|Appears in Collections:||Management, Work and Organisation Journal Articles|
|Peer Review Status:||Unrefereed|
|Title:||Predatory journals and the use and abuse of special issues|
Webster, Christopher William
Sociology and Political Science
|Citation:||Meijer A & Webster CW (2022) Predatory journals and the use and abuse of special issues. Information Polity, 27 (2), pp. 119-120. https://doi.org/10.3233/ip-229005|
|Abstract:||First paragraph: Many academics will be familiar with the tactics of some of the new ‘predatory journals’ – primarily, unsolicited invitations to publish in the said journal, to sit on the Editorial Board, and increasingly to lead the publication of a special issue, usually because of a topic that the author has previously published on. As editors of Information Polity we get at least two or three of these invitations per week, and sometimes more than one a day. As with all spam, these tactics must work, otherwise they would not be deployed. These journals are usually Open Access with the author paying a publishing fee (article processing charge). Their rapid growth suggests that academics are willing to pay these fees, usually in the region of $1000 per article, in order to get their work published quickly, and sometimes in as little as twenty days. A predatory journal will publish almost anything in return for a fee, and in recent years there has been an explosion in special issues and collections, sometimes with the frequency of such publications outnumbering ‘normal’ or traditional editions. Data on the number of special issues current being published points to an average of at least five per journal in 2020 and rising (Crosetto, 2021). So, what’s the problem, if good quality academic work is being published quickly and is accessible to all? Why do we call them ‘predatory journals’?|
|Rights:||The publisher does not allow this work to be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study.|
|IP 27.2 Editorial.pdf||Fulltext - Published Version||54.42 kB||Adobe PDF||Under Permanent Embargo Request a copy|
Note: If any of the files in this item are currently embargoed, you can request a copy directly from the author by clicking the padlock icon above. However, this facility is dependent on the depositor still being contactable at their original email address.
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact email@example.com providing details and we will remove the Work from public display in STORRE and investigate your claim.