2021
DOI: 10.1002/leap.1412
|View full text |Cite
|
Sign up to set email alerts
|

Journal hijacking: Challenges and potential solutions

Abstract: Key points Hijacked journals mimic the name (and the ISSN) of a reputable journal with the sole purpose of financial exploitation. A hijacked journal is an even more pernicious scam than a predatory journal. Grounded in stakeholder theory, this opinion piece indicates that the hijackers are the sole stakeholder group that benefits from journal hijacking. Hijacked journals will continue to menace scholarly research and publishing unless all stakeholders take specific and coordinated actions against them.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…Twenty‐two papers of questionable provenance were published in hijacked journals. Hijacked journals are cyber‐criminal publishers; in most cases, they create a clone website of legitimate journals, steal their identity (title, ISSN) and fraudulently collect fees for rapid publication without providing peer review (Abalkina, 2021a; Jalalian & Dadkhah, 2015; Moussa, 2021). I detected papers of questionable provenance in three hijacked journals: Journal of Talent Development and Excellence (Abalkina, 2020a), Journal of Southwest Jiaotong University , and International Journal of Disaster Recovery and Business Continuity .…”
Section: Resultsmentioning
confidence: 99%
“…Twenty‐two papers of questionable provenance were published in hijacked journals. Hijacked journals are cyber‐criminal publishers; in most cases, they create a clone website of legitimate journals, steal their identity (title, ISSN) and fraudulently collect fees for rapid publication without providing peer review (Abalkina, 2021a; Jalalian & Dadkhah, 2015; Moussa, 2021). I detected papers of questionable provenance in three hijacked journals: Journal of Talent Development and Excellence (Abalkina, 2020a), Journal of Southwest Jiaotong University , and International Journal of Disaster Recovery and Business Continuity .…”
Section: Resultsmentioning
confidence: 99%
“…The same pressure helps explain the rise of journal hijacking as a multifaceted and complex problem (Abalkina, 2021b). The lack of author awareness of journal hijacking also contributes to the high number of reported scams (Moussa, 2021). Human beings comprise the weakest link in cybersecurity (Aldawood & Skinner, 2018), and there is an urgent need for awareness and action to address the threats that hijacked journals pose to the integrity and credibility of contemporary scientific publishing (Dadkhah, Maliszewski, & Teixeira da Silva, 2016).…”
Section: Roots Of the Journal Hijacking Problemmentioning
confidence: 99%
“…The email invitation may be laced with flattery-filled language, giving a false sense of pride or offering false promises or hyped claims (Sousa et al, 2021). Such email-based invitations might guarantee peer review even when none is provided or claim that the journal has metrics, even when these are false or hijacked, giving the impression of a valid scholarly journal (Dadkhah et al, 2016;Moussa, 2021). ECRs, therefore, need to be aware of risks and dangers when selecting a target journal, conscientious of the fact that the discernment of predatory from non-predatory (Grudniewicz et al, 2019), or the characterisation of scholarly and unscholarly are becoming increasingly difficult parameters to claim with certainty, with a wide grey zone in between (Frederick, 2020; Teixeira da Silva, 2021d).…”
Section: Additional Challenges In Research and Publishing Environments That Ecrs Might Encountermentioning
confidence: 99%