Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Journal hijacking
Predatory journal that impersonates an academic journal

Journal hijacking refers to the brandjacking of a legitimate academic journal by a malicious third party. Typically, the imposter journal sets up a fraudulent website for the purpose of offering scholars the opportunity to rapidly publish their research online for a fee. The term hijacked journal may refer to either the fraud or the legitimate journal. The fraudulent journals are also known as "clone journals". Similar hijacking can occur with academic conferences.

We don't have any images related to Journal hijacking yet.
We don't have any YouTube videos related to Journal hijacking yet.
We don't have any PDF documents related to Journal hijacking yet.
We don't have any Books related to Journal hijacking yet.
We don't have any archived web articles related to Journal hijacking yet.

Background

In 2012, cyber criminals began hijacking print-only journals by registering a domain name and creating a fake website under the title of the legitimate journals.9

The first journal to be hijacked was the Swiss journal Archives des Sciences. In 2012 and 2013, more than 20 academic journals were hijacked.10 In some cases, scammers find their victims in conference proceedings, extracting authors' emails from papers and sending them fake calls for papers.11

There have also been instances of journal hijacking wherein hijackers take over the journal's existing domain name after the journal publisher neglects to pay the domain name registration fees on time.1213

List of hijacked journals

There are several hundred documented cases of journal hijackings; hijacked journals with existing Wikipedia articles include:1415

See also

Bibliography

References

  1. Butler, Declan (27 March 2013). "Sham journals scam authors". Nature. 495 (7442): 421–422. Bibcode:2013Natur.495..421B. doi:10.1038/495421a. PMID 23538804. https://doi.org/10.1038%2F495421a

  2. Jalalian, Mehrdad; Mahboobi, Hamidreza (2014). "Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?". Walailak Journal of Science and Technology. 11 (5): 389–394. http://wjst.wu.ac.th/index.php/wjst/article/view/1004

  3. McCook, Alison (19 November 2015). "Can journals get hijacked? Apparently, yes". Retraction Watch. http://retractionwatch.com/2015/11/19/can-journals-get-hijacked-apparently-yes/

  4. Danevska, Lenche; Spiroski, Mirko; Donev, Doncho; Pop-Jordanova, Nada; Polenakovic, Momir (1 November 2016). "How to Recognize and Avoid Potential, Possible, or Probable Predatory Open-Access Publishers, Standalone, and Hijacked Journals". Prilozi. 37 (2–3): 5–13. doi:10.1515/prilozi-2016-0011. PMID 27883329. https://doi.org/10.1515%2Fprilozi-2016-0011

  5. Menon, Varun G. (18 July 2018). "How are Predatory Publishers Preying on Uninformed Scholars? Don't Be a Victim". Online Educational Symposium Series. IGI Global. https://www.igi-global.com/symposium/

  6. Asim, Zeeshan; Sorooshian, Shahryar (13 January 2020). "Clone journals: a threat to medical research". Sao Paulo Medical Journal. 137 (6): 550–551. doi:10.1590/1516-3180.2018.0370160919. PMC 9754270. PMID 31939492. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9754270

  7. Jalalian, Mehrdad; Mahboobi, Hamidreza (2014). "Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?". Walailak Journal of Science and Technology. 11 (5): 389–394. http://wjst.wu.ac.th/index.php/wjst/article/view/1004

  8. Kolata, Gina (7 April 2013). "For Scientists, an Exploding World of Pseudo-Academia". The New York Times. https://www.nytimes.com/2013/04/08/health/for-scientists-an-exploding-world-of-pseudo-academia.html?_r=2&

  9. Jalalian, Mehrdad; Mahboobi, Hamidreza (2014). "Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?". Walailak Journal of Science and Technology. 11 (5): 389–394. http://wjst.wu.ac.th/index.php/wjst/article/view/1004

  10. Butler, Declan (27 March 2013). "Sham journals scam authors". Nature. 495 (7442): 421–422. Bibcode:2013Natur.495..421B. doi:10.1038/495421a. PMID 23538804. https://doi.org/10.1038%2F495421a

  11. Dadkhah, Mehdi; Quliyeva, Aida (2015). "Social Engineering in Academic World". Journal of Contemporary Applied Mathematics. 4 (2): 3–5.

  12. McCook, Alison (19 November 2015). "Can journals get hijacked? Apparently, yes". Retraction Watch. http://retractionwatch.com/2015/11/19/can-journals-get-hijacked-apparently-yes/

  13. Bohannon, John (19 November 2015). "Feature: How to hijack a journal". Science. doi:10.1126/science.aad7463. https://www.science.org/content/article/feature-how-hijack-journal

  14. "Beall's list of potential predatory journals and publishers". Beall's List. Retrieved 27 July 2024. https://beallslist.net/hijacked-journals/

  15. "Retraction Watch Hijacked Journals Checker". Google Docs. Retrieved 27 July 2024. https://docs.google.com/spreadsheets/d/1ak985WGOgGbJRJbZFanoktAN_UFeExpE/edit?gid=5255084#gid=5255084