hli logo
Image from Coce

Predatory Practices in Scholarly Publishing and Knowledge Sharing : Causes and Implications for Scholarship.

By: Contributor(s): Material type: TextTextSeries: ProQuest Ebook Central, ProQuest - Jun-Sept 2022 | Routledge Studies in Education, Neoliberalism, and Marxism SeriesPublisher: Milton : Taylor & Francis Group, 2023Copyright date: ©2024Description: 1 online resource (275 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781000930887
Genre/Form: Additional physical formats: Print version:: Predatory Practices in Scholarly Publishing and Knowledge SharingDDC classification:
  • 23 070.5
Online resources:
Contents:
Cover -- Endorsement Page -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Tables -- List of Contributors -- Foreword -- References -- Chapter 1: New Knowledge Economy and Predatory Practices -- Introduction -- Corporatization of Academia -- The Unholy Trisome -- Scholarly Strands in Predatory Practices Scholarship -- Overview of the Book -- Part I: History, Roots, and Circumstances -- Part II: Discourses, Allures, and Attributes -- Part III: Strategies, Pedagogies, and Responses -- References -- Part I: History, Roots, and Circumstances -- Chapter 2: Predatory Publishers' Spam Emails as a Symptom of the Multiple Vulnerabilities in Academia -- Introduction -- Predatory Publishing and Spam Emails in the Context of Academic Publishing -- Our Study: Corpus Overview -- Structural Topic Modelling (STM) -- Discussion -- Conclusion -- References -- Chapter 3: Exploring the Effects and Roots of Predatory Practices in Science -- Introduction -- Rise of Predation and Its Effects -- Rise of Predatory Publishers -- Impacts of Predatory Publishing -- Submitting Bogus Articles to Predatory Publishers -- Deeper Roots of Scientific Predation -- Conclusion -- Acknowledgement -- References -- Chapter 4: Fake It till You Make It: Predatory Publishing Realties in the Arab World -- Introduction -- Knowledge Production in the Arab World -- The Realities of Predatory Publishing in the Arab World -- Limited Number of Arabic-Medium Journals -- Medium of Instruction and Predatory Publishing -- Institutional Research Requirements and Predatory Publishing -- Challenges with Writing on Local Issues -- Predatory Publishing beyond Predator versus Prey Dichotomy -- Conclusion -- References -- Chapter 5: A Victim's Tale: An Auto-ethnographic Account of a Deceived Conference Delegate -- Introduction.
Why Look Back through an Auto-ethnographic Lens? -- My Story -- Analysis and Discussion -- Performativity Pressures Fuel Fraudulent Practices -- Academic Institutions Fail to Police Predatory Practices -- Academics Need to Know How to Recognise Fraudulent Conferences -- Individuals and Institutions Are Harmed to Varying Degrees -- Predatory Practices Disproportionately Harm Inexperienced Academics -- Conclusion -- References -- Part II: Discourses, Allures, and Attributes -- Chapter 6: Discourse Analysis of Presumed "Predatory" and "Legitimate": Calls for Submissions -- Introduction -- Predatory and Legitimate Academic Practices -- Review of Analyses of Predatory Calls and Other Relevant Studies -- Methods -- Results -- Discourse Community Coverage -- Claims of Legitimacy -- Desirability versus Authority: Fast Turnaround and Rules of Submission -- Discussion and Conclusion -- References -- Chapter 7: Spamvitations : Examining Invitations to Submit Scholarly Work -- Introduction -- Research on Predatory Publishing in Applied Linguistics -- Focus of the Study -- Data and Procedures -- Results -- Prototypical Move Structure of a Solicitation Email from a Reputable Journal -- Move 1: Stating the Purpose -- Move 2: Defining the Scope -- Move 3: Establishing Credentials -- Move 4: Building Rapport -- Spamvitations: The Structure of Emails from Potentially Predatory Publishers -- Move 1: Stating the Purpose -- Move 2: Defining the Scope -- Move 3: Establishing Credentials -- Move 4: Building Rapport -- Move 5: Offering Incentives -- Discussion -- Conclusion -- References -- Chapter 8: Flattery, Flexibility, and Font: How Predatory Journals Solicit Legitimate Scholarship through Direct Email -- Introduction -- Predatory Publishing and Academic Spam -- Investigations of Phishing and Academic Spam -- The Study -- The Research Team and Sample Justification.
Data Collection -- Data Analysis -- Limitations -- Results -- Discussion and Implications -- Conclusion -- References -- Chapter 9: Who Is Hurt by Predatory Conferences? -- Introduction -- Methods -- Results -- Discussion -- Appendix: Countries or Jurisdictions with Highest Participation -- Notes -- References -- Part III: Strategies, Pedagogies, and Responses -- Chapter 10: What Those Responsible for Open Infrastructure in Scholarly Communication Can Do about Possibly Predatory Practices -- Introduction -- Open Journal Systems -- Findings -- Phase One: Sample Study of Journal Elements -- Phase Two: Journals Using OJS in Beall's List and Cabells Predatory Reports -- Phase Three: A Journal Integrity Plan for OJS -- Conclusion -- Acknowledgments -- Notes -- References -- Chapter 11: No More Excuses: Stop the Ridiculous and Humiliating Predatory Publishing Farce Now -- Introduction -- Note on Diction -- How We Got Here -- Remedy Part 1: Put the Worst Predatory Publishers on a Proscribed List -- Remedy Part 2: Disallow Academic Engagements with Them -- Remedy Part 3: Create Our Own Replacement Journals -- Discussion -- References -- Chapter 12: Supporting Graduate Students to Avoid Predatory Publishing and Questionable Conferences -- Introduction -- Conceptual Framing -- Why Students Participate in Predatory Publishing -- Strategies to Support Graduate Students -- Micro-Level Support: Strategies for Students, Graduate Supervisors and Professors -- Meso-Level Support: Strategies for Academic Departments and Other Units on Campus -- Macro-Level Support: Strategies for Educational Institutions -- Mega-Level Support: Strategies for Government, Scholarly Associations, and Other External Organizations -- Conclusions -- References -- Chapter 13: Promoting Awareness, Reflection, and Dialogue to Deter Students' Predatory Publishing -- Introduction.
Developing Academic Literacy in a Community of Practice -- Method -- Findings -- Pedagogical Practices -- Institutional and Educational Policies -- Discussion -- Conclusion -- References -- Chapter 14: Academic Librarians and Pedagogical Approaches to Deterring Predatory Publishing -- Introduction -- Academic Librarians: Their Roles as Faculty, Their Functional Specializations, and Information Literacy Instruction -- Chapter Overview -- Background on Academic Librarians -- Functional Specializations: Scholarly Communications, Subject Liaisons, and Electronic Resources -- Functional Specializations: Information Literacy Instruction for Undergraduate Students and the 'Intersections' -- Functional Specializations: Instruction for Graduate Students -- Observations on the Causes of Unintended Predatory Publishing -- Metacognition, the Need to Read, and Evaluators -- Teaching Authors How to Publish Well and Avoid Predatory Publishers -- Publishing Support Workshop Series -- Avoiding Predatory Publishers and Conferences Workshop -- Consultations with Faculty -- Training for Evaluators -- Reflection on Challenges and Goals -- Other Pedagogical Efforts by Librarians that Mitigate Predatory Publishing -- Think. Check. Submit. and DOAJ -- Conclusion -- Notes -- References -- Part IV: Conclusion -- Chapter 15: Predatory Practices and Scholarly Communication: Future Directions and Orientations -- Introduction -- Implications and Recommendations -- Research and Inquiry -- Policy and Practice -- References -- Index.
Item type: eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Cover -- Endorsement Page -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Tables -- List of Contributors -- Foreword -- References -- Chapter 1: New Knowledge Economy and Predatory Practices -- Introduction -- Corporatization of Academia -- The Unholy Trisome -- Scholarly Strands in Predatory Practices Scholarship -- Overview of the Book -- Part I: History, Roots, and Circumstances -- Part II: Discourses, Allures, and Attributes -- Part III: Strategies, Pedagogies, and Responses -- References -- Part I: History, Roots, and Circumstances -- Chapter 2: Predatory Publishers' Spam Emails as a Symptom of the Multiple Vulnerabilities in Academia -- Introduction -- Predatory Publishing and Spam Emails in the Context of Academic Publishing -- Our Study: Corpus Overview -- Structural Topic Modelling (STM) -- Discussion -- Conclusion -- References -- Chapter 3: Exploring the Effects and Roots of Predatory Practices in Science -- Introduction -- Rise of Predation and Its Effects -- Rise of Predatory Publishers -- Impacts of Predatory Publishing -- Submitting Bogus Articles to Predatory Publishers -- Deeper Roots of Scientific Predation -- Conclusion -- Acknowledgement -- References -- Chapter 4: Fake It till You Make It: Predatory Publishing Realties in the Arab World -- Introduction -- Knowledge Production in the Arab World -- The Realities of Predatory Publishing in the Arab World -- Limited Number of Arabic-Medium Journals -- Medium of Instruction and Predatory Publishing -- Institutional Research Requirements and Predatory Publishing -- Challenges with Writing on Local Issues -- Predatory Publishing beyond Predator versus Prey Dichotomy -- Conclusion -- References -- Chapter 5: A Victim's Tale: An Auto-ethnographic Account of a Deceived Conference Delegate -- Introduction.

Why Look Back through an Auto-ethnographic Lens? -- My Story -- Analysis and Discussion -- Performativity Pressures Fuel Fraudulent Practices -- Academic Institutions Fail to Police Predatory Practices -- Academics Need to Know How to Recognise Fraudulent Conferences -- Individuals and Institutions Are Harmed to Varying Degrees -- Predatory Practices Disproportionately Harm Inexperienced Academics -- Conclusion -- References -- Part II: Discourses, Allures, and Attributes -- Chapter 6: Discourse Analysis of Presumed "Predatory" and "Legitimate": Calls for Submissions -- Introduction -- Predatory and Legitimate Academic Practices -- Review of Analyses of Predatory Calls and Other Relevant Studies -- Methods -- Results -- Discourse Community Coverage -- Claims of Legitimacy -- Desirability versus Authority: Fast Turnaround and Rules of Submission -- Discussion and Conclusion -- References -- Chapter 7: Spamvitations : Examining Invitations to Submit Scholarly Work -- Introduction -- Research on Predatory Publishing in Applied Linguistics -- Focus of the Study -- Data and Procedures -- Results -- Prototypical Move Structure of a Solicitation Email from a Reputable Journal -- Move 1: Stating the Purpose -- Move 2: Defining the Scope -- Move 3: Establishing Credentials -- Move 4: Building Rapport -- Spamvitations: The Structure of Emails from Potentially Predatory Publishers -- Move 1: Stating the Purpose -- Move 2: Defining the Scope -- Move 3: Establishing Credentials -- Move 4: Building Rapport -- Move 5: Offering Incentives -- Discussion -- Conclusion -- References -- Chapter 8: Flattery, Flexibility, and Font: How Predatory Journals Solicit Legitimate Scholarship through Direct Email -- Introduction -- Predatory Publishing and Academic Spam -- Investigations of Phishing and Academic Spam -- The Study -- The Research Team and Sample Justification.

Data Collection -- Data Analysis -- Limitations -- Results -- Discussion and Implications -- Conclusion -- References -- Chapter 9: Who Is Hurt by Predatory Conferences? -- Introduction -- Methods -- Results -- Discussion -- Appendix: Countries or Jurisdictions with Highest Participation -- Notes -- References -- Part III: Strategies, Pedagogies, and Responses -- Chapter 10: What Those Responsible for Open Infrastructure in Scholarly Communication Can Do about Possibly Predatory Practices -- Introduction -- Open Journal Systems -- Findings -- Phase One: Sample Study of Journal Elements -- Phase Two: Journals Using OJS in Beall's List and Cabells Predatory Reports -- Phase Three: A Journal Integrity Plan for OJS -- Conclusion -- Acknowledgments -- Notes -- References -- Chapter 11: No More Excuses: Stop the Ridiculous and Humiliating Predatory Publishing Farce Now -- Introduction -- Note on Diction -- How We Got Here -- Remedy Part 1: Put the Worst Predatory Publishers on a Proscribed List -- Remedy Part 2: Disallow Academic Engagements with Them -- Remedy Part 3: Create Our Own Replacement Journals -- Discussion -- References -- Chapter 12: Supporting Graduate Students to Avoid Predatory Publishing and Questionable Conferences -- Introduction -- Conceptual Framing -- Why Students Participate in Predatory Publishing -- Strategies to Support Graduate Students -- Micro-Level Support: Strategies for Students, Graduate Supervisors and Professors -- Meso-Level Support: Strategies for Academic Departments and Other Units on Campus -- Macro-Level Support: Strategies for Educational Institutions -- Mega-Level Support: Strategies for Government, Scholarly Associations, and Other External Organizations -- Conclusions -- References -- Chapter 13: Promoting Awareness, Reflection, and Dialogue to Deter Students' Predatory Publishing -- Introduction.

Developing Academic Literacy in a Community of Practice -- Method -- Findings -- Pedagogical Practices -- Institutional and Educational Policies -- Discussion -- Conclusion -- References -- Chapter 14: Academic Librarians and Pedagogical Approaches to Deterring Predatory Publishing -- Introduction -- Academic Librarians: Their Roles as Faculty, Their Functional Specializations, and Information Literacy Instruction -- Chapter Overview -- Background on Academic Librarians -- Functional Specializations: Scholarly Communications, Subject Liaisons, and Electronic Resources -- Functional Specializations: Information Literacy Instruction for Undergraduate Students and the 'Intersections' -- Functional Specializations: Instruction for Graduate Students -- Observations on the Causes of Unintended Predatory Publishing -- Metacognition, the Need to Read, and Evaluators -- Teaching Authors How to Publish Well and Avoid Predatory Publishers -- Publishing Support Workshop Series -- Avoiding Predatory Publishers and Conferences Workshop -- Consultations with Faculty -- Training for Evaluators -- Reflection on Challenges and Goals -- Other Pedagogical Efforts by Librarians that Mitigate Predatory Publishing -- Think. Check. Submit. and DOAJ -- Conclusion -- Notes -- References -- Part IV: Conclusion -- Chapter 15: Predatory Practices and Scholarly Communication: Future Directions and Orientations -- Introduction -- Implications and Recommendations -- Research and Inquiry -- Policy and Practice -- References -- Index.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.