Cargando…

Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level

Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue...

Descripción completa

Detalles Bibliográficos
Autores principales: McKenzie, Madeleine, Nickerson, Duncan, Ball, Chad G.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: CMA Joule Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8327997/
https://www.ncbi.nlm.nih.gov/pubmed/34105930
http://dx.doi.org/10.1503/cjs.003020
_version_ 1783732222468030464
author McKenzie, Madeleine
Nickerson, Duncan
Ball, Chad G.
author_facet McKenzie, Madeleine
Nickerson, Duncan
Ball, Chad G.
author_sort McKenzie, Madeleine
collection PubMed
description Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact.
format Online
Article
Text
id pubmed-8327997
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher CMA Joule Inc.
record_format MEDLINE/PubMed
spelling pubmed-83279972021-08-08 Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level McKenzie, Madeleine Nickerson, Duncan Ball, Chad G. Can J Surg Discussions in Surgery Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact. CMA Joule Inc. 2021-06 /pmc/articles/PMC8327997/ /pubmed/34105930 http://dx.doi.org/10.1503/cjs.003020 Text en © 2021 CMA Joule Inc. or its licensors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an Open Access article distributed in accordance with the terms of the Creative Commons Attribution (CC BY-NC-ND 4.0) licence, which permits use, distribution and reproduction in any medium, provided that the original publication is properly cited, the use is noncommercial (i.e., research or educational use), and no modifications or adaptations are made. See: https://creativecommons.org/licenses/by-nc-nd/4.0/
spellingShingle Discussions in Surgery
McKenzie, Madeleine
Nickerson, Duncan
Ball, Chad G.
Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title_full Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title_fullStr Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title_full_unstemmed Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title_short Predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
title_sort predatory publishing solicitation: a review of a single surgeon’s inbox and implications for information technology resources at an organizational level
topic Discussions in Surgery
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8327997/
https://www.ncbi.nlm.nih.gov/pubmed/34105930
http://dx.doi.org/10.1503/cjs.003020
work_keys_str_mv AT mckenziemadeleine predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel
AT nickersonduncan predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel
AT ballchadg predatorypublishingsolicitationareviewofasinglesurgeonsinboxandimplicationsforinformationtechnologyresourcesatanorganizationallevel