{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:24:21Z","timestamp":1769102661810,"version":"3.49.0"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,3,8]],"date-time":"2018-03-08T00:00:00Z","timestamp":1520467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11948-018-0038-0","type":"journal-article","created":{"date-parts":[[2018,3,8]],"date-time":"2018-03-08T06:28:02Z","timestamp":1520490482000},"page":"975-979","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Invitation to Speak at a Conference: The Tempting Technique Adopted by Predatory Conferences\u2019 Organizers"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3290-3162","authenticated-orcid":false,"given":"Amin","family":"Asadi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,8]]},"reference":[{"issue":"1","key":"38_CR1","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11948-015-9747-9","volume":"23","author":"A Asadi","year":"2016","unstructured":"Asadi, A., Rahbar, N., Asadi, M., Asadi, F., & Paji, K. K. (2016). Online-based approaches to identify real journals and publishers from hijacked ones. Science and Engineering Ethics, 23(1), 305\u2013308.","journal-title":"Science and Engineering Ethics"},{"key":"38_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-017-9906-2","author":"A Asadi","year":"2017","unstructured":"Asadi, A., Rahbar, N., Rezvani, M. J., & Asadi, F. (2017). Fake\/bogus conferences: Their features and some subtle ways to differentiate them from real ones. Science and Engineering Ethics. \n                    https:\/\/doi.org\/10.1007\/s11948-017-9906-2\n                    \n                  .","journal-title":"Science and Engineering Ethics"},{"issue":"7415","key":"38_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1038\/489179a","volume":"489","author":"J Beall","year":"2012","unstructured":"Beall, J. (2012). Predatory publishers are corrupting open access: Journals that exploit the author-pays model damage scholarly publishing and promote unethical behaviour by scientists, argues Jeffrey Beall. Nature,\n                           489(7415), 179\u2013180.","journal-title":"Nature"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s11948-014-9595-z","volume":"21","author":"MH Esfe","year":"2015","unstructured":"Esfe, M. H., Wongwises, S., Asadi, A., & Akbari, M. (2015). Fake journals: Their features and some viable ways to distinguishing them. Science and Engineering Ethics,\n                           21(4), 821\u2013824.","journal-title":"Science and Engineering Ethics"},{"issue":"5","key":"38_CR5","first-page":"389","volume":"11","author":"M Jalalian","year":"2014","unstructured":"Jalalian, M., & Mahboobi, H. (2014). Hijacked journals and predatory publishers: Is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology (WJST),\n                           11(5), 389\u2013394.","journal-title":"Walailak Journal of Science and Technology (WJST)"},{"issue":"6","key":"38_CR6","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1007\/s11948-016-9788-8","volume":"23","author":"S Sorooshian","year":"2017","unstructured":"Sorooshian, S. (2017a). Conference wolves in sheep\u2019s clothing. Science and Engineering Ethics,\n                           23(6), 1805\u20131806.","journal-title":"Science and Engineering Ethics"},{"issue":"2","key":"38_CR7","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s11948-016-9765-2","volume":"23","author":"S Sorooshian","year":"2017","unstructured":"Sorooshian, S. (2017b). Scholarly black market. Science and Engineering Ethics,\n                           23(2), 623\u2013624.","journal-title":"Science and Engineering Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0038-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-018-0038-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0038-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T11:07:05Z","timestamp":1561374425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-018-0038-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,8]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["38"],"URL":"https:\/\/doi.org\/10.1007\/s11948-018-0038-0","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,8]]},"assertion":[{"value":"19 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}