Skip to main navigation menu Skip to main content Skip to site footer

A serious threat to publishing ethics and research integrity: Citations to hijacked journals

Keywords

Citation, Hijacked journals, Publishing ethics, Research integrity, Web of Science

PDF

References

  1. Abalkina, A. (2021). Detecting a network of hijacked journals by its archive. Scientometrics, 126(8), 7123–7148. DOI: https://doi.org/10.1007/s11192-021-04056-0
    View in Google Scholar
  2. Abid, H., & Yousif, E. (2022). Hijacked journals: Tips for young researchers, to detect and avoid them. Baghdad Journal of Biochemistry and Applied Biological Sciences, 3(04), 232–236. DOI: https://doi.org/10.47419/bjbabs.v3i04.179
    View in Google Scholar
  3. Andoohgin Shahri, M., Jazi, M. D., Borchardt, G., & Dadkhah, M. (2018). Detecting hijacked journals by using classification algorithms. Science and Engineering Ethics, 24, 655–668. DOI: https://doi.org/10.1007/s11948-017-9914-2
    View in Google Scholar
  4. Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975. DOI: https://doi.org/10.1016/j.joi.2017.08.007
    View in Google Scholar
  5. Asadi, A., Rahbar, N., Asadi, M., Asadi, F., & Khalili Paji, K. (2017). Online-based approaches to identify real journals and publishers from hijacked ones. Science and Engineering Ethics, 23(1), 305–308. DOI: https://doi.org/10.1007/s11948-015-9747-9
    View in Google Scholar
  6. Beall, J. (2021). Open access, research communities, and a defense against predatory journals. Central Asian Journal of Medical Hypotheses and Ethics, 2(1), 14–17. doi: 0000-0001-9012-5330. DOI: https://doi.org/10.47316/cajmhe.2021.2.1.02
    View in Google Scholar
  7. Bohannon, J. (2015). How to hijack a journal. Science, 350(6263), 903–905. DOI: https://doi.org/10.1126/science.350.6263.903
    View in Google Scholar
  8. Chen, L.-X., Su, S.-W., Liao, C.-H., Wong, K.-S., & Yuan, S.-M. (2023). An open automation system for predatory journal detection. Scientific Reports, 13(1), 2976. DOI: https://doi.org/10.1038/s41598-023-34493-1
    View in Google Scholar
  9. Chen, S., Tian, D., Law, R., & Zhang, M. (2022). Bibliometric and visualized review of smart tourism research. International Journal of Tourism Research, 24(2), 298–307. DOI: https://doi.org/10.1002/jtr.2501
    View in Google Scholar
  10. da Silva, J. A. T. (2022). Reflections on the disappearance of Dolos list, a now-defunct “predatory” publishing blacklist. Open Information Science, 6(1), 136–142. DOI: https://doi.org/10.1515/opis-2022-0136
    View in Google Scholar
  11. Dabbagh, M., Sookhak, M., & Safa, N. S. (2019). The evolution of blockchain: A bibliometric study. IEEE Access, 7, 19212–19221. DOI: https://doi.org/10.1109/ACCESS.2019.2895646
    View in Google Scholar
  12. Dadkhah, M., Kahani, M., & Borchardt, G. (2018). A method for improving the integrity of peer review. Science and Engineering Ethics, 24, 1603–1610. DOI: https://doi.org/10.1007/s11948-017-9960-9
    View in Google Scholar
  13. Dadkhah, M., Lagzian, M., & Borchardt, G. (2017). Questionable papers in citation databases as an issue for literature review. Journal of Cell Communication and Signaling, 11(2), 181–185. DOI: https://doi.org/10.1007/s12079-016-0370-6
    View in Google Scholar
  14. Dadkhah, M., & Maliszewski, T. (2015). Hijacked journals-threats and challenges to countries’ scientific ranking. International Journal of Technology Enhanced Learning, 7(3), 281–288. DOI: https://doi.org/10.1504/IJTEL.2015.072819
    View in Google Scholar
  15. Dadkhah, M., Maliszewski, T., & Lyashenko, V. V. (2016). An approach for preventing the indexing of hijacked journal articles in scientific databases. Behaviour & Information Technology, 35(4), 298–303. DOI: https://doi.org/10.1080/0144929X.2015.1128975
    View in Google Scholar
  16. Dadkhah, M., Oermann, M. H., Hegedüs, M., Raman, R., & Dávid, L. D. (2023a). Detection of fake papers in the era of artificial intelligence. Diagnosis, 10(4), 390–397. DOI: https://doi.org/10.1515/dx-2023-0090
    View in Google Scholar
  17. Dadkhah, M., Oermann, M. H., Hegedüs, M., Raman, R., & Dávid, L. D. (2023b). Diagnosis Reliability of ChatGPT for Journal Evaluation. Advanced Pharmaceutical Bulletin. Advance online publication. DOI: https://doi.org/10.34172/apb.2024.020
    View in Google Scholar
  18. Dadkhah, M., Rahimnia, F., Darbyshire, P., & Borchardt, G. (2021). Ten (Bad) reasons researchers publish their papers in hijacked journals. Journal of Clinical Nursing, 30(19–20), e60–e63. DOI: https://doi.org/10.1111/jocn.15947
    View in Google Scholar
  19. Dadkhah, M., Rahimnia, F., & Memon, A. R. (2022a). How frequent is the use of misleading metrics? A case study of business journals. Serials Librarian, 83(2), 197–204. DOI: https://doi.org/10.1080/0361526X.2022.2145414
    View in Google Scholar
  20. Dadkhah, M., Rahimnia, F., Rafati Niya, S., & Borchardt, G. (2022b). Jourchain: using blockchain to avoid questionable journals. Irish Journal of Medical Science (1971 -), 191(3), 1435–1439. DOI: https://doi.org/10.1007/s11845-021-02697-x
    View in Google Scholar
  21. Dávid, L. D., & Dadkhah, M. (2023). Artificial intelligence in the tourism sector: Its sustainability and innovation potential. Equilibrium. Quarterly Journal of Economics and Economic Policy, 18(3), 609–613. DOI: https://doi.org/10.24136/eq.2023.019
    View in Google Scholar
  22. Grudniewicz, A., Moher, D., Cobey, K. D., Bryson, G. L., Cukier, S., Allen, K., Ardern, C., Balcom, L., Barros, T., & Berger, M. (2019). Predatory journals: No definition, no defence. Nature, 576(7786), 210–212. DOI: https://doi.org/10.1038/d41586-019-03759-y
    View in Google Scholar
  23. Jalalian, M. (2015). The story of fake impact factor companies and how we detected them. Electronic Physician, 7(2), 1069.
    View in Google Scholar
  24. Jalalian, M., & Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica, 19(2), 73–87. DOI: https://doi.org/10.5937/GeoPan1502073J
    View in Google Scholar
  25. Jalalian, M., & Mahboobi, H. (2014). Hijacked journals and predatory publishers: Is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology (WJST), 11(5), 389–394.
    View in Google Scholar
  26. Kendall, G., & Linacre, S. (2022). Predatory journals: Revisiting Beall’s research. Publishing Research Quarterly, 38(3), 530–543. DOI: https://doi.org/10.1007/s12109-022-09888-z
    View in Google Scholar
  27. Lengyel, A., Szőke, S., Kovács, S., Dávid, L. D., Bácsné Bába, É., & Müller, A. (2019), Assessing the essential pre-conditions of an authentic sustainability curriculum. International Journal of Sustainability in Higher Education, 20(2), 309–340. DOI: https://doi.org/10.1108/IJSHE-09-2018-0150
    View in Google Scholar
  28. Memon, A. R. (2019). Hijacked journals: A challenge unaddressed to the developing world. Journal of the Pakistan Medical Association, 69(10), 1413–1415.
    View in Google Scholar
  29. Menon, V. G., & Khosravi, M. R. (2019). Preventing hijacked research papers in fake (rogue) journals through social media and databases. Library Hi Tech News, 36(5), 1–6. DOI: https://doi.org/10.1108/LHTN-11-2018-0070
    View in Google Scholar
  30. Moussa, S. (2021a). A “Trojan horse” in the reference lists: Citations to a hijacked journal in SSCI-indexed marketing journals. Journal of Academic Librarianship, 47(5), 102388. DOI: https://doi.org/10.1016/j.acalib.2021.102388
    View in Google Scholar
  31. Moussa, S. (2021b). Journal hijacking: Challenges and potential solutions. Learned Publishing, 34(4), 688–695. DOI: https://doi.org/10.1002/leap.1412
    View in Google Scholar
  32. Oermann, M. H., Nicoll, L. H., Ashton, K. S., Edie, A. H., Amarasekara, S., Chinn, P. L., Carter‐Templeton, H., & Ledbetter, L. S. (2020). Analysis of citation patterns and impact of predatory sources in the nursing literature. Journal of Nursing Scholarship, 52(3), 311–319. DOI: https://doi.org/10.1111/jnu.12557
    View in Google Scholar
  33. Oermann, M. H., Nicoll, L. H., Carter-Templeton, H., Owens, J. K., Wrigley, J., Ledbetter, L. S., & Chinn, P. L. (2022). How to identify predatory journals in a search: Precautions for nurses. Nursing, 52(4), 41–45. DOI: https://doi.org/10.1097/01.NURSE.0000823280.93554.1a
    View in Google Scholar
  34. Oermann, M. H., Nicoll, L. H., Carter-Templeton, H., Woodward, A., Kidayi, P. L., Neal, L. B., Edie, A. H., Ashton, K. S., Chinn, P. L., & Amarasekara, S. (2019). Citations of articles in predatory nursing journals. Nursing Outlook, 67(6), 664–670. DOI: https://doi.org/10.1016/j.outlook.2019.05.001
    View in Google Scholar
  35. Oermann, M. H., Nicoll, L. H., Chinn, P. L., Ashton, K. S., Conklin, J. L., Edie, A. H., Amarasekara, S., & Williams, B. L. (2018). Quality of articles published in predatory nursing journals. Nursing Outlook, 66(1), 4–10. DOI: https://doi.org/10.1016/j.outlook.2017.05.005
    View in Google Scholar
  36. Oermann, M. H., Waldrop, J., Nicoll, L. H., Peterson, G. M., Drabish, K. S., Carter-Templeton, H., Owens, J. K., Moorman, T., Webb, B., & Wrigley, J. (2023). Research on predatory publishing in health care: A scoping review. Canadian Journal of Nursing Research, 55(4), 415–424. DOI: https://doi.org/10.1177/08445621231172621
    View in Google Scholar
  37. Priatmoko, S., Kabil, M., Vasa, L., Pallás, E. I., & Dávid, L. D. (2021). Reviving an unpopular tourism destination through the placemaking approach: Case study of Ngawen temple, Indonesia. Sustainability, 13(12), 6704. DOI: https://doi.org/10.3390/su13126704
    View in Google Scholar
  38. Rice, D. B., Skidmore, B., & Cobey, K. D. (2021). Dealing with predatory journal articles captured in systematic reviews. Systematic Reviews, 10(1), 175. DOI: https://doi.org/10.1186/s13643-021-01733-2
    View in Google Scholar
  39. The Retraction Watch Hijacked Journal Checker (2022). https://retractionwatch.com/the-retraction-watch-hijacked-journal-checker/.
    View in Google Scholar

Similar Articles

11-20 of 409

You may also start an advanced similarity search for this article.