Cargando…
Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
CMA Joule Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8327997/ https://www.ncbi.nlm.nih.gov/pubmed/34105930 http://dx.doi.org/10.1503/cjs.003020 |
_version_ | 1783732222468030464 |
---|---|
author | McKenzie, Madeleine Nickerson, Duncan Ball, Chad G. |
author_facet | McKenzie, Madeleine Nickerson, Duncan Ball, Chad G. |
author_sort | McKenzie, Madeleine |
collection | PubMed |
description | Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact. |
format | Online Article Text |
id | pubmed-8327997 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | CMA Joule Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-83279972021-08-08 Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level McKenzie, Madeleine Nickerson, Duncan Ball, Chad G. Can J Surg Discussions in Surgery Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact. CMA Joule Inc. 2021-06 /pmc/articles/PMC8327997/ /pubmed/34105930 http://dx.doi.org/10.1503/cjs.003020 Text en © 2021 CMA Joule Inc. or its licensors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an Open Access article distributed in accordance with the terms of the Creative Commons Attribution (CC BY-NC-ND 4.0) licence, which permits use, distribution and reproduction in any medium, provided that the original publication is properly cited, the use is noncommercial (i.e., research or educational use), and no modifications or adaptations are made. See: https://creativecommons.org/licenses/by-nc-nd/4.0/ |
spellingShingle | Discussions in Surgery McKenzie, Madeleine Nickerson, Duncan Ball, Chad G. Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title | Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title_full | Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title_fullStr | Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title_full_unstemmed | Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title_short | Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
title_sort | predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level |
topic | Discussions in Surgery |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8327997/ https://www.ncbi.nlm.nih.gov/pubmed/34105930 http://dx.doi.org/10.1503/cjs.003020 |
work_keys_str_mv | AT mckenziemadeleine predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel AT nickersonduncan predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel AT ballchadg predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel |