scholarly journals Incidence of predatory journals in computer science literature

2017 ◽  
Vol 66 (6/7) ◽  
pp. 505-522 ◽  
Author(s):  
Simona Ibba ◽  
Filippo Eros Pani ◽  
John Gregory Stockton ◽  
Giulio Barabino ◽  
Michele Marchesi ◽  
...  

Purpose One of the main tasks of a researcher is to properly communicate the results he obtained. The choice of the journal in which to publish the work is therefore very important. However, not all journals have suitable characteristics for a correct dissemination of scientific knowledge. Some publishers turn out to be unreliable and, against a payment, they publish whatever researchers propose. The authors call “predatory journals” these untrustworthy journals. The purpose of this paper is to analyse the incidence of predatory journals in computer science literature and present a tool that was developed for this purpose. Design/methodology/approach The authors focused their attention on editors, universities and publishers that are involved in this kind of publishing process. The starting point of their research is the list of scholarly open-access publishers and open-access stand-alone journals created by Jeffrey Beall. Specifically, they analysed the presence of predatory journals in the search results obtained from Google Scholar in the engineering and computer science fields. They also studied the change over time of such incidence in the articles published between 2011 and 2015. Findings The analysis shows that the phenomenon of predatory journals somehow decreased in 2015, probably due to a greater awareness of the risks related to the reputation of the authors. Originality/value We focused on computer science field, using a specific sample of queries. We developed a software to automatically make queries to the search engine, and to detect predatory journals, using Beall’s list.

2020 ◽  
Vol 2 (3) ◽  
pp. 125-139
Author(s):  
Dylan Rees ◽  
Qiru Wang ◽  
Robert S. Laramee

PurposeThis paper is a response to a frequently asked question from prospective industry partners searching for opportunities to collaborate with the Computer Science Department of Swansea University, UK. This paper seeks to provide structured guidance in the form of what is titled the Industry Engagement Ladder.Design/methodology/approachThe Industry Engagement Ladder presents a selection of collaboration opportunities, outlining the possible cooperation mechanisms between an industry partner and the academic institution.FindingsOpportunities are described and ranked according to the amount of investment required by the industrial partner, and therefore risk, from low to high.Originality/valueThis concise paper provides a quick reference for perspective industry academia collaboration opportunities, the risks involved with each, the possible funding available to help foster these partnerships and the benefits to industry. These collaborative activities (and variations thereof) can be incorporated by any university department. The manuscript offers an ideal starting point for industry–university collaboration.


2017 ◽  
Vol 8 (4) ◽  
pp. 558-577 ◽  
Author(s):  
Faiza Khan ◽  
Michelle Callanan

Purpose The purpose of this paper is to address the confusing use of terminology associated with tourism undertaken by Muslims and to identify key concerns associated with this type of tourism. Design/methodology/approach This is an exploratory study and adopts a critical review of literature following the evolutionary concept analysis method. Content analysis of popular UK media, UK-based tour operators’ websites and tourism strategies of destinations popular with Muslim tourists were conducted to examine the use of terminology. Findings There is no clear difference between the various terms (halal, Muslim friendly, Islamic, etc.) used. Overall, academia uses the term Islamic tourism, while the industry and media use various terms. Among destinations, however, there is no clear and consistent use of terminology. A key concern of Islamic tourism is the role of certification in assuring travellers and the lack of standardisation of halal certification. Research limitations/implications The paper is based on literature review and secondary data analysis. It lacks primary research. Practical implications This study highlights the need for consistent use of terminology across industry. Another implication is the issue surrounding halal certification of food and the importance of trust in the seller/service provide. Another trend that industry providers need to consider is the growth of the Muslim millennial traveller and the needs of this market segment. Originality/value The paper highlights the importance of studying the Muslim tourist market and provides a starting point for further research. It highlights several issues such as the need to develop a typology of Muslim tourists. Of particular interest is the concern whether halal values in danger of being commodified in the absence of a universal agreed criterion for halal certification.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Monica Consolandi

Purpose Seniors are nowadays at the core of important reflections to understand both how to ensure them a proper quality of life and better recognize their social role, providing them services and proper health care to value them as persons and resources. This paper aims to find a through definition about who is a senior, in the author’s opinion the starting point to help them flourishing. Design/methodology/approach As an example of definitions, an online dictionary and two geriatric text-books are quoted, highlighting qualities and rights referred to seniors especially in the delicate context of the health-care system. Findings The lack of a commonly shared perspective on this delicate kind of patient entails the difficulty to reach a coherent and satisfying definition about who a senior is. Originality/value The lack of a commonly shared definition leads to inevitable misunderstandings and could explain the arduousness of considering seniors in all their aspects. Further investigations are suggested.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tehmina Amjad ◽  
Mehwish Sabir ◽  
Azra Shamim ◽  
Masooma Amjad ◽  
Ali Daud

PurposeCitation is an important measure of quality, and it plays a vital role in evaluating scientific research. However, citation advantage varies from discipline to discipline, subject to subject and topic to topic. This study aims to compare the citation advantage of open access and toll access articles from four subfields of computer science.Design/methodology/approachThis research studies the articles published by two prestigious publishers: Springer and Elsevier in the author-pays charges model from 2011 to 2015. For experimentation, four sub-domains of computer science are selected including (a) artificial intelligence, (b) human–computer interaction, (c) computer vision and graphics, and (d) software engineering. The open-access and toll-based citation advantage is studied and analyzed at the micro level within the computer science domain by performing independent sample t-tests.FindingsThe results of the study highlight that open access articles have a higher citation advantage as compared to toll access articles across years and sub-domains. Further, an increase in open access articles has been observed from 2011 to 2015. The findings of the study show that the citation advantage of open access articles varies among different sub-domains of a subject. The study contributed to the body of knowledge by validating the positive movement toward open access articles in the field of computer science and its sub-domains. Further, this work added the success of the author-pays charges model in terms of citation advantage to the literature of open access.Originality/valueTo the best of the authors’ knowledge, this is the first study to examine the citation advantage of the author-pays charges model at a subject level (computer science) along with four sub-domains of computer science.


2018 ◽  
Vol 13 (3) ◽  
pp. 274-286 ◽  
Author(s):  
Samuel Paul Louis Veissière

Purpose This paper aims to take the “toxic masculinity” (TM) trope as a starting point to examine recent cultural shifts in common assumptions about gender, morality and relations between the sexes. TM is a transculturally widespread archetype or moral trope about the kind of man one should not be. Design/methodology/approach The author revisits his earlier fieldwork on transnational sexualities against a broader analysis of the historical, ethnographic and evolutionary record. The author describes the broad cross-cultural recurrence of similar ideal types of men and women (good and bad) and the rituals through which they are culturally encouraged and avoided. Findings The author argues that the TM trope is normatively useful if and only if it is presented alongside a nuanced spectrum of other gender archetypes (positive and negative) and discussed in the context of human universality and evolved complementariness between the sexes. Social implications The author concludes by discussing stoic virtue models for the initiation of boys and argues that they are compatible with the normative commitments of inclusive societies that recognize gender fluidity along the biological sex spectrum. Originality/value The author makes a case for the importance of strong gender roles and the rites and rituals through which they are cultivated as an antidote to current moral panics about oppression and victimhood.


2019 ◽  
Vol 71 (1) ◽  
pp. 54-71 ◽  
Author(s):  
Artur Strzelecki

Purpose The purpose of this paper is to clarify how many removal requests are made, how often, and who makes these requests, as well as which websites are reported to search engines so they can be removed from the search results. Design/methodology/approach Undertakes a deep analysis of more than 3.2bn removed pages from Google’s search results requested by reporting organizations from 2011 to 2018 and over 460m removed pages from Bing’s search results requested by reporting organizations from 2015 to 2017. The paper focuses on pages that belong to the .pl country coded top-level domain (ccTLD). Findings Although the number of requests to remove data from search results has been growing year on year, fewer URLs have been reported in recent years. Some of the requests are, however, unjustified and are rejected by teams representing the search engines. In terms of reporting copyright violations, one company in particular stands out (AudioLock.Net), accounting for 28.1 percent of all reports sent to Google (the top ten companies combined were responsible for 61.3 percent of the total number of reports). Research limitations/implications As not every request can be published, the study is based only what is publicly available. Also, the data assigned to Poland is only based on the ccTLD domain name (.pl); other domain extensions for Polish internet users were not considered. Originality/value This is first global analysis of data from transparency reports published by search engine companies as prior research has been based on specific notices.


2014 ◽  
Vol 115 (5/6) ◽  
pp. 225-236 ◽  
Author(s):  
Faye Chadwell ◽  
Shan C. Sutton

Purpose – The purpose of this article is to provide a vision for how academic libraries can assume a more central role in a future where open access (OA) publishing has become the predominant model for disseminating scholarly research articles. Design/methodology/approach – The authors analyze existing trends related to OA policies and publishing, with an emphasis on the development of repositories managed by libraries to publish and disseminate articles. They speculate that these trends, coupled with emerging economic realities, will create an environment where libraries will assume a major role in the OA publishing environment. The authors provide some suggestions for how this major role might be funded. Findings – The trends and economic realities discussed will lead to new roles for academic librarians and will change the existing roles. Originality/value – This article provides insights for academic libraries and their institutions to consider a dramatic shift in the deployment of subscription dollars from a dysfunctional and largely closed scholarly communication system to one that provides open, unfettered access to research results.


2018 ◽  
Vol 22 (1) ◽  
pp. 129-156 ◽  
Author(s):  
Marian Makkar ◽  
Sheau-Fen Yap

Purpose The purpose of this paper is to address the following questions: how do consumers construct meaning around their inconspicuous luxury fashion experiences? What desires do inconspicuous consumers strive to fulfill? What sentiments do they associate with their inconspicuous luxury fashion consumption? Design/methodology/approach This exploratory research begins with a netnographic study of 11 online luxury blogs followed by in-depth interviews and home observations of ten luxury consumers with inconspicuous preferences in Dubai. Findings Inconspicuous choices are not simply for associative or dissociative motivations but several symbolic consumption schemas come into play. A typology of inconspicuous luxury fashion consumers has emerged: fashion influencers, trendsetters, fashion followers, and luxe conservatives. Practical implications The findings have potential to yield important managerial implications for fashion retailers and brand communications. The typology of inconspicuous consumers provides a basis for developing a more targeted relationship marketing program for luxury fashion brands. Originality/value This research advances luxury knowledge in fashion and consumer behavior research by unveiling how consumers construct meanings around their inconspicuous consumption. The typology developed in this study marks the starting point for further extensions to explore the complexities of inconspicuous luxury consumers, which are grounded in the roles they take on in society, how they plan their luxury consumption journey and how they eventually use these possessions for self-identification and communication to others.


2019 ◽  
Vol 119 (2) ◽  
pp. 331-350 ◽  
Author(s):  
Kangning Wei ◽  
Yuzhu Li ◽  
Yong Zha ◽  
Jing Ma

Purpose The purpose of this paper is to compare the relative impacts of trust and risk on individual’s transaction intention in consumer-to-consumer (C2C) e-marketplaces from both the buyers’ and the sellers’ perspectives. Design/methodology/approach Two surveys were used to collect data regarding buyers’ and sellers’ perceptions and transaction intentions at a typical C2C e-marketplace. Partial least squares was used to analyze the data. A complementary qualitative study was conducted to triangulate the results from the quantitative study. Findings Institution-based trust (IBT) exerts a stronger influence on transaction intentions for buyers than for sellers. Sellers perceive a stronger impact of trust in intermediary (TII) than buyers on transaction intentions. The impacts of perceived risk in transactions are not different between buyers and sellers. Furthermore, IBT mediates the impacts of TII and perceived risk on transaction intentions for buyers. Research limitations/implications The results indicate that the impacts of trust and risk on transaction intention in e-marketplaces do differ between buyers and sellers. This suggests a need to further investigate the buyer–seller difference in online transactions. Practical implications Intermediaries need to focus on different types of trust-building mechanisms when attracting buyers and sellers to make transactions in the e-marketplace. Originality/value C2C e-marketplaces cannot survive without participation from both buyers and sellers. Most prior research is conducted from the buyers’ perspective. This research sets a starting point for future research to further explore the differences between buyers’ and sellers’ behavior in C2C e-commerce environments.


2018 ◽  
Vol 29 (5) ◽  
pp. 809-833 ◽  
Author(s):  
Christoph Breidbach ◽  
Sunmee Choi ◽  
Benjamin Ellway ◽  
Byron W. Keating ◽  
Katerina Kormusheva ◽  
...  

Purpose The purpose of this paper is to analyze the history and future of service operations, with the goal to identify key theoretical and technological advances, as well as fundamental themes that can help to imagine the future of service operations in 2050. Design/methodology/approach A review of the service operations literature was undertaken to inform a discussion regarding the role that technology will play in the future of service operations. Findings The future of service operations is framed in terms of three key themes – complexity, orchestration, and elasticity. The paper makes three contributions to the service science literature by: reviewing key themes underpinning extant service operations research to frame future trajectories of service operations research; elaborating a vision of service operations in 2050 based on history and technology; and outlining a research agenda for future service operations. Practical implications The case of service automation is used to provide an illustration of how the three themes converge to define future service operations, and in particular, to show how technology is recasting the role of the firm. Originality/value Service operations in the next 30 years will be very different from what it was in the past 30 years. This paper differs from other review papers by identifying three key themes that will characterize and instill new insights into the future of service operations research.


Sign in / Sign up

Export Citation Format

Share Document