Hijacked Journals and Their Detection Techniques

Document Type : Review Paper

Authors

1 Department of Computer and Information Technology, Foulad Institute of Technology

2 Department of Computer and Information Technology, Foulad Institute of Technology,

Abstract

With increasing development of research and academic centers, the number of research and publishing the results of these studies in scientific journals have been also increased. In the meantime, researchers are trying to publish the findings of their research in journals which have been approved by one or more international indices, so that such findings can be seen. In order to enhance the academic standards of universities, researchers are interested to select proper journal especially those that are indexed in websites such as Thomson Reuters. However, fraudsters   trick researchers by launching fake websites under the names of academic journals. In this paper, we introduce a method to identify this type of journals that will be applicable by researchers in various academic disciplines.

Keywords


Jalalian, M.;Mahboobi, H. (2014). Hijacked Journals and Predatory Publish-
ers: Is There a Need to Re-Think How to Assess the Quality of Academic
Research?Walailak J Sci& Tech. 11(5): 389-394.
Dadkhah, M.; Obeidat, M. M. Jazi, M. D.; Sutikno, T. & Riyadi, M. A. (2015).
How Can We Identify Hijacked Journals?.Bulletin of Electrical Engineering
and Informatics. 4(2): 83-87. DOI: 10.12928/eei.v4i2.449.
Maan, P. S.;Sharma, M.(2012). Social Engineering: A Partial Technical At-
tack. International Journal of Computer Science Issues. 9(2): 557-559
Mitnick, K. and Simon, W. (2002).THE ART OF DECEPTION, John Wiley
& Sons, New York.
Dadkhah, M.; DavarpanahJazi, M. (2014). Secure Payment in E-commerce:
Deal with Keyloggers and Phishings. International Journal of Electronics
Communication and Computer Engineering. 5(3): 656-660.
Jalalian, M. (2014). Hijacked Journals Are Attacking the Reliability and
Validity of Medical Research. Electronic Physician. 6(4): 925-926. DOI:
10.14661/2014.925-926.