{"id":1451,"date":"2014-12-22T08:39:42","date_gmt":"2014-12-22T07:39:42","guid":{"rendered":"http:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/?page_id=1451"},"modified":"2018-04-06T13:28:21","modified_gmt":"2018-04-06T11:28:21","slug":"predetor-publishers","status":"publish","type":"page","link":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/predetor-publishers\/","title":{"rendered":"Predetor Publishers"},"content":{"rendered":"\n<!-- This is the start of the WP Twitter Button code -->\n<div id=\"rk_wp_twitter_button\" style=\"margin: 0px 0px 0px 0px; float: right\"><a href=\"http:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/predetor-publishers\/\" data-count=\"horizontal\">Tweet<\/a><script type=\"text\/javascript\" src=\"http:\/\/platform.twitter.com\/widgets.js\"><\/script><\/div>\n<!-- This is the end of the WP Twitter Button code -->\n\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Jeffrey Beall,\u00a0bibliotecario de la University of Colorado, Denver (USA)\u00a0public\u00f3 en la revista Nature (12 de septiembre de 2012), el art\u00edculo \u00ab<a href=\"https:\/\/www.nature.com\/news\/predatory-publishers-are-corrupting-open-access-1.11385\" target=\"_blank\" rel=\"noopener\">Predatory publishers are corrupting open access<\/a>\u00ab, en el que explica que son los \u00abpredator publishers\u00bb y c\u00f3mo est\u00e1n influyendo en la publicaci\u00f3n de art\u00edculos acad\u00e9micos en acceso abierto.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tweet &nbsp; Jeffrey Beall,\u00a0bibliotecario de la University of Colorado, Denver (USA)\u00a0public\u00f3 en la revista Nature (12 de septiembre de 2012), el art\u00edculo \u00abPredatory publishers are corrupting open access\u00ab, en el que explica que son los \u00abpredator publishers\u00bb y c\u00f3mo est\u00e1n &hellip; <a href=\"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/predetor-publishers\/\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":18,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-1451","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/pages\/1451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/comments?post=1451"}],"version-history":[{"count":1,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/pages\/1451\/revisions"}],"predecessor-version":[{"id":1457,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/pages\/1451\/revisions\/1457"}],"wp:attachment":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/media?parent=1451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}