Arbitral action and preventive methods against predatory journal practice

Sung Pil Park, Eric Yong Joong Lee, Ji Hee Suh

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

As open access model of journal publication increases, predatory journals, which deceive scholars to publish journals in fake database websites and exploit them for publishing fee, is also increasing. There are two types of predatory journals. First, journal hijacking and cybersquatting generally create fake database website by mimicking authentic database website, thereby defrauding scholars for publication fee. Second, journal phishing use scam emails to steal scholars' personal information. If scholars suffered damage from predatory journals, scholars can take either arbitral or judicial actions. Arbitral action follows arbitrational resolution process termed Uniform Domain-Name Dispute-Resolution Policy. Scholars can join Uniform Domain-Name Dispute-Resolution Policy proceeding with legal entity that has right to authentic database website, which will result in cancellation or transfer of fake database website. In contrast, scholars can take judicial action under Anticybersquatting Consumer Protection Act, which may help scholars to recover an actual monetary damage from predatory journals. Nonetheless, taking precaution to avoid predatory journals is the best course of action, rather than going through arduous cure procedures. Scholars may prevent predatory journals by carefully examining fake database website names or email addresses, or observing unreasonable number of published article issues in predatory journal websites.

Original languageEnglish
Pages (from-to)49-52
Number of pages4
JournalScience Editing
Volume5
Issue number1
DOIs
StatePublished - 1 Feb 2018

Keywords

  • Asian Domain Name Dispute Resolution Center
  • Cybersquatting
  • Journal hijacking
  • Journal phishing
  • Uniform Domain-Name Dispute-Resolution Policy

Fingerprint

Dive into the research topics of 'Arbitral action and preventive methods against predatory journal practice'. Together they form a unique fingerprint.

Cite this