Can J Surg 2021;64(3):E351-E357 | PDF
Madeleine McKenzie, BSc; Duncan Nickerson, MD; Chad G. Ball, MD, MSc
Over a 6-month period, roughly one-third of emails received in a single surgeon’s email inbox were predatory in nature (i.e., soliciting material for nonexistent journals or conferences). While existing databases (e.g., Beall’s list and The CalTech Library list of questionable conferences) catalogue many fraudulent senders, the list is ever-expanding. The overall cost to health care organizations in terms of wasted bandwidth and financial diversion is extensive, as is confusion for trainees and colleagues. For the sake of fiscal responsibility and the maintenance of scholarly standards, it is incumbent upon organizational information technology departments to continually refine strategies to reduce this adverse impact.
Accepted January 11, 2021
Affiliations: From the Department of Surgery, University of Calgary, Calgary, Alta.
Competing interests: C.G. Ball is coeditor-in-chief of CJS. He was not involved in the review or decision to accept this manuscript for publication. No other competing interests declared.
Contributors: All authors contributed substantially to the conception, writing and revision of this article and approved the final version for publication.
Content licence: This is an Open Access article distributed in accordance with the terms of the Creative Commons Attribution (CC BY-NC-ND 4.0) licence, which p rmits use, distribution and reproduction in any medium, provided that the original publication is properly cited, the use is noncommercial (i.e., research or educational se), and no modifications or adaptations are made. See: https://creativecommons.org/licenses/by-nc-nd/4.0/
Correspondence to: D. Nickerson, Department of Surgery, University of Calgary, 1403-29 St NW, Calgary AB T2N 2T9, firstname.lastname@example.org