Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics

Academic research has always faced challenges associated with assuring its quality and seeking optimal ways of representing results. Conducting a high level of research and selecting a suitable target publisher and journal require careful attention. The choice of publishing venue has been expanded by the open access (OA) movement, spurring additional scientific activity. The benefits of OA, which consist, generally speaking, in making the results of empirical research and/or the results of intellectual work available almost immediately and to a wide audience, have also introduced a number of threats and challenges to the academic world. On one hand, the number of opportunities to publish has increased significantly. On the other hand, the traditional system of peer review that was always perceived to exert a level of control by the academic community with respect to the quality of publications, has become less strict and rigorous, or has shown flaws. Collectively, a researcher faces a number of challenges when wanting to publish in an OA journal. This paper focuses on some of the threats to the integrity of the expanding OA movement, specifically hijacked journals, hijacked websites, journal phishing, misleading metrics, and predatory publishing.

[1]  Roger W Byard The forensic implications of predatory publishing , 2016, Forensic Science, Medicine, and Pathology.

[2]  Mehdi Dadkhah,et al.  A New Challenge in the Academic World : Earning Real Money and Eminence by Paper Publishing , 2015 .

[3]  Adam Marcus,et al.  Publishing: The peer-review scam , 2014, Nature.

[4]  Mehrdad Jalalian,et al.  New corruption detected: Bogus impact factors compiled by fake organizations , 2013, Electronic physician.

[5]  Mehdi Dadkhah,et al.  Affiliation Oriented Journals: Don’t Worry About Peer Review If You Have Good Affiliation , 2015 .

[6]  Mehdi Dadkhah,et al.  How Can We Identify Hijacked Journals , 2015 .

[7]  Mehdi Dadkhah,et al.  The full story of 90 hijacked journals from August 2011 to June 2015 , 2015 .

[8]  Mehdi Dadkhah,et al.  Hiring Editorial Member for Receiving Papers from Authors , 2015 .

[9]  Mehdi Dadkhah,et al.  Hijacked journals - threats and challenges to countries' scientific ranking , 2015 .

[10]  Jaime A. Teixeira da Silva,et al.  Debunking Post-Publication Peer Review , 2015 .

[11]  Mehdi Dadkhah,et al.  Ranking Predatory Journals: Solve the Problem Instead of Removing It! , 2016, Advanced pharmaceutical bulletin.

[12]  Jaime A. Teixeira da Silva,et al.  Multiple Authorship in Scientific Manuscripts: Ethical Challenges, Ghost and Guest/Gift Authorship, and the Cultural/Disciplinary Perspective , 2016, Sci. Eng. Ethics.

[13]  John D Bowman,et al.  Predatory Publishing, Questionable Peer Review, and Fraudulent Conferences , 2014, American Journal of Pharmaceutical Education.

[14]  Judit Dobránszki,et al.  Problems with Traditional Science Publishing and Finding a Wider Niche for Post-Publication Peer Review , 2015, Accountability in research.

[15]  J. Samulski,et al.  Who ’ s Afraid of Peer Review ? , 2009 .

[16]  Mehdi Dadkhah,et al.  An approach for preventing the indexing of hijacked journal articles in scientific databases , 2016, Behav. Inf. Technol..

[17]  Judit Dobránszki,et al.  Potential Dangers with Open Access Data Files in the Expanding Open Data Movement , 2015 .

[18]  Deris Stiawan,et al.  An Introduction to Journal Phishings and Their Detection Approach , 2015 .

[19]  Mitchell S Cappell List predatory journal publications separately from genuine scholarly publications as standard for CVs , 2015, BMJ : British Medical Journal.

[20]  Ljubica Ivanovic-Bibic,et al.  Predatory and fake scientific journals/publishers: A global outbreak with rising trend: A review , 2014 .