{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T00:15:19Z","timestamp":1720052119340},"reference-count":17,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T00:00:00Z","timestamp":1716595200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Learned Publishing"],"published-print":{"date-parts":[[2024,7]]},"abstract":"Abstract<\/jats:title>This study sets out to detail the deceptive practice of including stock characters in the editorial boards of journals run by predatory publishers. Stock characters are defined by the author as those that currently (2023) appear 20 or more times on these editorial boards. Predatory publishers are in turn defined by the author as open access publishers in violation of three or more out of eight egregiously \u2018fatal\u2019 criteria such as identity theft and token (or no) peer review. Stock characters (and stolen academic names and affiliations in general) are included in editorial boards to give them an unwarranted appearance of quality and excellence. Ninety\u2010six of these stock characters were identified, with their numbers of board memberships ranging from 20 to 503 in the current year (2023). Some were cases of total identity theft, some partial identity theft, and some willing compliance. Academics in the latter category could also have records of publications with the predatory publishers in question. Universities typically warn staff and postgraduate students about the dangers of engaging with predatory publishers, but they can be unresponsive or otherwise negative when alerted to instances of such engagements involving their staff.<\/jats:p>","DOI":"10.1002\/leap.1608","type":"journal-article","created":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T10:41:25Z","timestamp":1716633685000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The stock characters in the editorial boards of journals run by predatory publishers"],"prefix":"10.1002","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9134-8421","authenticated-orcid":false,"given":"Mike","family":"Downes","sequence":"first","affiliation":[{"name":"Townsville Queensland Australia"}]}],"member":"311","published-online":{"date-parts":[[2024,5,25]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2017.029"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/leap.1573"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.47989\/irpaper912"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/leap.1297"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.3138\/jsp-2021-0021"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.3138\/jsp-2021-0023"},{"key":"e_1_2_7_8_1","unstructured":"Kolata G.(2017).Many academics are eager to publish in worthless journals New York Times(30 October).www.nytimes.com\/2017\/10\/30\/science\/predatory-journals-academics.html"},{"key":"e_1_2_7_9_1","unstructured":"Lowe D.(2018 February 21).Down the rabbit hole with Alireza Heidari. In the Pipeline.https:\/\/blogs.sciencemag.org\/pipeline\/archives\/2018\/02\/21\/down-the-rabbit-hole-with-alireza-heidari"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.3138\/jsp.51.3.01"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0261444822000490"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1038\/543481a"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.3138\/jsp.48.3.137"},{"key":"e_1_2_7_14_1","unstructured":"Scholarly Outlaws. (2023a). Beall\u2019s list predatory publishers and academic malpractice.https:\/\/scholarlyoutlaws.com\/index.php\/conferences\/"},{"key":"e_1_2_7_15_1","unstructured":"Scholarly Outlaws. (2023b). Beall\u2019s list predatory publishers and academic malpractice.https:\/\/scholarlyoutlaws.com\/index.php\/1054-2\/"},{"key":"e_1_2_7_16_1","unstructured":"Scholarly Outlaws. (2023c). Beall\u2019s list predatory publishers and academic malpractice.https:\/\/scholarlyoutlaws.com\/index.php\/outlaw-publishers\/"},{"key":"e_1_2_7_17_1","unstructured":"US Federal Trade Commission. (1998).Identity theft and assumption deterrence act.www.ftc.gov\/legal-library\/browse\/rules\/identity-theft-assumption-deterrence-act-text"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.3138\/jsp-2022-0066"}],"container-title":["Learned Publishing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/leap.1608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T13:27:08Z","timestamp":1720013228000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/leap.1608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,25]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10.1002\/leap.1608"],"URL":"https:\/\/doi.org\/10.1002\/leap.1608","archive":["Portico"],"relation":{},"ISSN":["0953-1513","1741-4857"],"issn-type":[{"value":"0953-1513","type":"print"},{"value":"1741-4857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,25]]},"assertion":[{"value":"2023-10-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}