Engaging in predatory practices: How editors persuade prospective authors
نویسندگان
چکیده
A number of studies have explored the main features predatory practices that prevail in academic journals and conferences. However, not much has been investigated regarding ways journal editors convey credibility trustworthiness when addressing scholars looking for publication outlets and, more specifically, what interpersonal resources (like proximity or engagement markers) are used to persuade them. This study draws on a dataset fifty email messages from publishers collected during past two years. It seeks delve into address “scholar customers” with aim persuading them submit their work. was first coded following Hyland’s models interaction texts, then qualitatively analysed using NVivo 11 Pro. The analysis shows (i) textual data provide direct evidence texts send dialogue they intend build authors haste publication; (ii) interactional abound, particularly markers, which explicitly at building rapport prospective author, (iii) these also contain other engagement-related elements directed an effect reader’s decision eventual submission.
منابع مشابه
Predatory publishing: what authors, reviewers, and editors need to know.
The expansion of the Internet and the increasing pressure to provide new scientific content to the public as quickly as possible have led to rapid changes in the publishing industry. Recently, new publishing models have arisen, such as open access (content available to readers at no charge), hybrid (some combination of print and online content delivery), and early online access to print journal...
متن کاملProtecting against Predatory Practices
A major reason for security professionals not seeming able to protect fully against the rapidly changing threat environment and sophisticated attacks is that they often don’t have available the necessary application security data for detecting and responding to such increasingly stealthy attacks. Furthermore, easily generated application security data are generally not reported timely or accura...
متن کاملProtecting against Predatory Practices
Software security represents a major concern as cyber attacks continue to grow in number and sophistication. One security-weakening factor is related to the standardized software ecosystem that facilitates the spread of malware in systems that share common vulnerabilities. In this overview article, the main concepts associated with diversity and software redundancy are described in the perspect...
متن کاملLead Authors: Contributing Authors: Review Editors
Contributing Authors: J.-M. Barnola (France), E. Bauer (Germany), E. Brady (USA), M. Chandler (USA), J. Cole (USA), E. Cook (USA), E. Cortijo (France), T. Dokken (Norway), D. Fleitmann (Switzerland, Germany), M. Kageyama (France), M. Khodri (France), L. Labeyrie (France), A. Laine (France), A. Levermann (Germany), Ø. Lie (Norway), M.-F. Loutre (Belgium), K. Matsumoto (USA), E. Monnin (Switzerla...
متن کاملConsensus building: How to persuade a group
Many decisions in private and public organizations are made by groups. The paper explores strategies that the sponsor of a proposal may employ to convince a qualified majority of group members to approve the proposal. Adopting a mechanism design approach to communication, it emphasizes the need to distill information selectively to key members of the group and to engineer persuasion cascades in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Circulo De Linguistica Aplicada A La Comunicacion
سال: 2023
ISSN: ['1576-4737']
DOI: https://doi.org/10.5209/clac.82441