Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/34439
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Meijer, Albert | en_UK |
dc.contributor.author | Webster, Christopher William | en_UK |
dc.date.accessioned | 2022-06-23T00:09:34Z | - |
dc.date.available | 2022-06-23T00:09:34Z | - |
dc.date.issued | 2022 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/34439 | - |
dc.description.abstract | First paragraph: Many academics will be familiar with the tactics of some of the new ‘predatory journals’ – primarily, unsolicited invitations to publish in the said journal, to sit on the Editorial Board, and increasingly to lead the publication of a special issue, usually because of a topic that the author has previously published on. As editors of Information Polity we get at least two or three of these invitations per week, and sometimes more than one a day. As with all spam, these tactics must work, otherwise they would not be deployed. These journals are usually Open Access with the author paying a publishing fee (article processing charge). Their rapid growth suggests that academics are willing to pay these fees, usually in the region of $1000 per article, in order to get their work published quickly, and sometimes in as little as twenty days. A predatory journal will publish almost anything in return for a fee, and in recent years there has been an explosion in special issues and collections, sometimes with the frequency of such publications outnumbering ‘normal’ or traditional editions. Data on the number of special issues current being published points to an average of at least five per journal in 2020 and rising (Crosetto, 2021). So, what’s the problem, if good quality academic work is being published quickly and is accessible to all? Why do we call them ‘predatory journals’? | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | IOS Press | en_UK |
dc.relation | Meijer A & Webster CW (2022) Predatory journals and the use and abuse of special issues. Information Polity, 27 (2), pp. 119-120. https://doi.org/10.3233/ip-229005 | en_UK |
dc.rights | The publisher does not allow this work to be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study. | en_UK |
dc.rights.uri | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved | en_UK |
dc.subject | Public Administration | en_UK |
dc.subject | Sociology and Political Science | en_UK |
dc.subject | Communication | en_UK |
dc.subject | Information Systems | en_UK |
dc.title | Predatory journals and the use and abuse of special issues | en_UK |
dc.type | Editorial | en_UK |
dc.rights.embargodate | 2999-12-31 | en_UK |
dc.rights.embargoreason | [IP 27.2 Editorial.pdf] The publisher does not allow this work to be made publicly available in this Repository therefore there is an embargo on the full text of the work. | en_UK |
dc.identifier.doi | 10.3233/ip-229005 | en_UK |
dc.citation.jtitle | Information Polity | en_UK |
dc.citation.issn | 1875-8754 | en_UK |
dc.citation.issn | 1570-1255 | en_UK |
dc.citation.volume | 27 | en_UK |
dc.citation.issue | 2 | en_UK |
dc.citation.spage | 119 | en_UK |
dc.citation.epage | 120 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.citation.peerreviewed | Unrefereed | en_UK |
dc.type.status | VoR - Version of Record | en_UK |
dc.author.email | william.webster@stir.ac.uk | en_UK |
dc.citation.date | 06/06/2022 | en_UK |
dc.contributor.affiliation | Utrecht University | en_UK |
dc.contributor.affiliation | Management, Work and Organisation | en_UK |
dc.identifier.isi | WOS:000812890600001 | en_UK |
dc.identifier.wtid | 1823703 | en_UK |
dc.date.accepted | 2022-06-01 | en_UK |
dcterms.dateAccepted | 2022-06-01 | en_UK |
dc.date.filedepositdate | 2022-06-21 | en_UK |
dc.subject.tag | Electronic Public Services | en_UK |
rioxxterms.apc | not required | en_UK |
rioxxterms.type | Journal Article/Review | en_UK |
rioxxterms.version | VoR | en_UK |
local.rioxx.author | Meijer, Albert| | en_UK |
local.rioxx.author | Webster, Christopher William| | en_UK |
local.rioxx.project | Internal Project|University of Stirling|https://isni.org/isni/0000000122484331 | en_UK |
local.rioxx.freetoreaddate | 2272-05-07 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved|| | en_UK |
local.rioxx.filename | IP 27.2 Editorial.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 1875-8754 | en_UK |
Appears in Collections: | Management, Work and Organisation Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IP 27.2 Editorial.pdf | Fulltext - Published Version | 54.42 kB | Adobe PDF | Under Permanent Embargo Request a copy |
This item is protected by original copyright |
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.