To locate credible, authoritative, and accurate evidence-based information, nurses should search for information in well-established and reputable bibliographic databases such as PubMed/MEDLINE, CINAHL, and Scopus, where journals are selected for inclusion after they are evaluated to ensure they meet quality research and editorial standards. 1 Senders from these "journals" and/or "conferences" attempt to disguise their intent and platforms. As with most things, if it seems too good to be true, it probably is. A further review of those 10 predatory journals revealed that 9 were originally published by a reputable publisher, and followed sound editorial and publishing practices at the time they were indexed, but were subsequently purchased by one of the large predatory publishers.15. 21. Articles consistent with the title and aims of the journal, for example. One important positive indicator is whether a journal is indexed in a major database, such as MEDLINE, CINAHL, or Embase. These and other studies have confirmed that predatory publishing threatens the integrity of nursing research and practice, as well as potentially damaging the reputation of nursing researchers and ultimately resulting in inferior patient care. A clear pattern exists in these definitions: motivation by profit rather than quality scholarship. 2020;52(3):311-9. doi:10.1111/jnu.12557, Oermann MH, Nicoll LH, Chinn PL, et al. ). Main objectives of research open world journals are to help . Zakout YM. Even experienced authors are challenged by the volume and questionable legitimacy of emails from predatory journals. Do not send emails asking for submissions unless it is a targeted email to a specific author because of expertise. I hope that I have been able to shed some light on the confusing topic of predatory journals. Various open access models exist, and the terminology used to describe them can be confusing for those less familiar with disseminating scholarly work in journals. Over the last 10 to 15 years, predatory journals have emerged in all disciplines, including nursing. However, the list created controversy about how journals and publishers were included. Characteristics recorded included the site of origin, presence of grammatical errors, contact information provided, relevance of the invitation to the recipients specialty, as well as whether the sender had already been identified as fraudulent by either Bealls list of potential predatory journals and publishers (beallslist.net) or the CalTech Library list of questionable conferences (https://libguides.caltech.edu/c.php?g=512665&p=3503029). Oermann MH, Nicoll LH, Chinn PL, et al. Because I delete most emails in my junk mail, I have often wondered if I would someday miss a real invitation to publish. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. They serve as a vehicle to share research findings and allow researchers to participate in the scholarly conversation. Rigorous peer-review, one of the hallmarks of reputable scholarly publishing, helps ensure publication of only accurate, well-conducted research. and transmitted securely. However, articles published as open access in a legitimate journal meet editorial and publishing standards including peer review, and the journal is transparent about the fee. The site is secure. No other competing interests declared. Analysis of citation patterns and impact of predatory sources in the nursing literature. Journal/Author Name Estimator (JANE) is another site that potential authors can use to decide on the best fi for their article.10 JANE flag journals that are indexed in Medline or considered to be high-quality open access journals. The email would typically include direct contact information for the editor and information that substantiates the legitimate nature of the journal. This article shares guidance to help nurses effectively appraise information and their sources, distinguish predatory from legitimate journals, and conduct due diligence. Additionally, emails often include grammatical errors, peculiar word choices, exaggerated compliments about your extraordinary work, and lack professional language,5 including the following: Hope this email find you in good spirits! 2015;76(3):132-5. doi:10.5860/crln.76.3.9277, Grudniewicz A, Moher D, Cobey KD, et al. J Nurs Scholarsh. Annette M. Bourgault; Predatory Journals: A Potential Threat to Nursing Practice and Science. PLOS SciComm. He wrote a series of articles profiling different publishers, most of which he classified as predatory. Almost all of the predatory email invitations originated from either fake journals (55.1%) or conference hosts (43.9%). An official website of the United States government. Learn Publ. Combatting Predatory Academic Journals and Conferences. Oermann and colleagues have written extensively on the topic of predatory publishing in nursing. In Google or Google Scholar, if an unfamiliar name of a journal turns up, then conduct due diligence to learn more: Although predatory journals have been in existence for less than 2 decades, they have already caused damage to the scientific literature. N - predatory journals. Look at the Editor and Editorial Board to see if they are nurses and if you recognize any of their affiliations (hospitals, universities). A bibliographic database is a collection of journal abstracts and articles, conference proceedings, books, legal publications, reports, and other types of publications. Pirinea, H., Simunich, T., Wehner, D., & Ashurst, GALLOP. More than just an annoyance, predatory journals are a potential threat to nursing practice and science. Carter-Templeton H. Informatics: protect yourself and the nursing profession from. Articles can be found in a Google and Google Scholar search. 11. Copyright 2022 The Author.
Allison Cowley Omundson, Army Education Centre Aldershot Contact Number, Llandovery Livestock Market Catalogue, University Of Florida Women's Soccer Coach Email, Articles I