In this course, you have learned why predatory publishing represents a real challenge in today’s academic landscape and how to respond to it in an informed and reflective way. The course aimed to provide you with guidance, confidence, and decision-making skills.
In module 1️⃣, you learned what predatory publishing is and how it has developed historically in the context of scholarly publishing and Open Access.
In module 2️⃣, you explored how to recognize common warning signs of questionable journals, such as suspicious email invitations, misleading impact metrics, or non-transparent websites.
In module 3️⃣, the focus was on the risks and consequences of publishing in predatory journals.
In module 4️⃣, you learned how to use tools and checklists such as DOAJ and Think.Check.Submit. to systematically assess whether a journal is trustworthy.
In module 5️⃣, you explored practical steps to take if you have been affected by predatory publishing.
We hope this course has provided valuable insights and that you now feel more confident in selecting an appropriate journal for publishing your research results.

If you have successfully completed all tests and activities, you will receive a certificate of participation (available at the bottom of the course page).
We welcome any feedback on the course content, structure, and exercises. Please feel free to contact us at: publikationsberatung@tib.eu.