A serious threat to publishing ethics and research integrity: Citations to hijacked journals

Authors

DOI:

https://doi.org/10.24136/eq.2023.028

Keywords:

Citation, Hijacked journals, Publishing ethics, Research integrity, Web of Science

Downloads

Download data is not yet available.

References

Abalkina, A. (2021). Detecting a network of hijacked journals by its archive. Scientometrics, 126(8), 7123–7148.

DOI: https://doi.org/10.1007/s11192-021-04056-0
View in Google Scholar

Abid, H., & Yousif, E. (2022). Hijacked journals: Tips for young researchers, to detect and avoid them. Baghdad Journal of Biochemistry and Applied Biological Sciences, 3(04), 232–236.

DOI: https://doi.org/10.47419/bjbabs.v3i04.179
View in Google Scholar

Andoohgin Shahri, M., Jazi, M. D., Borchardt, G., & Dadkhah, M. (2018). Detecting hijacked journals by using classification algorithms. Science and Engineering Ethics, 24, 655–668.

DOI: https://doi.org/10.1007/s11948-017-9914-2
View in Google Scholar

Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975.

DOI: https://doi.org/10.1016/j.joi.2017.08.007
View in Google Scholar

Asadi, A., Rahbar, N., Asadi, M., Asadi, F., & Khalili Paji, K. (2017). Online-based approaches to identify real journals and publishers from hijacked ones. Science and Engineering Ethics, 23(1), 305–308.

DOI: https://doi.org/10.1007/s11948-015-9747-9
View in Google Scholar

Beall, J. (2021). Open access, research communities, and a defense against predatory journals. Central Asian Journal of Medical Hypotheses and Ethics, 2(1), 14–17. doi: 0000-0001-9012-5330.

DOI: https://doi.org/10.47316/cajmhe.2021.2.1.02
View in Google Scholar

Bohannon, J. (2015). How to hijack a journal. Science, 350(6263), 903–905.

DOI: https://doi.org/10.1126/science.350.6263.903
View in Google Scholar

Chen, L.-X., Su, S.-W., Liao, C.-H., Wong, K.-S., & Yuan, S.-M. (2023). An open automation system for predatory journal detection. Scientific Reports, 13(1), 2976.

DOI: https://doi.org/10.1038/s41598-023-34493-1
View in Google Scholar

Chen, S., Tian, D., Law, R., & Zhang, M. (2022). Bibliometric and visualized review of smart tourism research. International Journal of Tourism Research, 24(2), 298–307.

DOI: https://doi.org/10.1002/jtr.2501
View in Google Scholar

da Silva, J. A. T. (2022). Reflections on the disappearance of Dolos list, a now-defunct “predatory” publishing blacklist. Open Information Science, 6(1), 136–142.

DOI: https://doi.org/10.1515/opis-2022-0136
View in Google Scholar

Dabbagh, M., Sookhak, M., & Safa, N. S. (2019). The evolution of blockchain: A bibliometric study. IEEE Access, 7, 19212–19221.

DOI: https://doi.org/10.1109/ACCESS.2019.2895646
View in Google Scholar

Dadkhah, M., Kahani, M., & Borchardt, G. (2018). A method for improving the integrity of peer review. Science and Engineering Ethics, 24, 1603–1610.

DOI: https://doi.org/10.1007/s11948-017-9960-9
View in Google Scholar

Dadkhah, M., Lagzian, M., & Borchardt, G. (2017). Questionable papers in citation databases as an issue for literature review. Journal of Cell Communication and Signaling, 11(2), 181–185.

DOI: https://doi.org/10.1007/s12079-016-0370-6
View in Google Scholar

Dadkhah, M., & Maliszewski, T. (2015). Hijacked journals-threats and challenges to countries’ scientific ranking. International Journal of Technology Enhanced Learning, 7(3), 281–288.

DOI: https://doi.org/10.1504/IJTEL.2015.072819
View in Google Scholar

Dadkhah, M., Maliszewski, T., & Lyashenko, V. V. (2016). An approach for preventing the indexing of hijacked journal articles in scientific databases. Behaviour & Information Technology, 35(4), 298–303.

DOI: https://doi.org/10.1080/0144929X.2015.1128975
View in Google Scholar

Dadkhah, M., Oermann, M. H., Hegedüs, M., Raman, R., & Dávid, L. D. (2023a). Detection of fake papers in the era of artificial intelligence. Diagnosis, 10(4), 390–397.

DOI: https://doi.org/10.1515/dx-2023-0090
View in Google Scholar

Dadkhah, M., Oermann, M. H., Hegedüs, M., Raman, R., & Dávid, L. D. (2023b). Diagnosis Reliability of ChatGPT for Journal Evaluation. Advanced Pharmaceutical Bulletin. Advance online publication.

DOI: https://doi.org/10.34172/apb.2024.020
View in Google Scholar

Dadkhah, M., Rahimnia, F., Darbyshire, P., & Borchardt, G. (2021). Ten (Bad) reasons researchers publish their papers in hijacked journals. Journal of Clinical Nursing, 30(19–20), e60–e63.

DOI: https://doi.org/10.1111/jocn.15947
View in Google Scholar

Dadkhah, M., Rahimnia, F., & Memon, A. R. (2022a). How frequent is the use of misleading metrics? A case study of business journals. Serials Librarian, 83(2), 197–204.

DOI: https://doi.org/10.1080/0361526X.2022.2145414
View in Google Scholar

Dadkhah, M., Rahimnia, F., Rafati Niya, S., & Borchardt, G. (2022b). Jourchain: using blockchain to avoid questionable journals. Irish Journal of Medical Science (1971 -), 191(3), 1435–1439.

DOI: https://doi.org/10.1007/s11845-021-02697-x
View in Google Scholar

Dávid, L. D., & Dadkhah, M. (2023). Artificial intelligence in the tourism sector: Its sustainability and innovation potential. Equilibrium. Quarterly Journal of Economics and Economic Policy, 18(3), 609–613.

DOI: https://doi.org/10.24136/eq.2023.019
View in Google Scholar

Grudniewicz, A., Moher, D., Cobey, K. D., Bryson, G. L., Cukier, S., Allen, K., Ardern, C., Balcom, L., Barros, T., & Berger, M. (2019). Predatory journals: No definition, no defence. Nature, 576(7786), 210–212.

DOI: https://doi.org/10.1038/d41586-019-03759-y
View in Google Scholar

Jalalian, M. (2015). The story of fake impact factor companies and how we detected them. Electronic Physician, 7(2), 1069.
View in Google Scholar

Jalalian, M., & Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica, 19(2), 73–87.

DOI: https://doi.org/10.5937/GeoPan1502073J
View in Google Scholar

Jalalian, M., & Mahboobi, H. (2014). Hijacked journals and predatory publishers: Is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology (WJST), 11(5), 389–394.
View in Google Scholar

Kendall, G., & Linacre, S. (2022). Predatory journals: Revisiting Beall’s research. Publishing Research Quarterly, 38(3), 530–543.

DOI: https://doi.org/10.1007/s12109-022-09888-z
View in Google Scholar

Lengyel, A., Szőke, S., Kovács, S., Dávid, L. D., Bácsné Bába, É., & Müller, A. (2019), Assessing the essential pre-conditions of an authentic sustainability curriculum. International Journal of Sustainability in Higher Education, 20(2), 309–340.

DOI: https://doi.org/10.1108/IJSHE-09-2018-0150
View in Google Scholar

Memon, A. R. (2019). Hijacked journals: A challenge unaddressed to the developing world. Journal of the Pakistan Medical Association, 69(10), 1413–1415.
View in Google Scholar

Menon, V. G., & Khosravi, M. R. (2019). Preventing hijacked research papers in fake (rogue) journals through social media and databases. Library Hi Tech News, 36(5), 1–6.

DOI: https://doi.org/10.1108/LHTN-11-2018-0070
View in Google Scholar

Moussa, S. (2021a). A “Trojan horse” in the reference lists: Citations to a hijacked journal in SSCI-indexed marketing journals. Journal of Academic Librarianship, 47(5), 102388.

DOI: https://doi.org/10.1016/j.acalib.2021.102388
View in Google Scholar

Moussa, S. (2021b). Journal hijacking: Challenges and potential solutions. Learned Publishing, 34(4), 688–695.

DOI: https://doi.org/10.1002/leap.1412
View in Google Scholar

Oermann, M. H., Nicoll, L. H., Ashton, K. S., Edie, A. H., Amarasekara, S., Chinn, P. L., Carter‐Templeton, H., & Ledbetter, L. S. (2020). Analysis of citation patterns and impact of predatory sources in the nursing literature. Journal of Nursing Scholarship, 52(3), 311–319.

DOI: https://doi.org/10.1111/jnu.12557
View in Google Scholar

Oermann, M. H., Nicoll, L. H., Carter-Templeton, H., Owens, J. K., Wrigley, J., Ledbetter, L. S., & Chinn, P. L. (2022). How to identify predatory journals in a search: Precautions for nurses. Nursing, 52(4), 41–45.

DOI: https://doi.org/10.1097/01.NURSE.0000823280.93554.1a
View in Google Scholar

Oermann, M. H., Nicoll, L. H., Carter-Templeton, H., Woodward, A., Kidayi, P. L., Neal, L. B., Edie, A. H., Ashton, K. S., Chinn, P. L., & Amarasekara, S. (2019). Citations of articles in predatory nursing journals. Nursing Outlook, 67(6), 664–670.

DOI: https://doi.org/10.1016/j.outlook.2019.05.001
View in Google Scholar

Oermann, M. H., Nicoll, L. H., Chinn, P. L., Ashton, K. S., Conklin, J. L., Edie, A. H., Amarasekara, S., & Williams, B. L. (2018). Quality of articles published in predatory nursing journals. Nursing Outlook, 66(1), 4–10.

DOI: https://doi.org/10.1016/j.outlook.2017.05.005
View in Google Scholar

Oermann, M. H., Waldrop, J., Nicoll, L. H., Peterson, G. M., Drabish, K. S., Carter-Templeton, H., Owens, J. K., Moorman, T., Webb, B., & Wrigley, J. (2023). Research on predatory publishing in health care: A scoping review. Canadian Journal of Nursing Research, 55(4), 415–424.

DOI: https://doi.org/10.1177/08445621231172621
View in Google Scholar

Priatmoko, S., Kabil, M., Vasa, L., Pallás, E. I., & Dávid, L. D. (2021). Reviving an unpopular tourism destination through the placemaking approach: Case study of Ngawen temple, Indonesia. Sustainability, 13(12), 6704.

DOI: https://doi.org/10.3390/su13126704
View in Google Scholar

Rice, D. B., Skidmore, B., & Cobey, K. D. (2021). Dealing with predatory journal articles captured in systematic reviews. Systematic Reviews, 10(1), 175.

DOI: https://doi.org/10.1186/s13643-021-01733-2
View in Google Scholar

The Retraction Watch Hijacked Journal Checker (2022). https://retractionwatch.com/the-retraction-watch-hijacked-journal-checker/.
View in Google Scholar

Downloads

Published

2023-12-30

How to Cite

Dadkhah, M., Oermann , M. H., Raman , R., & Dávid, L. D. (2023). A serious threat to publishing ethics and research integrity: Citations to hijacked journals. Equilibrium. Quarterly Journal of Economics and Economic Policy, 18(4), 897–906. https://doi.org/10.24136/eq.2023.028

Issue

Section

Editorial

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.