Please use this identifier to cite or link to this item:
Appears in Collections:Management, Work and Organisation Journal Articles
Peer Review Status: Unrefereed
Title: Predatory journals and the use and abuse of special issues
Author(s): Meijer, Albert
Webster, Christopher William
Contact Email:
Keywords: Public Administration
Sociology and Political Science
Information Systems
Issue Date: 2022
Date Deposited: 21-Jun-2022
Citation: Meijer A & Webster CW (2022) Predatory journals and the use and abuse of special issues. Information Polity, 27 (2), pp. 119-120.
Abstract: First paragraph: Many academics will be familiar with the tactics of some of the new ‘predatory journals’ – primarily, unsolicited invitations to publish in the said journal, to sit on the Editorial Board, and increasingly to lead the publication of a special issue, usually because of a topic that the author has previously published on. As editors of Information Polity we get at least two or three of these invitations per week, and sometimes more than one a day. As with all spam, these tactics must work, otherwise they would not be deployed. These journals are usually Open Access with the author paying a publishing fee (article processing charge). Their rapid growth suggests that academics are willing to pay these fees, usually in the region of $1000 per article, in order to get their work published quickly, and sometimes in as little as twenty days. A predatory journal will publish almost anything in return for a fee, and in recent years there has been an explosion in special issues and collections, sometimes with the frequency of such publications outnumbering ‘normal’ or traditional editions. Data on the number of special issues current being published points to an average of at least five per journal in 2020 and rising (Crosetto, 2021). So, what’s the problem, if good quality academic work is being published quickly and is accessible to all? Why do we call them ‘predatory journals’?
DOI Link: 10.3233/ip-229005
Rights: The publisher does not allow this work to be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study.
Licence URL(s):

Files in This Item:
File Description SizeFormat 
IP 27.2 Editorial.pdfFulltext - Published Version54.42 kBAdobe PDFUnder Permanent Embargo    Request a copy

Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.

This item is protected by original copyright

Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.

The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved

If you believe that any material held in STORRE infringes copyright, please contact providing details and we will remove the Work from public display in STORRE and investigate your claim.