Previous studies have examined the quantity and quality of predatory publishers, as well as characteristics of authors who publish in them. 10 12–19 However, to our knowledge, no study has described the prevalence of this phenomenon among researchers early in their career or quantified the time spent on ASEs. Therefore, we sought to examine factors associated with the amount of time spent addressing ASEs by career development grantees.

In the last 10 years, a subset of ‘predatory’ publishers has been able to flourish within the $10.5 billion per year market. 1–4 These predatory publishers send unsolicited emails that request manuscript submissions, offer rapid review and use publication fees (rather than traditional peer or editorial review) as criteria to accept articles. 5–7 As a result of this model, there have been documented instances of accepting flawed manuscripts or fake editorial board members. 8–11 Because academic research faculty career success is often centred on their publication and funding record, their ability to obtain funding to conduct research is intimately linked to their success in publishing their work. Junior academic faculty are particularly focused on opportunities to publish, given the importance tied to their promotion. They may, therefore, be most susceptible to academic spam emails (ASEs) from predatory publishers, which contain unsolicited requests for publishing manuscripts, presentations at organisation meetings and memberships on editorial boards.

We summarised responses to survey questions using descriptive statistics and then assessed factors associated with the daily amount of time spent on these emails (recategorised as none, 1–10 min and >10 min) using χ 2 bivariate analysis. We removed respondents with missing data (n=68) or who replied ‘not sure’ (n=4) to the question about time spent daily addressing ASEs from the bivariate analysis. Respondents removed from this analysis were less likely to have more than 20 publications but otherwise did not differ from those included in the sample by key study variables. All analysis was done using SAS V.9.4.

The survey requested information regarding basic demographic (eg, gender) and professional information (eg, academic job title, year of terminal degree and publication history). Survey respondents were also asked several questions about their experience with ASEs, which was described to survey respondents as an ‘unsolicited email requesting articles/editorial, conference presentations or editorial membership’. Subsequent questions asked respondents to report the number of ASEs they received daily, how they determined whether these emails were spam, the amount of time spent on these emails, whether their email account had a spam filter and if they ever felt like they missed opportunities due to ignoring these emails.

The survey was conducted using a self-structured questionnaire, which was piloted among 10 faculty at Indiana University School of Medicine that were not current K awardees to assure clarity of questions and adequate response options. If a question was not clear or the answer choices were not sufficient, the survey was edited before it was sent to the next faculty member. This process was repeated until there were no additional feedback suggestions. Validity testing on the survey (prior to the surveys being sent to the study participants) was not done. The survey was sent a total of three times over a 2-month period (November–December) in 2016 to 3492 NIH K awardees. The email was generated from a valid, personal email account of one of the study investigators (TAW).

We obtained the contact information for all National Institutes of Health (NIH) K awardees in the fiscal year of 2015 via a Freedom of Information Act request. Information of federal grant awardees is a standard report issued by the NIH Freedom of Information Office that is available online. 20 We then created and emailed an online survey using Survey Monkey, 21 consisting of 14 questions to the correspondent/recipient on record of each K award.

Finally, we assessed whether respondents felt they might have missed opportunities in the past because they mistakenly assumed legitimate emails were academic spam. We found that respondents who were concerned about missed opportunities were almost twice as likely to spend at least 10 min of their day assessing these emails than those who were not concerned (24.3% vs 12.8%, p=0.04).

However, there was an inverse association (p<0.001) with the number of academic publications reported and the time spent addressing these emails, such that faculty with fewer publications reported spending more time per day reading potential ASEs and assessing their legitimacy. Among faculty with 10 or fewer publications, 87.5% spent between 1 and 10 min assessing these emails compared with those with 11–20 publications (80.8%) and >20 (56.8%) publications, respectively. More than a quarter of the respondents with >20 publications spent no time assessing these emails compared with 0% of respondents with fewer publications. There was also an association between the number of potential ASEs received in a day and the time spent on them (p<0.001). Specifically, respondents who received more than 20 ASEs per day were more likely to report spending more than 10 min/day on these emails than respondents who received fewer emails.

On bivariate analysis, when examining variables associated with the amount of time spent on ASEs in a day ( table 2 ), we found that neither gender (p=0.37) nor academic job title (p=0.36) was associated with the time spent addressing ASEs. Interestingly, the time spent on emails was also not associated with reporting having a SPAM filter (p=0.99).

With respect to the number of ASEs received each day, every respondent reported receiving at least one ASE in the previous week (data not shown). Over half (54.5%) reported receiving between 1 and 10 ASEs per day, 30.6% reported receiving between 11 and 20 emails per day, and 14.1% reported receiving more than 20 emails per day ( table 1 ). When asked how much time was spent on these emails in a day, 80% of the respondents reported spending at least some amount of time during the day addressing these emails, with 63% of the respondents reporting spending between 1 and 10 min of their day reading, sorting and determining what to do with potential ASEs. The methods of how they determined an email to be academic spam were diverse, with an unknown journal name being the most frequently described method (82% of the respondents). More than a one-third of the respondents (31%) reported that they had responded to an ASE in the past.

A total of 3492 surveys were emailed, of which 206 (5.9%) were immediately returned as undeliverable; 96 (2.7%) of these 3286 emails had an out-of-office message automatically in response to the enquiry. Of the emails sent and received successfully, 733 (22.3%) surveys were completed by the end of the study period and were used for final analysis. A slight majority were women (n=399, 54.4%). Over two-thirds (65.5%) of the respondents were assistant professors working at an academic centre; most (71.9%) received their NIH K award funding in the 4 years preceding the survey ( table 1 ).

Discussion

This study sought to examine the scope of ASEs among NIH career development awardees and factors associated with the amount of daily time spent addressing them. We found that receiving ASEs was pervasive in this population. In fact, everyone who responded to the survey reported receiving academic spam, precluding us from examining demographic and job-related factors associated with the receipt of these emails. In addition, 80% of the respondents reported using time during their day to address these emails.

We examined demographic and job-related factors in relation to the amount of time respondents spent addressing the emails in any given day. Neither gender, academic rank nor having a spam filter affected the time spent addressing these emails, but faculty with <20 publications and who felt like they might be missing opportunities did report spending more time addressing these emails than their counterparts. More than 30% of the respondents who felt that they might have missed opportunities for publication, presentation or editorial service because they ignored an ASE reported spending more than 10 min every day reading and sorting academic spam. This suggests that academic faculty who are junior and/or who feel pressure to publish might be most susceptible to these types of predatory solicitations. In addition, the more ASEs received in a day was associated with more time spent addressing them.

While our study was focused on career development grantees who are generally in the early stages of their career, the burden of ASEs is not limited to these faculty. In 2017, a study found that even senior faculty are affected by ASEs, making the case that efforts to control this phenomenon are needed throughout academia.16 Therefore, whatever interventions or efforts are undertaken to combat this problem will need to include faculty at all stages and not just new or junior faculty.

As the number of journals and publishers continue to rise, we can expect the number of emails to do so as well. Given the focus of faculty to publish, it is likely that they will continue to spend time reading these emails to determine whether they are legitimate or not, when they could be working on projects, manuscripts and grant proposals. Knowing that ASEs will likely not stop may indicate that faculty should be given an additional piece of training and resources to determine whether or not to respond to unsolicited emails or any easy way to report them to help identify the senders as spam in the future.

Academic institutions could decide to value publications in predatory journals differently (in terms of promotion criteria) and thus deter faculty from pursuing those opportunities, although that could be viewed as impacting academic freedom.22 Additional research exploring how pervasive publication within these journals is occurring among academicians is under way; however, the larger question of how academia will perceive and evaluate these publications within the promotion and tenure setting is yet to be answered.23–25

Our study has some limitations. First, we used the contact information for grant awardees provided by the NIH and did not determine individual contact information based on awardees' names and institutions separately. Thus, some email addresses were not working or valid at the time of our survey and may have represented an institutional contact and not the awardee themselves. Furthermore, our study sample was those with funded NIH grants, not including those that may have applied but were not funded. Second, there is a chance that our emailed survey was viewed by recipients as spam itself and was possibly ignored or deleted without a response. We used a valid personal email address with a survey link in the body of the email to solicit respondents, but that also prohibited us from knowing who had completed the survey already or who to follow-up with directly for not completing the survey. Third, the overall response rate was 22%, and we did not require any question on the survey to be answered and thus had some missing data. However, respondents removed from the sample for missing data did not systematically differ from those included, except that they reported having fewer publications. This likely produced conservative results in our bivariate analysis.

Nonetheless, our study quantifies the burden of time faculty spend addressing ASEs as career development grantees and can provide groundwork for further studies examining the burden of ASEs among faculty. There are efforts under way to help researchers choose the right journal for their research, which includes deciphering predatory journals from others.18 24 26–31 Furthermore, efforts at the university level to help improve email filters to block unsolicited emails can be refined and improved, given a majority of our respondents had spam filters in place that permitted these emails to be delivered. This may present challenges as to how to discern ASEs from other emails; however, certain patterns to emails or sender addresses could be used to flag these within a larger system. From a larger system perspective, the publishing industry can build on their current communications to help differentiate from predatory journals for the receivers.