There is no single, straightforward method of identifying a predatory journal. The information on this guide is meant to serve as a helpful reference for researchers or librarians attempting to identify a suspicious journal. It is not meant to serve as legal advice. The final decision on where to publish is the responsibility of the researcher.
Predatory journals can have a broad range of different characteristics. Because of this, there is no standard or universal definition for a predatory journal; however, the term generally refers to journals that:
Image by Christel SAGNIEZ from Pixabay
Though every predatory journal is different, many predatory journals tend to share at least a few of the following characteristics. Note that there is no single, straightforward way to identify a predatory journal. Because of this, it's important to consider multiple characteristics when evaluating a journal.
Email: Emails sent by predatory journals tend to have
Helpful Tip: Below is an example of an email from a suspicious journal:
Beware of the following clever tactics:
For additional information on predatory journal emails, you can take a look at my commentary..
Website Integrity: Websites of predatory journals may have
Helpful Tip:Journal websites can sometimes be hijacked by predatory publishers. You can look up who owns a journal website on the Free Whois Domain Lookup tool and Retraction Watch's Hijacked Journal Checker. If you're using the Whois Domain Lookup tool, a few red flags would be journals that have existed for several years being registered recently (e.g., within the past year), the domain's country registration is different from the publisher's location, and/or the publisher's name and contact information are kept anonymous.Also beware of slightly modified URLs (e.g., https://www.nejm.org/ could be modified to the fake URL https://www.ne-jm.org/)
Editorial Board: Editorial board members may
Helpful Tip:When verifying information about editors, do not use the links provided by the journal website. Instead, look up the editors on their institutions' websites (e.g. you can Google "John Doe UW Madison" and see if they appear in the institution's directory).
Policies: The journal may have missing or unclear policies relating to:
Journal Content: The journal may have
Impact Metrics and Indexing: Predatory journals may have
Helpful Tip: Never take a journal's word for their indexing status, as predatory journals will frequently lie about this. The following bullets give you instructions for verifying whether a journal is indexed in a specific database. A journal's inclusion in these databases indicates that the journal has been reviewed and has been deemed to be of acceptable quality.
Note that a journal's inclusion in one of these databases doesn't necessarily mean it isn't predatory. Predatory journals can sometimes find their way into reputed database indices, which is why it's important to look at multiple factors in addition to indexing.
Helpful Tip: Just like indexing, never take a journal's word for their impact metrics, as predatory journals will frequently lie about these. To verify a Journal Impact Factor (JIF), you can click this link for Journal Citation Reports and search for the journal. For resources for other types of journal impact metrics, see the Journal Impact Metrics section of the Impact Metrics guide.
Transparency and Workflow: Predatory journals may have
Publisher Information: Publishers of predatory publishers may
Helpful Tip: To verify a publisher's location, try looking up their address on Google Street view.
You can also check to see if the publisher is a member of one of the following associations, which emphasize ethical publication standards:
Special issues within legitimate journals can also be hijacked by predatory practices. Nature wrote an article highlighting the problem of fraudulent special issues. Below are some tips for identifying suspicious special issues.
When evaluating a special issue proposal:
Note: Journals should not be charging compulsory fees for special issue articles.
Image by Fernando Arcos from Pixabay
There is a new hijacking scam that has targeted Elsevier, Springer Nature, and other major publishers. Hijacking scams operate by creating "clones" of legitimate journal websites to trick researchers. Before submitting an article to any journal, make sure to access the journal website directly, and double check the URL is correct. URLs of clone websites frequently have very minor changes to the URL (e.g., examplejournal.com vs examplejournals.com).
For additional information about the scam, see this article by Retraction Watch.
The following checklists can help you to identify a suspicious journal or conference. The unabridged checklist will be more extensive, while the abridged will just go over the general characteristics to out look for when evaluating a journal.
Click the links below to access/download the checklists.