BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

166 related articles for article (PubMed ID: 37101915)

  • 1. Unsolicited solicitations: identifying characteristics of unsolicited emails from potentially predatory journals and the role of librarians.
    Wilson P
    J Med Libr Assoc; 2022 Oct; 110(4):520-524. PubMed ID: 37101915
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Predatory Journals Spamming for Publications: What Should Researchers Do?
    Memon AR
    Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439
    [TBL] [Abstract][Full Text] [Related]  

  • 3. "Dear Doctor, greetings of the day!": A 1-year observational study of presumed predatory journal invitations.
    Livas C; Delli K
    Prog Orthod; 2023 Jul; 24(1):21. PubMed ID: 37394538
    [TBL] [Abstract][Full Text] [Related]  

  • 4. WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work - Young and senior researchers perspectives.
    Cuschieri S; Grech V
    Early Hum Dev; 2018 Jul; 122():64-66. PubMed ID: 29685577
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Prospective Observational Evaluation of Predatory Journals in Critical Care Pharmacy Practice: Defining Characteristics Associated With Receiving Unsolicited Invitations to Publish.
    Peppard WJ; Peppard SR; Feih JT; Kim AK; Obenberger SJ; Mulvey AF; Teng BQ; Brazauskas R; Pape KO; Gibson GA; Dzierba AL; Dobesh PP
    J Pharm Pract; 2023 Jun; 36(3):494-500. PubMed ID: 34645297
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Analysis of Solicitations From Predatory Journals in Ophthalmology.
    Justin GA; Huang C; Nguyen MK; Lee J; Seddon I; Wesley TA; Bakri SJ; Peter Campbell J; Cavuoto K; Collins M; Gedde SJ; Kossler AL; Milman T; Shukla A; Sridhar J; Syed ZA; Williams JBK; Woreta FA; Patel SN; Yonekawa Y
    Am J Ophthalmol; 2024 Mar; 264():216-223. PubMed ID: 38490339
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Characteristics of E-Mail Solicitations From Predatory Nursing Journals and Publishers.
    Lewinski AA; Oermann MH
    J Contin Educ Nurs; 2018 Apr; 49(4):171-177. PubMed ID: 29596704
    [TBL] [Abstract][Full Text] [Related]  

  • 8. One year of unsolicited e-mails: The modus operandi of predatory journals and publishers.
    Sousa FSO; Nadanovsky P; Dhyppolito IM; Santos APPD
    J Dent; 2021 Jun; 109():103618. PubMed ID: 33636240
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Predatory Publishing and the Academic Librarian: Developing Tools to Make Decisions.
    Lopez E; Gaspard CS
    Med Ref Serv Q; 2020; 39(1):1-14. PubMed ID: 32069201
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Invitations received from potential predatory publishers and fraudulent conferences: a 12-month early-career researcher experience.
    Mercier E; Tardif PA; Moore L; Le Sage N; Cameron PA
    Postgrad Med J; 2018 Feb; 94(1108):104-108. PubMed ID: 28912190
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An analysis of invitations for article submission received via emails.
    Bavdekar SB; Saha S; Thatte UM; Gogtay NJ
    Indian J Med Ethics; 2022; VII(2):103-107. PubMed ID: 34730088
    [TBL] [Abstract][Full Text] [Related]  

  • 12. What I learned from predatory publishers.
    Beall J
    Biochem Med (Zagreb); 2017 Jun; 27(2):273-278. PubMed ID: 28694718
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Identifying Predatory Journals in Plastic Surgery: A Prospective Study.
    Gallo M; Gallo L; Mowakket S; Murphy J; Duku E; Thoma A
    Plast Surg (Oakv); 2022 May; 30(2):144-150. PubMed ID: 35572080
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Defining predatory journals and responding to the threat they pose: a modified Delphi consensus process.
    Cukier S; Lalu M; Bryson GL; Cobey KD; Grudniewicz A; Moher D
    BMJ Open; 2020 Feb; 10(2):e035561. PubMed ID: 32041864
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Best practices for scholarly authors in the age of predatory journals.
    Beall J
    Ann R Coll Surg Engl; 2016 Feb; 98(2):77-9. PubMed ID: 26829665
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Detecting Hijacked Journals by Using Classification Algorithms.
    Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M
    Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Predatory science: Unraveling a secret journey of fake journals and conferences.
    Begum S; Abdulla R
    J Oral Maxillofac Pathol; 2021; 25(1):193-194. PubMed ID: 34349435
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Predator and Alien: the threat of predatory journals and conferences.
    Leducq S; Bonsu N; Clement K; Barlow R; Williams HC
    Clin Exp Dermatol; 2023 Jul; 48(8):847-853. PubMed ID: 37017182
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Predatory publishing solicitation: a review of a single surgeon's inbox and implications for information technology resources at an organizational level.
    McKenzie M; Nickerson D; Ball CG
    Can J Surg; 2021 Jun; 64(3):E351-E357. PubMed ID: 34105930
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Predatory conferences: Addressing researchers from developing countries.
    Memon AR; Azim ME
    J Pak Med Assoc; 2018 Nov; 68(11):1691-1695. PubMed ID: 30410151
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.