Presentation given at the Library Research Forum, La Trobe University, 25 October 2013. Discusses issues with predatory publishers and what to check. Discusses open access publishing in an institutional digital repository
What is meant by ‘predatory publisher’? Who is preyed on and by whom? What are the consequences of this publishing phenomenon? The Director of the US ISSN Center will draw on the experience of the ISSN Network and National Library of Medicine (NLM) to explore these issues. Criteria for inclusion in NLM’s indexes and the Directory of Open Access Journals (DOAJ), as well as criteria for denying or revoking an ISSN, will be outlined. Statistics on the ubiquity and longevity of these publications, their impact on ISSN and NLM, and the role of librarians will be discussed.
There are currently approximately 28,000 journals publishing 1.5 million papers annually. Although the majority of new journals are legitimate, the credentials of some are questionable. Such journals and publishers are referred to as 'predatory'. They commonly send spam emails to potential authors, solicit submissions and request payment of article processing charges, but lack academic rigour or credibility. This presentation will look at examples of publishers, publications and provide practical tips to identify and avoid predatory publishers.
Predatory publishing: what it is and how to avoid itUQSCADS
There are currently approximately 28,000 journals publishing 1.5 million papers annually. Although the majority of new journals are legitimate, the credentials of some are questionable. Such journals and publishers are referred to as 'predatory'. They commonly send spam emails to potential authors, solicit submissions and request payment of article processing charges, but lack academic rigor or credibility.
This presentation provides researchers with
an insight into predatory behaviors and and how they can avoid them.
Lars Bjørnshauge's presentation to the National Scholarly Editor's Forum of South Africa, Cape Town, 30th July 2014. Questionable publishing practices are not a phenomenon limited to open access publishers. In this presentation, Lars explores the phenomenon of questionable publishing practices, sometimes referred to as predatory publishers. The slides explore some thoughts on guidelines for transparency and what DOAJ is doing in this area. It includes tips on how to spot a questionable publisher in 5 minutes!
Open Access: Identifying Quality Journals & Avoiding Predatory Publishersciakov
Slideshow for presentation on open access. Topics include defining Gold OA (APCs, business models, subsidies), OA citation advantage, predatory publishers, whitelists/blacklists.
Predatory publishers aim to exploit the open-access model by publishing counterfeit journals and charging publication fees without providing proper editorial and publishing services. They often target inexperienced researchers. Jeffrey Beall, who coined the term "predatory open access publishing," warns that these publishers use deception to appear legitimate and entrap researchers into submitting work and paying fees. The number of predatory publishers has grown rapidly since 2011. Researchers should carefully vet journals and publishers to avoid predatory practices by checking for full contact details, legitimate editorial boards, transparent fee policies, and signs the operation may intend to deceive authors.
This document discusses predatory publishing and provides context and examples. It begins by defining predatory publishing as journals that exploit the open-access model by publishing counterfeit journals and lacking transparency. It then discusses the history, including librarian Jeffrey Beall first noticing spam solicitations in 2009 and coining the term "predatory publisher" in 2010. Examples of predatory journals, bogus metrics, and questionable peer review processes are shown. Finally, it discusses initiatives like Think Check Submit that provide checklists to help researchers identify trusted journals and avoid predatory publishers.
This document discusses Creative Commons and its role in scholarly publishing. It begins by providing background on copyright and how the current system may hinder sharing of information. It then introduces Creative Commons as a way for authors to choose how their work can be shared and used while still retaining certain protections. The document notes how Creative Commons licenses could help address issues in scholarly publishing around rising subscription costs and lack of publishing outlets. It suggests authors negotiate with publishers to retain certain rights to their work and then use Creative Commons to facilitate greater sharing and reuse. Overall, the document argues Creative Commons is a good fit within scholarly publishing and can help alleviate sustainability problems if adopted more widely.
What is meant by ‘predatory publisher’? Who is preyed on and by whom? What are the consequences of this publishing phenomenon? The Director of the US ISSN Center will draw on the experience of the ISSN Network and National Library of Medicine (NLM) to explore these issues. Criteria for inclusion in NLM’s indexes and the Directory of Open Access Journals (DOAJ), as well as criteria for denying or revoking an ISSN, will be outlined. Statistics on the ubiquity and longevity of these publications, their impact on ISSN and NLM, and the role of librarians will be discussed.
There are currently approximately 28,000 journals publishing 1.5 million papers annually. Although the majority of new journals are legitimate, the credentials of some are questionable. Such journals and publishers are referred to as 'predatory'. They commonly send spam emails to potential authors, solicit submissions and request payment of article processing charges, but lack academic rigour or credibility. This presentation will look at examples of publishers, publications and provide practical tips to identify and avoid predatory publishers.
Predatory publishing: what it is and how to avoid itUQSCADS
There are currently approximately 28,000 journals publishing 1.5 million papers annually. Although the majority of new journals are legitimate, the credentials of some are questionable. Such journals and publishers are referred to as 'predatory'. They commonly send spam emails to potential authors, solicit submissions and request payment of article processing charges, but lack academic rigor or credibility.
This presentation provides researchers with
an insight into predatory behaviors and and how they can avoid them.
Lars Bjørnshauge's presentation to the National Scholarly Editor's Forum of South Africa, Cape Town, 30th July 2014. Questionable publishing practices are not a phenomenon limited to open access publishers. In this presentation, Lars explores the phenomenon of questionable publishing practices, sometimes referred to as predatory publishers. The slides explore some thoughts on guidelines for transparency and what DOAJ is doing in this area. It includes tips on how to spot a questionable publisher in 5 minutes!
Open Access: Identifying Quality Journals & Avoiding Predatory Publishersciakov
Slideshow for presentation on open access. Topics include defining Gold OA (APCs, business models, subsidies), OA citation advantage, predatory publishers, whitelists/blacklists.
Predatory publishers aim to exploit the open-access model by publishing counterfeit journals and charging publication fees without providing proper editorial and publishing services. They often target inexperienced researchers. Jeffrey Beall, who coined the term "predatory open access publishing," warns that these publishers use deception to appear legitimate and entrap researchers into submitting work and paying fees. The number of predatory publishers has grown rapidly since 2011. Researchers should carefully vet journals and publishers to avoid predatory practices by checking for full contact details, legitimate editorial boards, transparent fee policies, and signs the operation may intend to deceive authors.
This document discusses predatory publishing and provides context and examples. It begins by defining predatory publishing as journals that exploit the open-access model by publishing counterfeit journals and lacking transparency. It then discusses the history, including librarian Jeffrey Beall first noticing spam solicitations in 2009 and coining the term "predatory publisher" in 2010. Examples of predatory journals, bogus metrics, and questionable peer review processes are shown. Finally, it discusses initiatives like Think Check Submit that provide checklists to help researchers identify trusted journals and avoid predatory publishers.
This document discusses Creative Commons and its role in scholarly publishing. It begins by providing background on copyright and how the current system may hinder sharing of information. It then introduces Creative Commons as a way for authors to choose how their work can be shared and used while still retaining certain protections. The document notes how Creative Commons licenses could help address issues in scholarly publishing around rising subscription costs and lack of publishing outlets. It suggests authors negotiate with publishers to retain certain rights to their work and then use Creative Commons to facilitate greater sharing and reuse. Overall, the document argues Creative Commons is a good fit within scholarly publishing and can help alleviate sustainability problems if adopted more widely.
This document discusses predatory publishing, which involves dishonest publishers exploiting the open-access model by publishing counterfeit journals to dupe researchers into paying publication fees without providing expected services like peer review or visibility. It provides tips to help researchers identify predatory publishers, such as checking tools like Beall's list or asking colleagues about journal quality and impact. Various types of deceptive publishing practices are described, and criteria for evaluating publishers' legitimacy are outlined.
A presentation on predatory publishing, in the Information Interventions series, sponsored by the LACUNY Scholarly Communications Roundtable , the CUNY Office of Library Services, and Just Publics @ 365.
It is critical to understand the history and background of predatory publishing, a fairly recent phenomenon, whether you are an author or a librarian called upon to assess a publisher. This talk addresses the politics of Gold Open Access, the Bohannon "sting," and the issue of "third world-ism." Red herrings of predatory publishers are an especially useful aspect of this presentation.
Predatory publishing is a relatively recent phenomenon that seems to be exploiting some key features of the open access publishing model, sustained by collecting APCs that are far less than those found in legitimate open access journals. This CME aims to introduce to the participants on the phenomenon of predatory journals, why they continue to thrive, characteristics that are suggestive of a predatory journal, and how one can take step to minimize the risk of faling into predatory journal publication
Predatory journals: Why you should not publish your manuscript in a predatory journal, and how to spot a predatory journal. Visit here: https://bit.ly/2wKX7tr
This document discusses predatory publishing and provides tips to help researchers avoid predatory journals. It notes that gold open access models have allowed corrupt publishers to flourish by only charging publication fees after acceptance. It outlines characteristics of predatory publishers like using similar names to reputable journals, having grammatical errors on their websites, no legitimate peer-review processes, and charging high author fees after publication. The document provides advice on how to check publishers and journals, such as looking for valid contact details, reviewing previous papers, and checking peer-review processes. It also suggests using a university repository as an alternative open access option without fees.
Journals, Open Access and Predators: Mentoring Junior Colleagues through the ...Dan Stafford
This document discusses university expectations for tenure, including publishing in respected journals and demonstrating expertise in one's teaching areas. It notes the types of publications valued for tenure (e.g. journal articles, books). It also discusses ensuring publication venues maintain quality standards, and warns about "predatory" open access journals and publishers that use deceptive practices. Faculty are advised to carefully evaluate journals and publishers to avoid being taken advantage of.
- what is open access, how do you participate in open access and why is it important to researchers.
-Tools and tips for publishing in open access : DOAJ, Think.check.Submit. , Beall's list etc.
This document discusses how to identify and avoid "predatory journals" that charge publication fees but provide minimal peer review services. It provides guidance from Tufts University, the British Medical Journal, and the London School of Hygiene & Tropical Medicine on evaluating journals. Key recommendations include checking if a journal is listed on the Directory of Open Access Journals or indexed in databases, whether the publisher belongs to organizations like OASPA that promote standards, and ensuring the editorial board consists of recognizable experts in the field. Visitors to a journal's website should look for signs of professionalism and transparency regarding practices and fees.
The document discusses arguments for and against open access publishing. Supporters argue that self-archiving models are available when funds run out for paid models, and that increased visibility and citation rates result from open access. Reputable open access publishers and journals exist, and contents are indexed in directories. Peer review still occurs and does not ensure quality alone. Permissions allow commercial use which can benefit all. Legal concerns still apply but open access makes plagiarism easier to detect. Opponents counter that fully funding author-pays models may not be possible or fair, and that high impact journals are not always compliant. Reputation and findability could decrease but directories help visibility. They also argue quality may decline without peer review and
This document summarizes scholarly communication and e-journals. It defines scholarly communication as the process by which academic content is generated, reviewed, disseminated and built upon. E-journals are described as journals available electronically over the internet or on CD-ROM. The benefits of e-journals include speed of publication and distribution, unlimited access, portability, and ability to link to other resources. E-journals are now overtaking print journals due to factors like cost reductions and user expectations changing with technology. However, issues still include the exponential rise in prices of some journals and licensing restrictions on electronic access.
Predatory journals aggressively market themselves and promise quick publication for a fee without providing proper editorial or publishing services. Their main goal is financial gain rather than communicating science. They take advantage of researchers in developing countries and the focus on quantity over quality of publications. Features of predatory journals include lack of contact information, broad topics to attract articles, and claims of being leading publishers without following standard practices. The rise of these journals is fueled by academic performance indicators, focus on quantity, and lack of oversight in scholarly publishing. Researchers must carefully check for journals on blacklists and follow transparency of peer review processes to avoid being preyed upon by predatory journals.
Scholarly Communications in Global PerspectiveNina Collins
Emerging scholars are often unprepared to navigate the changing landscape of scholarly publishing. Learn about author's rights and the importance of strategic publishing, including techniques to identify unethical scholarly publishers.
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work LegallyErin Owens
The document discusses various platforms for sharing scholarly work, including disciplinary repositories, institutional repositories, and scholarly collaborative networks. It outlines recent lawsuits against SciHub and restrictions placed on ResearchGate by publishers. Key challenges addressed are determining author rights based on publishing contracts and balancing open access with publisher business models. The presentation provides guidance on legally sharing work through repositories, negotiating publishing agreements, and avoiding problematic sites like SciHub. It emphasizes working with libraries for assistance navigating author rights and sharing options.
Fake Journals and Conferences: What to Know about the FauxJill Cirasella
As a researcher, you are eager to publish your work in journals and present at conferences. But don’t let your eagerness allow you to be fooled by fake (often called “predatory”) journals or conferences. These low-quality outlets exist for the sole purpose of profit, not for the dissemination of peer-reviewed research. Indeed, they frequently lie about their peer review practices and engage in other forms of deceit. Learn how to spot these bad actors and critically evaluate any journal or conference before submitting a paper or proposal.
Predatory journals actively solicit manuscripts from researchers but lack proper peer review and editorial boards. They often publish low-quality papers solely to charge publication fees without providing legitimate scholarly services. Researchers should be wary of these journals as publishing in them can corrupt the academic literature and mislead others about the quality of their work. Various studies have exposed predatory journals by getting computer-generated nonsense papers and unqualified scientists accepted. Scholars can check for warning signs like missing or fake editorial boards, poor website quality, and surprise article fees to identify potentially predatory journals.
El acceso abierto y las revistas depredadoras: un paso adelante y dos pasos h...Journals Authors
Jeffrey Beall, retirado de la University of Colorado, Denver, Estados Unidos. Conferencia presentada en el 4.° Encuentro Regional de Editores de Revistas Académicas 2019. Journals & Authors, Medellín - Colombia.
This document summarizes a digital natives seminar about open access publishing and predatory journals. It discusses rising journal prices, copyright issues for faculty publishing work, different types of open access like gold and green open access. It describes benefits and issues with open access like identifying predatory journals. It provides resources for evaluating journals and understanding publisher policies on self-archiving. It introduces the institutional repository Constellation that Benedictine University uses to provide open access to scholarly works.
This document discusses predatory publishing, which involves dishonest publishers exploiting the open-access model by publishing counterfeit journals to dupe researchers into paying publication fees without providing expected services like peer review or visibility. It provides tips to help researchers identify predatory publishers, such as checking tools like Beall's list or asking colleagues about journal quality and impact. Various types of deceptive publishing practices are described, and criteria for evaluating publishers' legitimacy are outlined.
A presentation on predatory publishing, in the Information Interventions series, sponsored by the LACUNY Scholarly Communications Roundtable , the CUNY Office of Library Services, and Just Publics @ 365.
It is critical to understand the history and background of predatory publishing, a fairly recent phenomenon, whether you are an author or a librarian called upon to assess a publisher. This talk addresses the politics of Gold Open Access, the Bohannon "sting," and the issue of "third world-ism." Red herrings of predatory publishers are an especially useful aspect of this presentation.
Predatory publishing is a relatively recent phenomenon that seems to be exploiting some key features of the open access publishing model, sustained by collecting APCs that are far less than those found in legitimate open access journals. This CME aims to introduce to the participants on the phenomenon of predatory journals, why they continue to thrive, characteristics that are suggestive of a predatory journal, and how one can take step to minimize the risk of faling into predatory journal publication
Predatory journals: Why you should not publish your manuscript in a predatory journal, and how to spot a predatory journal. Visit here: https://bit.ly/2wKX7tr
This document discusses predatory publishing and provides tips to help researchers avoid predatory journals. It notes that gold open access models have allowed corrupt publishers to flourish by only charging publication fees after acceptance. It outlines characteristics of predatory publishers like using similar names to reputable journals, having grammatical errors on their websites, no legitimate peer-review processes, and charging high author fees after publication. The document provides advice on how to check publishers and journals, such as looking for valid contact details, reviewing previous papers, and checking peer-review processes. It also suggests using a university repository as an alternative open access option without fees.
Journals, Open Access and Predators: Mentoring Junior Colleagues through the ...Dan Stafford
This document discusses university expectations for tenure, including publishing in respected journals and demonstrating expertise in one's teaching areas. It notes the types of publications valued for tenure (e.g. journal articles, books). It also discusses ensuring publication venues maintain quality standards, and warns about "predatory" open access journals and publishers that use deceptive practices. Faculty are advised to carefully evaluate journals and publishers to avoid being taken advantage of.
- what is open access, how do you participate in open access and why is it important to researchers.
-Tools and tips for publishing in open access : DOAJ, Think.check.Submit. , Beall's list etc.
This document discusses how to identify and avoid "predatory journals" that charge publication fees but provide minimal peer review services. It provides guidance from Tufts University, the British Medical Journal, and the London School of Hygiene & Tropical Medicine on evaluating journals. Key recommendations include checking if a journal is listed on the Directory of Open Access Journals or indexed in databases, whether the publisher belongs to organizations like OASPA that promote standards, and ensuring the editorial board consists of recognizable experts in the field. Visitors to a journal's website should look for signs of professionalism and transparency regarding practices and fees.
The document discusses arguments for and against open access publishing. Supporters argue that self-archiving models are available when funds run out for paid models, and that increased visibility and citation rates result from open access. Reputable open access publishers and journals exist, and contents are indexed in directories. Peer review still occurs and does not ensure quality alone. Permissions allow commercial use which can benefit all. Legal concerns still apply but open access makes plagiarism easier to detect. Opponents counter that fully funding author-pays models may not be possible or fair, and that high impact journals are not always compliant. Reputation and findability could decrease but directories help visibility. They also argue quality may decline without peer review and
This document summarizes scholarly communication and e-journals. It defines scholarly communication as the process by which academic content is generated, reviewed, disseminated and built upon. E-journals are described as journals available electronically over the internet or on CD-ROM. The benefits of e-journals include speed of publication and distribution, unlimited access, portability, and ability to link to other resources. E-journals are now overtaking print journals due to factors like cost reductions and user expectations changing with technology. However, issues still include the exponential rise in prices of some journals and licensing restrictions on electronic access.
Predatory journals aggressively market themselves and promise quick publication for a fee without providing proper editorial or publishing services. Their main goal is financial gain rather than communicating science. They take advantage of researchers in developing countries and the focus on quantity over quality of publications. Features of predatory journals include lack of contact information, broad topics to attract articles, and claims of being leading publishers without following standard practices. The rise of these journals is fueled by academic performance indicators, focus on quantity, and lack of oversight in scholarly publishing. Researchers must carefully check for journals on blacklists and follow transparency of peer review processes to avoid being preyed upon by predatory journals.
Scholarly Communications in Global PerspectiveNina Collins
Emerging scholars are often unprepared to navigate the changing landscape of scholarly publishing. Learn about author's rights and the importance of strategic publishing, including techniques to identify unethical scholarly publishers.
ResearchGate, SciHub, and Beyond: Sharing Scholarly Work LegallyErin Owens
The document discusses various platforms for sharing scholarly work, including disciplinary repositories, institutional repositories, and scholarly collaborative networks. It outlines recent lawsuits against SciHub and restrictions placed on ResearchGate by publishers. Key challenges addressed are determining author rights based on publishing contracts and balancing open access with publisher business models. The presentation provides guidance on legally sharing work through repositories, negotiating publishing agreements, and avoiding problematic sites like SciHub. It emphasizes working with libraries for assistance navigating author rights and sharing options.
Fake Journals and Conferences: What to Know about the FauxJill Cirasella
As a researcher, you are eager to publish your work in journals and present at conferences. But don’t let your eagerness allow you to be fooled by fake (often called “predatory”) journals or conferences. These low-quality outlets exist for the sole purpose of profit, not for the dissemination of peer-reviewed research. Indeed, they frequently lie about their peer review practices and engage in other forms of deceit. Learn how to spot these bad actors and critically evaluate any journal or conference before submitting a paper or proposal.
Predatory journals actively solicit manuscripts from researchers but lack proper peer review and editorial boards. They often publish low-quality papers solely to charge publication fees without providing legitimate scholarly services. Researchers should be wary of these journals as publishing in them can corrupt the academic literature and mislead others about the quality of their work. Various studies have exposed predatory journals by getting computer-generated nonsense papers and unqualified scientists accepted. Scholars can check for warning signs like missing or fake editorial boards, poor website quality, and surprise article fees to identify potentially predatory journals.
El acceso abierto y las revistas depredadoras: un paso adelante y dos pasos h...Journals Authors
Jeffrey Beall, retirado de la University of Colorado, Denver, Estados Unidos. Conferencia presentada en el 4.° Encuentro Regional de Editores de Revistas Académicas 2019. Journals & Authors, Medellín - Colombia.
This document summarizes a digital natives seminar about open access publishing and predatory journals. It discusses rising journal prices, copyright issues for faculty publishing work, different types of open access like gold and green open access. It describes benefits and issues with open access like identifying predatory journals. It provides resources for evaluating journals and understanding publisher policies on self-archiving. It introduces the institutional repository Constellation that Benedictine University uses to provide open access to scholarly works.
This document summarizes a digital natives seminar about open access publishing and predatory journals. It discusses rising journal prices, copyright issues for faculty publishing work, different types of open access like gold and green open access. It describes benefits and issues with open access like identifying predatory journals. It provides resources for evaluating journals and understanding publisher policies on self-archiving. It introduces the institutional repository Constellation that Benedictine University uses to provide open access to scholarly works.
This document summarizes a digital natives seminar about open access publishing and predatory journals. It discusses rising journal prices, copyright issues for faculty publishing work, different types of open access like gold and green open access. It describes benefits and issues with open access like identifying predatory journals. It provides resources for evaluating journals and understanding publisher policies on self-archiving. It introduces the institutional repository Constellation that Benedictine University uses to provide open access to scholarly works.
Open Access: Blazing Trails through the Scholarly Communication LandscapeMolly Keener
Slides from a presentation given before faculty at Furman University in Greenville, SC, as part of the Libraries' "Scholarly Conversations" series, and in celebration of Open Access Week 2012.
This document provides an introduction to open access publishing. It discusses the two main types of open access, gold and green, and notes the rapid growth of open access journals and repositories in recent years. Funding mandates from agencies like Canada's Tri-Agencies are also driving more research to be made openly accessible. The document seeks to dispel common myths about open access and provides resources for supporting open access publishing at the author's institution.
OA discussion at BILETA 2017, Universidade do Minho, Portugal, focusing on legal journal publication. Co-authored with Catherine Easton and Abhilash Hair
Academic libraries play an important role in supporting research in three key areas:
1. They facilitate literature searches through discovery services, subject databases, and remote access to subscribed resources. They also guide researchers on open access publishing and predatory journals.
2. They provide information literacy instruction and reference services to help researchers effectively find and evaluate information.
3. They assist researchers in managing their research profiles and outputs to increase visibility and track citations. This includes guidance on ORCID, Google Scholar, and Scopus profiles as well as publishing and citation metrics.
This presentation in intended to introduce Open Access (OA); the OA movement; OA advantages for authors, institutions and society; OA business models and publishing in OA; important tools for research and publishing; and other ‘open’ initiatives.
Scholarly communication refers to how academics find information, create knowledge, and share it with students and beyond academia. Traditionally, scholars would meet and correspond privately, but scholarly journals emerged as correspondence increased. Problems with the current system include commercial publishers controlling access and pricing out readers. Open Access aims to make scholarly works free online, either by publishing in an Open Access journal or self-archiving in an institutional repository. There are advocacy policies and mandates growing for Open Access worldwide to benefit research dissemination and public access to taxpayer-funded work.
This document provides information about open access for PhD students in business. It defines open access as free digital resources without copyright or licensing restrictions. It explains that open access matters for career development as articles are viewed more when freely available. It outlines how students can make their thesis and publications open access through Imperial College's institutional repository Spiral or open access journals. It also discusses relevant policies from research funders and selecting appropriate journals for publication.
O Futuro da Biblioteconomia no Brasil: Workshop Interativo
Quando: 07 de outubro de 2015 – 10h – 15h
Onde: Auditório do INRAD
Instituto de Radiologia do Hospital das Clínicas da Faculdade de Medicina da USP
Av. Dr. Enéas de Carvalho Aguiar, s/nº – Rua 1 – Cerqueira César – São Paulo, SP.
Metadata and Open Access – Reliably Finding Content and Finding Reliable ContentCharleston Conference
This document summarizes a presentation on metadata and open access content given at a conference. Sommer Browning from the Auraria Library discussed challenges with discovering and accessing open access materials using their systems. Better metadata is needed, including tags to identify open access resources and information to troubleshoot access problems. Jean-Claude Guédon from the University of Montreal also spoke as a researcher perspective. The presentation ended with a request to Serials Solutions to create a public Summon instance including all indexed open access content.
Why does research data matter to librariesJisc RDM
- Research data matters to libraries because it is increasingly being produced and collected by researchers, and there are growing requirements to manage and preserve it.
- A survey found that while most researchers currently manage their own data, there is a trend toward using institutional repositories and libraries more for long-term preservation.
- Libraries are well-suited to help with research data management because of their experience organizing and describing information over long periods of time, but there are also challenges due to differences across disciplines in how data is defined and treated.
- As funders and journals require better data sharing practices, libraries have an opportunity to take a more active role in helping researchers and institutions capture, describe, and manage research data over
Scholarly publishing transformations in times of digital technologiesLeonid Schneider
The document provides a history of scholarly publishing and discusses how it has transformed with digital technologies. It notes that historically, science was published in printed journals that universities and researchers subscribed to. With the internet, publishers like Elsevier began offering journal bundles electronically. This led to universities having to purchase all journals, including low-quality ones. The document critiques the traditional peer review system and commercialization of publishing. It discusses the open access movement and issues like predatory publishing. Finally, it argues that mandating preprints may be a better solution than open access mandates like Plan S.
Unearthing open access resource evaluationNina Collins
Explores types of unethical publishing tactics among false publishers claiming to be Open Access Scholarly Publishers. Presented at "Discovery to Delivery 5: Better Together", in Indianapolis, on April 25, 2014.
Academic Social Networks and Researcher RankingAmanyalsayed
Open science and web scholarly communication
Using Web 2.0 to increase researcher’s ranking
Academic Social Networks (types, services)
Question & Answer service
Sharing your research output through ASN
Researcher measurement (h-index, RG score)
ASN and researchers’ concerns
Nicole Nogoy at the G3 Workshop: Open Access Publishing - What you need to KnowGigaScience, BGI Hong Kong
This document discusses open access publishing and some of the key challenges. It notes that while open access publishing removes barriers to accessing and sharing scientific research, major publishers currently control the market and charge high subscription fees. This puts strain on library budgets. The document outlines initiatives to increase open access, such as university and funder mandates, and notes that open access journals can have high impact. However, challenges remain around copyright and the ability to fully text mine and reuse content. More advocacy and support for open access is needed to address these issues.
Jay patel Open Access TIPPA Midwest presentation june 2013Jay Patel
From closed to Open Access
This document summarizes how open access publishing is changing the way research is disseminated. It provides a brief history of scholarly publishing, outlines the benefits and limitations of traditional closed access models, and defines open access. Open access provides free online access to peer-reviewed research and is growing due to funder and institutional mandates. While it increases access and sharing, open access faces challenges around quality control and funding publication fees. The future may see greater open access support and alternative models like preprint servers and fluid embedded papers.
Similar to Predatory publishing: pitfalls for the unwary. 25 Oct 2013 (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Predatory publishing: pitfalls for the unwary. 25 Oct 2013
1. Predatory publishing: pitfalls for the unwary!
Simon Huggard
Digital Infrastructure Manager
Sharon Karasmanis
Faculty Librarian and Team Leader (Health Sciences)
Library Research Forum, 25 October 2013
latrobe.edu.au
CRICOS Provider 00115M
2. Predatory Publishers:
• Gold Open Access Model has created opportunities
for corrupt publishers to flourish
• Open Access mandates have spawned more of these
recently, with a huge increase in reports of
questionable email requests
• Only exist to extract author processing fees (often only
charging when the manuscript accepted)
• Take advantage of authors who want to publish in
Open Access journals, note: new PhD graduates
targeted!
La Trobe University
2
2
3. Predatory publishers – some characteristics:
• Look convincing by using similar names to well known
publications (eg. IJCEE: International Journal of Civil &
Environemental Engineering vs International Journal of
Environmental Engineering ;SciMed Central vs Pubmed
Central)
• Websites littered with grammatical errors
• No peer-review process or bogus reviewer details
• Spam researchers, soliciting manuscripts but failing to
mention required author fee. After the paper is
published, authors are invoiced typically US$1,800
• List bogus contact details (tricky to spot!)
La Trobe University
3
3
4. How can you check?
• Look for publishers verifiable contact details,
be cautious if only a web form is provided!
• Does the editorial board list recognised experts with
affiliations
• Check that author fees are prominently displayed
• Be wary of email invitations
• Read previous papers and assess the quality
• Check peer-review process is clearly described, try to
confirm if the displayed impact factor is correct!
La Trobe University
4
4
5. More on checking:
• Check Beall’s list of Predatory Publishers
•
scholarlyoa.com/2012/12/06/bealls-list-of-predatory-publishers-2013/
•
Further reading:
•
LibGuide on Predatory Publishing in:
latrobe.libguides.com/journalimpact
•
Butler, D. (2013). Investigating journals: the dark side of publishing,
Nature, 495(7442), 433-435. (Describes the emergence of predatory publishing
and provides an alternate view of the Beall’s list)
•
Bohannon, J. (2013). Who’s afraid of peer-review? Science, 342.
(Spoof paper concocted by Science reveals little scrutiny by some predatory journals)
La Trobe University
5
5
6. Consider Green Open Access!
• Upload a submitted manuscript or postprint of your
article to Research Online (LTU research repository)
• Article will be available freely online
• No article processing fees
• Contact repository@latrobe.edu.au
La Trobe University
6
6
10. Where to Publish: Evaluating journals
• What are the main issues?
• Publishing in high impact scholarly journals
• Selecting journals relevant to your discipline
• Where are other experts in your discipline
publishing?
• Identifying a journal in consideration of ERA, FoR
codes and impact factors
• Ensuring your research is reaching relevant
audiences
La Trobe University
10
10
11. What quality factors should I look for?
• Use a range of criteria and compare with other journals
in the same category
• Quantitative and qualitative assessments such as:
• Journal impact factors
• Indexing and abstracting services
• Relevance to your discipline
• Ranking within your discipline
• Peer review process
La Trobe University
11
11
12. A range of Library resources are available:
(under Databases Tab)
• Journal Citation Reports (JCR)
• Eigenfactor calculation
• Scopus Journal Analyzer (SJR)
• SCImago (uses SJR data)
• InCites
• Further guidance available:
• latrobe.libguides.com/journalimpact
La Trobe University
12
12
13. • Contact your Faculty Librarian
• latrobe.edu.au/library/contact-us
• Research Education and Development (RED)
• latrobe.edu.au/research/red
• Research Services
• latrobe.edu.au/research-services
La Trobe University
13
13