Predatory Journals: How to Identify and Avoid Them
A predatory journal solicits article processing fees from researchers while providing little or no legitimate peer review, editorial oversight, or indexing in recognized databases. The problem is neither fringe nor new — it has grown alongside the open-access publishing movement, exploiting the fee-based business model in ways that harm researchers, mislead readers, and pollute the scientific record. Knowing what distinguishes a predatory outlet from a legitimate one is now a basic professional skill in academic science.
Definition and scope
The term gained wide currency through the work of librarian Jeffrey Beall, who maintained a widely consulted — and heavily criticized — list of suspected predatory publishers from 2008 until 2017. Beall never claimed his list was exhaustive or infallible, but it forced the research community to name the problem explicitly.
A working definition used by the research community and formalized in a 2019 consensus paper published in Nature describes predatory journals as entities that "prioritize self-interest at the expense of scholarship and are characterized by false or misleading information, deviation from best editorial and publication practices, a lack of transparency, and/or the use of aggressive and indiscriminate solicitation practices" (Grudniewicz et al., Nature, 2019).
The scale is significant. A 2018 analysis in PLOS ONE estimated that roughly 420,000 articles per year were published in potential predatory journals at that time, drawing on a dataset of more than 1,900 journals. The problem spans every scientific discipline, though biomedical and social science fields appear most heavily targeted, likely because of the volume of researchers and funding in those areas.
How it works
The typical predatory journal runs what amounts to a vanity press with a scientific veneer. The operating sequence looks like this:
- Solicitation. A researcher receives an unsolicited email — often addressing them by name, often praising a previously published paper — inviting submission to a journal with a plausible-sounding name.
- Rapid acceptance. The manuscript is accepted within days, sometimes hours, with minimal or no substantive reviewer feedback.
- Fee extraction. An article processing charge (APC) is invoiced, sometimes disclosed upfront, sometimes revealed only after acceptance. APCs at predatory outlets can range from a few hundred dollars to amounts that mimic legitimate journals.
- Publication without gatekeeping. The article appears online, often on a site designed to resemble a reputable journal, with fabricated impact factors, invented editorial board members, or real researchers listed without their knowledge or consent.
The damage is not purely financial. Articles that would be rejected by legitimate peer review enter the public record and can be cited, reported in news coverage, or used to support policy claims. A 2017 study in the International Journal for Educational Integrity documented cases of researchers who unknowingly published in predatory journals and subsequently faced institutional sanctions.
Common scenarios
Three patterns account for the majority of predatory journal encounters:
The early-career researcher under pressure. Graduate students and junior faculty facing publication pressure are prime targets. An offer of fast publication from a journal with an authoritative-sounding title — Journal of Advanced Interdisciplinary Research, say — can look attractive when grant renewals or job applications depend on a publication count.
The hijacked legitimate journal. Predatory operators sometimes create websites that impersonate real, established journals, using near-identical names, stolen ISSNs, and cloned visual designs. A researcher submitting to what appears to be a known outlet only discovers the fraud after payment. The Committee on Publication Ethics (COPE) maintains guidance on hijacked journals and handles reports from researchers and editors who discover such fraud.
The conference-to-journal pipeline. Some predatory operations run associated conferences, collect presentation abstracts, and channel them into affiliated "proceedings" journals — charging fees at each step and providing no meaningful review at any point.
Decision boundaries
Distinguishing a legitimate journal from a predatory one requires checking specific signals, not making a single judgment call. The contrast between a legitimate open-access journal and a predatory one is clearest when examined across several dimensions simultaneously.
| Signal | Legitimate journal | Predatory journal |
|---|---|---|
| Indexing | Listed in DOAJ, PubMed, Scopus, or Web of Science | Not indexed, or claims indexing that cannot be verified |
| Editorial board | Named individuals verifiable via institutional profiles | Fabricated names, stolen identities, or real researchers unaware of listing |
| Peer review timeline | Weeks to months; specific reviewer feedback provided | Days to hours; generic or absent feedback |
| ISSN verification | ISSN registered at ISSN Portal with correct journal data | Missing, unregistered, or mismatched ISSN |
| Publisher membership | Member of COPE or OASPA | No verifiable memberships |
| APC disclosure | Clearly stated before submission | Hidden until post-acceptance |
The Think. Check. Submit. initiative, developed by a coalition of academic organizations including COPE, DOAJ, and OASPA, provides a practical checklist that maps to most of these signals. It is freely available and designed for researchers at all career stages.
A journal's impact factor is not a reliable filter on its own — predatory journals routinely publish fabricated metrics using names that closely resemble legitimate measurement services. Cross-referencing the Journal Citation Reports (Clarivate) is the only way to confirm an impact factor's authenticity.
The broader landscape of scientific publishing — including indexing databases, article processing charges, and publication ethics — is documented across this reference network. The home index provides a map of related topics for researchers navigating these questions systematically.
References
- Grudniewicz et al., "Predatory journals: no definition, no defence," Nature 576, 2019
- Think. Check. Submit. — researcher checklist initiative
- Directory of Open Access Journals (DOAJ)
- Committee on Publication Ethics (COPE)
- Open Access Scholarly Publishing Association (OASPA)
- ISSN International Centre — ISSN Portal
- Clarivate Journal Citation Reports