The theme of this year’s NASIG Annual Conference – Building Bridges – was appropriate for a number of reasons. Not only did the meeting take place in the City of Bridges, but the idea of connecting the various global communities within academia was present in many of the sessions. What’s more, the core mission of NASIG is to “facilitate and improve the distribution, acquisition, and long-term accessibility of information resources in all formats and business models”: in essence, building a bridge to knowledge.

There were an array of sessions building on this “connectivity” theme: discussions on linking to disabled members of the community through greater accessibility, to resource users through technical and customer services, and to future academics through digital preservation, to name just a few. However, the session that caught our collective eye at Cabells was one that focused not so much on building bridges, but rather on blocking the way down a dangerous road …

While there is no debate (we think) that predatory journals are causing problems in the scholarly publishing landscape, there are differing opinions on the magnitude of these problems.  “Minding Your Ps and Qs: Predatory Journals, Piracy, and Quality Questions” was presented by Marydee Ojala, Editor of Online Searcher Magazine and Regina Reynolds, Director of the U.S. ISSN Center and Head of the ISSN Section of the Library of Congress.  Ms. Ojala, a former academic and corporate librarian, spoke of the danger, especially in today’s ‘fake news’ environment, of calling into question the validity of scholarly research by muddying the water with junk science and ‘sting’ articles filled with nonsense.  Ms. Reynolds suggested the problem of predatory publishing is overstated and exists due to a market created by academia through several enabling forces.

What was made clear in this session is the fact that more and more librarians are becoming aware of predatory publishing and the dangers it poses. They are also becoming keenly aware that they must rethink how they evaluate collections and what researchers are finding in available databases. Instead of going directly to subscription databases, many researchers turn first to Google or Google Scholar. A quick search on these platforms will make it clear the results contain predatory articles alongside legitimate ones. The use of LibGuides, instructional videos, posters, presentations and even one-on-one communication to educate researchers can go a long way to changing the methods they use.

When discussing whether the problem of predatory journals is overstated (a firm ‘no’ in Cabells’ opinion), Mr. Reynolds made several interesting points.  Enabling market forces such as open access, a rapidly growing number of scholars worldwide, the disadvantages of the those in the global south, and the ‘publish or perish’ mindset have created a fertile ground for predatory publishing activity. To think that it will not be taken advantage of is short-sighted.  Predatory journals give scholars who wouldn’t otherwise have a chance to publish a chance to publish; this highlights an uneven playing field in academia that must be corrected to stem the tide of predatory enterprise.

Ms. Reynolds discussed the idea that predatory journals exist as a response to an environment, and market, created by academia itself.  Is the scholarly community willing to turn its collective back on predatory publications?  Is every academic serving on the editorial board of a predatory journal doing so without their knowledge and consent? Of course not, just as not everyone who publishes in a fake publication is duped into doing so. There must be a concerted effort throughout the scholarly community to reject the easy route to publication and CV glory on the back of fraudulent publications. As Ms. Ojala pointed out, there are resources (most notably the Journal Blacklist) that are working to shine a light on deceitful operations to alert researchers, librarians and administrators to stay away; as Ms. Reynolds pointed out, these stakeholders must be willing to heed the warning.

+ posts

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.