![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
Identifying Predatory Journals - A Few Simple Steps
Sorooshian has highlighted an important aspect which we are witnessing today - publication phishing. He describes how these 'phishers' use techniques to lure gullible scientists (or gullible writers who want to have a publication to add to their CV or for promotion, in some cases) to believe that a journal is authentic, where, in fact, it may not.
User
Font Size
Information
- Sorooshian, S., Curr. Sci., 2016, 110(5), 766–767.
- https://scholarlyoa.com/publishers/
- Bajpai, M., Br. Dent. J., 2015, 219, 147; http://www.nature.com/bdj/journal/v219/n4/full/sj.bdj.2015.643.html#a1 (accessed 17 March 2016).
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 242
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 81