Exclude insufficient quality: Beall’s list

Are you in doubt of the quality of an Open Access journal?
You can use Beall’s lists to exclude questionable, scholarly publishers or journals.

  • Publishers
    Jeffrey Beall works as an academic librarian and is dedicated to scholarly open access publishing.  Beall’s list of potential, possible, or probable predatory scholarly open access publishers includes 693 publishers, an increase of 241 over 2014
  • Journals
    Beall’s list of potential, possible, or probable predatory scholarly open access journals is also continuously updated. The list this year includes 507 standalone journals, an increase of 204 over 2014
  • Hijacked journals
    Beall’s third list, the Hijacked journals list includes at least 30 journals for which someone has created a counterfeit website, stealing the journal’s identity and soliciting articles submissions using the author-pays model (gold open access).

Source: Scholarly Open Access blog  

2 Responses to Exclude insufficient quality: Beall’s list

  1. egonw Sunday 1 March 2015 at 11:59 CEST #

    I am disappointed to read the lead of this post. It reflects what some suspect Beall’s ulterior motives are: discredit Open Access. The list is anecdotal, not flawless, and the conclusions are out of scope of the things measured. This post insinuations are highly unscientific. UM Library, you can do better!

    • Coen van Laer Wednesday 4 March 2015 at 09:51 CEST #

      Recently, Jeffrey Beall published his “Criteria for Determining Predatory Open-Access Publishers“(3rd edition / January 1, 2015). These criteria serve the evaluation of publishers and standalone journals to decide upon their possible inclusion on Beall’s list. In this way, Beall’s list enables authors to leave aside those journals which could discredit Open Access. The Criteria for Determining Predatory Open-Access Publishers make Beall’s list a transparent tool to exclude insufficient quality in the interest of Open Access, unless Beall’s approach would be falsified by some examples.

Leave a Reply

Back to top