Switch to: References

Add citations

You must login to add citations.
  1. Detecting Hijacked Journals by Using Classification Algorithms.Mona Andoohgin Shahri, Mohammad Davarpanah Jazi, Glenn Borchardt & Mehdi Dadkhah - 2018 - Science and Engineering Ethics 24 (2):655-668.
    Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Fake Journals: Not Always Valid Ways to Distinguish Them.Khaled Moustafa - 2015 - Science and Engineering Ethics 21 (5):1391-1392.
    In their recent paper, Esfe et al. present some criteria for fake journals and propose some ‘features’ to recognize them. While I share most of the authors’ concerns about this issue in general, some of the reported criteria are not fit to differentiate fake journals from genuine ones. Here are some examples derived from their list, which illustrate that such criteria are not necessarily specific to fake journals only, but they could also apply to well-established journals and, therefore, should not (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online-Based Approaches to Identify Real Journals and Publishers from Hijacked Ones.Amin Asadi, Nader Rahbar, Meisam Asadi, Fahime Asadi & Kokab Khalili Paji - 2017 - Science and Engineering Ethics 23 (1):305-308.
    The aim of the present paper was to introduce some online-based approaches to evaluate scientific journals and publishers and to differentiate them from the hijacked ones, regardless of their disciplines. With the advent of open-access journals, many hijacked journals and publishers have deceitfully assumed the mantle of authenticity in order to take advantage of researchers and students. Although these hijacked journals and publishers can be identified through checking their advertisement techniques and their websites, these ways do not always result in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Invitation to Speak at a Conference: The Tempting Technique Adopted by Predatory Conferences’ Organizers.Amin Asadi - 2019 - Science and Engineering Ethics 25 (3):975-979.
    In recent years, predatory journals, conferences, and publishers have turned to an inevitable threat in scientific publishing. Researchers, regardless of their disciplines, should be aware of these predators and have to be able to recognize them. The main aim of the present paper is to raise awareness about the growing menace of fake invitations to speak at a scientific conference organized by predatory organizers and publishers. Some subtle signs to identify the fake invitations from the authentic ones have been introduced (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Fake/Bogus Conferences: Their Features and Some Subtle Ways to Differentiate Them from Real Ones.Amin Asadi, Nader Rahbar, Mohammad Javad Rezvani & Fahime Asadi - 2018 - Science and Engineering Ethics 24 (2):779-784.
    The main objective of the present paper is to introduce some features of fake/bogus conferences and some viable approaches to differentiate them from the real ones. These fake/bogus conferences introduce themselves as international conferences, which are multidisciplinary and indexed in major scientific digital libraries. Furthermore, most of the fake/bogus conference holders offer publishing the accepted papers in ISI journals and use other techniques in their advertisement e-mails.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations