{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:12:09Z","timestamp":1776075129146,"version":"3.50.1"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T00:00:00Z","timestamp":1575417600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T00:00:00Z","timestamp":1575417600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11192-019-03315-5","type":"journal-article","created":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T06:04:18Z","timestamp":1575439458000},"page":"1171-1188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Spam emails in academia: issues and costs"],"prefix":"10.1007","volume":"122","author":[{"given":"Jaime A.","family":"Teixeira da Silva","sequence":"first","affiliation":[]},{"given":"Aceil","family":"Al-Khatib","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Tsigaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,4]]},"reference":[{"issue":"1","key":"3315_CR1","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11192-010-0190-z","volume":"85","author":"IF Aguillo","year":"2010","unstructured":"Aguillo, I. F., Bar-Ilan, J., Levene, M., & Ortega, J. L. (2010). Comparing university rankings. Scientometrics,85(1), 243\u2013256. https:\/\/doi.org\/10.1007\/s11192-010-0190-z.","journal-title":"Scientometrics"},{"issue":"1","key":"3315_CR2","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s12109-016-9486-z","volume":"33","author":"A Al-Khatib","year":"2017","unstructured":"Al-Khatib, A., & Teixeira da Silva, J. A. (2017a). Threats to the survival of the author-pays-journal to publish model. Publishing Research Quarterly,33(1), 64\u201370. https:\/\/doi.org\/10.1007\/s12109-016-9486-z.","journal-title":"Publishing Research Quarterly"},{"issue":"3","key":"3315_CR3","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11948-016-9808-8","volume":"23","author":"A Al-Khatib","year":"2017","unstructured":"Al-Khatib, A., & Teixeira da Silva, J. A. (2017b). What rights do authors have? Science and Engineering Ethics,23(3), 947\u2013949. https:\/\/doi.org\/10.1007\/s11948-016-9808-8.","journal-title":"Science and Engineering Ethics"},{"issue":"5","key":"3315_CR4","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10207-016-0321-5","volume":"15","author":"A Almaatouq","year":"2016","unstructured":"Almaatouq, A., Shmueli, E., Nouh, M., Alabdulkareem, A., Singh, V. K., Alsaleh, M., et al. (2016). If it looks like a\u00a0spammer and behaves like a\u00a0spammer, it must be a\u00a0spammer:\u00a0analysis\u00a0and detection of microblogging spam accounts. International Journal of Information Security,15(5), 475\u2013491. https:\/\/doi.org\/10.1007\/s10207-016-0321-5.","journal-title":"International Journal of Information Security"},{"issue":"4","key":"3315_CR5","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1109\/SURV.2013.030713.00020","volume":"15","author":"A Almomani","year":"2013","unstructured":"Almomani, A., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013a). A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials,15(4), 2070\u20132090. https:\/\/doi.org\/10.1109\/SURV.2013.030713.00020.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3315_CR6","doi-asserted-by":"crossref","unstructured":"Almomani, A., Gupta, B.B., Wan, T.C., Altaher, A., & Manickam, S. (2013b). Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email. arXiv arXiv:1302.0629 (preprint)","DOI":"10.17485\/ijst\/2013\/v6i1.18"},{"issue":"2","key":"3315_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1308\/rcsann.2016.0056","volume":"98","author":"J Beall","year":"2016","unstructured":"Beall, J. (2016a). Best practices for scholarly authors in the age of predatory journals. Annals of the Royal College of Surgeons of England,98(2), 77\u201379. https:\/\/doi.org\/10.1308\/rcsann.2016.0056.","journal-title":"Annals of the Royal College of Surgeons of England"},{"issue":"10","key":"3315_CR8","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.3346\/jkms.2016.31.10.1511","volume":"31","author":"J Beall","year":"2016","unstructured":"Beall, J. (2016b). Dangerous predatory publishers threaten medical research. Journal of Korean Medical Science,31(10), 1511\u20131513. https:\/\/doi.org\/10.3346\/jkms.2016.31.10.1511.","journal-title":"Journal of Korean Medical Science"},{"key":"3315_CR10","unstructured":"Bilge, L., & Dumitra\u015f, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM conference on computer and communications security, October 16\u201318, 2012, Raleigh, North Carolina, USA (pp. 833\u2013844). New York, NY: ACM."},{"issue":"11","key":"3315_CR11","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/asi.23329","volume":"66","author":"L Bornmann","year":"2015","unstructured":"Bornmann, L., & Mutz, R. (2015). Growth rates of modern science: A bibliometric analysis based on the number of publications and cited references. Journal of the Association for Information Science and Technology,66(11), 2215\u20132222. https:\/\/doi.org\/10.1002\/asi.23329.","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"3315_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.dss.2014.04.006","volume":"64","author":"I Bose","year":"2014","unstructured":"Bose, I., & Leung, A. C. M. (2014). Do phishing alerts impact global corporations? A firm value analysis. Decision Support Systems,64, 67\u201378. https:\/\/doi.org\/10.1016\/j.dss.2014.04.006.","journal-title":"Decision Support Systems"},{"key":"3315_CR13","doi-asserted-by":"publisher","first-page":"517","DOI":"10.22459\/RT.02.2017.30","volume-title":"Regulatory theory: Foundations and applications","author":"R Broadhurst","year":"2017","unstructured":"Broadhurst, R., & Alazab, M. (2017). Spam and crime. In P. Drahos (Ed.), Regulatory theory: Foundations and applications (pp. 517\u2013532). Canberra: ANU Press."},{"issue":"3\u20134","key":"3315_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3109\/17453054.2015.1108294","volume":"38","author":"J Bugeja","year":"2015","unstructured":"Bugeja, J., & Grech, V. (2015). Email solicitation for scholarly work\u2014a single researcher\u2019s perspective. Journal of Visual Communication in Medicine,38(3\u20134), 231\u2013233. https:\/\/doi.org\/10.3109\/17453054.2015.1108294.","journal-title":"Journal of Visual Communication in Medicine"},{"key":"3315_CR15","unstructured":"Clarivate Analytics. (2017). Email marketing top 5 do\u2019s and don\u2019ts. Retrieved November 22, 2019, from https:\/\/clarivate.com\/blog\/science-research-connect\/top-5-email-dos-and-donts\/."},{"issue":"2","key":"3315_CR16","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1634\/theoncologist.2016-0371","volume":"22","author":"M Clemons","year":"2017","unstructured":"Clemons, M., de Costa e Silva, M., Joy, A. A., Cobey, K. D., Mazzarello, S., Stober, C., et al. (2017). Predatory invitations from journals: More than just a nuisance? The Oncologist,22(2), 236\u2013240. https:\/\/doi.org\/10.1634\/theoncologist.2016-0371.","journal-title":"The Oncologist"},{"issue":"7","key":"3315_CR17","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1200\/JOP.2017.021469","volume":"13","author":"KD Cobey","year":"2017","unstructured":"Cobey, K. D., de Costa e Silva, M., Mazzarello, S., Stober, C., Hutton, B., Moher, D., et al. (2017). Is this conference for real? Navigating presumed predatory conference invitations. Journal of Oncology Practice,13(7), 410\u2013413. https:\/\/doi.org\/10.1200\/JOP.2017.021469.","journal-title":"Journal of Oncology Practice"},{"key":"3315_CR18","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.earlhumdev.2018.04.006","volume":"122","author":"S Cuschieri","year":"2018","unstructured":"Cuschieri, S., & Grech, V. (2018). WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work\u2014Young and senior researchers perspectives. Early Human Development,122, 64\u201366. https:\/\/doi.org\/10.1016\/j.earlhumdev.2018.04.006.","journal-title":"Early Human Development"},{"issue":"3","key":"3315_CR19","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s12024-016-9785-x","volume":"12","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., Maliszewski, T., & Teixeira da Silva, J. A. (2016). Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: Actual and potential threats to academic integrity and publishing ethics. Forensic Science, Medicine and Pathology,12(3), 353\u2013362. https:\/\/doi.org\/10.1007\/s12024-016-9785-x.","journal-title":"Forensic Science, Medicine and Pathology"},{"issue":"2","key":"3315_CR20","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s11192-019-03153-5","volume":"120","author":"M Erfanmanesh","year":"2019","unstructured":"Erfanmanesh, M., & Teixeira da Silva, J. A. (2019). Is the soundness-only quality control policy of open access mega journals linked to a higher rate of published errors? Scientometrics,120(2), 917\u2013923. https:\/\/doi.org\/10.1007\/s11192-019-03153-5.","journal-title":"Scientometrics"},{"key":"3315_CR21","unstructured":"Fenner, M. (2011). Did you receive spam because you published a paper? Retrieved November 22, 2019, from http:\/\/blogs.plos.org\/mfenner\/2011\/07\/13\/did-you-receive-spam-because-you-published-a-paper\/."},{"issue":"3","key":"3315_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/publications7030045","volume":"7","author":"JE Frantsv\u00e5g","year":"2019","unstructured":"Frantsv\u00e5g, J. E. (2019). The DOAJ spring cleaning 2016 and what was removed\u2014Tragic loss or good riddance? Publications,7(3), 45. https:\/\/doi.org\/10.3390\/publications7030045.","journal-title":"Publications"},{"key":"3315_CR23","doi-asserted-by":"publisher","first-page":"i5383","DOI":"10.1136\/bmj.i5383","volume":"355","author":"A Grey","year":"2016","unstructured":"Grey, A., Bolland, M. J., Dalbeth, N., Gamble, G., & Sadler, L. (2016). We read spam a lot: Prospective cohort study of unsolicited and unwanted academic invitations. BMJ,355, i5383. https:\/\/doi.org\/10.1136\/bmj.i5383.","journal-title":"BMJ"},{"key":"3315_CR24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","year":"2016","unstructured":"Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey, PA: IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-0105-3."},{"issue":"2","key":"3315_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11235-017-0334-z","volume":"67","author":"BB Gupta","year":"2018","unstructured":"Gupta, B. B., Arachchilage, N. A., & Psannis, K. E. (2018). Defending against phishing attacks: Taxonomy of methods, current issues and future directions. Telecommunication Systems,67(2), 247\u2013267. https:\/\/doi.org\/10.1007\/s11235-017-0334-z.","journal-title":"Telecommunication Systems"},{"issue":"12","key":"3315_CR26","doi-asserted-by":"publisher","first-page":"3629","DOI":"10.1007\/s00521-016-2275-y","volume":"28","author":"BB Gupta","year":"2017","unstructured":"Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications,28(12), 3629\u20133654. https:\/\/doi.org\/10.1007\/s00521-016-2275-y.","journal-title":"Neural Computing and Applications"},{"key":"3315_CR27","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1056\/NEJMp1512330","volume":"373","author":"CJ Haug","year":"2015","unstructured":"Haug, C. J. (2015). Peer-review fraud\u2014Hacking the scientific publication process. The New England Journal of Medicine,373, 2393\u20132395. https:\/\/doi.org\/10.1056\/NEJMp1512330.","journal-title":"The New England Journal of Medicine"},{"issue":"7739","key":"3315_CR28","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1038\/d41586-019-00120-1","volume":"565","author":"DW Hedding","year":"2019","unstructured":"Hedding, D. W. (2019). Payouts push professors towards predatory journals. Nature,565(7739), 267. https:\/\/doi.org\/10.1038\/d41586-019-00120-1.","journal-title":"Nature"},{"issue":"1","key":"3315_CR29","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/08109021003676359","volume":"28","author":"JW Houghton","year":"2010","unstructured":"Houghton, J. W., & Oppenheim, C. (2010). The economic implications of alternative publishing models. Prometheus,28(1), 41\u201354. https:\/\/doi.org\/10.1080\/08109021003676359.","journal-title":"Prometheus"},{"key":"3315_CR30","doi-asserted-by":"publisher","first-page":"5421046","DOI":"10.1155\/2017\/5421046","volume":"2017","author":"AK Jain","year":"2017","unstructured":"Jain, A. K., & Gupta, B. B. (2017). Phishing detection: Analysis of visual similarity based approaches. Security and Communication Networks,2017, 5421046. https:\/\/doi.org\/10.1155\/2017\/5421046.","journal-title":"Security and Communication Networks"},{"issue":"20","key":"3315_CR31","first-page":"1","volume":"16","author":"SA Jawaid","year":"2015","unstructured":"Jawaid, S. A., & Sherin, A. (2015). Professionalism, role of editors, regional editors organizations, predatory journals, publishers and indexing highlighted at WAME conference in India. Pulse International,16(20), 1\u20132.","journal-title":"Pulse International"},{"issue":"3","key":"3315_CR32","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/j.chb.2012.12.037","volume":"29","author":"AC Jerejian","year":"2013","unstructured":"Jerejian, A. C., Reid, C., & Rees, C. S. (2013). The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics. Computers in Human Behavior,29(3), 991\u2013996. https:\/\/doi.org\/10.1016\/j.chb.2012.12.037.","journal-title":"Computers in Human Behavior"},{"key":"3315_CR33","unstructured":"Johnson, R., Watkinson, A., & Mabe, M. (2018). The STM Report: An overview of scientific and scholarly publishing, October, 5th edition, by the International Association of Scientific, Technical and Medical Publishers, The Hague, The Netherlands, 213 pp. Retrieved November 22, 2019, from https:\/\/www.stm-assoc.org\/2018_10_04_STM_Report_2018.pdf."},{"issue":"5","key":"3315_CR34","doi-asserted-by":"publisher","first-page":"709","DOI":"10.3346\/jkms.2017.32.5.709","volume":"32","author":"M Kebede","year":"2017","unstructured":"Kebede, M., Schmaus-Klughammer, A. E., & Tekle, B. T. (2017). Manuscript submission invitations from \u2018predatory journals\u2019: What should authors do? Journal of Korean Medical Science,32(5), 709\u2013712. https:\/\/doi.org\/10.3346\/jkms.2017.32.5.709.","journal-title":"Journal of Korean Medical Science"},{"key":"3315_CR35","unstructured":"Kelly, B., & Delasalle, J. (2012). Can LinkedIn and Academia.edu enhance access to open repositories? In OR2012: The 7th international conference on open repositories. University of Bath. Retrieved November 22, 2019, from http:\/\/opus.bath.ac.uk\/30227\/1\/or12-136-final.pdf."},{"issue":"8","key":"3315_CR36","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1002\/asi.23521","volume":"67","author":"M Kozak","year":"2016","unstructured":"Kozak, M., Iefremova, O., & Hartley, J. (2016). Spamming in scholarly publishing: A case study. Journal of the Association for Information Science and Technology,67(8), 2009\u20132015. https:\/\/doi.org\/10.1002\/asi.23521.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"5","key":"3315_CR37","doi-asserted-by":"publisher","first-page":"711","DOI":"10.6633\/IJNS.201709.19(5).08","volume":"19","author":"P Kuacharoen","year":"2017","unstructured":"Kuacharoen, P. (2017). An anti-phishing password authentication protocol. International Journal of Network Security,19(5), 711\u2013719. https:\/\/doi.org\/10.6633\/IJNS.201709.19(5).08.","journal-title":"International Journal of Network Security"},{"issue":"3","key":"3315_CR38","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s11192-010-0202-z","volume":"84","author":"P Larsen","year":"2010","unstructured":"Larsen, P., & Von Ins, M. (2010). The rate of growth in scientific publication and the decline in coverage provided by Science Citation Index. Scientometrics,84(3), 575\u2013603. https:\/\/doi.org\/10.1007\/s11192-010-0202-z.","journal-title":"Scientometrics"},{"issue":"4","key":"3315_CR39","doi-asserted-by":"publisher","first-page":"171","DOI":"10.3928\/00220124-20180320-07","volume":"49","author":"AA Lewinski","year":"2018","unstructured":"Lewinski, A. A., & Oermann, M. H. (2018). Characteristics of e-mail solicitations from predatory nursing journals and publishers. The Journal of Continuing Education in Nursing,49(4), 171\u2013177. https:\/\/doi.org\/10.3928\/00220124-20180320-07.","journal-title":"The Journal of Continuing Education in Nursing"},{"key":"3315_CR40","unstructured":"Loder, T., Van Alstyne, M., & Wash, R. (2004). An economic answer to unsolicited communication. In Proceedings of the 5th ACM conference on electronic commerce (pp. 40\u201350). ACM. TPRC 2005. Retrieved November 22, 2019, from at SSRN https:\/\/ssrn.com\/abstract=2119659."},{"key":"3315_CR41","doi-asserted-by":"crossref","unstructured":"Lucey, B. M. (2013). Ten tips from an editor on undertaking academic peer review for journals. Retrieved November 22, 2019, from https:\/\/ssrn.com\/abstract=2331281. http:\/\/doi.org\/10.2139\/ssrn.2331281.","DOI":"10.2139\/ssrn.2331281"},{"key":"3315_CR42","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.future.2018.07.046","volume":"90","author":"A Makkar","year":"2019","unstructured":"Makkar, A., & Kumar, N. (2019). Cognitive spammer: A framework for pagerank analysis with split by over-sampling and train by under-fitting. Future Generation Computer Systems,90, 381\u2013404. https:\/\/doi.org\/10.1016\/j.future.2018.07.046.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"3315_CR43","doi-asserted-by":"publisher","first-page":"183","DOI":"10.3138\/jsp.50.3.02","volume":"50","author":"S Manley","year":"2019","unstructured":"Manley, S. (2019). Predatory journals on trial. Allegations, responses, and lessons for scholarly publishing from FTC v. OMICS. Journal of Scholarly Publishing,50(3), 183\u2013200. https:\/\/doi.org\/10.3138\/jsp.50.3.02.","journal-title":"Journal of Scholarly Publishing"},{"issue":"1","key":"3315_CR44","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3747\/co.23.2860","volume":"23","author":"S Mazzarello","year":"2016","unstructured":"Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for eliminating spam. Current Oncology,23(1), 75\u201376. https:\/\/doi.org\/10.3747\/co.23.2860.","journal-title":"Current Oncology"},{"key":"3315_CR45","doi-asserted-by":"publisher","first-page":"47991","DOI":"10.1109\/ACCESS.2019.2908420","volume":"7","author":"K Mehmood","year":"2019","unstructured":"Mehmood, K., Essam, D., Shafi, K., & Malik, M. K. (2019). Discriminative feature spamming technique for Roman Urdu sentiment analysis. IEEE Access,7, 47991\u201348002. https:\/\/doi.org\/10.1109\/ACCESS.2019.2908420.","journal-title":"IEEE Access"},{"issue":"1108","key":"3315_CR46","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1136\/postgradmedj-2017-135097","volume":"94","author":"E Mercier","year":"2018","unstructured":"Mercier, E., Tardif, P. A., Moore, L., Le Sage, N., & Cameron, P. A. (2018). Invitations received from potential predatory publishers and fraudulent conferences: A 12-month early-career researcher experience. Postgraduate Medical Journal,94(1108), 104\u2013108. https:\/\/doi.org\/10.1136\/postgradmedj-2017-135097.","journal-title":"Postgraduate Medical Journal"},{"issue":"3","key":"3315_CR47","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s11192-012-0732-7","volume":"93","author":"C Michels","year":"2012","unstructured":"Michels, C., & Schmoch, U. (2012). The growth of science and database coverage. Scientometrics,93(3), 831\u2013846. https:\/\/doi.org\/10.1007\/s11192-012-0732-7.","journal-title":"Scientometrics"},{"key":"3315_CR48","doi-asserted-by":"crossref","unstructured":"Mohebzada, J. G., El Zarka, A., Bhojani, A. H. & Darwish, A. (2012). Phishing in a university community: Two large scale phishing experiments. In 2012 international conference on innovations in information technology (IIT) (pp. 249\u2013254). IEEE. http:\/\/dx.doi.org\/10.1109\/INNOVATIONS.2012.6207742.","DOI":"10.1109\/INNOVATIONS.2012.6207742"},{"key":"3315_CR49","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1186\/s12916-015-0423-3","volume":"13","author":"D Moher","year":"2015","unstructured":"Moher, D., & Srivastava, A. (2015). You are invited to submit\u2026. BMC Medicine,13, 180. https:\/\/doi.org\/10.1186\/s12916-015-0423-3.","journal-title":"BMC Medicine"},{"issue":"2","key":"3315_CR50","first-page":"9","volume":"2","author":"D Nagamalai","year":"2008","unstructured":"Nagamalai, D., Dhinakaran, B. C., & Lee, J. K. (2008). An in-depth analysis of spam and spammers. International Journal of Security and its Applications,2(2), 9\u201322. arXiv:1302.0629.","journal-title":"International Journal of Security and its Applications"},{"issue":"2","key":"3315_CR51","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.surg.2018.01.027","volume":"164","author":"V Nguyen","year":"2018","unstructured":"Nguyen, V., Marmor, R. A., Ramamoorthy, S. L., Costantini, T. W., Baumgartner, J. M., Berumen, J., et al. (2018). The use of solicited publishing by academic surgeons. Surgery,164(2), 212\u2013218. https:\/\/doi.org\/10.1016\/j.surg.2018.01.027.","journal-title":"Surgery"},{"key":"3315_CR52","doi-asserted-by":"publisher","first-page":"4635","DOI":"10.4000\/rfsic.4635","volume":"15","author":"D Nicholas","year":"2019","unstructured":"Nicholas, D., Boukacem-Zeghmouri, C., Rodr\u00edguez-Bravo, B., Watkinson, A., \u015awigon, M., Xu, J., et al. (2019). Early career researchers: Observing how the new wave of researchers is changing the scholarly communications market. Revue Fran\u00e7aise des Sciences de l\u2019Information et de la Communication,15, 4635. https:\/\/doi.org\/10.4000\/rfsic.4635.","journal-title":"Revue Fran\u00e7aise des Sciences de l\u2019Information et de la Communication"},{"issue":"6","key":"3315_CR53","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1111\/jnu.12248","volume":"48","author":"MH Oermann","year":"2016","unstructured":"Oermann, M. H., Conklin, J. L., Nicoll, L. H., Chinn, P. L., Ashton, K. S., Edie, A. H., et al. (2016). Study of predatory open access nursing journals: Predatory nursing journals. Journal of Nursing Scholarship,48(6), 624\u2013632. https:\/\/doi.org\/10.1111\/jnu.12248.","journal-title":"Journal of Nursing Scholarship"},{"issue":"4","key":"3315_CR54","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.outlook.2018.04.007","volume":"66","author":"MH Oermann","year":"2018","unstructured":"Oermann, M. H., Nicoll, L. H., & Chinn, P. L. (2018a). Response to letter to the editor from Simpson re: Quality of articles published in predatory nursing journals. Nursing Outlook,66(4), 350\u2013351. https:\/\/doi.org\/10.1016\/j.outlook.2018.04.007.","journal-title":"Nursing Outlook"},{"issue":"1","key":"3315_CR55","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.outlook.2017.05.005","volume":"66","author":"MH Oermann","year":"2018","unstructured":"Oermann, M. H., Nicoll, L. H., Chinn, P. L., Ashton, K. S., Conklin, J. L., Edie, A. H., et al. (2018b). Quality of articles published in predatory nursing journals. Nursing Outlook,66(1), 4\u201310. https:\/\/doi.org\/10.1016\/j.outlook.2017.05.005.","journal-title":"Nursing Outlook"},{"issue":"6","key":"3315_CR56","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.18520\/cs\/v114\/i06\/1299-1303","volume":"114","author":"B Patwardhan","year":"2018","unstructured":"Patwardhan, B., Nagarkar, S., Gadre, S. R., Lakhotia, S. C., Katoch, V. M., & Moher, D. (2018). A critical analysis of the \u2018UGC-approved list of journals\u2019. Current Science,114(6), 1299\u20131303. https:\/\/doi.org\/10.18520\/cs\/v114\/i06\/1299-1303.","journal-title":"Current Science"},{"issue":"2","key":"3315_CR57","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/1360080X.2015.1019121","volume":"37","author":"S Pignata","year":"2015","unstructured":"Pignata, S., Lushington, K., Sloan, J., & Buchanan, F. (2015). Employees\u2019 perceptions of email communication, volume and management strategies in an Australian university. Journal of Higher Education Policy and Management,37(2), 159\u2013171. https:\/\/doi.org\/10.1080\/1360080X.2015.1019121.","journal-title":"Journal of Higher Education Policy and Management"},{"issue":"5","key":"3315_CR58","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1108\/AJIM-01-2017-0014","volume":"69","author":"W Quan","year":"2017","unstructured":"Quan, W., Chen, B.-K., & Shu, F. (2017). Publish or impoverish. Aslib Journal of Information Management,69(5), 486\u2013502. https:\/\/doi.org\/10.1108\/AJIM-01-2017-0014.","journal-title":"Aslib Journal of Information Management"},{"issue":"3","key":"3315_CR59","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1257\/jep.26.3.87","volume":"26","author":"JM Rao","year":"2012","unstructured":"Rao, J. M., & Reiley, D. H. (2012). The economics of spam. Journal of Economic Perspectives,26(3), 87\u2013110. https:\/\/doi.org\/10.1257\/jep.26.3.87.","journal-title":"Journal of Economic Perspectives"},{"key":"3315_CR60","doi-asserted-by":"publisher","first-page":"42934","DOI":"10.1109\/ACCESS.2019.2908495","volume":"7","author":"Y-F Ren","year":"2019","unstructured":"Ren, Y.-F., & Ji, D.-H. (2019). Learning to detect deceptive opinion spam: A survey. IEEE Access,7, 42934\u201342945. https:\/\/doi.org\/10.1109\/ACCESS.2019.2908495.","journal-title":"IEEE Access"},{"key":"3315_CR61","unstructured":"RIN (Research Information Network). (2008). Activities, costs and funding flows in the scholarly communications system in the UK. Report commissioned by the Research Information Network (RIN). Retrieved November 22, 2019, from http:\/\/www.rin.ac.uk\/system\/files\/attachments\/Activities-costs-flows-summary.pdf."},{"issue":"2","key":"3315_CR62","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/publications7010007","volume":"7","author":"J Soler","year":"2019","unstructured":"Soler, J., & Cooper, A. (2019). Unexpected emails to submit your work: Spam or legitimate offers? The implications for novice English L2 writers. Publications,7(2), 7. https:\/\/doi.org\/10.3390\/publications7010007.","journal-title":"Publications"},{"issue":"3","key":"3315_CR63","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1023\/A:1010064007816","volume":"1","author":"RA Spinello","year":"1999","unstructured":"Spinello, R. A. (1999). Ethical reflections on the problem of spam. Ethics and Information Technology,1(3), 185\u2013191. https:\/\/doi.org\/10.1023\/A:1010064007816.","journal-title":"Ethics and Information Technology"},{"key":"3315_CR64","doi-asserted-by":"publisher","first-page":"e00411-19","DOI":"10.1128\/mBio.00411-19","volume":"10","author":"M Strinzel","year":"2019","unstructured":"Strinzel, M., Severin, A., Milzow, K., & Egger, M. (2019). Blacklists and whitelists to tackle predatory publishing: A cross-sectional comparison and thematic analysis. mBio,10, e00411-19. https:\/\/doi.org\/10.1128\/mBio.00411-19.","journal-title":"mBio"},{"key":"3315_CR65","doi-asserted-by":"crossref","unstructured":"Sunder, S., Kraut, R.E., Morris, J., Telang, R., Filer, D., & Cronin, M.A. (2002). Markets for attention: Will postage for email help? In: Proceedings of the 2002 ACM conference on computer supported cooperative work (pp. 206\u2013215). ACM. http:\/\/doi.org\/10.2139\/ssrn.325961","DOI":"10.2139\/ssrn.325961"},{"key":"3315_CR66","unstructured":"Teixeira da Silva, J. A. (2013a). Predatory publishing: A quantitative assessment, the Predatory Score. The Asian and Australasian Journal of Plant Science and Biotechnology,7(Special issue 1), 21\u201334. Retrieved November 29, 2019, from http:\/\/www.globalsciencebooks.info\/Online\/GSBOnline\/images\/2013\/AAJPSB_7(SI1)\/AAJPSB_7(SI1)21-34o.pdf."},{"key":"3315_CR67","unstructured":"Teixeira da Silva, J. A. (2013b). The Global Science Factor v. 1.1: A new system for measuring and quantifying quality in science. The Asian and Australasian Journal of Plant Science and Biotechnology,7(Special issue 1), 92\u2013101. Retrieved November 29, 2019, from http:\/\/www.globalsciencebooks.info\/Online\/GSBOnline\/images\/2013\/AAJPSB_7(SI1)\/AAJPSB_7(SI1)92-101o.pdf."},{"issue":"2","key":"3315_CR68","doi-asserted-by":"publisher","first-page":"151","DOI":"10.5294\/PEBI.2016.20.2.3","volume":"20","author":"JA Teixeira da Silva","year":"2016","unstructured":"Teixeira da Silva, J. A. (2016). On the abuse of online submission systems, fake peer reviews and editor-created accounts. Persona y Bio\u00e9tica,20(2), 151\u2013158. https:\/\/doi.org\/10.5294\/PEBI.2016.20.2.3.","journal-title":"Persona y Bio\u00e9tica"},{"key":"3315_CR69","doi-asserted-by":"publisher","first-page":"28","DOI":"10.21037\/amj.2017.02.10","volume":"2","author":"JA Teixeira da Silva","year":"2017","unstructured":"Teixeira da Silva, J. A. (2017a). Fake peer reviews, fake identities, fake accounts, fake data: Beware! AME Medical Journal,2, 28. https:\/\/doi.org\/10.21037\/amj.2017.02.10.","journal-title":"AME Medical Journal"},{"issue":"4","key":"3315_CR70","doi-asserted-by":"publisher","first-page":"610","DOI":"10.3329\/bjms.v16i4.33623","volume":"16","author":"JA Teixeira da Silva","year":"2017","unstructured":"Teixeira da Silva, J. A. (2017b). Ethical exceptionalism: Can publishing rules be manipulated to give the impression of ethical publishing? Bangladesh Journal of Medical Science,16(4), 610\u2013614. https:\/\/doi.org\/10.3329\/bjms.v16i4.33623.","journal-title":"Bangladesh Journal of Medical Science"},{"issue":"3","key":"3315_CR71","doi-asserted-by":"publisher","first-page":"349","DOI":"10.6120\/JoEMLS.201811_55(3).e001.BC.BE","volume":"55","author":"JA Teixeira da Silva","year":"2018","unstructured":"Teixeira da Silva, J. A., Dobr\u00e1nszki, J., Al-Khatib, A., & Tsigaris, P. (2018). Challenges facing the DOAJ (Directory of Open Access Journals) as a reliable source of open access publishing venues. Journal of Educational Media & Library Sciences,55(3), 349\u2013358. https:\/\/doi.org\/10.6120\/JoEMLS.201811_55(3).e001.BC.BE.","journal-title":"Journal of Educational Media & Library Sciences"},{"issue":"6","key":"3315_CR72","doi-asserted-by":"publisher","first-page":"102071","DOI":"10.1016\/j.acalib.2019.102071","volume":"45","author":"JA Teixeira da Silva","year":"2019","unstructured":"Teixeira da Silva, J. A., Dobr\u00e1nszki, J., Tsigaris, P., & Al-Khatib, A. (2019a). Predatory and exploitative behaviour in academic publishing: An assessment. The Journal of Academic Librarianship,45(6), 102071. https:\/\/doi.org\/10.1016\/j.acalib.2019.102071.","journal-title":"The Journal of Academic Librarianship"},{"issue":"1","key":"3315_CR73","doi-asserted-by":"publisher","first-page":"110","DOI":"10.17646\/KOME.75698.87","volume":"7","author":"JA Teixeira da Silva","year":"2019","unstructured":"Teixeira da Silva, J. A., Katavi\u0107, V., Dobr\u00e1nszki, J., Al-Khatib, A., & Bornemann-Cimenti, H. (2019b). Establishing rules for ethicists and ethics organizations in academic publishing to avoid conflicts of interest, favoritism, cronyism and nepotism. KOME,7(1), 110\u2013125. https:\/\/doi.org\/10.17646\/KOME.75698.87.","journal-title":"KOME"},{"issue":"2","key":"3315_CR74","first-page":"325","volume":"19","author":"JA Teixeira da Silva","year":"2017","unstructured":"Teixeira da Silva, J. A., & Shaughnessy, M. F. (2017). An interview with Jaime A. Teixeira da Silva: Insight into improving the efficiency of the publication process. North American Journal of Psychology,19(2), 325\u2013338.","journal-title":"North American Journal of Psychology"},{"issue":"4","key":"3315_CR75","first-page":"259","volume":"14","author":"JA Teixeira da Silva","year":"2017","unstructured":"Teixeira da Silva, J. A., Sorooshian, S., & Al-Khatib, A. (2017). Cost\u2013benefit assessment of congresses, meetings or symposia, and selection criteria to determine if they are predatory. Walailak Journal of Science and Technology,14(4), 259\u2013265.","journal-title":"Walailak Journal of Science and Technology"},{"issue":"6","key":"3315_CR76","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1016\/j.acalib.2018.09.017","volume":"44","author":"JA Teixeira da Silva","year":"2018","unstructured":"Teixeira da Silva, J. A., & Tsigaris, P. (2018). What value do whitelists and blacklists have in academia? The Journal of Academic Librarianship,44(6), 781\u2013792. https:\/\/doi.org\/10.1016\/j.acalib.2018.09.017.","journal-title":"The Journal of Academic Librarianship"},{"key":"3315_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2019.102070","author":"JA Teixeira da Silva","year":"2019","unstructured":"Teixeira da Silva, J. A., & Tsigaris, P. (2019). Issues with criteria to evaluate blacklists: An epidemiological approach. The Journal of Academic Librarianship. https:\/\/doi.org\/10.1016\/j.acalib.2019.102070.","journal-title":"The Journal of Academic Librarianship"},{"issue":"3","key":"3315_CR78","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/s12109-019-09654-8","volume":"35","author":"JA Teixeira da Silva","year":"2019","unstructured":"Teixeira da Silva, J. A., Tsigaris, P., & Al-Khatib, A. (2019c). Open access mega-journals: Quality, economics and post-publication peer review infrastructure. Publishing Research Quarterly,35(3), 418\u2013435. https:\/\/doi.org\/10.1007\/s12109-019-09654-8.","journal-title":"Publishing Research Quarterly"},{"key":"3315_CR79","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/publications7020034","volume":"7","author":"JP Tennant","year":"2019","unstructured":"Tennant, J. P., Crane, H., Crick, T., Davila, J., Enkhbayar, A., Havemann, J., et al. (2019). Ten hot topics around scholarly publishing. Publications,7, 34. https:\/\/doi.org\/10.3390\/publications7020034.","journal-title":"Publications"},{"issue":"5","key":"3315_CR80","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1002\/asi.23236","volume":"66","author":"M Thelwall","year":"2015","unstructured":"Thelwall, M., & Kousha, K. (2015). ResearchGate: Disseminating, communicating, and measuring scholarship? Journal of the Association for Information Science and Technology,66(5), 876\u2013889. https:\/\/doi.org\/10.1002\/asi.23236.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"4","key":"3315_CR81","doi-asserted-by":"publisher","first-page":"362","DOI":"10.4065\/mcp.2010.0817","volume":"86","author":"B Thomas","year":"2011","unstructured":"Thomas, B. (2011). E-mail address harvesting on PubMed\u2014A call for responsible handling of e-mail addresses. Mayo Clinic Proceedings,86(4), 362. https:\/\/doi.org\/10.4065\/mcp.2010.0817.","journal-title":"Mayo Clinic Proceedings"},{"issue":"6","key":"3315_CR82","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1007\/s10734-018-0247-0","volume":"76","author":"S Torp","year":"2018","unstructured":"Torp, S., Lysfjord, L., & Midje, H. H. (2018). Workaholism and work\u2013family conflict among university academics. Higher Education,76(6), 1071\u20131090. https:\/\/doi.org\/10.1007\/s10734-018-0247-0.","journal-title":"Higher Education"},{"issue":"3","key":"3315_CR83","doi-asserted-by":"publisher","first-page":"298-105","DOI":"10.1108\/JSIT-11-2017-0105","volume":"20","author":"SK Trivedi","year":"2018","unstructured":"Trivedi, S. K., & Panigrahi, P. K. (2018). Spam classification: a comparative analysis of different boosted decision tree approaches. Journal of Systems and Information Technology,20(3), 298-105. https:\/\/doi.org\/10.1108\/JSIT-11-2017-0105.","journal-title":"Journal of Systems and Information Technology"},{"issue":"3","key":"3315_CR84","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.ipm.2015.10.002","volume":"52","author":"A Watkinson","year":"2016","unstructured":"Watkinson, A., Nicholas, D., Thornley, C., Herman, E., Jamali, H. R., Volentine, R., et al. (2016). Changes in the digital scholarly environment and issues of trust: An exploratory, qualitative analysis. Information Processing and Management,52(3), 446\u2013458. https:\/\/doi.org\/10.1016\/j.ipm.2015.10.002.","journal-title":"Information Processing and Management"},{"key":"3315_CR85","doi-asserted-by":"publisher","first-page":"e027928","DOI":"10.1136\/bmjopen-2018-027928","volume":"9","author":"TA Wilkinson","year":"2019","unstructured":"Wilkinson, T. A., Russell, C. J., Bennett, W. E., Cheng, E. R., & Carroll, A. E. (2019). A cross-sectional study of predatory publishing emails received by career development grant awardees. British Medical Journal Open,9, e027928. https:\/\/doi.org\/10.1136\/bmjopen-2018-027928.","journal-title":"British Medical Journal Open"},{"issue":"B","key":"3315_CR86","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/j.chb.2015.11.007","volume":"55","author":"MC Yu","year":"2016","unstructured":"Yu, M. C., Wu, Y. C. J., Alhalabi, W., Kao, H. Y., & Wu, W. H. (2016). ResearchGate: An effective altmetric indicator for active researchers? Computers in Human Behavior,55(B), 1001\u20131006. https:\/\/doi.org\/10.1016\/j.chb.2015.11.007.","journal-title":"Computers in Human Behavior"},{"issue":"2\/3","key":"3315_CR87","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1504\/IJGUC.2013.056254","volume":"4","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Huang, M. L., & Hoang, D. (2013). Visual analytics for intrusion detection in spam emails. International Journal of Grid and Utility Computing,4(2\/3), 178\u2013186.","journal-title":"International Journal of Grid and Utility Computing"}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03315-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-019-03315-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03315-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:21:17Z","timestamp":1606954877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-019-03315-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,4]]},"references-count":86,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["3315"],"URL":"https:\/\/doi.org\/10.1007\/s11192-019-03315-5","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"value":"0138-9130","type":"print"},{"value":"1588-2861","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,4]]},"assertion":[{"value":"19 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standard"}},{"value":"The authors declare no conflicts of interest, financial or otherwise, of relevance to this topic.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}