Home Medicine Hijacked medical journals and the risk to scholarly integrity: a web analytics study of prevalence, traffic channels, and geographic origins of traffic
Article
Licensed
Unlicensed Requires Authentication

Hijacked medical journals and the risk to scholarly integrity: a web analytics study of prevalence, traffic channels, and geographic origins of traffic

  • Edit Ilona Pallás ORCID logo , Mehdi Dadkhah ORCID logo EMAIL logo and Lóránt Dénes Dávid ORCID logo
Published/Copyright: January 7, 2026
Diagnosis
From the journal Diagnosis

Abstract

Objectives

The integrity of research and science is increasingly under threat from questionable journals. In particular, hijacked journals rapidly expand, propagating scam-based, non-peer-reviewed publications. While the academic literature offers discussions, developed methodologies, and block lists to combat these fraudulent journals, the most prevalent hijacked journals and their primary distribution channels remain ambiguous.

Methods

To bridge this knowledge gap, the current study utilized a list of 380 previously detected hijacked journals and the web analytics platform Semrush to identify the most visited hijacked journals and their primary channels for attracting web traffic. This research first analyzes hijacked journals across various fields and then focuses specifically on hijacked medical journals.

Results

Our findings demonstrate that over 50 % of previously detected hijacked journals are active, primarily attracting researchers via email, search engines, and artificial intelligence (AI) tools. Furthermore, the majority of visitors to these journal websites originate from India. The results for medical journals align with these overall trends.

Conclusions

Addressing the significant problem these questionable journals pose necessitates implementing legal action and technological solutions.


Corresponding author: Mehdi Dadkhah, Department of Sustainable Tourism, Institute of Rural Development and Sustainable Economy, Hungarian University of Agriculture and Life Sciences (MATE), Gödöllő, Hungary, E-mail:

Funding source: Hungarian University of Agriculture and Life Sciences (MATE)

Award Identifier / Grant number: This work was supported by the Flagship Research G

Acknowledgments

The authors would like to thank the Flagship Research Groups Programme of the Hungarian University of Agriculture and Life Sciences (MATE).

  1. Research ethics: Not applicable.

  2. Informed consent: Not applicable.

  3. Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.

  4. Use of Large Language Models, AI and Machine Learning Tools: AI technologies (Gemini 2.5 flash and Grammarly) were utilized to increase readability in some sections of the text. The additional conceivable applications of AI tools have been stated in the method section. The AI has been used to improve readability and fluency not writing from scratch.

  5. Conflict of interest: The authors state no conflict of interest.

  6. Research funding: This work was supported by the Flagship Research Groups Programme of the Hungarian University of Agriculture and Life Sciences (MATE).

  7. Data availability: Data available on request from the authors.

References

1. Sahni, V. Journal hijacking. Br Dent J 2025;238:76. https://doi.org/10.1038/s41415-025-8343-x.Search in Google Scholar PubMed

2. Trapp, J. Predatory publishing, hijacking of legitimate journals and impersonation of researchers via special issue announcements: a warning for editors and authors about a new scam. Phys Eng Sci Med 2020;43:9–10. https://doi.org/10.1007/s13246-019-00835-5.Search in Google Scholar PubMed

3. Van Zundert, A, Klein, A. How to avoid predatory and hijacking publishers? Eur J Anaesthesiol 2019;36:807–9. https://doi.org/10.1097/eja.0000000000001072.Search in Google Scholar

4. Abalkina, A. Detecting a network of hijacked journals by its archive. Scientometrics 2021;126:7123–48. https://doi.org/10.1007/s11192-021-04056-0.Search in Google Scholar

5. Althaus, F, Kohl, CBS, FaggionJrCM. An overview of studies assessing predatory journals within the biomedical sciences. Account Res:1–20. https://doi.org/10.1080/08989621.2025.2465625.Search in Google Scholar PubMed

6. Beall, J. What I learned from predatory publishers. Biochem Med 2017;27:273–8. https://doi.org/10.11613/bm.2017.029.Search in Google Scholar PubMed PubMed Central

7. Müller, SD, Sæbø, JI. The ‘hijacking’ of the Scandinavian journal of information systems: implications for the information systems community. Inf Syst J 2024;34:364–83. https://doi.org/10.1111/isj.12481.Search in Google Scholar

8. Švab, I, Makivić, I. Predators and hijackers in academic publishing. Eur J Gen Pract 2015;21:95–6. https://doi.org/10.3109/13814788.2015.1037270.Search in Google Scholar PubMed

9. Jalalian, M, Dadkhah, M. The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica 2015;19:73–87. https://doi.org/10.5937/geopan1502073j.Search in Google Scholar

10. Graber, ML, Plebani, M. The growing threat of hijacked journals. Diagnosis 2024;11:219. https://doi.org/10.1515/dx-2024-0103.Search in Google Scholar PubMed

11. Abid, H, Yousif, E. Hijacked journals: tips for young researchers, to detect and avoid them. Baghdad J Biochem Appl Biol Sci. 2022;3:232–6. https://doi.org/10.47419/bjbabs.v3i04.179.Search in Google Scholar

12. Asadi, A, Rahbar, N, Asadi, M, Asadi, F, Khalili Paji, K. Online-based approaches to identify real journals and publishers from hijacked ones. Sci Eng Ethics 2017;23:305–8. https://doi.org/10.1007/s11948-015-9747-9.Search in Google Scholar PubMed

13. Abalkina, A. Prevalence of plagiarism in hijacked journals: a text similarity analysis. Account Res 2025;32:1–19. https://doi.org/10.1080/08989621.2024.2387210.Search in Google Scholar PubMed

14. Andoohgin, SM, Jazi, MD, Borchardt, G, Dadkhah, M. Detecting hijacked journals by using classification algorithms. Sci Eng Ethics 2018;24:655–68. https://doi.org/10.1007/s11948-017-9914-2.Search in Google Scholar PubMed

15. Holly, E. Hijacked-journal tracker helps researchers to spot scam websites. Nature 2022. https://doi.org/10.1038/d41586-022-01666-3.Search in Google Scholar PubMed

16. Retraction Watch. The retraction watch hijacked journal checker [Internet]. Available from: https://retractionwatch.com/the-retraction-watch-hijacked-journal-checker/ [Cited 22 Oct 2025].Search in Google Scholar

17. Dadkhah, M, Oermann, MH, Hegedűs, M, Dénes Dávid, L, Raman, R. Detecting new hijacked journals by using a list of known hijacked journals and the diagnosis of web domain data. Ser Rev 2024;50:91–6.10.1080/00987913.2024.2411664Search in Google Scholar

18. Jalalian, M, Mahboobi, H. Hijacked journals and predatory publishers: is there a need to re-think how to assess the quality of academic research? Walailak J Sci Technol 2014;11:389–94.Search in Google Scholar

19. Teixeira da Silva, JA, Al-Khatib, A, Tsigaris, P. Spam emails in academia: issues and costs. Scientometrics 2020;122:1171–88. https://doi.org/10.1007/s11192-019-03315-5.Search in Google Scholar

20. Hegedűs, M, Dadkhah, M, Dávid, LD. Benchmarking AI chatbots: assessing their accuracy in identifying hijacked medical journals; 2025. Available from: https://doi.org/10.1515/dx-2025-0043 [Cited 22 Oct 2025].Search in Google Scholar PubMed

21. Abalkina, A. Challenges posed by hijacked journals in Scopus. J Assoc Inf Sci Technol 2024;75:395–422. https://doi.org/10.1002/asi.24855.Search in Google Scholar

22. Bohannon, J. How to hijack a journal. Science. 2015;350:903–5. https://doi.org/10.1126/science.350.6263.903.Search in Google Scholar PubMed

23. Hegedűs, M, Dadkhah, M, Dávid, LD. Hijacked medical journals rank first via search engine optimization and threaten academic integrity. Eur J Intern Med 2025;140:106450. https://doi.org/10.1016/j.ejim.2025.106450.Search in Google Scholar PubMed

24. Nanda, JK, Hay, JL, Marchetti, MA. Analysis of keywords used in internet searches for melanoma information: observational study. JMIR Dermatol 2021;4:e25720. https://doi.org/10.2196/25720.Search in Google Scholar PubMed PubMed Central

25. Wackerbarth, JJ, Fantus, RJ, Darves-Bornoz, A, Hehemann, MC, Helfand, BT, Keeter, MK, et al.. Examining online traffic patterns to popular direct-to-consumer websites for evaluation and treatment of erectile dysfunction. Sex Med 2021;9:100289. https://doi.org/10.1016/j.esxm.2020.100289.Search in Google Scholar PubMed PubMed Central

26. Semrush. Traffic analytics [Internet]. Available from: https://www.semrush.com/kb/1506-traffic-and-market-traffic-overview#:∼:text=Direct%20%E2%80%93%20Traffic%20from%20users%20typing,from%20unpaid%20social%20media%20posts [Cited 23 Oct 2025].Search in Google Scholar

27. Semrush. What countries does Semrush cover? [Internet]. Available from: https://www.semrush.com/kb/287-what-countries-does-semrush-cover [Cited 30 Oct 2025].Search in Google Scholar

Received: 2025-11-07
Accepted: 2025-11-16
Published Online: 2026-01-07

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 24.1.2026 from https://www.degruyterbrill.com/document/doi/10.1515/dx-2025-0158/html?lang=en
Scroll to top button