Affiliation:
1. Central Medical Library, Medical Faculty, Ss Cyril and Methodius University of Skopje, Skopje, Macedonia (the former Yugoslav Republic of)
2. Medical Faculty, Ss Cyril and Methodius University of Skopje, Skopje, Macedonia (the former Yugoslav Republic of)
3. Institute of Social Medicine, Medical Faculty, Ss Cyril and Methodius University of Skopje, Skopje, Macedonia (the former Yugoslav Republic of)
4. Macedonian Academy of Sciences and Arts, Skopje, Macedonia (the former Yugoslav Republic of)
Abstract
Abstract
Introduction and aim: The Internet has enabled an easy method to search through the vast majority of publications and has improved the impact of scholarly journals. However, it can also pose threats to the quality of published articles. New publishers and journals have emerged so-called open-access potential, possible, or probable predatory publishers and journals, and so-called hijacked journals. It was our aim to increase the awareness and warn scholars, especially young researchers, how to recognize these journals and how to avoid submission of their papers to these journals.
Methods: Review and critical analysis of the relevant published literature, Internet sources and personal experience, thoughts, and observations of the authors.
Results: The web blog of Jeffrey Beall, University of Colorado, was greatly consulted. Jeffrey Beall is a Denver academic librarian who regularly maintains two lists: the first one, of potential, possible, or probable predatory publishers and the second one, of potential, possible, or probable predatory standalone journals. Aspects related to this topic presented by other authors have been discussed as well.
Conclusion: Academics should bear in mind how to differentiate between trustworthy and reliable journals and predatory ones, considering: publication ethics, peer-review process, international academic standards, indexing and abstracting, preservation in digital repositories, metrics, sustainability, etc.
Reference47 articles.
1. 1. Elliott C. On predatory publishers: a Q&A With Jeffrey Beall. The chronicle of higher education. 2012 [Internet]. Available from: http://chronicle.com/blogs/brainstorm/on-predatory-publishers-a-qa-with-jeffrey-beall/47667
2. 2. Scholarly Open Access: Critical analysis of scholarly open-access publishing. Available from: https://scholarlyoa.com/page/4/
3. 3. Jallalian M. Academic Journalism, Publication Ethics. Hijacked Journals. Available from: http://www.mehrdadjalalian.com/index.php/updates-of-hijacked-journals
4. 4. Beall J. “Predatory” Open-Access Scholarly Publishers. Charleston Advisor. 2010 (April): 10–7.
5. 5. Lukic T, Blesic I, Basarin B, Ivanovic Bibic L, Milosevic D, Dusan S. Predatory and fake scientific journals/publishers-a global outbreak with rising trend: A review. Geogr Pannonica. 2014; 18(3): 69–81.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献