Moderation by Researchgate Related to Comments on “Predatory” Publishing Practices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Predatory Publishing Practices Corrode the Credibility of Science

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. pISSN 1011-8934 eISSN 1598-6357 Predatory Publishing Practices Corrode the Credibility of Sc...

متن کامل

Predatory publishing and you.

Once upon a time there was an academic librarian at the University of Colorado who led a quiet librarian life until the day he noticed predators in the midst of scholarly publishing. Jeffrey Beall discovered, studied, revealed, and blogged about what he would eventually name Predatory Publishing. His Web site, Scholarly Open Access (http:// scholarlyoa.com), is an increasingly important source ...

متن کامل

Predatory publishing is no joke.

I often receive e-mails inviting me to submit papers to what seem to be legitimate journals. The journals’ names look familiar, their editorial boards list wellcredentialed professionals, and some of these journals even claim to have impact factor rankings. Their invitations are tempting, promising expedient peer review and publication. If I were a new author eager to publish and unfamiliar wit...

متن کامل

Protecting against Predatory Practices

A major reason for security professionals not seeming able to protect fully against the rapidly changing threat environment and sophisticated attacks is that they often don’t have available the necessary application security data for detecting and responding to such increasingly stealthy attacks. Furthermore, easily generated application security data are generally not reported timely or accura...

متن کامل

Protecting against Predatory Practices

Software security represents a major concern as cyber attacks continue to grow in number and sophistication. One security-weakening factor is related to the standardized software ecosystem that facilitates the spread of malware in systems that share common vulnerabilities. In this overview article, the main concepts associated with diversity and software redundancy are described in the perspect...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Communication

سال: 2019

ISSN: 2450-7563

DOI: 10.2478/sc-2019-0001