162 related articles for article (PubMed ID: 32010761)
21. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.
Dadkhah M; Borchardt G; Maliszewski T
Am J Med; 2017 Jan; 130(1):27-30. PubMed ID: 27637600
[TBL] [Abstract][Full Text] [Related]
22. [Predatory journals: A real threat for medical research. 1. Identify these journals and understand how they work].
de La Blanchardière A; Barde F; Peiffer-Smadja N; Maisonneuve H
Rev Med Interne; 2021 Jun; 42(6):421-426. PubMed ID: 33867197
[TBL] [Abstract][Full Text] [Related]
23. WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work - Young and senior researchers perspectives.
Cuschieri S; Grech V
Early Hum Dev; 2018 Jul; 122():64-66. PubMed ID: 29685577
[TBL] [Abstract][Full Text] [Related]
24. An analysis of invitations for article submission received via emails.
Bavdekar SB; Saha S; Thatte UM; Gogtay NJ
Indian J Med Ethics; 2022; VII(2):103-107. PubMed ID: 34730088
[TBL] [Abstract][Full Text] [Related]
25. Predatory Journals Spamming for Publications: What Should Researchers Do?
Memon AR
Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439
[TBL] [Abstract][Full Text] [Related]
26. A Toolkit for Detecting Fallacious Calls for Papers from Potential Predatory Journals.
Dadkhah M; Raja AM; Memon AR; Borchardt G; Nedungadi P; Abu-Eteen K; Raman R
Adv Pharm Bull; 2023 Nov; 13(4):627-634. PubMed ID: 38022802
[TBL] [Abstract][Full Text] [Related]
27. Study of Predatory Open Access Nursing Journals.
Oermann MH; Conklin JL; Nicoll LH; Chinn PL; Ashton KS; Edie AH; Amarasekara S; Budinger SC
J Nurs Scholarsh; 2016 Nov; 48(6):624-632. PubMed ID: 27706886
[TBL] [Abstract][Full Text] [Related]
28. Electronic communication between family physicians and patients: Findings from a multisite survey of academic family physicians in Ontario.
Girdhari R; Krueger P; Wang R; Meaney C; Domb S; Larsen D; Kiran T
Can Fam Physician; 2021 Jan; 67(1):39-46. PubMed ID: 33483396
[TBL] [Abstract][Full Text] [Related]
29. To Decline or Accept: A Guide for Determining the Legitimacy of Academic Conference Invitations.
Warden AM; Soteropulos CE; Eftekari SC; Nicksic PJ; Dingle AM; Poore SO
Ann Plast Surg; 2022 Jul; 89(1):8-16. PubMed ID: 35502938
[TBL] [Abstract][Full Text] [Related]
30. Ethical issues in publishing in predatory journals.
Ferris LE; Winker MA
Biochem Med (Zagreb); 2017 Jun; 27(2):279-284. PubMed ID: 28694719
[TBL] [Abstract][Full Text] [Related]
31. Detecting Hijacked Journals by Using Classification Algorithms.
Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M
Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175
[TBL] [Abstract][Full Text] [Related]
32. A cross-sectional study of predatory publishing emails received by career development grant awardees.
Wilkinson TA; Russell CJ; Bennett WE; Cheng ER; Carroll AE
BMJ Open; 2019 May; 9(5):e027928. PubMed ID: 31110104
[TBL] [Abstract][Full Text] [Related]
33. A content analysis of e-mail communication between primary care providers and parents.
Anand SG; Feldman MJ; Geller DS; Bisbee A; Bauchner H
Pediatrics; 2005 May; 115(5):1283-8. PubMed ID: 15867036
[TBL] [Abstract][Full Text] [Related]
34. A Qualitative Study Assessing the Management of Predatory Journals and Their Publishing Activities: Results From the ASGLOS Study.
Martinino A; Owen E; Puri O; Scarano Pereira JP; Chatterjee S; Smeenk F; Pouwels S
Cureus; 2024 Feb; 16(2):e54189. PubMed ID: 38496146
[TBL] [Abstract][Full Text] [Related]
35. Best practices for scholarly authors in the age of predatory journals.
Beall J
Ann R Coll Surg Engl; 2016 Feb; 98(2):77-9. PubMed ID: 26829665
[TBL] [Abstract][Full Text] [Related]
36. Analysis of e-Mail Spam Detection Using a Novel Machine Learning-Based Hybrid Bagging Technique.
Rayan A
Comput Intell Neurosci; 2022; 2022():2500772. PubMed ID: 35983156
[TBL] [Abstract][Full Text] [Related]
37. Potential predatory and legitimate biomedical journals: can you tell the difference? A cross-sectional comparison.
Shamseer L; Moher D; Maduekwe O; Turner L; Barbour V; Burch R; Clark J; Galipeau J; Roberts J; Shea BJ
BMC Med; 2017 Mar; 15(1):28. PubMed ID: 28298236
[TBL] [Abstract][Full Text] [Related]
38. 'Predatory' open access: a longitudinal study of article volumes and market characteristics.
Shen C; Björk BC
BMC Med; 2015 Oct; 13():230. PubMed ID: 26423063
[TBL] [Abstract][Full Text] [Related]
39. Problems and risks of unsolicited e-mails in patient-physician encounters in travel medicine settings.
Sing A; Salzman J; Sing D
J Travel Med; 2001; 8(3):109-12. PubMed ID: 11468110
[TBL] [Abstract][Full Text] [Related]
40. Blacklists and Whitelists To Tackle Predatory Publishing: a Cross-Sectional Comparison and Thematic Analysis.
Strinzel M; Severin A; Milzow K; Egger M
mBio; 2019 Jun; 10(3):. PubMed ID: 31164459
[TBL] [Abstract][Full Text] [Related]
[Previous] [Next] [New Search]