{"id":5059,"date":"2024-03-12T09:15:20","date_gmt":"2024-03-11T22:15:20","guid":{"rendered":"https:\/\/blogs.deakin.edu.au\/article\/?p=5059"},"modified":"2024-03-12T16:38:20","modified_gmt":"2024-03-12T05:38:20","slug":"avoid-scam-invitations-from-predatory-conferences-and-journals","status":"publish","type":"post","link":"https:\/\/blogs.deakin.edu.au\/article\/avoid-scam-invitations-from-predatory-conferences-and-journals\/","title":{"rendered":"Avoid scam invitations from predatory conferences and journals"},"content":{"rendered":"<p>If you are a researcher or academic, you may have noticed an increase in pesky emails and phone calls trying to lure you into submitting a paper to a shady journal or attending sketchy conferences. You know what we&#8217;re talking about \u2013 the ones that seem too good to be true? Well, turns out, they usually are!<\/p>\n<h2>What\u2019s happened?&nbsp;<\/h2>\n<p>Australian universities and research institutions are currently facing <a href=\"https:\/\/deakin365.sharepoint.com\/sites\/cybersecurity\/SitePages\/Security-Alert--Phishing-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs.aspx\">a new spike<\/a> in personalised phishing attacks and general spam. These deceptive tactics masquerade as communication from prestigious figures like journalists from reputable news outlets. They&#8217;re cunningly crafted with tailored messages, often tying into current geopolitical events, aiming to instil urgency and relevance.<\/p>\n<p>Adding to the mix, researchers and academics are bombarded with spam emails and calls, enticing them to submit papers to dubious journals or attend conferences organised by unknown entities. Usually, these unsolicited messages are nothing but spam and should be swiftly deleted.<\/p>\n<h2>How do these scams work?&nbsp;<\/h2>\n<h3>Via email<\/h3>\n<p><strong>If in doubt, spam email can be deleted or marked as junk. <\/strong>These types often want you to sign up by clicking on a link. Delete spam emails. Avoid opening these&nbsp;emails and clicking on the links within them. Don\u2019t buy anything from a spammer.<\/p>\n<p>Did you know you can&nbsp;<strong>block senders of spam<\/strong>? Just right-click on the email, hover on the word \u2018Junk\u2019 in the drop-down list and then select&nbsp;<strong>Block Sender<\/strong>.<\/p>\n<h3>Via phone<\/h3>\n<p><strong>If in doubt, don\u2019t pick up the phone.&nbsp;<\/strong>Most people don\u2019t enjoy answering unexpected phone calls, and it actually works in your favour. By simply letting the call go to voicemail, you can avoid a lot of spam callers. If they do decide to leave a message, it gives you time to think about whether or not it\u2019s legitimate. Spam callers often rely on making you feel their directions are urgent and following them <em>now <\/em>is critical to staving off a crisis. Taking a moment to listen to your messages before choosing whether to call back allows you time to breathe and independently verify the nature of the call. &nbsp;<\/p>\n<p>Did you know the library offers great resources to help you&nbsp;<a href=\"https:\/\/deakin.libguides.com\/your-publishing-plan\/evaluate-quality\">evaluate the quality of journals and conferences<\/a>?&nbsp;<\/p>\n<h2>Publishing red flags<\/h2>\n<p><span data-contrast=\"auto\">Examples of red flags:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Never heard of the journal<\/span><span data-contrast=\"auto\">, or it has a title which can be easily confused with another journal<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Never heard of the publisher<\/span><span data-contrast=\"auto\">, or it has no address or contact information on its website<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Asking for a fee to <\/span><span data-contrast=\"auto\">expedite<\/span><span data-contrast=\"auto\"> review<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Claims are not backed up in other sources (e.g. database indexing claims, etc.)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Makes nonsense claims (e.g. <\/span><span data-contrast=\"auto\">We\u2019re<\/span><span data-contrast=\"auto\"> indexed in Google Scholar, IC Index Value, etc.)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Sends out unsolicited emails calling for papers<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:120,&quot;335559740&quot;:264}\">&nbsp;<\/span><\/li>\n<\/ul>\n<h2>How do I stay safe?&nbsp;<\/h2>\n<ul>\n<li><strong>Keep your email address private (where possible)<\/strong>. Don\u2019t store it in plain text on a blog or website, and only give it to trusted sources.<\/li>\n<li><strong>Verify <\/strong>by researching (e.g. Google, Deakin Library) the name and information about the journal and check for blogs about complaints and unethical behaviour.<\/li>\n<li><strong>Ask a colleague <\/strong>in your field (or the Assoc Head of Research) about whether they have heard of the journal or conference, and whether it\u2019s reputable or not.<\/li>\n<li><strong>Use filters<\/strong>. Most email clients allow you to adjust filters based on content to block spam.<\/li>\n<li><strong>Unsubscribe <\/strong>to unwanted email lists.<\/li>\n<li><strong>Hang up.&nbsp;<\/strong>As soon as you suspect the phone call is a phishing call, simply hang up and block the number (<strong>iOS and<\/strong><a href=\"https:\/\/support.google.com\/phoneapp\/answer\/6325463?hl=en\"><strong>Android<\/strong><\/a>).<\/li>\n<\/ul>\n<h2>Want to learn more?<\/h2>\n<p>There are lots of resources on the Cyber Security Blog, Deakin Hub and Library websites.<\/p>\n<ul>\n<li><strong>Think. Check. Submit.<\/strong> and other publishing resources are available from <a href=\"https:\/\/deakin.libguides.com\/c.php?g=558289&amp;p=3912298\">Deakin\u2019s Library website<\/a>.<\/li>\n<li><strong>Your phishing call reporting guide<\/strong> and similar resources are available from the <a href=\"https:\/\/blogs.deakin.edu.au\/cybersecurity\/2023\/06\/26\/your-phishing-call-reporting-guide\/\">Cyber Security Blog<\/a>.<\/li>\n<li><strong>The latest cyber security alerts for Deakin staff<\/strong> are available on <a href=\"https:\/\/deakin365.sharepoint.com\/sites\/cybersecurity\/SitePages\/Security-Alert--Phishing-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs.aspx\">DeakinHub<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>If you are a researcher or academic, you may have noticed an increase in pesky emails and phone calls trying to lure you into submitting a paper to a shady journal or attending sketchy conferences. You know what we&#8217;re talking about \u2013 the ones that seem too good to be true? Well, turns out, they [&hellip;]<\/p>\n","protected":false},"author":33472,"featured_media":5060,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25,199],"tags":[204,149,120],"class_list":["post-5059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-interest","category-research-news","tag-cybersecurity","tag-deakin-academics","tag-deakin-research"],"jetpack_featured_media_url":"https:\/\/blogs.deakin.edu.au\/article\/wp-content\/uploads\/sites\/326\/2024\/03\/LCOM277-Blog-banner-Staying-safe-from-predatory-conference-and-journals.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pao1A6-1jB","_links":{"self":[{"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/posts\/5059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/users\/33472"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/comments?post=5059"}],"version-history":[{"count":10,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/posts\/5059\/revisions"}],"predecessor-version":[{"id":5081,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/posts\/5059\/revisions\/5081"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/media\/5060"}],"wp:attachment":[{"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/media?parent=5059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/categories?post=5059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.deakin.edu.au\/article\/wp-json\/wp\/v2\/tags?post=5059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}