Professional Documents
Culture Documents
in high-impact journals), and a high number of citations of her The emails were downloaded as PDF files and stored by the
publications (h-index of 21 in Google Scholar). The second profile researchers in a shared work folder. The content analysis of the
was that of mid-career researcher represented by a professor messages followed a similar process as that conducted by Lund
with 15 years of experience, 11 years from his doctorate, author and Wang (2020): two of the researchers authoring the study
of 15 to 20 articles published in high-impact journals, and an h- analysed the emails composing the study sample successively
index of 18 in Google Scholar. Finally, the third profile was that according to the previously mentioned dimensions, while the
of junior researcher represented by a professor with less than third researcher had to individually review the double analyses of
10 years of experience, 3 years from her doctorate, less than each email and find a solution in case of any divergence between
15 articles published in high-impact journals, and an h-index of the two researchers regarding data collection.
11 in Google Scholar. The data were transferred to three Excel data matrices: the
The second data set resulted from the analysis of various first had the data of all the messages, the second had the data of
dimensions and characteristics of the domains of the predatory the journals and the third had that of the publishers. These matri-
publishers that sent unsolicited emails to the researchers collabo- ces were then exported to the statistical analysis software SPSS
rating in the study. 21 for the data statistical analysis.
TABLE 1 Characteristics of the journals treatment of these three aspects of the emails content,
Total number of journals on PL (title and/or publisher) 97 (69.7%) depending on whether the messages are from legitimate or
potentially predatory journals.
With title included in Beall’s list 21
As far as the impact factor is concerned, 50% of the mes-
With publisher included in Beall’s list 71 sages from potentially predatory journals refer to this, while only
With title included in Cabell’s Predatory Reports 59 12.2% of the emails from legitimate journals refer to it, with the
peculiarity that the reference is very brief and unspecific in more
Total number of journals on VL 23 (16.5%)
than half of the cases of predatory journals, simply stating a num-
Included in JCR master list 6 ber without further explanation. The messages that specify the
Included in SCImago 20 type of metric provide data unrelated to that of the main interna-
tional impact meters, using others, some very confusing, such as:
Included in MIAR 20
scientific journal impact factor; IBI Factor; I2OR Impact factor;
Included in DOAJ 6 SIS Impact factor; AQCJ; ISRA-JIF; PIF; NAAS SCORE. Refer-
Included in ERIH Plus 3 ences to the inclusion of the journals in a scientific database,
index or directory appeared in 55% of the emails of potentially
Included in Dialnet 5
predatory journals and in 18.7% of the legitimate journals, of
Journals that do not appear on either PL or VL 19 (13.6%) which the most cited were Google Scholar, Copernicus, NASA,
Related to the field of education ANED, Cross Ref, and Open J Gate.
As noted, references to the time between the receipt of the
Fully 51 (36.6%)
message and deadline for manuscript submission to the journal is
Partially 35 (25.1%) another noteworthy aspect of the content of the messages, and
Not at all 42 (30.2%) was much more present in messages from predatory journals
(53% against 18.7% for legitimate journals), with a mean of
Multidisciplinary journals 11 (7.9%)
10.4 days, while it was 100 days for legitimate journals. There are
also considerable differences in the manuscript review and publi-
cation periods: 6.2% of emails from legitimate journals refer to
occupying positions in the lower part of its ranking: Q4. Most the duration of the review period (60 days on average), while the
(n = 17) journals indexed in SCImago Journal Rank also appear in percentage rises to 62.9% for potentially predatory journals with
the lower quartile of the said impact index, one in Q1, and one in a mean review period of 7.1 days. The mean number of days for
Q2, both belonging to research areas other than Education. publication from the manuscript acceptance date is 9.7 days in
the case of predatory journals, with no references to this data in
the emails of legitimate journals.
Concordance between the researcher profile
Another analysed dimension is that of publication costs.
and the subject matter of the journals
Regarding this, eight messages from journals (two of which corre-
Focusing on the subject matter of the journals, it should be noted spond to legitimate journals) refer to these fees, with a mean
that 36% of the messages match the recipients’ fields. Con- price of $155, ranging from $66 to $399.
versely, 30.2% of the messages offer publication opportunities in
journals that are not related to the field of research of Education
and, therefore, do not match the research profiles of the recipi-
Publishers sending academic spam
ents of the emails.
The emails containing proposals to publish articles in journals rev-
ealed 37 academic publishers responsible for publications, with
Academic spam content
most (62.1%) included in lists of predatory publishers. Four of
Approximately 90% of the spam is not personalized; hence, these them (18.8%) are included in VL and 10 (27%) are in the grey area
messages are sent indiscriminately, while 10.3% is addressed to a of publishers that do not appear on VL or PL (Table 2).
recipient, and identifies the recipient by their first and last name. Access to the websites of those publishers led to a more pre-
Approximately 22.6% of the messages are signed by a sender or cise analysis of the publication fees, which, as aforementioned,
real person, in most of the cases someone who is introduced as were explicitly stated in 8 of the 97 emails. The article processing
the editor or editorial manager of the journal. charges found in the analysis of the publishers’ websites range
One of the fundamental contents, and which is strongly men- from $34 to $2,779 (Table 2). Several different publishers charge
tioned in the emails, refers to the impact factors of the journals fees that vary according to the level of development of the
and their indexing in databases, indexes or repositories. Secondly, authors’ country, and, in a few cases, to the type of article. In
there are references and allusions to temporal aspects related to these situations, solely rates for developed countries have been
manuscript acceptance and, finally, to the review and publication considered, and the rates for all types of documents have been
period of the articles, with considerable differences in the averaged.
TABLE 2 Characteristics of publishers sending academic spam (n = 37): TABLE 3 Countries where publishers sending academic spam are
their inclusion on PL and VL and their fees registered (n = 37)
Total number of publishers registered on PL 23 (62.1%) Countries where the websites of the 4 VL publishers are
registered
Total number of publishers on VL (OA Scholarly 4 (18.8%)
Publishing Association or COPE) United States 3
Article processing charges Countries where the websites of the 23 PL publishers are
registered
Publishers that do not provide information in emails 5
or on their website United States 7
New Zealand 1
Characteristics of the websites of predatory No data 1
publishers Countries where the websites of the 10 publishers that are
neither PL nor VL are registered
The data on the country where the domain of the identified pub-
lishers is registered indicates a large number within countries United States 4
with a high level of scientific research output (Table 3). Spain 2
Another studied dimension was the age of the publishers’
Nigeria 1
websites, and these results were very striking: the domains of
legitimate publishers were an average of 29.5 years, while this United Kingdom 1
average was only 6 years in the case of predatory journals. Ukraine 1
The security level of the websites of the analysed publishers
India 1
was calculated and established using the portal www.ssllabs.com,
and an SSL server test was run for each case. The result indicated
that three of the four domains of non-predatory publishers had the results. Firstly, the results indicate that among academics in the field
maximum rating of A+, while the other obtained an A. Of the of Social Sciences, and more specifically among researchers in Edu-
domains of the 33 predatory publishers, 45.4% and 33.6% have cation, predatory publishers make extensive use of spam to dissemi-
security levels of A and B, respectively, and 21% have server security nate their products. However, the number of unsolicited emails (0.4
levels lower than B. This means that more than half of the domains per day) is lower than in other academic environments and other
of predatory publishers have poor and unreliable security levels. geographical contexts, which range from 0.2 to 12.5 unsolicited
emails per day, with a mean of 4.5 (Da-Silva et al., 2020). Neverthe-
less, a little more than three-quarters of unsolicited messages from
DISCUSSION AND CONCLUSIONS journals inviting academics in the field of Education to publish are
regarded as predatory, and this is highly revealing of the magnitude
The results of this study should be interpreted considering sev- and severity of the phenomenon.
eral limitations of which the authors are fully aware. The first is One of the main characteristics of predatory journals is their
the sample utilized, because, although the number of emails does poor contribution for strengthening the research profile of those
not differ considerably from those utilized in similar studies, con- who publish in them; therefore, solely 4 of the 139 journals
ducted in other scientific fields, and published in prestigious journals found in the study (one indexed in JCR and three with Q1 and
(Dagens, 2019; Lund & Wang, 2020; Nguyen et al., 2018), a larger Q2 positions in SCIMAGO/SCOPUS) would lead to publications
sample would have conferred greater consistency and robustness to with a positive assessment in accreditation and evaluation pro-
the results. The second limitation is a consequence of current proce- cesses of researchers in our country. In addition, the results
dures for classifying journals as predatory. Without entering the reveal a high percentage of unsolicited emails proposing publica-
debate on the existing lists (Buschman, 2020), the fact is that their tion in journals unrelated to the field of research of the recipients
utilization can generate false positives and negatives (Da-Silva & of the emails. These results are in line with researches conducted
Tsigaris, 2018), requiring some caution when interpreting the data in the field of Biomedical Sciences (Clemons et al., 2017) and
thus obtained; however, these limitations should not undermine our Library Science (Lund & Wang, 2020). Given this low relevance,
and considering that the productivity of academics can be nega- academic libraries; therefore, authors must ensure that they are
tively affected (Da-Silva et al., 2020; Wilkinson et al., 2019), the prepared to work and succeed in this new role.
most appropriate approach is to tackle this type of messages Researchers must acquire skills in what might be called
send by predatory publishers through unsolicited emails or spam. ‘scholarly publishing literacy’ (Zhao, 2014), which involves acquir-
As for the implications of our results, it is worth noting the ing the ability to identify and reject controversial and deceitful
risks that predatory publications and their dissemination using offers from companies related to scientific publications or events.
spam pose both individually for each researcher, and collectively This skill also involves knowing how to identify and submit their
for the disciplinary field of Social Sciences. The first of these dan- work to respected journals, book publishers and conferences in
gers is evident, on the one hand, by the data on the level of secu- their field or area of expertise.
rity of their websites that clearly discourages the utilization of
these websites to make payments of article processing fees, and, ACKNOWLEDGEMENT
on the other hand, by the limited, if not negative, impact of these
publications on the research profile of the authors who publish in Authors would like to thank the Spanish Ministry of Science and
them. The second level of risk, the collective risk, emerges when Innovation, the Spanish State Research Agency and the European
considering that disciplines in the field of Social Sciences and Regional Development Fund (ERDF) for their support and funding
Humanities are founded on more questioned epistemologies the project RTI2018-098314-B-I00. Open access publishing facil-
(Althaus, 2019), and, therefore, more exposed to the risks posed by itated by the University of the Balearic Islands, as part of Willey
predatory publications as disseminating structures to legitimize ide- agreement via the Spanish National Research Council.
ologies (Boukacem-Zeghmouri et al., 2020) or simply to spread
falsehoods or misinformation. In this context, the collected data AUTHOR CONTRIBUTIONS
and the results can help to address this challenge by the implemen-
Jaume Sureda-Negre and Rubén Comas-Forgas: research design
tation of awareness campaigns and training initiatives for promot-
and conceptualization. Jaume Sureda-Negre, Aina Calvo-Sastre
ing consciousness on the issue among academics in Education, and,
and Rubén Comas-Forgas: data extraction, data curation and
consequently, the refusal to submit manuscripts to these publishers
processing. Jaume Sureda-Negre, Aina Calvo-Sastre and Rubén
(Frandsen, 2019). In addition to illustrating the deceptive processes
Comas-Forgas: methodology, writing draft and original version.
utilized by predatory publishers, the collected data also provides a
Jaume Sureda-Negre and Rubén Comas-Forgas: review version
warning list that incorporates the most active predatory journals
and editing.
and publishers in the field of Education, which can be useful to
facilitate this training. Journals in educational sciences are repre-
REFERENCES
sented in the major scientific databases: in SCOPUS, for instance,
Althaus, V. (2019). Le capitalisme à l’assaut des sciences humaines et
in 2020 the number of indexed journals was 1,536 what corre-
sociales: l’exemple des revues payantes en psychologie. Zilsel,
spond to around 4% of the total of journals indexed in this data-
2(6), 9–24. https://doi.org/10.3917/zil.006.0009
base, in the case of Web of Science the percentage is around 2%
Anderson, M. S., Ronning, E. A., De-Vries, R., & Martinson, B. (2007).
and in the DOAJ have a representation of around 9%. Very similar The perverse effects of competition on scientists’ work and rela-
figures are obtained if the presence of educational science journals tionships. Science and Engineering Ethics, 13(4), 437–461. https://
in predatory journals’ databases is analysed; for instance if we use doi.org/10.1007/s11948-007-9042-5
data from Cabells’ Predatory Reports we found that the percentage Bagues, M., Sylos-Labini, M., & Zinovyeva, N. (2019). A walk on the
of these journals is around 4.5% of the total. Somehow, the repre- wild side: ’Predatory’ journals and information asymmetries in sci-
sentation of educational sciences journals in legitimate scientific entific evaluations. Research Policy, 48(2), 462–477. https://doi.
databases and predatory journals lists is quite similar. org/10.1016/j.respol.2018.04.013
Finally, it is important to reflect on the importance of revers- Beall, J. (2012). Predatory publishers are corrupting open access.
ing some of the features of the current research culture’s ecosys- Nature, 489(7415), 179. https://doi.org/10.1038/489179a
tem that has facilitated the emergence and consolidation of Beall, J. (2016). Essential information about predatory publishers and
journals. International Higher Education, 86, 2–3. https://doi.org/
predatory publications. One of these characteristics revolves
10.6017/ihe.2016.86.9358
around the principle of ‘publish or perish’ (Wellcome-Trust, 2020);
Boukacem-Zeghmouri, C., Rakotoary, S., & Bador, P. (2020). La préda-
a culture that constitutes the ideal biotope for the emergence
tion dans le champ de la publication scientifique: un objet de
and development of phenomena such as predatory journals and
recherche révélateur des mutations de la communication
publishers (Cobey et al., 2019; Kurt, 2018). The pressure to pub- scientifique ouverte. HAL Archives.ouvertes, 02941731.
lish affects the quality of research (Anderson et al., 2007; Retrieved from https://bit.ly/2WoY1fS
Fanelli, 2009; Van-Dalen & Henkens, 2012), and is the breeding Brown, H., & Cook, M. (2013). Unscrupulous journal solicitations: What
ground for scientific misconduct. they are, what they do, and how yoy can protect yourself. The Lan-
Research in Education is too crucial to be left in the hands of guage Teacher, 37(3), 48–50. Retrieved from. https://bit.ly/3zXXRdb
greedy and unprofessional open access publishers. The open Buschman, J. (2020). A political sociology of the Beall’s list affair. The
access model based on charging fees for processing articles turns Library Quarterly, 90(3), 298–313. https://doi.org/10.1086/708959
authors into clients, a role previously played primarily by Cabells. (2021). Predatory reports. https://www2.cabells.com/predatory
Callaghan, C. W., & Nicholson, D. (2020). Predatory publishing and listing of scientific journals. Rheumatology International, 37(11),
predatory journals: A critical review and proposed research agenda 1773–1778. https://doi.org/10.1007/s00296-017-3830-2
for higher education. Journal of Further and Higher Education, 44(10), Nguyen, V., Marmor, R., Ramamoorthy, S., Costantini, T.,
1433–1449. https://doi.org/10.1080/0309877X.2019.1695762 Baumgartner, J., Berumen, J., Jacobsen, G. R., & Sicklick, J. K.
Chen, X. (2019). Beall’s list and Cabell’s blacklist: A comparison of (2018). The use of solicited publishing by academic surgeons. Sur-
two lists of predatory OA journal. Serials Review, 45(4), 219–226. gery, 164(2), 212–218. https://doi.org/10.1016/j.surg.2018.01.027
https://doi.org/10.1080/00987913.2019.1694810 Perlin, M., Santos, A., Imasato, T., Borenstein, D., & Da Silva, S.
Clemons, M., Silva, M., Joy, A., Cobey, K., Mazzarello, S., Stober, C., & (2017). The Brazilian scientific output published in journals: A
Hutton, B. (2017). Predatory invitations from journals: More than study based on a large CV database. Journal of Informetrics, 11(1),
just a nuisance? The Oncologist, 22(2), 236–240. https://doi.org/ 18–31. https://doi.org/10.1016/j.joi.2016.10.008
10.1634/theoncologist.2016-0371 Rich, T. (2018). You can trust me: A multimethod analysis of the
Cobey, K., Grudniewicz, A., Lalu, M., Rice, D., Raffoul, H., & Moher, D. Nigerian email scam. Security Journal, 31(1), 208–225. https://doi.
(2019). Knowledge and motivations of researchers publishing in org/10.1057/s41284-017-0095-0
presumed predatory journals: A survey. BMJ Open, 9(3), e026516. Schepers, T., & Rammelt, S. (2019). The burden of predatory journals
https://doi.org/10.1136/bmjopen-2018-026516 and journal request in foot and ankle surgery. Fuß & Sprunggelenk,
Cohen, A., Patino, G., Kamal, P., Ndoye, M., Tresh, A., Mena, J., 17(2), 61–67. https://doi.org/10.1016/j.fuspru.2019.03.001
Butler, C., Washington, S., & Breyer, B. N. (2019). Perspectives Shen, C., & Björk, B. C. (2015). ‘Predatory’ open access: A longitudi-
from authors and editors in the biomedical disciplines on preda- nal study of article volumes and market. BMC Medicine, 13(1),
tory journals: Survey study. Journal of Medical Internet Research, 230. https://doi.org/10.1186/s12916-015-0469-2
21(8), e13769. https://doi.org/10.2196/13769
Silver, A. (2017a). Controversial website that lists “predatory” pub-
Cuschieri, S., & Grech, V. (2018). WASP (write a scientific paper): lishers shuts down. Nature. https://doi.org/10.1038/nature.2017.
Open access unsolicited emails for scholarly work. Young and 21328
senior researchers perspectives. Early Human Development, 122,
Silver, A. (2017b). Pay-to-view blacklist of predatory journals set to
64–66. https://doi.org/10.1016/j.earlhumdev.2018.04.006
launch. Nature. https://doi.org/10.1038/nature.2017.22090
Dagens, D. (2019). 5 predator publishing or fake science? A case
Smith, C., Quan, S. D., Morra, D., Rossos, P. G., Khatibi, H., Lo, V.,
series of 75 unsolicited emails received from “predator journals”.
Wong, H., & Wu, R. C. (2012). Understanding interprofessional
BMJ Evidence-Based Medicine, 24(1), A3–A4. https://doi.org/10.
communication: A content analysis of email communications
1136/bmjebm-2019-EBMLive.5
between doctors and nurses. Applied Clinical Informatics, 3(1), 38–
Da-Silva, J., Al-Khatib, A., & Tsigaris, P. (2020). Spam emails in acade- 51. https://doi.org/10.4338/ACI-2011-11-RA-0067
mia: Issues and costs. Scientometrics, 122(2), 1171–1188. https://
Soler, J., & Cooper, A. (2019). Unexpected emails to submit your
doi.org/10.1007/s11192-019-03315-5
work: Spam or Legitimitate offers? The implications for novice
Da-Silva, J., & Tsigaris, P. (2018). What value do journal whitelists and English L2 writers. Publica, 7(7), 11. https://doi.org/10.3390/
blacklists have in academia? Journal of Academic Librarianship, publications7010007
44(6), 781–792. https://doi.org/10.1016/j.acalib.2018.09.017
Taylor, G. A. (2021). Predatory journals: A different pandemic. Pediat-
European-Commission. (2019). Future of Scholarly Publishing and ric Radiology, 51(4), 516–518. https://doi.org/10.1007/s00247-
Scholarly Communication: Report of the Group to the European 020-04918-4
Commission. Publications Office of the European Union.
Van-Dalen, H., & Henkens, K. (2012). Intended and unintended con-
Retrieved from https://bit.ly/3AV8kY4
sequences of a publish-or-perish culture: A worldwide survey.
Fanelli, D. (2009). How many scientists fabricate and falsify research? Journal of the American Society for Information Science and Technol-
A systematic review and meta-analysis of survey data. PLoS One, ogy, 63(7), 1282–1293. https://doi.org/10.1002/asi.22636
4(5), e5738. https://doi.org/10.1371/journal.pone.0005738
Wahyudi, R. (2017). The generic structure of the call for papers of
Frandsen, T. (2019). Why do researchers decide to publish in ques- predatory journals: A social semiotic perspectives. In P. Mickan &
tionable journals? A review of the literature. Learned Publishing, E. Lopez (Eds.), Text-based research and teaching (pp. 117–136).
32(1), 57–62. https://doi.org/10.1002/leap.1214 Palgrave-Macmillan.
Kurt, S. (2018). Why do authors publish in predatory journals? Learned Wellcome-Trust. (2020). What Researchers Think About the Culture
Publishing, 31(2), 141–147. https://doi.org/10.1002/leap.1150 They Work In. Retrieved from https://bit.ly/3omACHI
Lund, B. D., & Wang, T. (2020). An analysis of spam from predatory Wilkinson, T. A., Russell, C. J., Bennett, W. E., Cheng, E. R., &
publications in library and information science. Journal of Scholarly Carroll, A. E. (2019). A cross-sectional study of predatory publishung
Publishing, 52(1), 35–45. https://doi.org/10.3138/jsp.52.1.03 email received by career development grant awardees. BMJ Open, 9
Machacek, V., & Srholec, M. (2021). Predatory publishing in Scopus: (5), 1–6. https://doi.org/10.1136/bmjopen-2018-027928
Evidence on cross-country differences. Scientometrics, 126(3), Zhao, L. (2014). Riding the wave of open access: Providing library
1897–1921. https://doi.org/10.1007/s11192-020-03852-4 research support for scholarly publishing literacy. Australian Aca-
Misra, D. P., Ravindran, V., Wakhlu, A., Sharma, A., Agarwal, V., & demic and Research Libraries, 45(1), 3–18. https://doi.org/10.
Negi, V. S. (2017). Publishing in black and white: The relevance of 1080/00048623.2014.882873