Predatory journals are fake or deceptive publications that charge authors fees without providing proper peer review or editorial services. They waste research, damage academic reputations, and proliferate through aggressive solicitation. To avoid them, use the Think. Check. Submit. checklist, verify the journal in the DOAJ (Directory of Open Access Journals), check publisher affiliations (COPE, OASPA), scrutinize editorial boards, and beware of red flags like rapid acceptance promises and hidden fees. When uncertain, consult a university librarian. Legitimate journals are transparent about peer review, indexed in reputable databases (Scopus, Web of Science), and belong to recognized industry associations. Protect your research by verifying before you submit—your academic career depends on it.
Your research deserves a reputable home—one that will lend credibility to your work, ensure rigorous peer review, and contribute to your academic reputation. Yet the scholarly publishing landscape is riddled with predatory journals: exploitative publications that exist solely to collect author fees while failing to provide the editorial standards and peer review that legitimate journals uphold. Submitting your paper to a predatory journal can result in wasted effort, damaged credibility, and a publication that counts for nothing in your CV or tenure dossier. As a student or early-career researcher, you’re particularly vulnerable because you may lack the experience to spot warning signs and feel pressure to “publish something” quickly. This guide equips you with the knowledge, tools, and step-by-step process to identify and avoid predatory journals, ensuring your research finds a trustworthy audience.
Predatory publishing is a global problem. Estimates suggest there are between 8,000 and 15,000 active predatory journals, publishing over 400,000 articles annually and generating approximately $74 million in revenue (Yoo, 2025). The problem has worsened over the past decade; citations to predatory articles in reputable health databases increased roughly ten-fold between 2014 and 2022 (NIH). These journals not only dilute the scientific record but also waste researcher time, misallocate funding, and erode trust in scholarly communication. For students, the stakes are especially high: a predatory publication can harm job prospects, funding opportunities, and the perceived integrity of your work.
But how can you tell the difference between a legitimate journal and a predatory operation? Many predatory journals are cleverly disguised, copying legitimate websites, listing fake editorial boards, and mimicking indexing claims. That’s why you need a systematic approach—one that combines verification tools, critical evaluation, and professional judgment. This article provides that framework. You’ll learn the defining characteristics of predatory journals, a comprehensive red flags checklist, how to use resources like DOAJ and Think. Check. Submit., a step-by-step evaluation process, real-world case studies, and answers to common questions. By the end, you’ll be prepared to make informed decisions that protect your research and your career.
Predatory journals are deceptive, for-profit entities that bypass proper peer review and prioritize revenue over scholarship (COPE, 2019). They present themselves as legitimate academic publications but fail to provide the editorial and peer review services that scholars expect. Instead, they charge authors Article Processing Charges (APCs) or submission fees while delivering little or no quality control, editorial oversight, or genuine indexing.
The business model is simple: attract submissions—often through spam emails promising rapid publication—collect fees, and minimize costs by skipping peer review, copyediting, and proper archiving. Some predatory publishers operate hundreds of journals under a single umbrella, creating an illusion of choice while maintaining the same low standards across all titles.
The term “predatory journal” gained prominence thanks to librarian Jeffrey Beall, who maintained “Beall’s List,” a widely cited blacklist of allegedly predatory publishers and journals. Although Beall’s List is no longer updated (the original was taken down in 2017), an archived version remains available at beallslist.net. The list sparked widespread debate about predatory publishing and helped many researchers identify suspicious outlets. However, reliance on any single blacklist is risky—some legitimate new journals may be wrongly listed, and some predatory journals may slip through. That’s why modern approaches combine multiple verification tools, including whitelists like DOAJ and membership directories (COPE, OASPA).
The proliferation of predatory journals wastes valuable research resources. Studies show that authors often spend months preparing manuscripts only to see them published in journals with no readership, no indexing, and no academic standing. Worse, these publications can clutter a researcher’s CV and raise doubts about their judgment. In some cases, institutions have revoked promotions or funding for researchers who unknowingly included predatory publications on their applications. The broader scholarly record suffers as poorly vetted or even fraudulent research enters the literature, potentially misleading future studies and eroding public trust.
Moreover, predatory journals exploit systemic pressures in academia—the “publish or perish” culture, the rush to accumulate publications for tenure, and the lack of publishing expertise among early-career researchers. They create an alternative pathway that appears easy but exacts a high cost: your reputation and the integrity of your work.
Not every journal with low impact factor or poor editorial practices is predatory. There’s a spectrum:
The line can blur—some journals start predatory but later improve; others claim to be legitimate while engaging in exploitative practices. That’s why verification tools and critical evaluation are essential.
One of the most effective ways to avoid predatory journals is to recognize the common warning signs. Use this checklist when evaluating any unfamiliar journal. If you spot several red flags, proceed with extreme caution or abandon the journal entirely.
Predatory journals often spam thousands of researchers with personalized email invitations to submit. These messages may flatter you (“We are impressed by your work…”) or reference a completely unrelated topic to appear relevant. Legitimate journals rarely, if ever, send unsolicited bulk invitations.
Example: You receive an email titled “Invitation to Submit to the International Journal of Advanced Studies” even though your research is in molecular biology. The email promises a 7-day review and asks you to submit via a suspicious link.
Legitimate peer review takes time—typically weeks to months. Predatory journals boast “guaranteed acceptance within 3–5 days” or “no revisions required.” This is a clear sign that no meaningful review occurs.
Example: A journal’s website states: “All manuscripts are accepted within 48 hours of submission.” No reputable journal can guarantee such speed without sacrificing quality.
Legitimate journals are transparent about Article Processing Charges (APCs) and display them prominently on their website. Predatory journals often hide fee information until after acceptance, then demand high payments with little notice.
Example: The journal’s submission page asks for your manuscript without mentioning any fees. Only after you receive an “acceptance” email do they reveal an APC of $2,500, payable within 48 hours.
Predatory journals list editorial board members without their permission, include deceased scholars, or fabricate affiliations with prestigious institutions. They may also use stock photos instead of real headshots.
Example: The journal’s editorial board page shows the same person as Editor-in-Chief for ten different journals. When you Google the names, you find no academic profiles or publications.
While not definitive alone, a poorly designed website with broken links, spelling errors, low-quality graphics, or an unprofessional look can indicate a lack of investment in the journal’s mission.
Example: The journal’s website is filled with pixelated images, contains multiple grammatical errors, and navigation links lead to 404 pages.
Predatory journals boast inclusion in databases like Scopus, Web of Science, PubMed, or claim impressive impact factors. Always verify these claims directly with the indexing services—they are easily debunked.
Example: The journal displays a fake “Impact Factor: 4.2” logo and claims to be indexed in PubMed. A quick search on PubMed and the journal’s master list yields no results.
Legitimate journals describe their peer review process clearly—single-blind, double-blind, or other models. Predatory journals either omit this information entirely or provide vague, unrealistic descriptions.
Example: The journal’s website simply states “All submissions are reviewed by experts” without details about reviewer qualifications, timelines, or revision expectations.
Some predatory journals mimic the names of well-established legitimate journals to deceive authors and readers. They might add “International,” “American,” or “Global” to a known title or use a nearly identical ISSN.
Example: A journal calls itself “The Journal of Clinical Oncology” (the real journal is “Journal of Clinical Oncology”). A quick comparison reveals subtle differences in the logo and publisher.
Check whether the publisher is a member of recognized industry bodies like COPE (Committee on Publication Ethics), OASPA (Open Access Scholarly Publishers Association), or STM (International Association of Scientific, Technical and Medical Publishers). Absence from these directories is a warning sign.
Example: The publisher’s website makes no mention of COPE or OASPA membership, and a search of these organizations’ member directories returns no results.
All journals should have a published policy for handling errors, retractions, and ethical issues. Predatory journals often omit this information or provide a perfunctory statement.
Example: The journal’s ethics page is missing entirely, or it simply states “We take ethics seriously” without defining procedures.
Legitimate journals usually focus on a specific discipline or subdiscipline. Predatory journals often claim to cover a vast range of topics—from engineering to medicine to social sciences—because they will accept anything that pays the fee.
Example: A single journal’s aims and scope list includes “biological sciences, computer science, economics, literature, and theology.”
Some predatory journals demand payment upfront or during submission, before any peer review has occurred. This is a major red flag—reputable journals charge APCs only after acceptance, never before.
Example: The online submission system asks for credit card payment before you can upload your manuscript.
Once you’ve screened for red flags, it’s time to use established verification tools. These resources provide independent, authoritative assessments of journals and publishers.
Think. Check. Submit. is a campaign and checklist designed to help researchers evaluate the trustworthiness of a journal or publisher. The approach is simple but powerful:
Think – Before submitting, critically evaluate whether the journal is suitable and trusted. Ask: Do I know this journal? Is the publisher clearly identified? Is the peer review process clearly described? (thinkchecksubmit.org)
Check – Use the detailed checklist to verify credentials. The checklist asks you to confirm:
Submit – Only proceed if you can answer “yes” to most or all questions. Keep a copy of your completed checklist for your records.
The Think. Check. Submit. website offers downloadable checklists in multiple languages and specific versions for journals, books, and conferences.
The Directory of Open Access Journals (DOAJ) is a whitelist of open access journals that meet strict quality criteria. Inclusion in DOAJ requires journals to have transparent peer review, editorial board member affiliations, a clear APC policy, and a Creative Commons license offering. If a journal is listed in DOAJ, it is highly likely to be legitimate. Conversely, absence from DOAJ does not automatically mean a journal is predatory, but it warrants further investigation.
To check a journal, search DOAJ by title, ISSN, or publisher. DOAJ’s badge can also be displayed on the journal’s website—clicking it should link back to the DOAJ entry for verification.
Beall’s List (archived version) remains a reference point for identifying known predatory publishers. While it has limitations—subjectivity, potential false positives, and being out of date—it can still alert you to publishers with a history of predatory practices. Use it with caution: if a publisher appears on Beall’s List, treat it as a major red flag and investigate further. If a journal is not listed, that alone does not confirm legitimacy.
COPE is a nonprofit organization that provides guidelines and support for ethical publishing. COPE membership indicates that a publisher adheres to core practices such as handling misconduct, managing conflicts of interest, and ensuring transparency. Many legitimate publishers are COPE members. You can search the COPE member directory to verify a publisher’s membership status.
Legitimate journals are typically indexed in major bibliographic databases such as:
Check directly on these platforms. Be wary of journals that claim to be indexed in obscure databases with names that sound similar to reputable ones (e.g., “Index Copernicus” is not a recognized quality index).
Associations like the Open Access Scholarly Publishers Association (OASPA) and the International Association of Scientific, Technical and Medical Publishers (STM) vetted their members for professionalism and ethical standards. A publisher’s membership in these organizations is a positive signal. Look for their logos on the publisher’s website and verify on the association’s member directory.
Many university libraries maintain guides on predatory publishing. These resources often include locally recommended checklists, examples, and procedures. Notable examples include:
These guides are excellent for students because they are tailored to common pitfalls.
Evaluating a journal need not be overwhelming. Follow this structured process to make an informed decision. Think of it as a decision tree: if any step reveals serious red flags, stop and reconsider.
Start with your own knowledge and trusted networks. Does the journal appear in discussions with your supervisor, colleagues, or field-specific forums? Is it well-known in your discipline? If you’ve never encountered it before, that’s not automatically bad—many legitimate new journals exist—but it means you’ll need extra verification. Search your field’s association websites or ask your subject librarian whether the journal is recognized.
Identify the publisher. Is it an established academic publisher (e.g., Elsevier, Wiley, Springer Nature, SAGE, Taylor & Francis, MDPI, PLOS, university press) or an obscure company? Search the publisher’s name online; look for reviews, Wikipedia entries, or news articles. Check if the publisher is listed as a member of OASPA, STM, or COPE. If the publisher has no online presence beyond its own website, treat it as suspicious.
Find the editorial board listing on the journal website. Copy the names of the Editor-in-Chief and a few regional/subject editors. Google each name—do they have academic profiles, publications, and institutional affiliations? Do their profiles list them as editors of that journal? Be alert for deceased scholars (their names may be used without permission) or people who are listed but have never heard of the journal. A quick test: email one of the listed editorial board members (using a publicly listed email, not the contact form on the journal site) to ask if they serve on the board. Lack of response or denial is a red flag. Legitimate boards are usually composed of active researchers who are easily verifiable.
Locate the journal’s APC information—it should be prominently displayed on the website, often on pages titled “Author Guidelines,” “Submission Fees,” or “Open Access Charges.” The amount should be comparable to similar journals in your field (typical range $500–$3,000). If the fee is hidden, presented only as “contact us for pricing,” or must be paid before peer review, walk away. Also check for additional charges (color figures, extra pages, supplementary materials). Ask: Does the publisher offer waivers for authors from low-income countries or those with financial hardship? Legitimate publishers often do.
Read the journal’s peer review policy. How many reviewers are involved? Is it single-blind, double-blind, or open review? What is the average time to decision? A vague description like “All submissions are reviewed by experts” is insufficient. Look for concrete information about review criteria, revision expectations, and the role of the editorial board. Also check for a plagiarism detection policy—legitimate journals use tools like iThenticate or Turnitin.
The journal may claim to be indexed in Scopus, Web of Science, PubMed, etc. Do not take their word for it. Go directly to the database’s website and search for the journal title and ISSN. For example, visit the Scopus source list and search. If the journal is not listed, be skeptical. Some predatory journals invent fake indexing services (e.g., “International Index of Scientific Journals”)—if you’ve never heard of the index, research it.
Send a concise, polite email to the editorial office with a specific question (e.g., “What is your average time to first decision?” or “Do you have a retraction policy?”). Note the response time and quality. Legitimate publishers typically respond within a few business days with helpful, professional replies. No response or a canned reply that doesn’t address your question is a red flag.
Before finalizing your decision, seek advice from your supervisor, department colleagues, or a university librarian. Subject librarians are particularly valuable—they are familiar with reputable journals in their disciplines and often know the warning signs of predatory outlets. Bring your checklist and any doubts. A second opinion can prevent costly mistakes.
Predatory journals sometimes hijack the identity of a legitimate journal—stealing its name, logo, or website design. Compare the journal you’re considering with the known legitimate version. Check ISSNs carefully; a hijacked journal will have a different ISSN. Visit the legitimate journal’s official publisher site to verify differences. If you suspect hijacking, report it to the legitimate publisher.
After completing these steps, you should have a clear picture. Does the journal pass verification on multiple fronts (DOAJ listing, COPE membership, transparent fees, editorial board verified, indexed in your target database)? If yes, you can proceed with confidence. If you have lingering doubts or uncovered multiple red flags, it’s wise to choose another outlet. Remember: when in doubt, consult a librarian. The cost of a missed opportunity is small compared to the damage of a predatory publication.
Real-world examples help illustrate the contrast. The following case studies are composites based on common patterns, anonymized to protect privacy.
Scenario: A graduate student in computer science receives an email titled “Invitation to Submit – International Journal of Advanced Computer Science (IJACS)”. The email praises the student’s recent conference presentation and invites a submission within two weeks. The journal sounds plausible—the name includes “International” and the field is correct.
Red Flags Encountered:
Outcome: The student consulted their university librarian, who recognized the journal from a predatory list and warned against submission. The student avoided wasting time and money.
Scenario: A postdoctoral researcher in environmental science searches for appropriate journals using their university library’s journal finder tool. They identify the Journal of Environmental Sustainability (JES), published by a university press.
Positive Verification:
Outcome: The researcher submitted and after two rounds of peer review, the article was accepted. The publication added a legitimate, indexed item to their CV and contributed to their later job search.
Scenario: A nursing master’s student encounters Healthcare Innovation & Practice (HIP), a relatively new journal launched three years ago by a midsize publisher that also runs several established journals.
Mixed Signals:
Decision: Given the mixed signals, the student consulted their academic advisor, who suggested waiting until the journal gains more traction or submitting elsewhere. The student chose a well-indexed, fully established alternative.
Lesson: Not every unclear case is outright predatory, but uncertainty warrants caution. Use the step-by-step process to weigh evidence.
Even with careful research, you may encounter journals that are ambiguous or raise doubts. Knowing when to ask for help can save your research from misadventure.
Consult an expert if:
When reaching out to a librarian or mentor, provide specific details:
Being precise helps them give targeted advice.
If you lack access to a university librarian or need more in-depth assistance, consider professional publication support services. QualityCustomEssays offers consultations to evaluate journals, verify credentials, and advise on submission strategies. Our experts can review a journal’s legitimacy and suggest reputable alternatives. Contact us for a personalized consultation.
Your university library is an invaluable resource. Subject librarians specialize in specific disciplines and maintain knowledge of reputable journals. Many libraries also provide online guides and one-on-one appointments. Don’t hesitate to use these free services—they are there to support your research success.
Certain characteristics should trigger immediate professional review:
If you notice two or more of these, walk away or seek expert confirmation before proceeding.
No. Many high-quality open access journals are highly reputable, such as those from PLOS, BMC, and many university presses. Predatory journals exist across all publishing models, including subscription-based ones that fake peer review. The key is verification, not blanket suspicion. Use DOAJ to find vetted OA journals and always check the publisher’s credentials.
Yes, if it passes verification checks. Many excellent journals are niche or new. The issue is not familiarity but legitimacy. Use the Think. Check. Submit. checklist and tools like DOAJ to confirm the journal’s credibility before submitting.
Peer review timelines vary by field, but a guarantee of acceptance in less than a week is almost always a red flag. Legitimate peer review typically takes 4–12 weeks for first decision, depending on the journal and field. If a journal promises decisions in 48 hours, it likely skips meaningful review.
Article Processing Charges (APCs) vary widely but generally fall within these ranges:
Diamond OA journals charge no APC. Always compare the fee to similar journals in your field. If a fee seems dramatically lower or higher, investigate why.
Not necessarily. Predatory journals routinely list names of prominent academics without their permission or even if the scholars are deceased. Always verify editorial board membership by checking the person’s personal or institutional webpage to see if they list that journal as an editorial role. A quick email to the scholar can also confirm.
You can report suspected predatory journals to:
Yes. When you include a predatory publication on your CV, it signals poor judgment to employers, tenure committees, and grant reviewers. If discovered, it can lead to retractions, loss of credibility, and even accusations of misconduct (especially if the journal publishes fake data). In some cases, institutions have rescinded job offers or funding based on predatory publications.
If you have not yet paid and the journal is still under review, you may be able to withdraw your submission. Contact the editorial office with a polite withdrawal request citing personal reasons (you don’t need to accuse them). If you have already paid and the journal has published your article, you may consider requesting retraction, but be aware that predatory journals may ignore such requests. In extreme cases, consult your institution’s research integrity office. Going forward, use the verification steps before submitting.
Avoiding predatory journals is a critical skill for any student or early-career researcher. The stakes are high: your research reputation, career opportunities, and the integrity of the scholarly record depend on choosing legitimate outlets.
Key takeaways:
Before you submit any manuscript, run through this final checklist:
Protecting your work from predatory journals is not just about avoiding scams—it’s about ensuring your research achieves the impact it deserves. Take the time to verify, and your future self will thank you.
If you need help evaluating a specific journal or want personalized guidance on publication strategies, contact our publication experts for a consultation. QualityCustomEssays’ team of academic advisors can review journal options, verify legitimacy, and assist with manuscript preparation to maximize your chances of successful publication.
For more on academic writing, research preparation, and publication strategies, explore these resources:
These guides provide step-by-step assistance for every stage of the research and publication process—from crafting a proposal to revising your manuscript based on reviewer feedback.