Logo-apb
Adv Pharm Bull. 2023;13(4): 627-634.
doi: 10.34172/apb.2023.068
PMID: 38022802
PMCID: PMC10676554
  Abstract View: 1119
  PDF Download: 605

Editorial

A Toolkit for Detecting Fallacious Calls for Papers from Potential Predatory Journals

Mehdi Dadkhah 1,2* ORCID logo, Abdul Majed Raja 3, Aamir Raoof Memon 4, Glenn Borchardt 5 ORCID logo, Prema Nedungadi 6, Khaled Abu-Eteen 7, Raghu Raman 8,9

1 Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
2 Technology forecasting department, SnowaTec Technology center and Innovation Factory, Entekhab Industrial Group, Isfahan, Iran.
3 Data Scientist, Atlassian, Bengaluru, Karnataka, India.
4 Institute for Health and Sport, Victoria University, Melbourne, Australia.
5 Progressive Science Institute, 1966 TICE VALLEY BLVD #172, WALNUT CREEK, CA 94595-2203, USA.
6 Amrita School of Computing, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
7 The Hashemite University, P.O. Box 330127- Zarqa 13115, Jordan.
8 Amrita School of Business, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
9 Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amaravati, Andhra Pradesh, India.
*Corresponding Author: Mehdi Dadkhah, Email: mehdidadkhah@mail.um.ac.ir

Abstract

Purpose: Flattering emails are crucial in tempting authors to submit papers to predatory journals. Although there is ample literature regarding the questionable practices of predatory journals, the nature and detection of spam emails need more attention. Current research provides insight into fallacious calls for papers from potential predatory journals and develops a toolkit in this regard.

Methods: In this study, we analyzed three datasets of calls for papers from potential predatory journals and legitimate journals using a text mining approach and R programming language.

Results: Overall, most potential predatory journals use similar language and templates in their calls for papers. Importantly, these journals praise themselves in glorious terms involving positive words that may be rarely seen in emails from legitimate journals. Based on these findings, we developed a lexicon for detecting unsolicited calls for papers from potential predatory journals.

Conclusion: We conclude that calls for papers from potential predatory journals and legitimate journals are different, and it can help to distinguish them. By providing an educational plan and easily usable tools, we can deal with predatory journals better than previously.

First Name
Last Name
Email Address
Comments
Security code


Abstract View: 1120

Your browser does not support the canvas element.


PDF Download: 605

Your browser does not support the canvas element.

Submitted: 21 Nov 2022
Revision: 27 Dec 2022
Accepted: 20 Jan 2023
ePublished: 23 Jan 2023
EndNote EndNote

(Enw Format - Win & Mac)

BibTeX BibTeX

(Bib Format - Win & Mac)

Bookends Bookends

(Ris Format - Mac only)

EasyBib EasyBib

(Ris Format - Win & Mac)

Medlars Medlars

(Txt Format - Win & Mac)

Mendeley Web Mendeley Web
Mendeley Mendeley

(Ris Format - Win & Mac)

Papers Papers

(Ris Format - Win & Mac)

ProCite ProCite

(Ris Format - Win & Mac)

Reference Manager Reference Manager

(Ris Format - Win only)

Refworks Refworks

(Refworks Format - Win & Mac)

Zotero Zotero

(Ris Format - Firefox Plugin)