An integrated paradigm shift to deal with ‘predatory publishing’

Jaime A. Teixeira da Silva, Mina Moradzadeh, Kwabena Osei Kuffour Adjei, Christopher M. Owusu-Ansah, Mulubrhan Balehegn, Eduardo I. Faúndez, Manthan D. Janodia, Aceil Al-Khatib

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The issue of ‘predatory publishing’, and indeed unscholarly publishing practices, affects all academics and librarians around the globe. However, there are some flaws in arguments and analyses made in several papers published on this topic, in particular those that have relied heavily on the blacklists that were established by Jeffrey Beall. While Beall advanced the discussion on ‘predatory publishing’, relying entirely on his blacklists to assess a journal for publishing a paper is problematic. This is because several of the criteria underlying those blacklists were insufficiently specific, excessively broad, arbitrary with no scientific validation, or incorrect identifiers of predatory behavior. The validity of those criteria has been deconstructed in more detail in this paper. From a total of 55 criteria in Beall's last/latest 2015 set of criteria, we suggest maintaining nine, eliminating 24, and correcting the remaining 22. While recognizing that this exercise involves a measure of subjectivity, it needs to advance in order to arrive – in a future exercise – at a more sensitive set of criteria. Fortified criteria alone, or the use of blacklists and whitelists, cannot combat ‘predatory publishing’, and an overhaul of rewards-based academic publishing is needed, supported by a set of reliable criteria-based guidance system.

Original languageEnglish
Article number102481
JournalJournal of Academic Librarianship
Volume48
Issue number1
DOIs
Publication statusPublished - 01-2022

All Science Journal Classification (ASJC) codes

  • Education
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'An integrated paradigm shift to deal with ‘predatory publishing’'. Together they form a unique fingerprint.

Cite this