Scholarly Communication

Scholarly communication is the term used to describe the variety of subjects pertaining to the creation and dissemination of research, and other scholarly writing. This topic ranges from discussions on publishers, funders, informal communications, and beyond.

For a more in-depth picture of scholarly communication, read ACRL Guide to Scholarly Communication.


A predatory publisher is a publisher who produces low quality academic journals. These journals are rarely peer-reviewed, and often charge the author a publication fee. The publisher preys on authors by emulating well-known publishers, lying about their credentials, and soliciting submissions with spam emails. With support, scholars can avoid the predators and retain as many rights as possible for themselves.

Predatory Publishing

Copycats and Mimicry

We provide training and assistance with identifying and avoiding predators who mimic open access journals and publishers in order to prey on researchers.

What to Verify

  • Editorial board
  • Peer review process
  • Citations accuracy
  • Publication periodicity
  • Impact factors (if available)
  • Discoverability though indexing

Your Rights

What Are Your Rights?

Knowing your rights as an author of a scholarly article is an important and often overlooked first step in publishing process. Use SHERPA/RoMEO to learn about publishers' use policies after publication, and read summaries of self-archiving permissions and conditions of rights given to authors.

Retain Your Author's Rights When Possible

Publishers often require you to sign an agreement that transfers copyright from your work to them and limits your ability to use, share, and distribute your work. Learn about statements that can be included to retain your rights, as well as other methods and resources.

Predatory Publishing Resources

  • Directory of Open Access Journals - The DOA Journals Directory is a community curated resource used to check publication validity.
  • Harzing's List - Review an extensive list of journals evaluated on 20 criteria.
  • Beall's List - The first attempt to articulate characteristics of predatory publishers and to list titles. Examine Jeffrey Beall's original list, recent additions, and inclusion criteria.
  • Think. Check. Submit. & Stop Predatory Journals - Learn about predatory publishing through open questions, decision trees, and thoughtful readings.
  • Sherpa/Romeo - A thorough analysis of author's rights post publication. Search by journal title, issn, or publisher name.


We support both traditional and non-traditional scholarly outputs. Increasing the visibility of your publications also increases your impact on scholarship.

Open Access

Benefits of Open Access

Open access increases the likelihood that a scholar's work will be discovered and cited if the work is available without a paywall.

Remember to verify the journal is not a predatory one pretending to be open!

Data Management

Why Manage and Share Your Data?

  • Increases impact
  • Fulfills funding requirements (NSF, NIH)
  • Assists colleagues with future research

Data Management

  • Necessary for Open Data and helpful for your research
  • Track data and easily collaborate with colleagues
  • Provide statistics with a Data Management Plan

Start with a data management plan. Create and manage your plan through the free DMPTool

We are here to help

What Can We Do For You?

  • Understand your rights as an Author
  • Explore Open Access options, including CORE Scholar and SelectedWorks
  • Expand influence and promotion of non-traditional scholarly outputs
  • Provide scholarly communication instruction sessions and workshops

Contact Us

CORE Scholar

CORE Scholar is Wright State University's institutional repository. Within the institutional repository, we collect and make available the scholarly output of WSU faculty, staff, and students, as well as local, regional, and WSU heritage material.

Learn More