
{"id":1388,"date":"2016-02-21T15:19:57","date_gmt":"2016-02-21T15:19:57","guid":{"rendered":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\/"},"modified":"2025-02-18T06:32:50","modified_gmt":"2025-02-18T06:32:50","slug":"simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","status":"publish","type":"post","link":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","title":{"rendered":"Simple steps authors can follow to protect their research from predatory publishers"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>[This post was created for the Wolters-Kluwer author newsletter <a href=\"https:\/\/wkauthorservices.editage.com\/resources\/author-resource-review\/\n\" target=\"_blank\" rel=\"noopener\">Author Resource Review<\/a>&nbsp;and has been reproduced with permission.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Editorial note: Jeffrey Beall no longer maintains a list of potential predatory publishers\/journals, which has been mentioned in this post, anymore.]<\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:14px;\">I often receive e-mails inviting me to submit papers to what seem to be legitimate journals. The journals\u2019 names look familiar, their editorial boards list well-credentialed professionals, and some of these journals even claim to have impact factor rankings. Their invitations are tempting, promising expedient peer review and publication. If I were a new author eager to publish and unfamiliar with standard publishing industry practices, I might respond. And I&#8217;d be dismayed to find that, upon submission, a hefty article processing fee would be charged, and my article would receive little or no dissemination. Instead, I&#8217;d have become yet another author victimized by predatory publishers.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">In 2009, University of Colorado Denver librarian Jeffrey Beall began tracking these publishers. He started Scholarly Open Access (<a href=\"http:\/\/www.scholarlyoa.com\">www.scholarlyoa.com<\/a>), where he offers criteria for determining whether a publisher or journal is legitimate or predatory and maintains a list of predatory publishers and journals. Last August, Beall presented his work at the annual meeting of the International Academy of Nursing Editors (INANE). Inspired, a group of editors formed the INANE Predatory Publishing Practices Collaborative in order to raise awareness in the nursing community. In September, the group published an article on predatory publishing in <\/span><em style=\"font-size: 14px;\">Nurse Author and Editor<\/em><span style=\"font-size: 14px;\">, and encouraged editors to \u201cspread the word\u201d in order to educate readers. (The article is available for free at&nbsp;<\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/nursingeditors.com\/\">http:\/\/nursingeditors.com\/<\/a><\/span><span style=\"font-size: 14px;\">; registration is required.)<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">Predatory publishers take advantage of the relatively new open access model in publishing. In this model, authors or funding agencies pay the publisher a fee in order to make their article freely available or \u201copen\u201d to all. Open access is a legitimate model; many well-regarded publishers and journals (including the <\/span><em style=\"font-size: 14px;\">American Journal of Nursing<\/em><span style=\"font-size: 14px;\">) now offer open access options to authors. But legitimate publishers do so only after an article has been vetted through standard peer review and acceptance processes. Predatory publishers do token peer review or none at all.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">The sole aim of predatory publishers is to profit. Their article processing fees typically aren&#8217;t disclosed until after an article has been accepted and the author has signed a copyright agreement granting the publisher all rights. This ensures two results: first, the author&#8217;s work is essentially held hostage, published only upon payment of the processing fee (which can be $1,000 or more). Second, because of the sham peer review, once published, the article will lack all scholarly credibility.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">How can you ensure that you&#8217;re not submitting your work to a predatory publisher? The INANE collaborative recommends the following:<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"font-size:14px;\">Check Beall&#8217;s list of predatory publishers (<a href=\"http:\/\/www.scholarlyoa.com\/\">www.scholarlyoa.com<\/a>), which he updates regularly.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size:14px;\">Check the Directory of Open Access Journals (<a href=\"http:\/\/doaj.org\/\">http:\/\/doaj.org<\/a>), which \u201cindexes and provides access to quality open access, peer-reviewed journals.\u201d<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size:14px;\">Check INANE&#8217;s directory of reputable nursing journals (<a href=\"http:\/\/nursingeditors.com\/journals-directory\">http:\/\/nursingeditors.com\/journals-directory<\/a>).<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size:14px;\">Verify listed impact factors or other rankings.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">The collaborative also lists several \u201cred flags\u201d that should raise your suspicions about a journal&#8217;s integrity. These include overly flattering solicitations to submit articles or guest edit, a lack of contact information for the journal, a lack of evidence of the editor&#8217;s expertise or professional standing, the promise of unusually short submission-to-publication times (such as a month or less), and a journal name that sounds vague (for example, \u201cThe Journal of Care\u201d) or is overly similar to that of a well-known journal.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">The <\/span><a href=\"http:\/\/www.ajnonline.com\/\" style=\"font-size: 14px;\"><em>American Journal of Nursing<\/em><\/a><span style=\"font-size: 14px;\"> supports INANE&#8217;s initiative. It&#8217;s especially timely now, as more nurses are pursuing advanced degrees and seeking to publish their scholarly work, per the recommendations of the Institute of Medicine&#8217;s 2010 report, <\/span><a href=\"http:\/\/iom.nationalacademies.org\/Reports\/2010\/The-Future-of-Nursing-Leading-Change-Advancing-Health.aspx\" style=\"font-size: 14px;\"><em>The Future of Nursing: Leading Change, Advancing Health<\/em><\/a><span style=\"font-size: 14px;\">. They will need guidance from faculty and other mentors to steer them through the publication process.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14px;\">As the INANE collaborative notes, the \u201cproliferation of pseudoscholarly activity could significantly flood the market with journals and articles that discredit the profession. In health care, this threat is even more serious, as the pseudoscience and poor scholarship published by predatory journals could conceivably result in harm to patients and the health information\u2013seeking public.\u201d Predatory publishing poses a threat that extends beyond authors to all providers, patients, and health care consumers. It&#8217;s up to all of us to ensure the integrity of our professional literature.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[This post was created for the Wolters-Kluwer author newsletter Author Resource Review&nbsp;and has been reproduced with permission. Editorial note: Jeffrey Beall no longer maintains a list of potential predatory publishers\/journals, which has been mentioned in this post, anymore.] I often receive e-mails inviting me to submit papers to what seem to be legitimate journals. The [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":33313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2407],"tags":[136],"new_categories":[],"new_tags":[],"series":[],"class_list":["post-1388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avoiding-predatory-publishers","tag-predatory-publishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Simple steps authors can follow to protect their research from predatory publishers | Editage Insights<\/title>\n<meta name=\"description\" content=\"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simple steps authors can follow to protect their research from predatory publishers | Editage Insights\" \/>\n<meta property=\"og:description\" content=\"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\" \/>\n<meta property=\"og:site_name\" content=\"Editage Insights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Editage\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-21T15:19:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-18T06:32:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2018\/09\/Simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers-resized_0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"656\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editage Insights\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Editage\" \/>\n<meta name=\"twitter:site\" content=\"@Editage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editage Insights\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\"},\"author\":{\"name\":\"Editage Insights\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/71ff452a0868e4716ad471b4a1ed6df6\"},\"headline\":\"Simple steps authors can follow to protect their research from predatory publishers\",\"datePublished\":\"2016-02-21T15:19:57+00:00\",\"dateModified\":\"2025-02-18T06:32:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\"},\"wordCount\":761,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"keywords\":[\"predatory publishing\"],\"articleSection\":[\"Avoiding Predatory Publishers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\",\"url\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\",\"name\":\"Simple steps authors can follow to protect their research from predatory publishers | Editage Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"datePublished\":\"2016-02-21T15:19:57+00:00\",\"dateModified\":\"2025-02-18T06:32:50+00:00\",\"description\":\"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"width\":656,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editage.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simple steps authors can follow to protect their research from predatory publishers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editage.com\/insights\/#website\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"name\":\"Editage Insights\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editage.com\/insights\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\",\"name\":\"Editage Insights\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"width\":2560,\"height\":324,\"caption\":\"Editage Insights\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Editage\",\"https:\/\/x.com\/Editage\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/71ff452a0868e4716ad471b4a1ed6df6\",\"name\":\"Editage Insights\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d33a4703576af04935cc28dc48b743638328ea5bb37abe951330e2024defb9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d33a4703576af04935cc28dc48b743638328ea5bb37abe951330e2024defb9e?s=96&d=mm&r=g\",\"caption\":\"Editage Insights\"},\"url\":\"https:\/\/www.editage.com\/insights\/editage-insights\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Simple steps authors can follow to protect their research from predatory publishers | Editage Insights","description":"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","og_locale":"en_US","og_type":"article","og_title":"Simple steps authors can follow to protect their research from predatory publishers | Editage Insights","og_description":"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.","og_url":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","og_site_name":"Editage Insights","article_publisher":"https:\/\/www.facebook.com\/Editage","article_published_time":"2016-02-21T15:19:57+00:00","article_modified_time":"2025-02-18T06:32:50+00:00","og_image":[{"width":656,"height":336,"url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2018\/09\/Simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers-resized_0.jpg","type":"image\/jpeg"}],"author":"Editage Insights","twitter_card":"summary_large_image","twitter_creator":"@Editage","twitter_site":"@Editage","twitter_misc":{"Written by":"Editage Insights","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#article","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers"},"author":{"name":"Editage Insights","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/71ff452a0868e4716ad471b4a1ed6df6"},"headline":"Simple steps authors can follow to protect their research from predatory publishers","datePublished":"2016-02-21T15:19:57+00:00","dateModified":"2025-02-18T06:32:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers"},"wordCount":761,"commentCount":0,"publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"image":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","keywords":["predatory publishing"],"articleSection":["Avoiding Predatory Publishers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","url":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers","name":"Simple steps authors can follow to protect their research from predatory publishers | Editage Insights","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage"},"image":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","datePublished":"2016-02-21T15:19:57+00:00","dateModified":"2025-02-18T06:32:50+00:00","description":"This article takes a look at predatory publishers and shares a few simple steps on how you can protect your research.","breadcrumb":{"@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#primaryimage","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","width":656,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/www.editage.com\/insights\/simple-steps-authors-can-follow-to-protect-their-research-from-predatory-publishers#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editage.com\/insights\/"},{"@type":"ListItem","position":2,"name":"Simple steps authors can follow to protect their research from predatory publishers"}]},{"@type":"WebSite","@id":"https:\/\/www.editage.com\/insights\/#website","url":"https:\/\/www.editage.com\/insights\/","name":"Editage Insights","description":"","publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editage.com\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.editage.com\/insights\/#organization","name":"Editage Insights","url":"https:\/\/www.editage.com\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","width":2560,"height":324,"caption":"Editage Insights"},"image":{"@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Editage","https:\/\/x.com\/Editage"]},{"@type":"Person","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/71ff452a0868e4716ad471b4a1ed6df6","name":"Editage Insights","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9d33a4703576af04935cc28dc48b743638328ea5bb37abe951330e2024defb9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d33a4703576af04935cc28dc48b743638328ea5bb37abe951330e2024defb9e?s=96&d=mm&r=g","caption":"Editage Insights"},"url":"https:\/\/www.editage.com\/insights\/editage-insights"}]}},"_links":{"self":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/1388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/comments?post=1388"}],"version-history":[{"count":0,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/1388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media\/33313"}],"wp:attachment":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media?parent=1388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/categories?post=1388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/tags?post=1388"},{"taxonomy":"new_categories","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_categories?post=1388"},{"taxonomy":"new_tags","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_tags?post=1388"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/series?post=1388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}