- Home
- Publications
- Publication Search
- Publication Details
Title
Spam emails in academia: issues and costs
Authors
Keywords
-
Journal
SCIENTOMETRICS
Volume 122, Issue 2, Pages 1171-1188
Publisher
Springer Science and Business Media LLC
Online
2019-12-04
DOI
10.1007/s11192-019-03315-5
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Payouts push professors towards predatory journals
- (2019) David William Hedding NATURE
- A cross-sectional study of predatory publishing emails received by career development grant awardees
- (2019) Tracey A Wilkinson et al. BMJ Open
- Is the soundness-only quality control policy of open access mega journals linked to a higher rate of published errors?
- (2019) Mohammadamin Erfanmanesh et al. SCIENTOMETRICS
- Blacklists and Whitelists To Tackle Predatory Publishing: a Cross-Sectional Comparison and Thematic Analysis
- (2019) Michaela Strinzel et al. mBio
- A Critical Analysis of the ‘UGC-Approved List of Journals’
- (2018) Bhushan Patwardhan et al. CURRENT SCIENCE
- WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work – Young and senior researchers perspectives
- (2018) Sarah Cuschieri et al. EARLY HUMAN DEVELOPMENT
- Response to letter to the editor from Simpson re: Quality of articles published in predatory nursing journals (Oermann et al., 2018)
- (2018) Marilyn H. Oermann et al. NURSING OUTLOOK
- Quality of articles published in predatory nursing journals
- (2018) Marilyn H. Oermann et al. NURSING OUTLOOK
- The Use of Solicited Publishing by Academic Surgeons
- (2018) Vi Nguyen et al. SURGERY
- Characteristics of E-Mail Solicitations From Predatory Nursing Journals and Publishers
- (2018) Allison A. Lewinski et al. JOURNAL OF CONTINUING EDUCATION IN NURSING
- Cognitive spammer: A Framework for PageRank analysis with Split by Over-sampling and Train by Under-fitting
- (2018) Aaisha Makkar et al. Future Generation Computer Systems-The International Journal of eScience
- Manuscript Submission Invitations from ‘Predatory Journals’: What Should Authors Do?
- (2017) Mihiretu Kebede et al. JOURNAL OF KOREAN MEDICAL SCIENCE
- Predatory Invitations from Journals: More Than Just a Nuisance?
- (2017) Mark Clemons et al. ONCOLOGIST
- Invitations received from potential predatory publishers and fraudulent conferences: a 12-month early-career researcher experience
- (2017) Eric Mercier et al. POSTGRADUATE MEDICAL JOURNAL
- Phishing Detection: Analysis of Visual Similarity Based Approaches
- (2017) Ankit Kumar Jain et al. Security and Communication Networks
- Defending against phishing attacks: taxonomy of methods, current issues and future directions
- (2017) B. B. Gupta et al. TELECOMMUNICATION SYSTEMS
- Publish or impoverish
- (2017) Wei Quan et al. Aslib Journal of Information Management
- Is This Conference for Real? Navigating Presumed Predatory Conference Invitations
- (2017) Kelly D. Cobey et al. Journal of Oncology Practice
- Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics
- (2016) Mehdi Dadkhah et al. Forensic Science Medicine and Pathology
- Changes in the digital scholarly environment and issues of trust: An exploratory, qualitative analysis
- (2016) Anthony Watkinson et al. INFORMATION PROCESSING & MANAGEMENT
- If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
- (2016) Abdullah Almaatouq et al. International Journal of Information Security
- Dangerous Predatory Publishers Threaten Medical Research
- (2016) Jeffrey Beall JOURNAL OF KOREAN MEDICAL SCIENCE
- Study of Predatory Open Access Nursing Journals
- (2016) Marilyn H. Oermann et al. JOURNAL OF NURSING SCHOLARSHIP
- Fighting against phishing attacks: state of the art and future challenges
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- What Rights Do Authors Have?
- (2016) Aceil Al-Khatib et al. SCIENCE AND ENGINEERING ETHICS
- We read spam a lot: prospective cohort study of unsolicited and unwanted academic invitations
- (2016) Andrew Grey et al. BMJ-British Medical Journal
- We read spam a lot: prospective cohort study of unsolicited and unwanted academic invitations
- (2016) Andrew Grey et al. BMJ-British Medical Journal
- Best practices for scholarly authors in the age of predatory journals
- (2016) J Beall ANNALS OF THE ROYAL COLLEGE OF SURGEONS OF ENGLAND
- You are invited to submit…
- (2015) David Moher et al. BMC Medicine
- A simple approach for eliminating spam
- (2015) S. Mazzarello et al. Current Oncology
- Peer-Review Fraud — Hacking the Scientific Publication Process
- (2015) Charlotte J. Haug NEW ENGLAND JOURNAL OF MEDICINE
- Spamming in scholarly publishing: A case study
- (2015) Marcin Kozak et al. Journal of the Association for Information Science and Technology
- Growth rates of modern science: A bibliometric analysis based on the number of publications and cited references
- (2015) Lutz Bornmann et al. Journal of the Association for Information Science and Technology
- Do phishing alerts impact global corporations? A firm value analysis
- (2014) Indranil Bose et al. DECISION SUPPORT SYSTEMS
- ResearchGate: Disseminating, communicating, and measuring Scholarship?
- (2014) Mike Thelwall et al. Journal of the Association for Information Science and Technology
- A Survey of Phishing Email Filtering Techniques
- (2013) Ammar Almomani et al. IEEE Communications Surveys and Tutorials
- The growth of science and database coverage
- (2012) Carolin Michels et al. SCIENTOMETRICS
- E-mail Address Harvesting on PubMed—A Call for Responsible Handling of E-mail Addresses
- (2011) Brendan Thomas MAYO CLINIC PROCEEDINGS
- The rate of growth in scientific publication and the decline in coverage provided by Science Citation Index
- (2010) Peder Olesen Larsen et al. SCIENTOMETRICS
- Comparing university rankings
- (2010) Isidro F. Aguillo et al. SCIENTOMETRICS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now