Donald Stephen (March 2022, Updated July 2023)
Title: Identifying Predatory Journals: A Guide for Academics
Introduction:
Malaysian academics have been significantly affected by the proliferation of “fraudulent journals,” with their work appearing in over 300 such journals as identified by a reputable global citation database used for evaluating tertiary institutions worldwide (MalaysiaNow, 2021). These journals, commonly referred to as “predatory journals,” lack research quality and are known for accepting manuscripts without proper review in exchange for a fee. They aggressively pursue articles for publication, prioritizing financial gain over scholarly integrity by neglecting promised quality checks for plagiarism and ethical approval. Predatory journals exhibit various characteristics, including the dissemination of false or misleading information, lack of sound editorial and publication practices, absence of transparency, and adoption of aggressive and indiscriminate solicitation practices. Unfortunately, it is not only naive readers who suffer the consequences. Many researchers have fallen victim to these predatory journals, putting their work at risk of being overlooked (Elmore & Weston, 2020). This article aims to provide guidance on recognizing and identifying predatory journals.
Identifying Predatory Journals:
Check for Quality:
When assessing a journal, examine the quality of its content, research, and copy editing. Legitimate journals should have the following elements on their website: a clearly defined scope, an editorial board with contact information, a description of the review process and policies, and transparency regarding article processing fees (APCs).
Investigate the Editorial Board:
Be cautious if the members of the editorial board are unqualified in their respective fields. Also, if different journals from the same publisher have identical editorial boards, it raises suspicions. Predatory journals may invite well-known academics to join their boards to give an appearance of legitimacy. They may even add academics to editorial boards without their consent or prevent them from resigning.
Watch for Solicitation Attempts:
Predatory journals often aggressively request manuscripts from academics through spam emails or flattering invitations. Be cautious if the email address belongs to unprofessional domains like gmail.com or yahoo.com. Legitimate journals typically do not market themselves directly to potential authors. Moreover, be wary if a journal agrees to publish your paper before conducting a review, as this is an indication of predatory practices.
Beware of Bogus Peer-Review Claims:
Do not be swayed by claims that a journal is peer-reviewed, as almost all predatory journals make this assertion. Be skeptical if the peer review process is completed unusually quickly, as legitimate peer review typically takes a longer time. Additionally, some predatory journals may ask you to join their editorial team, allowing authors to review their own work or involve friends and family in the review process under pseudonyms.
Check Impact Factors:
Exercise caution with journals that cite dubious impact factors like the GIF (Global Impact Factor), Index Copernicus Value, Citefactor, or the UIF (Universal Impact Factor). Some journals falsify legitimate impact factors to appear more reputable.
Verify Indexing:
Beware of journals that claim to be indexed in popular databases like WoS and Scopus without proper verification. Some predatory journals falsely state their indexing status or use discontinued/retracted indexing claims. It is advisable to check the indexing status of a journal before submitting your work.
Avoid Conferences for Publication:
While conferences are valuable for networking, they are not ideal platforms for publication. Do not rely on conference organizers to help publish your papers. Many conferences mention the possibility of publishing in Scopus indexed journals or proceedings, but it is often unreliable. Some conferences partner with predatory journals for profit, so be cautious not to waste your resources on such conferences. Before submitting your work to a conference, please check the credibility of the conference.Â
Tools to Avoid Predatory Journals:
Beall’s List:
Check if the journal is listed in Beall’s list of predatory journals/publishers. Beall’s list was compiled by librarian Jeffrey Beall, who used various criteria to identify predatory open-access publishers. Jeffrey Beall took down the original list; however, the content has been adopted and is utilised on this website, which also updates the list periodically.
Beware of Hijacked Journals:
Hijacked journals are fraudulent websites that impersonate legitimate scholarly journal websites. These websites solicit manuscripts and pocket the submission fees. An archive of hijacked journals can be found online.
Think Check Submit:
Utilize the Think. Check. Submit. initiative, an international cross-sector program that assists researchers in identifying reputable journals and publishers. This program aims to educate researchers, promote integrity, and enhance trust in reliable research and publications.
Visit The Malaysian Citation and Infometrics Division -MOHE Website
Consider publishing your research in local Malaysian journals if it is relevant to local audiences. The Ministry of Higher Education (MOHE) provides a list of Malaysian journals indexed by Web of Science / ECSI and/or Scopus. Additionally, the Malaysian Citation Index (MyCite) contains over 95,000 articles from Malaysian scholarly journals. Publishers are considered for MyCite indexation if they meet the listed criteria. Note that some journals indexed in MyCite may not be indexed in Scopus due to their novelty.
Conclusion:
In conclusion, although there is no foolproof method for identifying predatory journals, researchers can take measures to minimize the risk of publishing in such outlets. Conducting thorough investigations is crucial, encompassing assessments of a journal’s quality, editorial board, solicitation practices, peer-review claims, impact factors, and indexing status. Utilizing resources such as Beall’s list, maintaining vigilance against hijacked journals, following the guidelines provided by Think Check Submit, and considering local publication options can all contribute to making informed decisions.
It is important to note that fulfilling one or more of the mentioned criteria does not automatically classify a journal as predatory. While predatory journals exhibit certain characteristics, it is essential to exercise discernment and consider other factors before making a judgment. Even newly-established journals can be reputable and offer valuable platforms for publication, provided they uphold rigorous scholarly standards.
References
Elmore, S. A., & Weston, E. H. (2020). Predatory journals: What they are and how to avoid them. Toxicologic Pathology, 48(4), 607–610. https://doi.org/10.1177/0192623320920209
MalaysiaNow. (2021, February 14). Malaysian academics among the top in ‘fraudulent’ publications found in global database. Retrieved from https://www.malaysianow.com/news/2021/02/14/malaysian-journals-among-top-fraudulent-publications-found-in-global-academic-database/
Sabel, B.A., Seifert, R. How criminal science publishing gangs damage the genesis of knowledge and technology—a call to action to restore trust. Naunyn-Schmiedeberg’s Arch Pharmacol 394, 2147–2151 (2021). https://doi.org/10.1007/s00210-021-02158-3