Predatory Publishers
- RIT/
- Security/
- Resources/
- Types of Threats/
- Predatory Publishers
Recognize, Respond, Report
Predatory publishers are opportunistic publishing venues that exploit researchers and professors based on their academic requirements to have their work published. Predatory publishing organizations take the author’s money and publish the work without peer review or professional editing, completely diminishing the integrity of the research. As predatory publishers continue to grow in the world of academic publishing it is important to understand the risk associated with these spam attacks.
Recognize
- Be cautious of relatively low article processing charges (APCs).
- Look out for fuzzy, distorted, or unauthorized images on the publisher’s website.
- Requests that an article be submitted via email is often a red flag.
- If a publisher lacks policies regarding retractions, corrections, and plagiarism this is a major red flag.
Respond
- Verify the legitimacy of an organization or conference referenced in an email by researching them online.
- Examine this list of suspected predatory publishers.
Report
- Report any suspected predatory publisher scam to spam@rit.edu.
How a Predatory Publishing Scam Works
The scam works by the predatory publisher claiming to be a legitimate open-access operation and targeting the existing works of researchers and professors. They will make false claims regarding the practices of the organization and proceed to offer submission to the journal for some amount of money. The payment options will often be limited to a credit card or direct wire transfer to the sender of the email.
Check out this infographic (external) for ways to spot predatory publisher scams.