Summary
Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact.
Predatory publishing or “phishing” emails purport to invite scholarly activity, but in truth actually seek to collect publishing or registration fees.1 Senders from these “journals” and/or “conferences” attempt to disguise their intent and platforms. Despite claims to the contrary, predatory journals do not provide peer review or editorial services — essential steps in validating research methodology and manuscript content — nor do they offer transparent policies or processes regarding fees, long-term archiving and/or the management of potential conflicts of interest.2 The challenges incumbent in the academic, peer-reviewed literature associated with predatory journals have now become so substantial that this was the lone topic at the most recent meeting of the Surgery Journal Editors Group (SJEG).3 Although the SJEG does not have any overriding policing authority, it is an engaged group of editors from the most prominent peer-reviewed surgical journals in the world, who determine and evaluate surgical publication policy and requirements. Furthermore, our surgical trainees, research assistants and nursing collaborators are also finding it increasingly difficult to navigate the extensive web of deceitful possibilities and invitations. In the event that these journals do actually publish, the lack of adequate peer review dilutes the quality of evidence within the literature.4
Case study of a single surgeon’s email inbox
All emails received by an academic surgeon at his hospital-provided email account over a 6-month period were evaluated by 2 reviewers (M.M. and D.N.). Characteristics recorded included the site of origin, presence of grammatical errors, contact information provided, relevance of the invitation to the recipient’s specialty, as well as whether the sender had already been identified as fraudulent by either Beall’s list of potential predatory journals and publishers (beallslist.net) or the CalTech Library list of questionable conferences (https://libguides.caltech.edu/c.php?g=512665&p=3503029).
A total of 1905 emails were received within the observation period. Of these, 608 were identified as likely to be fraudulent phishing emails and were found to consist of invitations to submit a manuscript (46.9%), present at a conference (34.7%), attend a conference (9.2%), join an editorial board (4.1%), both submit a manuscript and join an editorial board (4.1%), contribute to an eBook (0.7%), or review a manuscript (0.3%). Almost all of the predatory email invitations originated from either fake journals (55.1%) or conference hosts (43.9%).
Phishing emails seeking manuscript submissions originated from 43 different fake publishers with 146 different journal titles (Table 1) or 8 fake stand-alone journals (Table 2). The majority of fake publishers were already included on Beall’s list (86.7%). Characteristics associated with emails suspected of being predatory included the presence of obvious spelling and/or grammar errors (90.2%), a salutation including the word “greetings” (60.4%; e.g., “Greetings of the day,” “Greetings from…,” “Warm greetings…”), an offer to submit a broad range of document/article categories (53.3%; e.g., including research or review articles, case reports, editorials, clinical images, letters to editors), and/or the use of excessively flattering language (46.7%; Table 3).
Table 1.
Summary of phishing emails from predatory publishers seeking manuscript submissions
Publisher | No. (%) of emails received, n =285 | Present on Beall’s list | Journal titles used by predatory publisher |
---|---|---|---|
Open Access Text | 42 (14.7) | Yes |
|
OMICS Publishing Group | 19 (6.7) | Yes |
|
Remedy Publications | 18 (6.3) | Yes |
|
Austin Publishing Group | 17 (6.0) | Yes |
|
Gavin Publishers | 14 (4.9) | Yes |
|
Peertechz | 11 (3.9) | Yes |
|
ClinMed International Library | 9 (3.2) | Yes |
|
Allied Academies | 7 (2.5) | Yes |
|
SCIAEON | 7 (2.5) | Yes |
|
SM Online Publishers | 7 (2.5) | Yes |
|
Global Science Library Publishers | 6 (2.1) | No |
|
Insight Medical Publishing | 6 (2.1) | Yes |
|
KEI Journals | 4 (1.4) | Yes |
|
Pulsus Group | 4 (1.4) | Yes |
|
Science Publishing Group | 4 (1.4) | Yes |
|
Scientific Literature | 4 (1.4) | Yes |
|
SciRes Literature | 4 (1.4) | Yes |
|
SciTechnol | 4 (1.4) | Yes |
|
Somato Publications | 4 (1.4) | No |
|
Crimson Publishers | 3 (1.1) | Yes |
|
Herald Scholarly Open Access | 3 (1.1) | Yes |
|
MedCrave | 3 (1.1) | Yes |
|
Symbiosis Online Publishing | 3 (1.1) | Yes |
|
Bioaccent Publishing | 2 (0.7) | Yes |
|
Chronicle Publishers | 2 (0.7) | No |
|
Gratis Open Access Publishing | 2 (0.7) | Yes |
|
Heighten Science Publications | 2 (0.7) | Yes |
|
Longdom Publishing | 2 (0.7) | Yes |
|
Madridge Publishers | 2 (0.7) | Yes |
|
Research Open | 2 (0.7) | Yes |
|
Scholarly Pages | 2 (0.7) | Yes |
|
Science Repository | 2 (0.7) | Yes |
|
Annex Publishers | 1 (0.4) | Yes |
|
Avens Publishing Group | 1 (0.4) | Yes |
|
Bibliotics Journals | 1 (0.4) | No |
|
Boffin Access | 1 (0.4) | Yes |
|
Edorium Journals | 1 (0.4) | No |
|
JSciMed Central | 1 (0.4) | Yes |
|
Juniper Publishers | 1 (0.4) | Yes |
|
Meddocs Online | 1 (0.4) | No |
|
Ommega Publishers | 1 (0.4) | Yes |
|
Onjourn Publishers | 1 (0.4) | Yes |
|
ScholArena | 1 (0.4) | Yes |
|
Scimaze Publishers | 1 (0.4) | Yes |
|
Scitechz | 1 (0.4) | Yes |
|
Table 2.
Summary of phishing emails from predatory stand-alone journals seeking manuscript submissions
Jounal | No. (%) of emails received, n =285 | Present on Beall’s list |
---|---|---|
Clinics in Surgery | 28 (9.8) | Yes |
World Journal of Surgery and Surgical Research | 10 (3.5) | No |
Accura Science | 6 (2.1) | No |
United Journal of Physical Medicine and Rehabilitation | 3 (1.1) | No |
Annals of Clinical Case Reports | 1 (0.4) | Yes |
International Journal of Animal Science | 1 (0.4) | No |
International Journal of Critical Care and Trauma | 1 (0.4) | No |
Journal Surgery Research and Reports | 1 (0.4) | No |
Table 3.
Characteristics of phishing emails seeking manuscript submissions
Characteristic | No. (%) of emails received, n =285 |
---|---|
Email origin | |
Sent from free provider (e.g., gmail.com) | 9 (3.2) |
Purported country of origin | |
None mentioned | 139 (48.8) |
USA | 120 (42.1) |
UK | 18 (6.3) |
Italy | 4 (1.4) |
Greece | 1 (0.4) |
Japan | 1 (0.4) |
South Korea | 1 (0.4) |
Switzerland | 1 (0.4) |
Email salutation | |
Addressed by name | 226 (79.3) |
Generic | 49 (17.2) |
Absent | 7 (2.5) |
Addressed to wrong name | 3 (1.1) |
“Greetings…” | 172 (60.4) |
Journal characteristics | |
Impact Factor cited | 28 (9.8) |
ISSN number cited | 48 (16.8) |
Claim to offer editorial services and/or a peer review process | 108 (37.9) |
Claim to be open access | 78 (27.4) |
Claim to offer short publication time | 44 (15.4) |
Broad range of documents accepted (e.g., research, review, case report, editorial, clinical image, letter to editor) | 152 (53.3) |
Discounted publication fee mentioned | 49 (17.2) |
Publisher/standalone journal online presence | |
Organization has a website | 262 (91.9) |
Organization is verifiable online (i.e., listed on PubMed | 0 (0) |
External links provided within the email | 157 (55.1) |
An “unsubscribe” mechanism is available | 133 (46.7) |
Disclaimer present at the end of the email | 53 (18.6) |
Email language | |
Presence of spelling or grammar errors | 258 (90.5) |
Use of flattery | 133 (46.7) |
Deadline to respond is given | 153 (53.7) |
Use of appealing words to make the journal appear international (e.g., global, world, euro) | 48 (16.8) |
Email contact information | |
Phone number | 107 (37.5) |
Street address | 109 (38.2) |
Email Relevance to surgeon’s discipline | |
Previous publications by the recipient are cited in the invitation | 24 (8.4) |
Invitation is related to surgeon’s specialty | 84 (29.5) |
The majority of the predatory conference invitations (97.4%) originated from 14 unique fake hosts, of which more than half (57.1%) were present on CalTech Library’s list of questionable conferences (Table 4). In the absence of a comprehensive list of fake conference hosts to rely on, characteristics such as the presence of spelling and/or grammar errors (73.0%), use of the word “greetings” (41.2%), appealing words in the conference title giving it an international appearance (74.9%; e.g., global, world, euro), and the use of excessively flattering language (42.7%) are often helpful (Table 5).
Table 4.
Sumary of predatory conference invitations sent from fake hosts
Conference hosts | No. (%) of emails received, n = 267 | Present in CalTech Library listing |
---|---|---|
Conference Series LLC Ltd | 128 (47.9) | Yes |
BioEvents | 27 (10.1) | No |
EuroSciCon | 21 (7.9) | Yes |
PULSUS Group | 20 (7.5) | Yes |
Allied Academies | 17 (6.4) | Yes |
Scientific Federation | 14 (5.2) | Yes |
WONCA | 12 (4.5) | No |
Meetings International Pte Ltd | 6 (2.2) | Yes |
WSP | 6 (2.2) | No |
BioGenesis | 1 (0.4) | No |
BIT Congress Inc | 1 (0.4) | Yes |
OMICS International | 1 (0.4) | Yes |
Pharma Professionals | 1 (0.4) | No |
Scientific Overseas Group Conferences | 1 (0.4) | No |
Unable to determine conference provider | 7 (2.6) | N/A |
Table 5.
Characteristics of predatory conference invitations
Parameters | No. (%) of emails received, n = 267 |
---|---|
Email origin | |
Email sent from a free provider like gmail.com | 3 (1.1) |
Purported country of origin | |
UK | 124 (46.4) |
None mentioned | 114 (42.7) |
India | 7 (2.6) |
Singapore | 7 (2.6) |
Italy | 6 (2.2) |
USA | 6 (2.2) |
Canada | 1 (0.4) |
China | 1 (0.4) |
Luxembourg | 1 (0.4) |
Purported country of conference location | |
UK | 31 (11.6) |
USA | 25 (7.9) |
Spain | 21 (7.9) |
None mentioned | 20 (7.5) |
Japan | 20 (7.5) |
Italy | 19 (7.1) |
South Korea | 12 (4.5) |
United Arab Emirates | 11 (4.1) |
Russia | 10 (3.7) |
Singapore | 10 (3.7) |
Australia | 8 (3.0) |
Austria | 8 (3.0) |
Canada | 8 (3.0) |
Thailand | 8 (3.0) |
Czech Republic | 7 (2.6) |
Germany | 6 (2.2) |
Malaysia | 6 (2.2) |
Scotland | 5 (1.9) |
China | 4 (1.5) |
Ireland | 4 (1.5) |
Switzerland | 4 (1.5) |
France | 3 (1.1) |
The Netherlands | 3 (1.1) |
Norway | 3 (1.1) |
Hungary | 2 (0.7) |
New Zealand | 2 (0.7) |
Portugal | 2 (0.7) |
Denmark | 1 (0.4) |
Greece | 1 (0.4) |
India | 1 (0.4) |
Turkey | 1 (0.4) |
Sweden | 1 (0.4) |
Email salutation | |
Addressed by name | 74 (27.7) |
Generic | 123 (46.1) |
Absent | 45 (16.9) |
Addressed to wrong name | 24 (9.0) |
“Greetings…” | 110 (41.2) |
Conference host online presence | |
Organization has a website | 190 (71.2) |
External links provided within the email | 256 (95.9) |
An “unsubscribe” mechanism is available | 231 (86.5) |
Disclaimer present at the end of the email | 91 (34.1) |
Email language | |
Presence of spelling or grammar errors | 195 (73.0) |
Use of flattery | 114 (42.7) |
A conference date is provided | 224 (84.0) |
Use of appealing words to make the conference appear international (e.g., global, world, euro) | 200 (74.9) |
Email relevance to surgeon’s specialty | |
Previous publications by the recipient are cited in the invitation | 3 (1.1) |
Invitation is related to surgeon’s specialty | 5 (1.4) |
Nearly all publishers and stand-alone journals (91.9%), as well as the majority of conference hosts (71.2%) identified as potentially predatory in nature were associated with a website; therefore, online verification is not a reliable way of determining the legitimacy of a phishing email.
Discussion
Receiving an email invitation to submit a manuscript should raise a red flag, given that most legitimate journals and publishers rarely solicit manuscript submissions. Based on our review, we suggest authenticating these emails by looking for characteristics indicative of a predatory email, including spelling and grammar errors, overly formal or stilted salutations, and a broad range of welcomed submission types (original articles, review articles, case reports, editorials, clinical images, letters to editors), and by consulting Beall’s list to look for the publisher or journal name.
Our institution’s information technology (IT) department estimates that on a monthly basis, an average of 21 million out of 31 million emails to 120 000 distinct users are blocked by firewalls (Alberta Health Services employee website, 2019 Nov. 28). Our data also suggest that of the 10 million emails that penetrate these firewalls, potentially one-third are phishing emails. This clearly highlights the need for improvement to firewall/sequestration practices. For an organization of 100 000 users, earning an average of $100 000 per year, and receiving 6 spam emails a day, the cost in terms of storage, management, downtime, and lost productivity has been estimated to be greater than $16 million per year.5 Our study also identified the types of words firewalls could flag to block predatory emails. They included the names of journals and publishers listed on Beall’s list; the names of conference hosts listed on the CalTech Library list; the names of journals, publishers and conference hosts we deemed to be predatory; the word “greetings”; and the presence of obvious spelling and/or grammar errors.
Conclusion
In our experience, unsolicited emails mostly consisted of invitations from predatory publishers with associated (or stand-alone) journals seeking manuscript submissions. Emails from predatory conference hosts inviting recipients to attend or present at a fake conference are also frequent. The costs associated with this type of spam in large organizations can be in the millions of dollars. These emails shared common characteristics which, together with PubMed’s indexed list, as well as both Beall’s list and the CalTech Library list, can be used by recipients to distinguish between legitimate and predatory invitations.
Footnotes
Competing interests: C.G. Ball is coeditor-in-chief of CJS. He was not involved in the review or decision to accept this manuscript for publication. No other competing interests declared.
Contributors: All authors contributed substantially to the conception, writing and revision of this article and approved the final version for publication.
References
- 1.Shamseer L, Moher D, Maduekwe O, et al. Potential predatory and legitimate biomedical journals: can you tell the difference? A cross-sectional comparison. BMC Med 2017;15:28. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Sharma H, Verma S. Predatory journals: the rise of worthless biomedical science. J Postgrad Med 2018;64:226–31. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 3.Surgery Journal Editors Group. Consensus statement on the adoption of the COPE guidelines. Am J Surg 2010;200:1–2. [DOI] [PubMed] [Google Scholar]
- 4.Franco EL. The downside of the shifting paradigm of scholarly publishing in the biomedical sciences: predatory publishing. J Obstet Gynaecol Can 2017;39:513–5. [DOI] [PubMed] [Google Scholar]
- 5.Spam cost calculator. Edmonton (Alta.): SpyderMail. Available: https://www.spydermail.com/spam-cost-calculator/ (accessed 2019 Dec. 12). [Google Scholar]