Current and potential cyber attacks on medical journals; guidelines for improving security

M Dadkhah, SAH Seno, G Borchardt - European Journal of Internal …, 2017 - Elsevier
At the moment, scholarly publishing is faced with much academic misconduct and threats
such as predatory journals, hijacked journals, phishing, and other scams. In response, we …

A credit-like rating system to determine the legitimacy of scientific journals and publishers

JA Teixeira da Silva, DJ Dunleavy, M Moradzadeh… - Scientometrics, 2021 - Springer
The predatory nature of a journal is in constant debate because it depends on multiple
factors, which keep evolving. The classification of a journal as being predatory, or not, is no …

Breaking free from academic scams: Five key reflections on the cloned journal conundrum.

R Vijay Solomon - Learned Publishing, 2024 - search.ebscohost.com
Key points: Emerging as a novel cybercrime, cloned (or hijacked) journals with identical
ISSNs to legitimate ones have surfaced. These cloned journals employ various tactics, and …

[PDF][PDF] Hijacked journals: A challenge unaddressed to the developing world

AR Memon - Journal of the Pakistan Medical Association, 2019 - researchgate.net
1414 example, International Journal of Game Theory (http://www. springer. com/economics/
economic? theor y/journal/182) of the Springer Nature, HFSP journal (now known as …

Predatory journals

S Panda - Indian Journal of Dermatology, Venereology and …, 2020 - ijdvl.com
April 2019 was the cruellest month for predatory publishing. There was a big splash in
international news headlines when the Federal Trade Commission (FTC) of the United …

Preventing hijacked research papers in fake (rogue) journals through social media and databases

VG Menon, MR Khosravi - Library Hi Tech News, 2019 - emerald.com
This paper on “hijacked journals”, a subset of predatory journals, is motivated from our real
life experience that happened while contacting a few university professors and students …

Reliability of hijacked journal detection based on scientometrics, altmetric tools, and web informatics: A case report using Google Scholar, Web of Science, and …

MR Khosravi, VG Menon - Security and Communication …, 2021 - Wiley Online Library
This paper presents a case report on detecting hijacked journals. Towards identification of a
fake journal website and preventing a hijacked paper, we can use different tools including …

[PDF][PDF] Publication phishing: A growing challenge for researchers and scientific societies

S Sorooshian - Curr. Sci, 2016 - core.ac.uk
Publication phishing has the potential to develop further into a serious gainful enterprise if
effective security measures are not in place. Be that as it may, there is growing concern over …

Kradzież tożsamości czasopism naukowych

N Białka - Zagadnienia Informacji Naukowej–Studia Informacyjne, 2020 - ceeol.com
Abstrakt Cel/Teza: Celem artykułu jest prezentacja historii kradzieży czasopism naukowych
oraz przedstawienie najnowszej wiedzy na temat tego zjawiska. W artykule dokonano …

[PDF][PDF] Journal hijacking an imminent threat Journal hijacking an imminent threat

S Patil, T Patil, S Hathiwala - academia.edu
Journal hijacking an imminent threat Journal hijacking an imminent threat Page 1 Submit
Manuscript | http://medcraveonline.com Emails are sent under the ‘’call for papers’’ to various …