Get AI summaries of any video or article — Sign up free
Safeguard Your Research: Avoiding Predatory Journals thumbnail

Safeguard Your Research: Avoiding Predatory Journals

Research and AI·
6 min read

Based on Research and AI's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Predatory journals monetize open access by charging article processing fees without delivering core editorial services such as credible peer review and plagiarism/ethics checks.

Briefing

Predatory journals turn the open-access pay-to-publish model into a money-making scheme by charging article processing fees while skipping the core editorial services researchers rely on—especially peer review and basic quality controls. That combination has career consequences for individual researchers and reputational damage for institutions, because funding and promotion decisions increasingly scrutinize where work was published.

The term “predatory” traces back to 2010, when librarian Jeffrey Beall at the University of Colorado Denver coined it after spotting publishers exploiting open access. Beall’s early work involved compiling lists of suspected predatory publishers, but later efforts to standardize definitions showed that not everyone agreed on what should count. By November 2019, researchers in science and technology formalized a widely cited definition in the Nature-branded “UtoA Declaration”: predatory journals and publishers prioritize self-interest over scholarship, use false or misleading information, deviate from editorial and publication norms, and often rely on aggressive, indiscriminate solicitation.

Breaking that definition into practical terms, predatory publishing is characterized by extortion of article processing charges without delivering the expected work. Legitimate journals typically run peer review to validate findings; predatory outlets often omit it, undermining the scientific system built on expert scrutiny. They also tend to lack copyediting, typesetting, proofreading, plagiarism detection, and other ethical checks (such as verifying originality and ensuring research compliance). Even when articles appear online, weak metadata practices and poor indexing can limit discoverability, reducing visibility, citations, and real academic impact.

Because many of these failures are hard to prove from the outside—predatory journals may claim peer review even when it isn’t real—researchers are advised to treat “signals” as warning lights rather than courtroom evidence. Common red flags include fake or unverifiable editorial boards, fabricated impact factors, incorrect addresses, and false claims of being indexed in Scopus or Web of Science. Other cues are unprofessional websites with spelling and grammar errors, vague transparency about fees and editorial decision-making, and heavy spam solicitation. Some scams push impossible timelines such as publication within 48 hours, and they may misuse terminology—confusing search engines like Google Scholar with true indexing services.

The briefing also distinguishes predatory journals from related misconduct. “Hijack journals” imitate legitimate titles by cloning websites or using URL spoofing and domain hijacking to steal submissions and fees. Other unethical practices—like citation manipulation, citation cartels, excessive self-citation, paper brokerage for authorship, and plagiarism disguised through “tortured phrases”—may aim at prestige or citation metrics rather than direct fee extraction. The key difference is scope: predatory and hijack operations target the entire publication process as a fraudulent business model, while many other abuses affect specific articles or behaviors.

To counter these threats, Scopus relies on journal curation and ongoing re-evaluation. An independent board applies selection criteria (including evidence of peer review, publication regularity, ethics statements, and content quality), while algorithms flag outlier behavior for review. Journals found to no longer meet standards can be discontinued and published on lists of removed titles. For individual researchers, the recommended default is to distrust unsolicited invitations, verify journal legitimacy through reputable indexes, and use structured journal-selection guidance such as Think. Check. Submit. rather than chasing titles based on name recognition alone. The overarching message: understand what “predatory” specifically means, read the warning signals carefully, and choose journals aligned with the research topic and reputable indexing sources.

Cornell Notes

Predatory journals exploit open-access publishing by charging article processing fees while skipping essential editorial and ethical safeguards—most critically peer review and plagiarism/ethics checks. The term gained traction after 2010, and a widely used definition was formalized in the UtoA Declaration (published in Nature in November 2019), describing predatory outlets as prioritizing profit, using misleading information, deviating from editorial norms, and relying on aggressive solicitation. Because proof is often difficult from the outside, researchers should treat warning signals—such as fake editorial boards, fabricated indexing claims, unprofessional websites, and impossible publication timelines—as reasons to investigate further. Scopus counters by curating and re-evaluating journals using an independent board, algorithms, and discontinuation when standards fail. Researchers are urged to avoid responding to unsolicited emails and to select journals through trusted directories and structured checklists like Think. Check. Submit.

What makes a journal “predatory” rather than merely “low quality” or “sloppy”?

Predatory publishing is defined as a fraudulent business model: it prioritizes profit over scholarship and typically charges article processing fees without delivering the services expected from legitimate publishing. The core missing elements include peer review (or any credible expert validation), copyediting/typesetting/proofreading, plagiarism detection, and ethical oversight such as checks for research compliance. The UtoA Declaration’s criteria also emphasize false or misleading information and deviations from standard editorial practices, often paired with aggressive solicitation.

Why is peer review hard to verify directly, and what should researchers do instead?

Predatory journals may claim they perform peer review, but verifying the reality of that process is difficult for outsiders. The guidance therefore shifts to “signals” that warrant deeper investigation: unverifiable or fake editorial boards, fabricated impact factors, incorrect contact details, and false claims of indexing in Scopus or Web of Science. Unprofessional website design, spelling/grammar errors, vague transparency about fees and editorial decisions, and spammy invitations are additional warning lights.

What are common red flags in predatory solicitation emails?

Solicitation emails often look generic or suspicious: vague journal names, flattering personal greetings, and no real connection between the journal’s scope and the researcher’s field. They may reference fake abstracting/indexing services, use unclear sender information (sometimes Gmail addresses), and include impossible promises like publication within 48 hours. The transcript also notes that invitations are highly unlikely for established researchers to receive unless the journal is legitimate and the targeting is appropriate.

How do “hijack journals” differ from predatory journals?

Hijack journals are counterfeit versions of legitimate journals. Scammers clone websites and logos, use URL spoofing (slightly altered domains), or exploit expired domains to redirect submissions and article processing fees to a fake operation. Like predatory journals, the goal is fraudulent profit, but hijack operations mimic a specific real journal’s identity rather than operating under a wholly new brand.

What unethical practices are mentioned that are not primarily about charging fees?

Several abuses aim at prestige or citation metrics instead of direct fee extraction. Examples include excessive publication by editorial board members without proper peer review, citation manipulation (including citation cartels and self-citation strategies), paper brokerage that sells authorship, and plagiarism disguised through translation paraphrases (“tortured phrases”). Special issues with guest editor conflicts of interest and weak peer review are also flagged as misconduct patterns.

What does Scopus do to reduce the risk of predatory journals appearing in its index?

Scopus uses curation and re-evaluation. An independent content selection and advisory board applies criteria such as evidence of peer review, publication regularity, ethics statements, content quality, and journal standing. Journals are also rechecked because some can shift from acceptable to predatory over time. Algorithms monitor for outlier behavior, and journals that fail standards can be discontinued and listed as removed. Scopus also responds to feedback, though proving predatory behavior can require substantial investigation.

Review Questions

  1. Which specific editorial and ethical functions are repeatedly described as missing in predatory publishing, and why do those omissions matter for research validity?
  2. List at least four warning signals from the transcript that should trigger further journal verification before submitting a manuscript.
  3. Explain the difference between predatory journals and hijack journals, using the transcript’s examples of how each scam operates.

Key Points

  1. 1

    Predatory journals monetize open access by charging article processing fees without delivering core editorial services such as credible peer review and plagiarism/ethics checks.

  2. 2

    A widely used definition (UtoA Declaration, published in Nature in November 2019) links predatory publishing to profit-driven motives, misleading information, editorial norm violations, and aggressive solicitation.

  3. 3

    Because direct proof is often difficult, researchers should treat warning signals—fake editorial boards, fabricated indexing claims, unprofessional websites, and impossible timelines—as reasons to investigate further.

  4. 4

    Hijack journals steal submissions by cloning legitimate journal identities through website cloning, URL spoofing, or domain hijacking, then collecting article processing fees.

  5. 5

    Other unethical publishing behaviors (citation cartels, paper brokerage, plagiarism via translation “tortured phrases,” and special-issue conflicts) may target prestige or metrics rather than fee extraction across the whole journal.

  6. 6

    Scopus reduces exposure risk through independent curation, ongoing re-evaluation, algorithmic monitoring for outliers, and discontinuation of journals that no longer meet standards.

  7. 7

    Researchers are advised to avoid responding to unsolicited journal emails by default and to select publication venues using structured guidance (e.g., Think. Check. Submit.) and trusted indexing sources.

Highlights

Predatory publishing is framed as a business model: pay the fee, but skip the safeguards—especially peer review and plagiarism/ethics oversight.
The UtoA Declaration definition emphasizes both operational failures (deviating from editorial norms) and informational tactics (false or misleading claims) alongside aggressive solicitation.
Warning signs include fabricated indexing claims (e.g., Scopus/Web of Science), unverifiable editorial boards, and impossible promises like publication within 48 hours.
Hijack journals operate by cloning legitimate journal identities via spoofed URLs or domain hijacking to capture article processing fees.
Scopus counters with curation plus re-evaluation, including algorithmic detection of outlier behavior and discontinuation when standards fail.

Topics

Mentioned

  • Jeffrey Beall
  • UtoA
  • Scopus
  • Web of Science
  • AI
  • CVS