics that journals use to show their degree of influence in a particular specialty. In recent years, some misleading metrics have arisen. These often use names similar to the original legitimate metrics. The express purpose of these bogus impact factors is to convince authors to submit papers to fraudulent journals (Jalalian and Mahboobi, 2013; Jalalian, 2013; Gutierrez et al., 2015).
Reputable journals with inexperienced editors are at risk of misleading authors by using such phony metrics with reference to their journal. Table 2 shows some common misleading metrics. Editors tempted to use such bogus impact factors as promotional tools face possible boycotts from prominent researchers. Also, bogus metrics seldom have clear ranking methods and thus editors cannot trust the reports concerning their own journals.
Some journals use a self-calculated impact factor. For example, they might calculate their journal impact factor using Google Scholar citation. Or they might create a research ID in Thomson Reuters, subsequently claiming that their journal is indexed in Thomson Reuters research ID. These practices sometimes can lead to journals being classified as predatory.
Special Issues
To increase sales, predatory journals sometimes create special issues for publishing papers that are outside their journals' aim and scope. Normally, the main goal of a special issue is to focus on a particular subject pertinent to the aim and scope of that particular journal. This collects valuable research in one place, whereas a special issue with papers in widely varying subjects can have a negative effect on journal quality.
Author's View for Submitting Papers
Many authors in reputable institutes or universities use special criteria for selecting journals for their papers. Table 2 shows some of the criteria used by expert researchers. Editors should be aware of these criteria for improving their journals.
Emerging Problems Reviewing Papers
With the increase in fraudulent journals, a special problem arises when reviewing papers submitted to your legitimate journal. Many papers use data gathered directly from other publications. If those other publications are fraudulent, then, by association, the paper before you verges on being fraudulent also. You not only have to review the paper at hand, but you have to review its references as well. It might be easy to spot references from previously unknown journals, but hijacked journals present a particularly vexatious problem. References suspected of being from hijacked journals must be tracked down to see if they are associated with a legitimate journal or with a fake website.
Expunging Hijacked Journals
All editors of journals now must be aware of the possibility of being hijacked (Jalalian and Mahboobi, 2014; Dadkhah and Borchardt, 2016). When this happens, your journal will lose some legitimate submissions and your journal's reputation will suffer. Most likely, you will also suffer the legal expense of putting a stop to the infringement. The sooner you find out about such fraudulent misrepresentations, the less the damage will be. Beall now has a list of hijacked journals (Beall, 2016).
Conclusion
In this paper, we presented guidelines for helping journals to improve their quality. Inexperienced editors and those journals just starting out do not have sufficient information about the emerging issues in scholarly publishing. They are particularly at risk of being victims of fraud. Also, without being aware, they actually may become predatory journals themselves. This can happen when editors use bogus metrics that were initially designed to attract authors to publish in predatory journals. As in the case of computer viruses and phishing scams, emerging fraudulent activities require all editors to be cognizant of the threat and willing to confront it.
References
Beall, J. (2013). "Medical Publishing Triage - Chronicling Predatory Open Access Publishers". Annals of Medicine and Surgery, 2(2), 47-49.
Beall, J. (2015a). Criteria for Determining Predatory Open-Access Publishers. [3rd ed], Scholarly Open Access, Available from: https://scholarlyoa.files.wordpress .com/2015/01/criteria-2015.pdf.
Beall, J. (2015b). List of Standalone Journals. Scholarly Open Access, Available from: https://scholarlyoa.com/individual-journals.
Beall, J. (2016). Hijacked Journals. Scholarly Open Access, Available from: https://scholarlyoa.com/other-pages/hijacked-joumals.
Dadkhah, M. & Bianciardi, G. (2016). "Ranking Predatory Journals: Solve the Problem Instead of Removing It!". Advanced Pharmaceutical Bulletin, 6(1), 1-4. DOI: 10.15171/apb.2016.001.
Dadkhah, M. & Borchardt, G. (2016). "Hijacked Journals: An Emerging Challenge for Scholarly Publishing". Aesthetic Surgery Journal. DOI: http://dx.doi.org/10.1093/asj/sjw026.
Gutierrez R.S.; Beall, J. & Forero, D.A. (2015). "Spurious alternative impact factors: The scale of the problem from an academic perspective". BioEssays, 37(5), 474-476. DOI: 10.1002/bies.201500011.
Huth, E.J. (1986). Guidelines on authorship of medical papers. Annals of Internal Medicine, 104(2), 269-274.
Jalalian, M. (2015). "The story of fake impact factor companies and how we detected them". Electronic Physician, 7(2), 1069-1072. DOI: 10.14661/2015.
Jalalian, M. & Mahboobi, H. (2013). "New Corruption Detected: Bogus Impact Factors Compiled by Fake Organizations". Electronic Physician, 5(3), 685-686. DOI: 10.14661/2013.
Jalalian, M., & Mahboobi, H. (2014). "Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?". Walailak Journal of Science and Technology, 11(5), 389-394. DOI: 10.14456/WJST.2014.16.
Klingner J.K.; Scanlo, D. & Pressley, M. (2005). "How to publish in scholarly journals". Educational Researcher, 34(8), 14-20. DOI: 10.3102/0013189X034008014.
Moher, D.; Schulz, K.F. Simera, I. & Altman D.G. (2010). "Guidance for developers of health research reporting guidelines". PLoS Med, 7(2), 1-9. DOI: 10.1371/journal.pmed.1000217.
Nolfi, D.A.; Lockhart, J.S. & Myers C.R. (2015). "Predatory publishing: What you don't know can hurt you". Nurse Educator, 40 (5), 217-219. DOI: 10.1097/NNE.0000000000000179.
Mehdi Dadkhah1*, Glenn Borchardt
1. Information Science Scientist, Isfahan, Iran
2. Progressive Science Institute, Box 5335, Berkeley, CA 94705, USA
(Received: 13 April, 2016; Revised: 19 May, 2016; Accepted: 25 May, 2016)
* Corresponding Author, Email: [email protected]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright University of Tehran, Qom College Summer 2016
Abstract
In recent years, scholarly publishing has been faced with many distractive phenomena. Generally, most researchers are unaware of fraudulent practices now common to scholarly publishing and are at risk of becoming a victim of them. Editors also need to have sufficient knowledge about these practices. There are papers that try to increase awareness of authors about fraud in scholarly publishing, but it seems that there is no good academic resource to direct editors. In this paper, we try to present a general guideline for increasing journal quality by discussing the emerging threats to scholarly publishing and methods to avoid being victimized.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer