In this study, by using Beall’s (Scholarly open-access, 2014; Beall’s list of predatory journals and publishers, 2018) predatory journal lists as well as direct e-mail solicitations from journals, we intentionally submitted a poorly written manuscript to 58 open-access journals using counterfeit names and affiliations. . . . Regarding "positive responses," we point to five common flaws associated with such journals, namely that (1) they lack any interest in the researchers who are submitting manuscripts; (2) they do not judge academic writing in accordance with expected conventions; (3) they appear to be indifferent to scholarship including research design, plagiarism issues, and citation quality; (4) their review process is opaque and overly hasty, and (5) the tone they use in correspondence e-mail messages is highly inappropriate. Based upon the investigation, it is clear that such journals’ primary aim is in securing the article processing fee.
https://doi.org/10.1002/leap.1583
| Research Data Curation and Management Works |
| Digital Curation and Digital Preservation Works |
| Open Access Works |
| Digital Scholarship |