{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T13:49:55Z","timestamp":1769953795385,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:00:00Z","timestamp":1544832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11192-018-2981-6","type":"journal-article","created":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:15:22Z","timestamp":1544832922000},"page":"687-698","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An approach to conference selection and evaluation: advice to avoid \u201cpredatory\u201d conferences"],"prefix":"10.1007","volume":"118","author":[{"given":"Raynell","family":"Lang","sequence":"first","affiliation":[]},{"given":"Marcy","family":"Mintz","sequence":"additional","affiliation":[]},{"given":"Hartmut B.","family":"Krentz","sequence":"additional","affiliation":[]},{"given":"M. John","family":"Gill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,15]]},"reference":[{"key":"2981_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-018-0038-0","author":"A Asadi","year":"2018","unstructured":"Asadi, A. (2018). Invitation to speak at a conference: The tempting technique adopted by predatory conferences\u2019 organizers. Science and Engineering Ethics. \n                    https:\/\/doi.org\/10.1007\/s11948-018-0038-0\n                    \n                  .","journal-title":"Science and Engineering Ethics"},{"issue":"10","key":"2981_CR2","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.3346\/jkms.2016.31.10.1511","volume":"31","author":"J Beall","year":"2016","unstructured":"Beall, J. (2016). Dangerous predatory publishers threaten medical research. Journal of Korean Medical Science,\n                           31(10), 1511\u20131513.","journal-title":"Journal of Korean Medical Science"},{"key":"2981_CR3","unstructured":"CLocate. (2018) CLocate-Conference and Exhibitions Search [Internet]. 2018. Available from: \n                    https:\/\/www.clocate.com\/\n                    \n                  . Cited 1 July 2018."},{"issue":"7659","key":"2981_CR4","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1136\/bmj.a351","volume":"336","author":"JO Drife","year":"2008","unstructured":"Drife, J. O. (2008). Are international medical conferences an outdated luxury the planet can\u2019t afford? No. BMJ,\n                           336(7659), 1467.","journal-title":"BMJ"},{"issue":"7659","key":"2981_CR5","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1136\/bmj.a358","volume":"336","author":"M Green","year":"2008","unstructured":"Green, M. (2008). Are international medical conferences an outdated luxury the planet can\u2019t afford? Yes. BMJ,\n                           336(7659), 1466.","journal-title":"BMJ"},{"issue":"12","key":"2981_CR6","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1001\/jama.2012.360","volume":"307","author":"JP Ioannidis","year":"2012","unstructured":"Ioannidis, J. P. (2012). Are medical conferences useful? And for whom? JAMA,\n                           307(12), 1257\u20131258.","journal-title":"JAMA"},{"issue":"6","key":"2981_CR7","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1002\/ca.22899","volume":"30","author":"J Johal","year":"2017","unstructured":"Johal, J., Ward, R., Gielecki, J., Walocha, J., Natsis, K., Tubbs, R. S., et al. (2017). Beware of the predatory science journal: A potential threat to the integrity of medical research. Clinical Anatomy,\n                           30(6), 767\u2013773.","journal-title":"Clinical Anatomy"},{"issue":"4","key":"2981_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3928\/00220124-20180320-07","volume":"49","author":"AA Lewinski","year":"2018","unstructured":"Lewinski, A. A., & Oermann, M. H. (2018). Characteristics of e-mail solicitations from predatory nursing journals and publishers. The Journal of Continuing Education in Nursing,\n                           49(4), 171\u2013177.","journal-title":"The Journal of Continuing Education in Nursing"},{"issue":"5","key":"2981_CR9","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s11948-017-9955-6","volume":"24","author":"AR Memon","year":"2017","unstructured":"Memon, A. R. (2017). Predatory journals spamming for publications: What should researchers do? Science and Engineering Ethics,\n                           24(5), 1617\u20131639.","journal-title":"Science and Engineering Ethics"},{"issue":"1108","key":"2981_CR10","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1136\/postgradmedj-2017-135097","volume":"94","author":"E Mercier","year":"2018","unstructured":"Mercier, E., Tardif, P. A., Moore, L., Le Sage, N., & Cameron, P. A. (2018). Invitations received from potential predatory publishers and fraudulent conferences: a 12-month early-career researcher experience. Postgraduate Medical Journal,\n                           94(1108), 104\u2013108.","journal-title":"Postgraduate Medical Journal"},{"key":"2981_CR11","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1186\/s12916-015-0423-3","volume":"13","author":"D Moher","year":"2015","unstructured":"Moher, D., & Srivastava, A. (2015). You are invited to submit. BMC Medicine,\n                           13, 180.","journal-title":"BMC Medicine"},{"key":"2981_CR12","unstructured":"Mostafa, M. (2017). How to identify predatory conferences: The think. Check. Attend checklist. Editage Insights; [Internet] [cited June 29, 2018]. Available from: \n                    https:\/\/www.editage.com\/insights\/how-toidentify-predatory-conferences-the-thinkcheckattend-checklist\n                    \n                  ."},{"key":"2981_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/1478-4505-10-26","volume":"10","author":"J Neves","year":"2012","unstructured":"Neves, J., Lavis, J. N., & Ranson, M. K. (2012). A scoping review about conference objectives and evaluative practices: how do we get more out of them? Health Research Policy and Systems,\n                           10, 26.","journal-title":"Health Research Policy and Systems"},{"issue":"4","key":"2981_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1177\/1078390317716883","volume":"23","author":"GS Pearson","year":"2017","unstructured":"Pearson, G. S. (2017). Avoiding predatory journals with \u201c Think. Check. Submit\u201d. Journal American Psychiatric Nurses Association,\n                           23(4), 239\u2013240.","journal-title":"Journal American Psychiatric Nurses Association"},{"key":"2981_CR15","unstructured":"Ruben, A. (2016). Dubious conferences put the \u2018pose\u2019 in \u2018symposium\u2019: Science. Available from: \n                    http:\/\/www.sciencemag.org\/careers\/2016\/11\/dubious-conferences-put-pose-symposium\n                    \n                  . Updated 30 June 2018."},{"issue":"1","key":"2981_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1186\/s12916-017-0785-9","volume":"15","author":"L Shamseer","year":"2017","unstructured":"Shamseer, L., Moher, D., Maduekwe, O., Turner, L., Barbour, V., Burch, R., et al. (2017). Potential predatory and legitimate biomedical journals: Can you tell the difference? A cross-sectional comparison. BMC Medicine,\n                           15(1), 28.","journal-title":"BMC Medicine"},{"issue":"6","key":"2981_CR17","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1007\/s11948-016-9788-8","volume":"23","author":"S Sorooshian","year":"2017","unstructured":"Sorooshian, S. (2017). Conference wolves in sheep\u2019s clothing. Science and Engineering Ethics,\n                           23(6), 1805\u20131806.","journal-title":"Science and Engineering Ethics"},{"key":"2981_CR19","unstructured":"Think Check Attend. (2018). Creative Commons Attribution License; [Internet]. [cited June 29, 2018]. Available from: \n                    https:\/\/thinkchecksubmit.org\/\n                    \n                  ."},{"key":"2981_CR18","unstructured":"Think Check Submit: Choose the right journal for your research. (2018). Creative Commons Attribution License; [Internet]. [cited June 29, 2018]. Available from: \n                    https:\/\/thinkchecksubmit.org\/\n                    \n                  ."}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-018-2981-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-018-2981-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-018-2981-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T19:07:54Z","timestamp":1576350474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-018-2981-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,15]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["2981"],"URL":"https:\/\/doi.org\/10.1007\/s11192-018-2981-6","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"value":"0138-9130","type":"print"},{"value":"1588-2861","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,15]]},"assertion":[{"value":"12 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical Standards"}},{"value":"We have no relevant conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The survey was voluntary and respects the confidentiality and anonymity of all research respondents. Based on ARECCI screening tool no further ethical review required.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}]}}