In this Clarivate blog post, you will learn how a senior researcher mistakenly submitted his paper to an impostor version of a credible academic journal.
Illustration by David Parkins, from: https://doi.org/10.1038/d41586-019-03759-y
Scammers are everywhere, and unfortunately, academia is not exempt from their presence. Predatory publishers, also known as fraudulent, opportunistic, or pseudo publishers, will masquerade as open access publishers while in fact they are operating on an aggressive, profit-driven business model. They often use deceptive and unethical tactics to attract authors, including fake editorial boards, hidden charges, fabricated impact metrics, and claims of "quick peer review".
The methods that predatory publishers use are sophisticated and constantly evolving, and can cause confusion and skepticism over whether a publication is a legitimate, high-quality product or an outright scam.
Below are tips on identifying and avoiding predatory publishers to empower authors to protect their work and uphold scholarly integrity when publishing open access.
Like other scammers, predatory publishers are constantly revising their phishing strategies so it is vital that you be attentive to warning signs and to do a careful assessment before submitting a publication to a suspicious publisher. If you do inadvertently submit to a predatory publisher, you might lose the opportunity to publish your research in a reputable outlet later, since technically your work will no longer be considered original. You also run the risk of losing all APC charges.
These scams typically start with direct emails, which have become so sophisticated that they can bypass spam filters. They can also look remarkably genuine: scammers will mention some of your previous publications (based on public information in sources such as ORCID or your Google Scholar Profile) and praise your contribution and impact in the field. They may refer to a special issue, track, or series of books that would perfectly match your expertise. Sometimes, the publisher or title will sound familiar, since some scammers mirror the title of known journals and organizations and even use their ISSN and impact metrics. This modality of hijacked or cloned publications makes it even harder for academics to assess whether a publication is legitimate. The URL includes words of the fabricated title but lands on a fake website. In the past, the website might contain typos and have a very simplistic design and little information; however, scammers are improving the look and functionality of their websites to such a degree that even experienced scholars and researchers have been fooled.
There are many types of predatory approaches, but more and more, a combination of the following are present:
While predatory publishers' tactics are constantly evolving, knowing how to identify some common red flags is a good start:
To avoid falling for predatory publishers, the following is recommended: