Home Masquerade of authority: hijacked journals are gaining more credibility than original ones
Article
Licensed
Unlicensed Requires Authentication

Masquerade of authority: hijacked journals are gaining more credibility than original ones

  • Mihály Hegedűs ORCID logo , Mehdi Dadkhah ORCID logo EMAIL logo and Lóránt D. Dávid ORCID logo
Published/Copyright: July 3, 2024

Abstract

At the moment, the academic world is faced with various challenges that negatively impact science integrity. One is hijacked journals, a second, inauthentic website for indexed legitimate journals, managed by cybercriminals. These journals publish any manuscript by charging authors and pose a risk to scientific integrity. This piece compares a journal’s original and hijacked versions regarding authority in search engines. A list of 16 medical journals, along with their hijacked versions, has been collected. The MOZ Domain Authority has been used to check the authority of both original and hijacked journals, and the results have been discussed. It indicates that hijacked journals are gaining more credibility than original ones. This should alarm academia and highlights a need for serious action against hijacked journals. The related policies should be planned, and tools should be developed to support easy detection of hijacked journals. On the publishers’ side, the visibility of journals’ websites must be enhanced to address this issue.


Corresponding author: Mehdi Dadkhah, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India, E-mail:

Award Identifier / Grant number: This work was supported by the Flagship Research Groups Programme of the Hungarian University of Agriculture and Life Sciences.

Acknowledgments

The AI has been used only for improving readability of texts not writing from scratch. The possible usage of AI for methodological purpose has been clarified in methodology section.

  1. Research ethics: The local Institutional Review Board deemed the study exempt from review.

  2. Informed consent: Not applicable.

  3. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Competing interests: The authors state no conflict of interest.

  5. Research funding: This work was supported by the Flagship Research Groups Programme of the Hungarian University of Agriculture and Life Sciences.

  6. Data availability: The raw data can be obtained on request from the corresponding author.

References

1. Beall, J. What I learned from predatory publishers. Biochem Med 2017;27:273–8. https://doi.org/10.11613/bm.2017.029.Search in Google Scholar PubMed PubMed Central

2. Dadkhah, M, Rahimnia, F, Memon, AR. Facilitators and barriers to dealing with questionable journals in management science. Library Hi Tech 2023. [cited 2024 Jan 10];ahead-of-print(ahead-of-print). https://doi.org/10.1108/LHT-09-2022-0420.Search in Google Scholar

3. Grudniewicz, A, Moher, D, Cobey, KD, Bryson, GL, Cukier, S, Allen, K, et al.. Predatory journals: no definition, no defence. Nature 2019;576:210–2. https://doi.org/10.1038/d41586-019-03759-y.Search in Google Scholar PubMed

4. Kendall, G, Linacre, S. Predatory journals: revisiting Beall’s research. Publish Res Q 2022;38:530–43. https://doi.org/10.1007/s12109-022-09888-z.Search in Google Scholar

5. Memon, AR. Predatory journals spamming for publications: what should researchers do? Sci Eng Ethics 2018;24:1617–39. https://doi.org/10.1007/s11948-017-9955-6.Search in Google Scholar PubMed

6. Dadkhah, M, Rahimnia, F, Memon, AR. How frequent is the use of misleading metrics? A case study of business journals. Ser Libr 2022;83:197–204. https://doi.org/10.1080/0361526x.2022.2145414.Search in Google Scholar

7. Gutierrez, FR, Beall, J, Forero, DA. Spurious alternative impact factors: the scale of the problem from an academic perspective. Bioessays 2015;37:474–6. https://doi.org/10.1002/bies.201500011.Search in Google Scholar PubMed

8. Asadi, A, Rahbar, N, Rezvani, MJ, Asadi, F. Fake/bogus conferences: their features and some subtle ways to differentiate them from real ones. Sci Eng Ethics 2018;24:779–84. https://doi.org/10.1007/s11948-017-9906-2.Search in Google Scholar PubMed

9. Sonne, C, Ok, YS, Lam, SS, Rinklebe, J, Alstrup, AK, Kim, KH. First predatory journals, now conferences: the need to establish lists of fake conferences. Sci Total Environ 2020;715:136990. https://doi.org/10.1016/j.scitotenv.2020.136990.Search in Google Scholar PubMed

10. Dadkhah, M, Oermann, MH, Hegedüs, M, Raman, R, Dávid, LD. Detection of fake papers in the era of artificial intelligence. Diagnosis 2023;10:390–7. https://doi.org/10.1515/dx-2023-0090.Search in Google Scholar PubMed

11. Lund, BD, Wang, T, Mannuru, NR, Nie, B, Shimray, S, Wang, Z. ChatGPT and a new academic reality: artificial intelligence‐written research papers and the ethics of the large language models in scholarly publishing. J. Assoc. Inf. Sci. Technol. 2023;74:570–81. https://doi.org/10.1002/asi.24750.Search in Google Scholar

12. Dadkhah, M, Rahimnia, F, Darbyshire, P, Borchardt, G. Ten (Bad) reasons researchers publish their papers in hijacked journals. J Clin Nurs 2021;30. https://doi.org/10.1111/jocn.15947.Search in Google Scholar PubMed

13. Vijay Solomon, R. Breaking free from academic scams: five key reflections on the cloned journal conundrum. Learned Publishing [Internet]; 2023. [cited 2024 Jan 10];n/a(n/a).10.1002/leap.1590Search in Google Scholar

14. Dadkhah, M, Oermann, MH, Raman, R, Dávid, LD. A serious threat to publishing ethics and research integrity: citations to hijacked journals. Equilibrium 2023;18:897–906. https://doi.org/10.24136/eq.2023.028.Search in Google Scholar

15. Dadkhah, M, Maliszewski, T. Hijacked journals-threats and challenges to countries’ scientific ranking. Int J Technol Enhanc Learn (IJTEL) 2015;7:281–8. https://doi.org/10.1504/ijtel.2015.072819.Search in Google Scholar

16. Dadkhah, M, Sutikno, T, Jazi, MD, Stiawan, D. An introduction to journal phishings and their detection approach. TELKOMNIKA 2015;13:373–80. https://doi.org/10.12928/telkomnika.v13i2.1436.Search in Google Scholar

17. Jalalian, M, Dadkhah, M. The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica 2015;19:73–87. https://doi.org/10.5937/geopan1502073j.Search in Google Scholar

18. Bohannon, J. How to hijack a journal. Science 2015;350:903–5. https://doi.org/10.1126/science.350.6263.903.Search in Google Scholar PubMed

19. Abalkina, A. Challenges posed by hijacked journals in Scopus. J. Assoc. Inf. Sci. Technol. 2024; 75(4): 395-422. [cited 2024 Jan 10];n/a(n/a). https://doi.org/10.1002/asi.24855.Search in Google Scholar

20. Dadkhah, M. Letter to the JAVA editor. J Assoc Vasc Access 2016;21(1):19–20. https://doi.org/10.1016/j.java.2015.11.001.Search in Google Scholar

21. Dadkhah, M, Hegedűs, M, Nedungadi, P, Raman, R, Dávid, LD. Unveiling the hidden menace: a topic modeling analysis of hijacked medical journals. Adv Pharm Bull 2024. Inpress. https://apb.tbzmed.ac.ir/Article/apb-42791.10.34172/apb.2024.029Search in Google Scholar

22. Müller, SD, Sæbø, JI. The ‘hijacking’of the scandinavian journal of information systems: implications for the information systems community. Inf Syst J 2024;34(2):364–83. https://doi.org/10.1111/isj.12481.Search in Google Scholar

23. Nicholas, D, Watkinson, A, Volentine, R, Allard, S, Levine, K, Tenopir, C, et al.. Trust and authority in scholarly communications in the light of the digital transition: setting the scene for a major study. Learn Publ 2014;27:121–34. https://doi.org/10.1087/20140206.Search in Google Scholar

24. Thornley, C, Watkinson, A, Nicholas, D, Volentine, R, Jamali, HR, Herman, E, et al.. The role of trust and authority in the citation behaviour of researchers. Inf Res 2015;20(3):677.Search in Google Scholar

25. Else, H. Hijacked-journal tracker helps researchers to spot scam websites. Nature 2022. https://doi.org/10.1038/d41586-022-01666-3.Search in Google Scholar PubMed

26. Dhar, P, Gayan, MA. A webometric study of selected international library association websites: an evaluative study. DESIDOC J. Libr. Inf. Technol. 2022;42. https://doi.org/10.14429/djlit.42.3.17772.Search in Google Scholar

27. MOZ. Domain authority [internet]. 2024 [cited 2024 Jan 12]. Available from: https://moz.com/learn/seo/domain-authority.Search in Google Scholar

28. Verma, MK, Brahma, K. Ranking of National Institutes of Technology (NITs) of northeast region of India on the basis of web impact factor. COLLNET J Sci Inf Manag 2017;11:235–48. https://doi.org/10.1080/09737766.2017.1292667.Search in Google Scholar

Received: 2024-05-02
Accepted: 2024-05-31
Published Online: 2024-07-03

© 2024 Walter de Gruyter GmbH, Berlin/Boston

Articles in the same Issue

  1. Frontmatter
  2. Editorial
  3. The growing threat of hijacked journals
  4. Review
  5. Effects of SNAPPS in clinical reasoning teaching: a systematic review with meta-analysis of randomized controlled trials
  6. Mini Review
  7. Diagnostic value of D-dimer in differentiating multisystem inflammatory syndrome in Children (MIS-C) from Kawasaki disease: systematic literature review and meta-analysis
  8. Opinion Papers
  9. Masquerade of authority: hijacked journals are gaining more credibility than original ones
  10. FRAMED: a framework facilitating insight problem solving
  11. Algorithms in medical decision-making and in everyday life: what’s the difference?
  12. Original Articles
  13. Computerized diagnostic decision support systems – a comparative performance study of Isabel Pro vs. ChatGPT4
  14. Comparative analysis of diagnostic accuracy in endodontic assessments: dental students vs. artificial intelligence
  15. Assessing the Revised Safer Dx Instrument® in the understanding of ambulatory system design changes for type 1 diabetes and autism spectrum disorder in pediatrics
  16. The Big Three diagnostic errors through reflections of Japanese internists
  17. SASAN: ground truth for the effective segmentation and classification of skin cancer using biopsy images
  18. Computable phenotype for diagnostic error: developing the data schema for application of symptom-disease pair analysis of diagnostic error (SPADE)
  19. Development of a disease-based hospital-level diagnostic intensity index
  20. HbA1c and fasting plasma glucose levels are equally related to incident cardiovascular risk in a high CVD risk population without known diabetes
  21. Short Communications
  22. Can ChatGPT-4 evaluate whether a differential diagnosis list contains the correct diagnosis as accurately as a physician?
  23. Analysis of thicknesses of blood collection needle by scanning electron microscopy reveals wide heterogeneity
  24. Letters to the Editor
  25. For any disease a human can imagine, ChatGPT can generate a fake report
  26. The dilemma of epilepsy diagnosis in Pakistan
  27. The Japanese universal health insurance system in the context of diagnostic equity
  28. Case Report – Lessons in Clinical Reasoning
  29. Lessons in clinical reasoning – pitfalls, myths, and pearls: a case of tarsal tunnel syndrome caused by an intraneural ganglion cyst
Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/dx-2024-0082/html
Scroll to top button