Abstract
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for detecting hijacked journals by using a classification algorithm. The number of published articles exposing hijacked journals is limited and most of them use simple techniques that are limited to specific journals. Hence we needed to amass Internet addresses and pertinent data for analyzing this type of attack. We inspected the websites of 104 scientific journals by using a classification algorithm that used criteria common to reputable journals. We then prepared a decision tree that we used to test five journals we knew were authentic and five we knew were hijacked.
Similar content being viewed by others
References
Asadi, A., Rahbar, N., Asadi, M., Asadi, F., & Khalili Paji, K. (2017). Online-based approaches to identify real journals and publishers from hijacked ones. Science and Engineering Ethics, 23(1), 305–308. doi:10.1007/s11948-015-9747-9.
Bohannon, J. (2015). How to hijack a journal. Science, 350(6263), 903–905.
Butler, D. (2013). Sham journals scam authors. Nature, 495(7442), 421–422. doi:10.1038/495421a.
Dadkhah, M., & Borchardt, G. (2016). Hijacked journals: An emerging challenge for scholarly publishing. Aesthetic Surgery Journal, 36(6), 739–741. doi:10.1093/asj/sjw026.
Dadkhah, M., Maliszewski, T., & Lyashenko, V. V. (2016). An approach for preventing the indexing of hijacked journal articles in scientific databases. Behaviour and Information Technology, 35(4), 298–303. doi:10.1080/0144929X.2015.1128975.
Dadkhah, M., Obeidat, M. M., Jazi, M. D., Sutikno, T., & Riyadi, M. A. (2015a). How can we identify hijacked journals? Bulletin of Electrical Engineering and Informatics, 4(2), 83–87.
Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015b). An introduction to journal phishings and their detection approach. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13(2), 373–380.
Esfe, M. H., Wongwises, S., Asadi, A., & Akbari, M. (2015). Fake journals: Their features and some viable ways to distinguishing them. Science and Engineering Ethics, 21(4), 821–824. doi:10.1007/s11948-014-9595-z.
Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques. Amsterdam: Elsevier.
Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283.
Jalalian, M., & Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica, 19(2), 73–87.
Jalalian, M., & Mahboobi, H. (2014). Hijacked journals and predatory publishers: Is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology, 11(5), 6. doi:10.2004/wjst.v11i5.1004.
Lukić, T., Blešić, I., Basarin, B., Ivanović, B., Milošević, D., & Sakulski, D. (2014). Predatory and fake scientific journals/publishers—A global outbreak with rising trend: A review. Geographica Pannonica, 18(3), 69–81.
Ward, S. M. (2016). The rise of predatory publishing: How to avoid being scammed. Weed Science, 64(4), 772–778.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare.
Appendix
Appendix
List of journals in our dataset (hijacked journals extracted from Beall’s list with some editions).
Rights and permissions
About this article
Cite this article
Andoohgin Shahri, M., Jazi, M.D., Borchardt, G. et al. Detecting Hijacked Journals by Using Classification Algorithms. Sci Eng Ethics 24, 655–668 (2018). https://doi.org/10.1007/s11948-017-9914-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11948-017-9914-2