当前位置: X-MOL 学术Written Communication › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Evidence Engines: Common Rhetorical Features of Fraudulent Academic Articles
Written Communication ( IF 2.447 ) Pub Date : 2022-01-31 , DOI: 10.1177/07410883211069332
Ehren Helmut Pflugfelder 1
Affiliation  

Predatory publishers deliver neither the editorial oversight, nor the peer review of legitimate publishers, and benefit from those whose positions require academic publications. These publishers also provide a home for conspiracy theorists and pseudoscience promoters, as their lack of scrutiny offers fraudulent academic research articles a veneer of scholarly credibility. While most predatory journals were designed to dupe researchers, the fraudulent articles they often publish are designed to be found by members of the public, and their accessibility ensures that unlike legitimate research, they are likely to be employed as evidence by those seeking evidence. While studies have examined the common features of predatory journals, their emails, and their websites, this essay situates fraudulent academic articles in posttruth discourse, offers a taxonomy of illegitimate research articles, and highlights their common rhetorical features, in the hopes that the concepts discovered here can further contribute to pedagogy and public understanding.



中文翻译:

证据引擎:欺诈性学术文章的常见修辞特征

掠夺性出版商既不提供编辑监督,也不提供合法出版商的同行评审,并从那些职位需要学术出版物的人那里受益。这些出版商还为阴谋论者和伪科学推动者提供了一个家,因为他们缺乏审查为欺诈性学术研究文章提供了学术可信度的外衣。虽然大多数掠夺性期刊旨在欺骗研究人员,但他们经常发表的欺诈性文章旨在被公众发现,并且它们的可访问性确保了与合法研究不同,它们很可能被那些寻求证据的人用作证据。虽然研究已经检查了掠夺性期刊、电子邮件和网站的共同特征,但本文将欺诈性学术文章置于后真相话语中,

更新日期:2022-01-31
down
wechat
bug