{"title":"Evidence Engines: Common Rhetorical Features of Fraudulent Academic Articles","authors":"E. H. Pflugfelder","doi":"10.1177/07410883211069332","DOIUrl":null,"url":null,"abstract":"Predatory publishers deliver neither the editorial oversight, nor the peer review of legitimate publishers, and benefit from those whose positions require academic publications. These publishers also provide a home for conspiracy theorists and pseudoscience promoters, as their lack of scrutiny offers fraudulent academic research articles a veneer of scholarly credibility. While most predatory journals were designed to dupe researchers, the fraudulent articles they often publish are designed to be found by members of the public, and their accessibility ensures that unlike legitimate research, they are likely to be employed as evidence by those seeking evidence. While studies have examined the common features of predatory journals, their emails, and their websites, this essay situates fraudulent academic articles in posttruth discourse, offers a taxonomy of illegitimate research articles, and highlights their common rhetorical features, in the hopes that the concepts discovered here can further contribute to pedagogy and public understanding.","PeriodicalId":47351,"journal":{"name":"Written Communication","volume":null,"pages":null},"PeriodicalIF":1.9000,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Written Communication","FirstCategoryId":"98","ListUrlMain":"https://doi.org/10.1177/07410883211069332","RegionNum":1,"RegionCategory":"文学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMMUNICATION","Score":null,"Total":0}
引用次数: 3
Abstract
Predatory publishers deliver neither the editorial oversight, nor the peer review of legitimate publishers, and benefit from those whose positions require academic publications. These publishers also provide a home for conspiracy theorists and pseudoscience promoters, as their lack of scrutiny offers fraudulent academic research articles a veneer of scholarly credibility. While most predatory journals were designed to dupe researchers, the fraudulent articles they often publish are designed to be found by members of the public, and their accessibility ensures that unlike legitimate research, they are likely to be employed as evidence by those seeking evidence. While studies have examined the common features of predatory journals, their emails, and their websites, this essay situates fraudulent academic articles in posttruth discourse, offers a taxonomy of illegitimate research articles, and highlights their common rhetorical features, in the hopes that the concepts discovered here can further contribute to pedagogy and public understanding.
期刊介绍:
Written Communication is an international multidisciplinary journal that publishes theory and research in writing from fields including anthropology, English, education, history, journalism, linguistics, psychology, and rhetoric. Among topics of interest are the nature of writing ability; the assessment of writing; the impact of technology on writing (and the impact of writing on technology); the social and political consequences of writing and writing instruction; nonacademic writing; literacy (including workplace and emergent literacy and the effects of classroom processes on literacy development); the social construction of knowledge; the nature of writing in disciplinary and professional domains.