Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Correspondence
  • Published:

Predatory journals: fortify the defences

Subjects

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinicius J. Giglio.

Related links

Related links

Related links in Nature Research

https://doi.org/10.1038/543481

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Giglio, V., Luiz, O. Predatory journals: fortify the defences. Nature 544, 416 (2017). https://doi.org/10.1038/544416a

Download citation

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1038/544416a

This article is cited by

Comments

Commenting on this article is now closed.

  1. Peer review: Avoid pseudo review

    The publication contributes often form the basis for research funding and career advancement. Due to the lack of valuable peer review, many researchers publish papers blindly in predatory journals which seriously threatens the quality of scholarship (Predatory journals recruit fake editor; doi:10.1038/543481a; Nature 543, 481-483; 2017; http://www.nature.com/news/.... On the other hand, in order to publish articles in non-predatory high-level journals, some authors who want to avoid the real peer review often recommend their own acquaintances because of the existence of reviewers recommended by authors. Some other authors even use the real names of the reviewers in the process of recommending reviewers, but impersonate the reviewer's e-mail address, which makes the editor think that the article is sent to the real reviewer (https://link.springer.com/a....

    In response to this situation, the review system should be able to get the Reviewer Locator Results from Google or Web of Science. The review system should also be able to verify the information of the recommended expert online, identify the authenticity of the expert, and whether the author has a collaborative relationship with the recommended expert. By reviewing the recommended reviewers, the review system should verify whether the authors recommend peer-related experts directly related to the literature, and whether the authors are willing to accept peer-to-peer evaluations of their own research results.

    Of course, journals can also be based on specific circumstances, to cancel the process of reviewers recommended by authors. BioMed Central (BMC) retracted 43 manus cripts including 41 Chinese authors' in 2015, which was due to the undue influence and harm of the peer review process. Now, BMC has canceled the process of author's advice on the recommendation of reviewers (https://www.washingtonpost.... ).

    In addition, there is a third-party agency that provides details of the counterfeiting of potential peer reviewers for these above papers. The phenomenon has attracted wide attention that the academic papers are written, submitted or reviewed by the third-party agencies. Academic journals should make it clear to authors that it is forbidden to cooperate with the third-party agency to do these counterfeiting behaviors (http://www.cast.org.cn/n350....

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing