{"id":87,"date":"2017-11-08T13:27:51","date_gmt":"2017-11-08T18:27:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/research-integrity\/?page_id=87"},"modified":"2020-01-06T07:53:55","modified_gmt":"2020-01-06T12:53:55","slug":"predatory-conferences","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/research-integrity\/predatory-conferences\/","title":{"rendered":"Information on Predatory Conferences"},"content":{"rendered":"<p>Predatory conferences or predatory meetings are set up and appear like legitimate scientific conferences.\u00a0 However, like predatory publishing they are exploitative offering little in the way of editorial control over content. Researchers attending may have good intentions, organizing company only interested in money. These conferences are organized and run by revenue seeking companies; some of these companies also arrange your travel and hotel for the conference. Many also publish conference papers in affiliated journals. Organizing committee members, those claimed to be involved with the conference, may not know they are even linked to the conference.<\/p>\n<p>Characteristics of predatory conferences:<\/p>\n<ul>\n<li>Little or no academic merit<\/li>\n<li>High fees for attendance<\/li>\n<li>Poor reviewing standards for acceptance<\/li>\n<li>Opportunity for chairing session &#8211; great draw for you investigators<\/li>\n<li>Multiple conferences in same place at same time &#8211; discounted registration fees to attend more than one conference<\/li>\n<li>Deceptively similar names to existing reputable conferences<\/li>\n<li>Claiming editorial boards and organizing committees with prominent academics who have not agreed to participate<\/li>\n<li>Same plenary speakers for the multiple conferences<\/li>\n<li>E-mail solicitation &#8211; especially outside field of expertise<\/li>\n<li>Often target early career researchers<\/li>\n<\/ul>\n<p>Reasons for not going to Predatory Conferences<\/p>\n<ol>\n<li>Waste of Money<\/li>\n<li>Who really goes? Who is interested in what you are talking about?<\/li>\n<li>Poor screening of presentations &#8211; anyone can present if you pay<\/li>\n<li>Publish in their &#8220;Proceedings&#8221; and you loose rights to publish elsewhere<\/li>\n<li>Not everyone is there for the talk as such\u00a0&#8211; they want your intellectual property<\/li>\n<\/ol>\n<p><strong><a href=\"https:\/\/thinkcheckattend.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Think. Check. Attend.<\/a><\/strong>Choosing the right conference to attend and present your research.\u00a0 A sister site to <strong><a href=\"https:\/\/thinkchecksubmit.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Think Check Submit<\/a><\/strong>.\u00a0 This site &#8220;aims to guide and assist r<span style=\"font-size: 15px;font-weight: 300\">esearchers and scholars to jud<\/span><span style=\"font-size: 15px;font-weight: 300\">ge the legitimacy and academic credentials of conferences in order to help them decide whether to or not atte<\/span><span style=\"font-size: 15px;font-weight: 300\">nd the same.&#8221;\u00a0 There is <strong><a href=\"https:\/\/thinkcheckattend.org\/check\/\" target=\"_blank\" rel=\"noopener noreferrer\">check list<\/a> <\/strong>that provides guidance on trusting a conference to attend<\/span><span style=\"font-size: 15px;font-weight: 300\">.<\/span><\/p>\n<h5 style=\"font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif;font-style: normal\"><img decoding=\"async\" class=\"aligncenter\" style=\"font-style: inherit;font-weight: inherit;font-size: 15px;margin-top: 0.4em\" src=\"https:\/\/thinkcheckattend.org\/wp-content\/uploads\/2017\/08\/logo.png\" alt=\"Think Check Attend\" \/><\/h5>\n<h5><em><strong>Additional Information on Preda<\/strong><\/em><em style=\"font-size: 18px\"><strong>tory Conferences<\/strong><\/em><\/h5>\n<ul>\n<li><strong><a href=\"https:\/\/journals.lww.com\/co-anesthesiology\/Abstract\/publishahead\/Predatory_journals_and_conferences__why_fake.98799.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Predatory journals and Conferences: why fake counts<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/www.authoraid.info\/en\/news\/details\/1156\/\" target=\"_blank\" rel=\"noopener noreferrer\">What are \u2018predatory\u2019 conferences and how can I avoid them?<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/www.enago.com\/academy\/tips-identify-avoid-predatory-conferences\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Tips on How to Identify and Avoid Predatory Conferences<\/strong><\/a><\/li>\n<li><strong><a href=\"https:\/\/academic.oup.com\/asj\/article\/37\/6\/734\/2966192\" target=\"_blank\" rel=\"noopener noreferrer\">Are Predatory Conferences the Dark Side<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/nhs.12318\/full\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cBuyer Beware!\u201d predatory conferences: Avoiding an expensive mistake<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/ascopubs.org\/doi\/full\/10.1200\/JOP.2017.021469\" target=\"_blank\" rel=\"noopener noreferrer\">Is This Conference for Real? Navigating Presumed Predatory Conference Invitations<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.huffingtonpost.ca\/dr-madhukar-pai\/predatory-conferences-academia_b_12467834.html\" target=\"_blank\" rel=\"noopener noreferrer\">Predatory Conferences Undermine Science And Scam Academics<\/a><\/strong><\/li>\n<li><strong><a href=\"http:\/\/ismpp-newsletter.com\/2017\/09\/28\/beware-the-imposter-predatory-conferences-lure-the-unsuspecting\/\" target=\"_blank\" rel=\"noopener noreferrer\">Beware the Imposter: Predatory Conferences Lure the Unsuspecting<\/a><\/strong><\/li>\n<li id=\"s-lg-guide-name\"><strong><a href=\"https:\/\/libguides.caltech.edu\/c.php?g=512665&amp;p=3503029\" target=\"_blank\" rel=\"noopener noreferrer\">Questionable Conferences (contains a list of Conferences\/Conference Organizers)<\/a><\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Predatory conferences or predatory meetings are set up and appear like legitimate scientific conferences.\u00a0 However, like predatory publishing they are exploitative offering little in the way of editorial control over content. Researchers attending may have good intentions, organizing company only <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/research-integrity\/predatory-conferences\/\">Continue reading <span class=\"screen-reader-text\">  Information on Predatory Conferences<\/span><span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":72,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/pages\/87"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/pages\/87\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/pages\/87\/revisions\/421"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/research-integrity\/wp-json\/wp\/v2\/media?parent=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}