Science and Engineering Ethics

, Volume 24, Issue 2, pp 785–790 | Cite as

Academic Information Security Researchers: Hackers or Specialists?

Opinion

Abstract

In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

Keywords

Academic information security Academic ethic Identity theft Phishing attacks 

References

  1. Bartholomew, R. E. (2014). Science for sale: The rise of predatory journals. Journal of the Royal Society of Medicine, 107(10), 384–385. doi: 10.1177/0141076814548526.CrossRefGoogle Scholar
  2. Beall, J. (2016). Pharmacy research and predatory journals: Authors beware. American Journal of Health System Pharmacy, 73(19), 1548–1550. doi: 10.2146/ajhp160150.CrossRefGoogle Scholar
  3. Beall, J. (2017). Predatory journals threaten the quality of published medical research. Journal of Orthopaedic and Sports Physical Therapy, 47(1), 3–5. doi: 10.2519/jospt.2017.0601.CrossRefGoogle Scholar
  4. Clark, A. M., & Thompson, D. R. (2016). Five (bad) reasons to publish your research in predatory journals. Journal of Advanced Nursing, n/a-n/a.. doi: 10.1111/jan.13090.Google Scholar
  5. Dadkhah, M., & Bianciardi, G. (2016a). Fake universities as an emerging issue. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 11(4), 49–52. doi: 10.4018/IJWLTT.2016100104.CrossRefGoogle Scholar
  6. Dadkhah, M., & Bianciardi, G. (2016b). Hackers spy scientists. Indian Pediatrics, 53(11), 1027.CrossRefGoogle Scholar
  7. Dadkhah, M., Elias, N., Jazi, M. D., Christova-Bagdassarian, V., & Abu-Elteen, K. H. (2015a). A new challenge in the academic world: Earning real money and eminence by paper publishing. Jordan Journal of Biological Sciences, 8(2), 73–75.CrossRefGoogle Scholar
  8. Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015b). An introduction to journal phishings and their detection approach. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13(2), 373–380.CrossRefGoogle Scholar
  9. Dadkhah, M., Lagzian, M., & Borchardt, G. (2016a). The game of hacking academic websites. World Digital Libraries-An International Journal, 9(2), 131–133.CrossRefGoogle Scholar
  10. Dadkhah, M., Stefanutti, C., & Bianciardi, G. (2016b). Scientific information security in information science and Academic Publishing. Artificial Organs, 40(5), 425–430. doi: 10.1111/aor.12729.CrossRefGoogle Scholar
  11. Dadkhah, M., Lagzian, M., & Borchardt, G. (2017). Identity theft in the academic world leads to junk science. Science and Engineering Ethics. doi: 10.1007/s11948-016-9867-x.Google Scholar
  12. Günaydin, G. P., & Dogan, N. Ö. (2015). A growing threat for academicians: Fake and predatory journals. Journal of Academic Emergency Medicine, 14(2), 94.CrossRefGoogle Scholar
  13. Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283.CrossRefGoogle Scholar
  14. Jalalian, M., & Mahboobi, H. (2013). New corruption detected: Bogus impact factors compiled by fake organizations. Electronic Physician, 5(3), 685–686. doi: 10.14661/2013.685-686.Google Scholar
  15. Mitnick, K. D., & Simon, W. L. (2011). The art of deception: Controlling the human element of security. London: Wiley.Google Scholar
  16. Moher, D., & Srivastava, A. (2015). You are invited to submit…. BMC Medicine, 13, 180. doi: 10.1186/s12916-015-0423-3.CrossRefGoogle Scholar
  17. Mooloo, D., & Fowdur, T. (2013). An SSL-based client-oriented anti-spoofing email application. Paper presented at the AFRICON, 2013.Google Scholar
  18. Nahai, F. (2015). The rise of predatory journals: What difference does it make? Aesthetic Surgery Journal, 35(8), 1042–1043. doi: 10.1093/asj/sjv085.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2017

Authors and Affiliations

  • Mehdi Dadkhah
    • 1
  • Mohammad Lagzian
    • 1
  • Glenn Borchardt
    • 2
  1. 1.Department of management, Faculty of Economics and Administrative SciencesFerdowsi University of MashhadMashhadIran
  2. 2.Progressive Science InstituteBerkeleyUSA

Personalised recommendations