1. Detecting Hijacked Journals by Using Classification Algorithms.
- Author
-
Andoohgin Shahri, Mona, Jazi, Mohammad Davarpanah, Borchardt, Glenn, and Dadkhah, Mehdi
- Subjects
- *
CLASSIFICATION algorithms , *PERIODICAL publishing , *INTERNET fraud , *PREVENTION of spam email , *PROFESSIONAL ethics - Abstract
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for detecting hijacked journals by using a classification algorithm. The number of published articles exposing hijacked journals is limited and most of them use simple techniques that are limited to specific journals. Hence we needed to amass Internet addresses and pertinent data for analyzing this type of attack. We inspected the websites of 104 scientific journals by using a classification algorithm that used criteria common to reputable journals. We then prepared a decision tree that we used to test five journals we knew were authentic and five we knew were hijacked. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF