Abstract
Objective
To systematically map the scholarly literature on predatory conferences and describe the present state of research and the prevalent attitudes about these conferences.
Methods
This scoping review follows Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. Four databases were searched (PubMed/Medline, Web of Science, Scopus and ProQuest Social Sciences Premium Collection). In addition, the included studies’ reference lists were scanned for additional papers not found in the searches. Peer-reviewed publications were included irrespective of study design. Letters and commentary were included if they were peer reviewed. Editorials and literature reviews were excluded.
Results
From 809 initial publications, 20 papers were included in the review, from 12 countries and covered a wide range of science disciplines, from nursing/medicine to energy/technology and computer science. More than half were empirical and published after 2017. In most papers, a definition of the term predatory conferences was put forward. Spam email invitations with flattering language were the most common characteristics, and the conferences were often hosted by unknown organisations that used copied pictures without permission. High fees, lack of peer review, and a multidisciplinary scope were signal features. All papers explicitly or implicitly suggested possible reasons for participating in predatory conferences. Some reasons were related to the overall context of academic work, the nature of predatory conferences (eg, researchers falling prey to misleading information about a conference or choosing a conference based on an attractive location) and the personal characteristics of researchers. Only one paper reported empirically identified reasons for participating in predatory conferences. The three countermeasures proposed most frequently to deal with predatory conferences were increasing education, emphasising responsibilities of universities and funders, and publishing lists of predatory publishers associated with conferences.
Conclusions
This review identified a scarcity of research concerning predatory conferences. Future empirical as well as fully analytical research should be encouraged by funders, journals and research institutions.
Keywords: medical ethics, statistics & research methods, qualitative research
Strengths and limitations of this study.
This scoping review is the first to synthesise systematically the scholarly peer-reviewed literature on predatory conferences in different settings.
It identifies gaps in the existing literature and based on the literature suggests important countermeasures to prevent the further spread of predatory conference practices.
Limitations of this review include the scarcity of empirical research concerning predatory conferences, and the review therefore relied on theoretical papers, such as commentaries, which are less rigorous and make generalisations difficult.
Introduction
Predatory journals have significantly infiltrated the academic publishing world, and many papers have raised awareness about the perils of publishing in such journals.1–6 Predatory journals and conferences are often perceived as two sides of the same coin; nevertheless, literature on predatory conferences (PC) is noticeably lacking.7 Academic conferences are essential to researchers and an integral part of scientific communication, as they offer an opportunity for sharing research findings, building networks and obtaining valuable new information.8 Conferences are also important for stakeholders, policy-makers and students.9 For graduate students, presenting at an international conference is often a required part of the curriculum.10 The number of PC has increased worldwide, and reportedly, they are becoming more sophisticated in concealing their nature as for-profit businesses with little or no regard for academic values.11 12 They often spam researchers with unsolicited email invitations, excessively praising the researcher’s latest published paper.6 13
These predatory enterprises are driven by a for-profit business model (while sometimes presenting themselves as not-for-profit), charging fees to the attendees, and disregarding proper peer review, instead allowing anyone who pays to become a speaker.14 15 Because PC appear to be legitimate scientific conferences, they deceive the attendees or their organisations into spending large sums for conference registration, travel and accommodation. They also inflict a significant risk of damage to future researchers or policymakers who might unknowingly build their subsequent work or policies on the purported ‘scientific results’ shared at such conferences.16
The InterAcademy Partnership (IAP) recently carried out a large global study, Combatting Predatory Academic Journals and Conferences. The IAP (and author SE who was part of the working group carrying out the study) examined the available resources and found a striking focus on the publishing side of predatory practices and very little knowledge about PC in comparison. Not only is there a lack of knowledge on why students and scholars attend PC, but also about criteria that determine if a conference is predatory and how many they are. Alarmingly, it has been claimed that PC might outnumber legitimate ones, which, if true, should call for a dedicated effort to counteract them.17 It thus became clear that there is a pronounced need for a targeted research approach mapping the existing literature and identifying gaps in it.
Reviews have previously focused on predatory journals and conferences. One review examined the main features of the open-access model, its potential consequences, and its relevance to the scientific community.18 That review summarised the literature on predatory journals and conferences and described how this practice threatens the reputation of the open-access movement as it deviates from best editorial standards and ethics. The authors urge educational and ethical actions to enhance scholars’ awareness of this serious threat to scientists’ reputation and ultimately patients’ safety. One narrative review aimed to create awareness of PC in biomedicine, to describe the tactics they use to trap researchers and to suggest how neophyte researchers can learn to delineate PCs from legitimate ones.19 However, these reviews were not performed systematically and had limited scope and focus. To our knowledge, this scoping review is the first to systematically synthesise the literature solely on PC.
Objectives and research questions
The overall aim of this scoping review was to map systematically the scholarly literature on PC to describe the present state of research. We also posed the following research questions (RQ):
RQ1: How does the literature define PC?
RQ2: What are the reasons attendees have for participating in PC?
RQ3: What are the actual consequences for those attending PC, if any?
RQ4: What are the suggested countermeasures?
Method
Design
This study used the established scoping review methodology by Arksey and O’Malley,20 later developed by Levac et al.21 This study used the Preferred Reporting Items for Systematic Reviews and Meta-Analyses for Scoping Reviews (PRISMA-Scr)22 (see online supplemental file S1).
bmjopen-2022-062425supp001.pdf (90.3KB, pdf)
According to Arksey and O’Malley, there are usually six stages in undertaking a scoping review: (1) identifying the RQ; (2) identifying relevant studies; (3) study selection; (4) charting the data, (5) collating, summarising and reporting the results, and (6) consultation. According to the original framework, step 6 is optional.
Stage 1: identifying RQ
See earlier aim and RQs.
Stage 2: identifying relevant studies
Two of the researchers (TG and SG) developed the initial search strategy, then further discussed it with SE and MO. TG created the actual searches in collaboration with two medical librarians. The librarians completed a preliminary test search in Scopus to identify whether studies appropriate for inclusion exists.
The databases searched were PubMed/Medline, Web of Science, Scopus and Social Sciences Premium Collection (ProQuest). In addition, the included papers (stage 3) were later scrutinised for any references to studies meeting the inclusion criteria but not found in the searches. The databases were searched from inception to 23 September 2021.
Stage 3: study selection
The identified publications were exported and collated in EndNote (Clarivate) to remove duplicates. The screening process used the Rayyan software platforms to facilitate the review.23 This review process included a traditional screening approach of (1) titles and abstracts and (2) full text. Two reviewers (TG and SG) independently screened the papers based on predetermined inclusion and exclusion criteria for the title and abstract review (table 1). TG and SG discussed all disagreements in the process of reaching a consensus. The resulting papers were then carefully read in full, and TG and SG again discussed any disagreement about inclusion or exclusion to reach consensus.
Table 1.
Inclusion and exclusion criteria
| Inclusion criteria | Exclusion criteria | |
| Exposure | Predatory conferences | Predatory publishers or journals |
| Setting | All research settings | N/A |
| Study design | Publications irrespective of their study design. Letters to editor and commentary are included if they were peer reviewed (letters and commentaries were examined for any declaration of having been subject to a peer review process, such as statements to that fact or dates being given for revision/acceptance). | Editorials and literature reviews were excluded |
| Language | English | All other languages |
N/A, not applicable.
Stage 4: charting the data
We confirmed the publication’s relevance to the aim of the review and extracted the data (table 2). The framework included bibliographical information (ie, author(s), country, title, journal and publication year), study type and objectives. For each publication, we included in the table any definition of PC adopted, any empirical conference characteristics (eg, country, setting and research area of focus), reasons found for attendees to participate in PC, the experiences of attending such conferences, and any proposed countermeasures aiming to discourage their proliferation. All authors charted data from publications by using the data extraction framework. Two of the reviewers (TG and SG) discussed discrepancies until consensus was reached.
Table 2.
Screening and extraction form
| Level 1: title and abstract review | |
| 1.Is this title/abstract written in English? | Yes/no |
| 2.Does it seemingly address PC? | Yes/no |
| Level 2: full-text review | |
| 1.Is there any reason this article should be excluded? | |
| If yes: What is the reason for excluding? |
|
| If no: What is the bibliographical information? |
|
| 2. What type of publications? | a. Theoretical (commentary/viewpoint/letter) b.Empirical (qualitative or quantitative/case report) |
| 3.Is there any definition of PC? | Yes/no |
| If yes: What is the definition? |
|
| If no: Are some characteristics of PC mentioned? |
|
| 4.Does the publication say anything about why researchers participate in PC? | Yes/no |
| If yes: What are the reasons? |
|
| 5.Does it say something about the actual consequences for those attending predatory conferences? | Yes/no |
| If yes: What are the consequences? |
|
| 5.Does it suggest any countermeasures to PC? | Yes/no |
| If yes: What are the countermeasures? |
|
PC, predatory conferences.
Stage 5: summarising and reporting the results
Since a scoping review aims to map the concepts underpinning a research area and the primary sources available, the aggregated findings provided an overview of the research rather than an assessment of the individual studies’ quality. This study summarised data descriptively in line with the screening and extraction form. All authors discussed the results and agreed on the final groupings of the results.
Stage 6: consultation
Arksey and O’Malley20 suggest an (optional) consultation stage with stakeholders and experts to provide insights beyond what is reported in the literature. They recommend consultation exercises with stakeholders or experts throughout the process, from preparation to the dissemination of the findings. Since one of the authors (SE) is a member of an international working group formed by the IAP,14 as an expert working with combatting predatory academic journals and conferences, we opted to include step 6 in this review. SE was part of the whole process. Some IAP working group members (n=2) read a draft of this article and commented on it.
Patient and public involvement
Patients and the public were not involved in the design, or conduct, or reporting, or dissemination plans of this research.
Results
Search results
The electronic searches yielded 809 records; after the removal of duplicates, screening of the remaining 419 records ensued. Assessment of titles and abstracts based on the inclusion criteria resulted in 38 papers remaining. The full texts of all these papers were obtained, and after applying the inclusion criteria, 18 records were excluded as 6 were editorials, 3 were not in English, 6 did not provide data relevant to PC, 2 were not peer reviewed and 1 was not available as a full-text document. As such, 20 peer-reviewed papers were included in the review (see PRISMA, figure 1). Scanning these papers for further references to research on PC did not result in any additional records.
Figure 1.
Flow diagram of article selection for further review.50
Study context
Most (n=17) of the included papers were published between 2017 and 2021. The corresponding authors were from 12 different countries, where one-fourth were affiliated to the USA,24–28 followed by India,29–31 Denmark,32 33 Hungary,34 35 Saudi Arabia,36 Iran,37 UK,38 Australia,39 Switzerland,40 Canada,41 Hong Kong42 and the Czech Republic.43 PC attract multidisciplinary attention. Corresponding authors’ disciplines included nursing/medicine,26 27 34–36 41 psychiatry,29 39 energy/technology,31–33 37 dentistry,38 cancer,30 pharmacy,24 finance,43 bibliometrics28 and computer science.25
Study design
Eleven studies collected empirical data,25 26 28 34–36 38 40–43 where one half used a quantitative approach, one qualitative. Nine papers were theoretical,24 27 29–33 37 39 All papers were peer reviewed.
Data synthesis
RQ1: how are PC defined?
Of 20 papers, 14 defined PC,24 26 29–31 33 34 36–41 43 2 of these used definitions by others33 39 (table 3). Five papers did not define PC,27 28 32 35 42 and one paper suggested not to define them.25 Most definitions varied between addressing them as fraudulent or just of low quality, and between being ‘fictitious’ and providing services wanted by the attendees, but they converge in pinpointing the exploitative profit motive as the driving force. Three attributes regarding PC were described: means of invitation, organization and low quality. The common way of inviting to conferences were by email which used flattering language26 27 30 33 36 38; had grammatical errors and/or non-scientific language27 38; often two contact persons and no physical address, only email addresses29 38 42; were lacking details of the meeting26 27; and often targeting junior or novice researchers.29 34 36
Table 3.
Definitions of predatory conferences (PC)
| Definitions | |
| Agrawal et al,202129 | “Predatory conferences are like other conferences that provide platform to a scholar to present their research work, but these are organized mainly for profit and these are poorly organized” |
| Alnajjar et al, 202036 | “They are low quality dubious events with a ‘blink of an eye’ abstract acceptance without peer review” |
| Asadi et al, 201837 | “These fake/bogus conferences introduce themselves as international conferences, which are multidisciplinary and indexed in major scientific digital libraries” |
| Asadi, 201932 | N/A |
| Begum et al, 202130 | “The fraudulent behaviour of predatory journals/conferences through E-mail solicitations and author’s perspective in unknowingly becoming victims of predatory publishing scheme, by being unaware of the fact that the journals in which they are involved are possibly predatory are highlighted here” |
| Bowman, 201424 | “Fraudulent conferences take advantage of scholars for reasons similar to electronic publication: profitability for the hosting ‘organization’ and the desire for recognition by the party invited to make a presentation or chair a round table discussion” |
| Elmacioglu et al,200925 | “let us not define what questionable conferences are” |
| Heasman, 201938 | PCs are “essentially small meetings, perhaps seminars would be a better term, based in hotel meeting rooms where elegates/speakers present their research and are presented with a certificate of recognition for their contribution” |
| Krasowski et al, 201926 | “Conferences or meetings that are of potentially low quality and scientific value. Common themes include organization by companies or individuals as opposed to established scientific communities or organizations, high fees for presenters, and lack of transparency regarding the details of the meeting” |
| Lang et al, 201934 | PC are “solely organized to make short term, commercial profit, taking advantage of the naïveté of many scholars and undermining the scientific community through misused time energy and resources” |
| Lang et al, 202035 | N/A |
| Looi et al, 202039 | From Cress, 2017,” … conferences that appear to be scholarly but are strictly exploitive money-making schemes that cost authors and funding sources time and money” |
| Makvandi et al, 202140 | Organizers who “exploit the need for researchers to publish papers in proceedings or affiliated journals by asking for a significant conference attendance charge, using low quality conference business models” |
| Mercier et al, 201741 | Organisers of these meetings “usually individuals or companies rather that an organisation or a scientific community, use names similar to reputable conferences and terms such as international or global but charge substantial fees to presenters and have little concern for scientific value” |
| Ozdemir et al, 201731 | “Email invitations with flattering language. Some PCs are fictitious conferences, others are ‘‘congress tourism’’ in exotic places for a vacation. But others may promote narrow and certain scientific view of product without the alternatives mentioned” |
| Pecorari, 202142 | N/A |
| Prorokowski, 202143 | “conferences that are organised with the sole purpose of charging fees from unsuspecting researchers” |
| Sewell et al, 201927 | N/A |
| Sonne et al, 202033 | From McCrostie, 2018: “Low quality academic meetings, no supporting development of scholarship, no effective peer review, organizer uses deceit (most common is false claim of peer review, hides company headquarters' true location, and conceals it is for-profit” |
| Zhuang et al, 200728 | N/A |
N/A, not available.
Another common attribute was related to the organisation holding the conference. The organisers were often not well known and used names or copied pictures without permission.24 29 33 36 38 40–42 Fast track (guarantee) acceptance was often described28 29 37 42 with high fees,26 27 36 39–42 or sometimes low fees that were not refunded if the conference was cancelled.24 29 The conferences were often situated at relatively small hotels, never in conference centres, colleges or universities.24 29 Another attribute concerned the poor-quality standards. Peer review was often missing25 27 29 32 33 37 38 42; the academic subject matter of the PC had a wide and multidisciplinary scope27 29 32 36–38 42; and the conference was organised for profit with little concern about scientific value.29 34 39 41 43
RQ2: reasons for participating in PC
All 20 papers24–43 explicitly or implicitly suggested possible reasons for participating in PC (table 4). We identified reasons for this as relating to the overall context of the academic work, the nature of PC, and the personal characteristics of researchers. Academic related reasons involved a publish or perish climate focusing on the quantity rather than the quality of research dissemination,25 27 29 30 32 36 37 39–41 and the lack of support structures including guidance and control measures, encouraging and enabling researchers to make informed choices.24 26 28 31–35 40 42 Reasons related to the nature of PC involved researchers falling prey to deceptive and misleading information about conferences,24 27 29–33 35–39 41–43 choosing conferences due to attractive venues and exotic locations,31 32 36 37 42 opting for hassle-free submission and review processes,25 42 and the opportunity to attend as a chair or invited speaker.24 31 40 Reasons relating to personal characteristics involved researchers overlooking the moral and scientific implications of attending PC due to inexperience,29 32 36–41 43 naivety,34 36 43 ignorance,32–34 37 vanity27 33 or indifference.25 36 42
Table 4.
Reasons for participating in predatory conferences (PC)
| Academia related | Conference related | Researcher related | |||||||||
| Publish or perish climate | Lack of support structures | Deceptive information | Attractive venue | Invitation as chair/speaker | Hassle-free submission and review | Inexperience | Naiveté | Ignorance | Vanity | Indifference | |
| Agrawal et al, 202129 | X | X | X | ||||||||
| Alnajjar et al, 202036 | X | X | X | X* | X* | X* | |||||
| Asadi et al, 201837 | X | X | X | X | X | ||||||
| Asadi, 201932 | X | X | X | X | X | X | |||||
| Begum et al, 202130 | X | X | |||||||||
| Bowman, 201424 | X | X | X | ||||||||
| Elmacioglu et al, 200925 | X | X | X | ||||||||
| Heasman, 201938 | X | X | |||||||||
| Krasowski et al, 201926 | X | ||||||||||
| Lang et al, 201934 | X | X | X | ||||||||
| Lang et al, 202035 | X | X | |||||||||
| Looi et al, 202039 | X | X | X | ||||||||
| Makvandi et al, 202140 | X | X | X | X | |||||||
| Mercier et al, 201741 | X | X | X | ||||||||
| Ozdemir et al, 201731 | X | X | X | X | |||||||
| Pecorari, 202142 | X | X | X | X | X | X | |||||
| Prorokowski, 202143 | X | X | X | ||||||||
| Sewell et al, 201927 | X | X | X | ||||||||
| Sonne et al, 202033 | X | X | X | X | |||||||
| Zhuang et al, 200728 | X | ||||||||||
*Empirical findings.
Only one of the papers, Alnajjar et al36 reported an empirical study on reasons for participating in PC. The qualitative study explored experiences of faculty members in nursing and medicine who had unknowingly fallen prey to PC. Study participants described how novice, naïve and carrier-driven researchers are at higher risk of being conned into PC participation. Some peers overlook the conference value consciously and continue to travel on professional development grants, whereas others, who cover the costs with personal funds, are believed to be less likely to opt for PC.
RQ3: consequences from having attended a PC
Nineteen papers did not report or discuss the consequences of participating in PC.24–35 37–43 Just one empirical paper36 reported a qualitative study in nursing and medicine. Seven faculty members with varying backgrounds that had fallen prey to PC in Australia, Spain, the USA, Switzerland, Singapore and Italy were interviewed about their first-hand experiences. One consequence described was disappointment. They described how the conference organisers initially seemed interested in their research, but as soon as they arrived at the venue, they found overcrowded small rooms, no sessions and workshops in parallel, and a much disorganised venue. The conference did not follow the programme or was reduced from three to 2 days, and the well-respected experts announced as keynote speakers were not there. Some attendees were asked to moderate sessions just before starting. The organisers never revealed their identities, and when contacting them, it appeared to be a remote-control operation. Many conference attendees were so disappointed that they left the conference.
Another disappointment involved cost; attendees were sometimes forced to book the accommodation through the organisers, in effect doubling the price. Another consequence concerned the risk of being subject to deceitful practices. Several of those who attended experienced that the organiser stole their identity and, without consent, used their pictures and personal information to portray them as part of their conference team. They also feared finding their conference abstract published on the conference webpage. Several interviewees expressed disappointment over a valuable academic opportunity being taken away from them, and they felt betrayed and angry because their reputation and credibility were at stake. Therefore, they did not want to attend any conferences at all in the future.36
RQ4: what are the suggested countermeasures?
Six areas of countermeasures were suggested. The most important countermeasure described was education for all researchers and mentorship for beginning researchers and academics.26 29 31 32 34 36 38 39 41 43 A workshop with training exercises that could enable attendees to demarcate between legitimate and fake events was suggested.36 The second and third most described countermeasures were that steps must be taken by universities and funding institutions when evaluating qualifications of candidates for promotions or funding,24 33 36 41 and to publish lists of PC and organisers with red flags.27 30 33 43 Accreditations for conferences (eg, through an impact factor or designation that the conference meets specific criteria) were also suggested,28 35 40 and by using diagnostic questions to assess PC to avoid submitting to them (self-help tools).33 38 42 The last suggested countermeasure described was that more empirical research is needed.36
Discussion
Our mapping of the research on PC shows a small, although growing body of literature on the subject. Compared with the issue of predatory publishing, PC, although a widespread and pervasive problem, receive surprisingly little attention.19 44 The IAP suggested that COVID-19 caught most of the attention of stakeholders since 2020, neglecting the alarming threat of predatory practices.14 This is unfortunate, as the problem seems to affect the global research community, regardless of discipline. There is now a worry that the pandemic is actually fuelling predatory online conferences.29 Yet, the literature typically consists of editorials, letters and the like, while the empirical scholarly literature on the subject consists of only 11 papers. Clearly, there is a need for more research to be funded, performed and disseminated.
Definitions of what constitutes PC vary. They have been described as fraudulent, of low quality, as being ‘fictitious’, and providing services wanted by the attendees. There is agreement in the literature, however, that PC have a profit motive that is the driving force. In light of this, the scholarly community needs to develop a common understanding of what constitutes true PC that should never be supported by attendance, be given legitimacy, and so on, and to delineate what constitutes a quality conference in which scholars should aspire to participate (going beyond avoidance of the unethical).45 This might leave us with a grey zone of conferences that are of moderate quality but do not reflect the characteristics of PC. Established professional societies might also publish their materials from conferences without stringent quality checks.46 An important aspect is that many research organisations and funders pay for scholars to attend conferences to disseminate their research; these stakeholders should pay more attention to the quality of academic meetings paid for by them and could initiate quality control programmes. The literature is consistent in showing that good measures of quality are the communication style of organisers and various characteristics of how the conference is organised.
Reasons for participating in PC are to a large extent the same as for participating in legitimate conferences, for example, to present and discuss research with colleagues and to further one’s career. The main reasons for participation in PC suggested in the literature are researchers being subject to deception by conference organisers and researchers being unaware of PC or indifferent to the moral and scientific implications of attending them. This involves researchers who are inexperienced and often lack the support structures for choosing appropriate conferences in a publish or perish culture. Remarkably, the empirical evidence is limited to one study supporting only a few of these suggestions. Further, we believe that research on reasons for participation in PC must consider the value of conference attendance and conference publications, which vary between disciplines. For example, we recognise that conference presentations and conference publications have little value when competing for research grants or academic positions for some disciplines. In contrast, conferences in, for example, computer science are considered as important as publication is in established journals.28 Thus, it might be that lack of awareness of PC and naivety are more common reasons for participating in disciplines where conference publications hold little merit, while ambition and indifference might be more important driving forces in other disciplines. Understanding researchers’ intentions when choosing to attend PC is important in designing effective counterstrategies. The lack of empirical research in this area calls for further research.
It is especially noteworthy that we found only one article addressing the consequences for people who have attended PC.36 Thus, we have no knowledge about possible benefits of attending PC or whether scholars face negative consequences from presenting their research at these conferences. This knowledge would be of value in assessing the probability that people will continue to attend these types of conferences because of perceived gains or choose not to attend them because of the costs imposed on individual researchers and their research organisations from attending. A better understanding of reasons why scholars present at these conferences would lead to strategies for educating academics, universities and funding institutions about PC. There is a need for much more research on this.47
Our fourth RQ relates to this last point, about what we should do to counteract or ‘combat’ PC. While we have identified an argument for placing some of the responsibility on higher education institutions and funding agencies, the included surveyed literature calls mainly for educational efforts. Undoubtedly, these actions are complementary, and both are needed. We agree with Pecorari42 that disregarding ethics ‘can be countered by awareness-raising, and the deliberate choice can be countered by sanctions or at least the withholding of rewards’.42 However, while we found a lot of educational material in the scholarly literature pointing to the threat, several self-help tools are available to help individuals assess conferences, for example. Think.Check.Attend.48 49
Conclusions
This review identified a scarcity of empirical research concerning PC but revealed characteristics of these conferences and reasons why scholars submit abstracts to them. These conferences are low quality, with some researchers labelling them as fraudulent; invite potential attendees and presenters through spam emails (often with flattering language and grammatical errors); include limited, if any, peer review of abstracts; and are poorly organised. Reasons for participating in PC include the overall nature of academic work, with a climate in many settings that rewards quantity rather than quality of research dissemination, and lack of mentoring and support of beginner scholars to make informed decisions about conferences at which to present their research. Other reasons were not realising the conference was low quality, deciding to attend because of location, or overlooking the implications of presenting at these conferences. While education of novice and experienced scholars about PC is critical, the review also suggested that universities and funding agencies should not be supporting presentations at PC. Consistent with calls for lists of predatory publishers is the need for a similar list of organisers of PC. In addition to costs of attending these conferences, the academic and career implications for researchers who present at PC have not been identified in the literature. This is an area needing further research and it should be encouraged by funders and research institutions.
Supplementary Material
Acknowledgments
The authors would like to thank medical research librarians Ebba Warén and Agnes Kotka at Uppsala University for valuable help during the development of the search strategy. We would also like to thank Abdullah Shams Bin Tariq and Diane Negra for reading a draft and giving expert input to the study.
Footnotes
Twitter: @seb_gab
Contributors: Design of the review: TG and SG. Data collection: TG. Data analysis and interpretation: TG, SG, SE and MO. Drafting the article: TG, SG, SE and MO. Critical revisions of the article: TG; SG; SE and MO. All authors approved the final version to be published. I TG is the garantor and accepts full
responsibility for the work and/or the conduct of the study, had access to the data, and controlled the decision to publish.
Funding: The authors have not declared a specific grant for this research from any funding agency in the public, commercial or not-for-profit sectors.
Competing interests: None declared.
Patient and public involvement: Patients and/or the public were not involved in the design, or conduct, or reporting, or dissemination plans of this research.
Provenance and peer review: Not commissioned; externally peer reviewed.
Supplemental material: This content has been supplied by the author(s). It has not been vetted by BMJ Publishing Group Limited (BMJ) and may not have been peer-reviewed. Any opinions or recommendations discussed are solely those of the author(s) and are not endorsed by BMJ. BMJ disclaims all liability and responsibility arising from any reliance placed on the content. Where the content includes any translated material, BMJ does not warrant the accuracy and reliability of the translations (including but not limited to local regulations, clinical guidelines, terminology, drug names and drug dosages), and is not responsible for any error and/or omissions arising from translation and adaptation or otherwise.
Data availability statement
All data relevant to the study are included in the article or uploaded as supplementary information.
Ethics statements
Patient consent for publication
Not applicable.
Ethics approval
Ethical review was not required as no human subjects were the object of the study. Findings will be disseminated through professional networks, conference presentations and publication in a scientific journal.
References
- 1.Oermann MH, Conklin JL, Nicoll LH, et al. Study of predatory open access nursing journals. J Nurs Scholarsh 2016;48:624–32. 10.1111/jnu.12248 [DOI] [PubMed] [Google Scholar]
- 2.Oermann MH, Nicoll LH, Carter-Templeton H, et al. Citations of articles in predatory nursing journals. Nurs Outlook 2019;67:664–70. 10.1016/j.outlook.2019.05.001 [DOI] [PubMed] [Google Scholar]
- 3.Rupp M, Anastasopoulou L, Wintermeyer E, et al. Predatory journals: a major threat in orthopaedic research. Int Orthop 2019;43:509–17. 10.1007/s00264-018-4179-1 [DOI] [PubMed] [Google Scholar]
- 4.Sharma K, Rani M, Sharma L. Scrutinizing predator journals in pharmacology and calculating their predatory rate. Indian J Pharmacol 2019;51:208–11. 10.4103/ijp.IJP_428_18 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5.Gabrielsson S, Eriksson S, Godskesen T. Predatory nursing journals: a case study of author prevalence and characteristics. Nurs Ethics 2021;28:969733020968215. 10.1177/0969733020968215 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 6.Grey A, Bolland MJ, Dalbeth N, et al. We read spam a lot: prospective cohort study of unsolicited and unwanted academic invitations. BMJ 2016;355:i5383. 10.1136/bmj.i5383 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 7.McCrostie J. Predatory conferences: a case of academic cannibalism. IHE 2018;93:6–8. 10.6017/ihe.0.93.10425 [DOI] [Google Scholar]
- 8.Becerra LA, Sellers TP, Contreras BP. Maximizing the conference experience: tips to effectively navigate academic conferences early in professional careers. Behav Anal Pract 2020;13:479–91. 10.1007/s40617-019-00406-w [DOI] [PMC free article] [PubMed] [Google Scholar]
- 9.Oester S, Cigliano JA, Hind-Ozan EJ, et al. Why conferences Matter—An illustration from the International marine conservation Congress. Front Mar Sci 2017;4. 10.3389/fmars.2017.00257 [DOI] [Google Scholar]
- 10.Carroll JK, Albada A, Farahani M, et al. Enhancing international collaboration among early career researchers. Patient Educ Couns 2010;80:417–20. 10.1016/j.pec.2010.06.020 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 11.Stoye E. Predatory conference scammers are getting smarter chemistry world, 2018. [Google Scholar]
- 12.Beall J, Levine R. OMICS Goes from “Predatory Publishing” to “Predatory Meetings”: Scholarlyoa, 2019. Available: https://scholarlyoa.com/omics-goes-from-predatory-publishing-to-predatory-meetings/ [Accessed 02 Jan 2022].
- 13.Rossiter RC, Stone TE. "Buyer Beware!" predatory conferences: Avoiding an expensive mistake. Nurs Health Sci 2016;18:414–5. 10.1111/nhs.12318 [DOI] [PubMed] [Google Scholar]
- 14.InterAcademy Partnership . Combatting predatory academic journals and conferences. Report, 2022. Available: https://www.interacademies.org/publication/predatory-practices-report-English [Accessed 02 Aug 2022].
- 15.Cobey KD, de Costa E Silva M, Mazzarello S, et al. Is this conference for real? navigating presumed predatory conference invitations. J Oncol Pract 2017;13:410–3. 10.1200/JOP.2017.021469 [DOI] [PubMed] [Google Scholar]
- 16.Bishnoi A, Reddy A, Vinay K. Predatory journals, publishers, conferences, and indexing systems: who is responsible for their growth? Int J Dermatol 2021;60:1303–4. 10.1111/ijd.15684 [DOI] [PubMed] [Google Scholar]
- 17.Grove J. Predatory conferences ‘now outnumber official scholarly events’ The World University Rankings, 2017. Available: https://www.timeshighereducation.com/news/predatory-conferences-now-outnumber-official-scholarly-events [Accessed 11 Nov 2021].
- 18.Cortegiani A, Manca A, Giarratano A. Predatory journals and conferences: why fake counts. Curr Opin Anaesthesiol 2020;33:192–7. 10.1097/ACO.0000000000000829 [DOI] [PubMed] [Google Scholar]
- 19.Sharma H, Verma S. Predatory conferences in biomedical streams: an invitation for academic upliftment or predator's looking for prey. Saudi J Anaesth 2020;14:212–6. 10.4103/sja.SJA_668_19 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Arksey H, O'Malley L. Scoping studies: towards a methodological framework. Int J Soc Res Methodol 2005;8:19–32. 10.1080/1364557032000119616 [DOI] [Google Scholar]
- 21.Levac D, Colquhoun H, O'Brien KK. Scoping studies: advancing the methodology. Implement Sci 2010;5:69. 10.1186/1748-5908-5-69 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 22.Tricco AC, Lillie E, Zarin W, et al. PRISMA extension for scoping reviews (PRISMA-ScR): checklist and explanation. Ann Intern Med 2018;169:467–73. 10.7326/M18-0850 [DOI] [PubMed] [Google Scholar]
- 23.Ouzzani M, Hammady H, Fedorowicz Z, et al. Rayyan-a web and mobile APP for systematic reviews. Syst Rev 2016;5:210. 10.1186/s13643-016-0384-4 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Bowman JD. Predatory publishing, questionable peer review, and fraudulent conferences. Am J Pharm Educ 2014;78:176. 10.5688/ajpe7810176 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 25.Elmacioglu E, Lee D. Oracle, where shall I submit my papers? Commun ACM 2009;52:115–8. 10.1145/1461928.1461958 [DOI] [Google Scholar]
- 26.Krasowski MD, Lawrence JC, Briggs AS, et al. Burden and characteristics of Unsolicited Emails from Medical/Scientific journals, conferences, and Webinars to faculty and trainees at an academic pathology department. J Pathol Inform 2019;10:16. 10.4103/jpi.jpi_12_19 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Sewell KA, Firnhaber GC. Predatory publishers and conference organizers. Nutr Today 2019;54:261–70. 10.1097/NT.0000000000000384 [DOI] [Google Scholar]
- 28.Zhuang Z, Elmacioglu E, Lee D. Measuring conference quality by mining program Committee characteristics. JCDL '07: Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries, 2007:225–34. [Google Scholar]
- 29.Agrawal AK, Das S. Beware of predatory conferences: a pandemic through another pandemic. Indian J Psychol Med 2021;43:365–6. 10.1177/02537176211023280 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 30.Begum S, Abdulla R. Predatory science: unraveling a secret journey of fake journals and conferences. J Oral Maxillofac Pathol 2021;25:193–4. 10.4103/jomfp.jomfp_493_20 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 31.Özdemir V, Dandara C, Hekim N, et al. Stop the spam! conference ethics and decoding the Subtext in Post-Truth science. what would Denis Diderot say? OMICS 2017;21:658–64. 10.1089/omi.2017.0150 [DOI] [PubMed] [Google Scholar]
- 32.Asadi A. Invitation to speak at a conference: the tempting technique adopted by predatory conferences' organizers. Sci Eng Ethics 2019;25:975–9. 10.1007/s11948-018-0038-0 [DOI] [PubMed] [Google Scholar]
- 33.Sonne C, Ok YS, Lam SS, et al. First predatory journals, now conferences: the need to establish Lists of fake conferences. Sci Total Environ 2020;715:136990. 10.1016/j.scitotenv.2020.136990 [DOI] [PubMed] [Google Scholar]
- 34.Lang R, Mintz M, Krentz HB, et al. An approach to conference selection and evaluation: advice to avoid “predatory” conferences. Scientometrics 2019;118:687–98. 10.1007/s11192-018-2981-6 [DOI] [Google Scholar]
- 35.Lang R, Porter K, Krentz HB, et al. Evaluating medical conferences: the emerging need for a quality metric. Scientometrics 2020;122:759–64. 10.1007/s11192-019-03291-w [DOI] [Google Scholar]
- 36.Alnajjar H, Asif U, Bano N, et al. Faculty experiences with predatory conferences: a qualitative study. Prensa Med Argent 2020;S2:025. [Google Scholar]
- 37.Asadi A, Rahbar N, Rezvani MJ, et al. Fake/Bogus conferences: their features and some subtle ways to differentiate them from real ones. Sci Eng Ethics 2018;24:779–84. 10.1007/s11948-017-9906-2 [DOI] [PubMed] [Google Scholar]
- 38.Heasman PA. Unravelling the mysteries of predatory conferences. Br Dent J 2019:228–30. 10.1038/sj.bdj.2019.101 [DOI] [PubMed] [Google Scholar]
- 39.Looi JC, Owens-Walton C. Commentaries: sharks: predatory journals and conferences in psychiatry, neurology and neuroscience. Aust N Z J Psychiatry 2020;54:644–5. 10.1177/0004867420919154 [DOI] [PubMed] [Google Scholar]
- 40.Makvandi P, Nodehi A, Tay FR. Conference accreditation and need of a bibliometric measure to distinguish predatory conferences. Publications 2021;9:16–5. 10.3390/publications9020016 [DOI] [Google Scholar]
- 41.Mercier E, Tardif P-A, Émond M, et al. Predatory publishers and fraudulent conferences: perspectives and implications for novice researchers. Perspect Med Educ 2017;6:433–4. 10.1007/s40037-017-0381-x [DOI] [PMC free article] [PubMed] [Google Scholar]
- 42.Pecorari D. Predatory conferences: what are the signs? J Acad Ethics 2021;19:343–61. 10.1007/s10805-021-09406-4 [DOI] [Google Scholar]
- 43.Prorokowski L. Predatory conferences in economics and finance. Bank i Kredyt 2021;52. [Google Scholar]
- 44.McCrostie J. Warning: conmen and shameless scholars operate in this area: the, 2017. Available: https://www.timeshighereducation.com/comment/warning-conmen-and-shameless-scholars-operate-area [Accessed 14 Nov 2021].
- 45.Sekerka LE, Comer DR, Godwin LN. Positive organizational ethics: cultivating and sustaining moral performance. J Bus Ethics 2014;119:435–44. 10.1007/s10551-013-1911-z [DOI] [Google Scholar]
- 46.Gasparyan AY, Nurmashev B, Voronov AA, et al. The pressure to publish more and the scope of predatory publishing activities. J Korean Med Sci 2016;31:1874–8. 10.3346/jkms.2016.31.12.1874 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 47.Memon AR, Azim ME. Predatory conferences: addressing researchers from developing countries. J Pak Med Assoc 2018;68:1691–5. [PubMed] [Google Scholar]
- 48.Think, Check . Attend. Why think. check. attend, 2022. Available: https://thinkcheckattend.org/ [Accessed 03 Jan 2022].
- 49.Eaton SE. Avoiding predatory journals and questionable conferences: a resource guide. Alberta, 2018. [Google Scholar]
- 50.Moher D, Liberati A, Tetzlaff J, et al. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. PLoS Med 2009;6:e1000097. 10.1371/journal.pmed.1000097 [DOI] [PMC free article] [PubMed] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Supplementary Materials
bmjopen-2022-062425supp001.pdf (90.3KB, pdf)
Data Availability Statement
All data relevant to the study are included in the article or uploaded as supplementary information.

