Cargando…

Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level

Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue...

Descripción completa

Detalles Bibliográficos
Autores principales: McKenzie, Madeleine, Nickerson, Duncan, Ball, Chad G.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: CMA Joule Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8327997/
https://www.ncbi.nlm.nih.gov/pubmed/34105930
http://dx.doi.org/10.1503/cjs.003020
Descripción
Sumario:Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact.