How to identify predatory publications | Tools | eSupport for Research | 2022 | Dr. Akash Bhoi
Based on eSupport for Research's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Use UGC CARE’s authenticated Group 1 and Group 2 lists as a starting point to spot clone journals, including highlighted entries.
Briefing
Predatory journals often mimic legitimate titles, but researchers can reduce the risk by cross-checking journal listings across trusted directories—especially UGC CARE’s Group 1 and Group 2 lists—and then verifying indexing claims in major databases. UGC CARE is presented as an authenticated resource site maintained under UGC, designed to help identify questionable or “clone” journals that may exist mainly to extract publication fees.
The core method starts with UGC CARE’s categorization. Group 1 contains journals evaluated through the UGC CARE protocol and listed after meeting the program’s criteria. A key signal for Group 2 is whether the journal is indexed in globally recognized databases such as Web of Science and Scopus (including categories like SCIE, SSCI, and A&HCI). The transcript emphasizes that clone journals may share similar or confusingly close titles with legitimate ones, which can lead authors—especially those unaware—to submit manuscripts to the wrong outlet.
On the UGC CARE site, the transcript describes how clone journals are highlighted (for example, in yellow) within the Group 1 and Group 2 listings. It also notes a practical complication: some clone journals may appear only in print and may not have a functioning website. That makes title matching alone unreliable. The recommended approach is to treat the UGC CARE list as a starting point, then verify the journal’s official website and details before submitting.
Verification is framed as a multi-step cross-check. When a journal claims indexing in Web of Science, the researcher should search the journal in the Web of Science master list and confirm that the listing includes a hyperlink to the journal’s authentic website. The same logic applies to Scopus. For open-access journals, the transcript suggests checking the Directory of Open Access Journals (DOAJ), which also provides links to journal sites. Additional cross-validation can be done through resources like the SHERPA/RoMEO directory to compare publisher policies.
Beyond directory checks, the transcript points to UGC CARE’s resources section, which includes guidance on predatory publishing and a “journal evaluation rubrics” framework. A commonly cited debate—whether to follow Beall’s List blindly—is acknowledged, with the transcript urging researchers to use judgment rather than treat any single list as absolute. The evaluation rubric assigns scores such as good (3), fair (2), and poor (1), based on transparency indicators previously discussed in related guidance: clear journal identity, transparent peer-review process, conflict-of-interest disclosures, revenue model clarity, archive policy, publishing schedule, and fee-related information.
Journals scoring below a threshold can be placed in a “predatory” category, with the possibility of removal if they rectify issues. The takeaway is that avoiding predatory outlets requires active verification—confirming the correct journal identity, checking indexing in trusted databases, and using rubric-based transparency signals—before paying submission or publication fees.
Cornell Notes
UGC CARE provides an authenticated way to identify potentially predatory or “clone” journals by separating journals into Group 1 and Group 2 based on evaluation and indexing signals. Clone journals can share similar titles with legitimate journals, sometimes appearing only in print, so title matching alone is not enough. The transcript recommends cross-checking any journal’s claims by verifying its official website link in Web of Science or Scopus master lists, and using DOAJ or SHERPA/RoMEO for additional confirmation. UGC CARE’s resources also include journal evaluation rubrics that score transparency and publishing practices (good/fair/poor), with low scores indicating higher risk. Researchers should use these tools to decide where to submit rather than relying blindly on any single list.
How does UGC CARE help distinguish legitimate journals from clone or predatory ones?
What’s the difference between UGC CARE Group 1 and Group 2 in the transcript?
What cross-check steps should a researcher take before submitting a manuscript?
Why does the transcript warn against relying only on Beall’s List?
What transparency criteria are used in UGC CARE’s journal evaluation rubrics?
How do rubric scores relate to predatory risk and possible removal from a predatory list?
Review Questions
- When a journal claims indexing in Web of Science, what specific verification step should be performed to confirm the journal’s authenticity?
- What transparency elements (identity, peer review, fees, archiving, etc.) are used to score journals in the UGC CARE rubric framework?
- Why can clone journals still appear in UGC CARE Group 1 or Group 2, and what practical checks help catch them?
Key Points
- 1
Use UGC CARE’s authenticated Group 1 and Group 2 lists as a starting point to spot clone journals, including highlighted entries.
- 2
Do not rely on title similarity alone; some clone journals may exist only in print and may not provide a reliable website.
- 3
Verify indexing claims by checking the journal in Web of Science and confirming the master-list hyperlink to the journal’s official site.
- 4
Cross-check Scopus indexing and, for open-access journals, confirm presence and links in DOAJ.
- 5
Use SHERPA/RoMEO to compare publisher policies as an additional authenticity signal before submitting.
- 6
Apply UGC CARE’s transparency rubric logic: clear journal identity, peer-review transparency, conflict-of-interest statements, revenue model clarity, archive policy, publishing schedule, and fee transparency.
- 7
Treat predatory lists (including Beall’s List) as one input—not a standalone decision rule—and combine them with directory and transparency checks.