Department of Computer and Information Technology, Foolad Institute of Technology, Foolad shahr, Isfahan, 8491663763, Iran.
Progressive Science Institute, Box 5335, Berkeley, CA, 94705, USA.
Sci Eng Ethics. 2018 Apr;24(2):655-668. doi: 10.1007/s11948-017-9914-2. Epub 2017 Apr 10.
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for detecting hijacked journals by using a classification algorithm. The number of published articles exposing hijacked journals is limited and most of them use simple techniques that are limited to specific journals. Hence we needed to amass Internet addresses and pertinent data for analyzing this type of attack. We inspected the websites of 104 scientific journals by using a classification algorithm that used criteria common to reputable journals. We then prepared a decision tree that we used to test five journals we knew were authentic and five we knew were hijacked.
无效期刊是学术领域的新挑战,许多研究人员对此并不熟悉。受害者的数量似乎在加速增加。研究人员可能会对掠夺性期刊持怀疑态度,因为它们的名称不熟悉,但劫持期刊是知名、有声望的期刊的模仿,其网站已被劫持。劫持期刊通过通常是赞美的电子邮件发出征稿启事,诱使研究人员为在一个不存在的期刊上发表文章支付过高的页面费用。本文提出了一种使用分类算法检测劫持期刊的方法。揭露劫持期刊的已发表文章数量有限,而且大多数文章使用的技术简单,仅限于特定的期刊。因此,我们需要收集互联网地址和相关数据来分析这种类型的攻击。我们使用一种分类算法检查了 104 种科学期刊的网站,该算法使用了受信任期刊共有的标准。然后,我们准备了一个决策树,用于测试我们知道是真实的和我们知道是劫持的五个期刊。