Detecting Hijacked Journals by Using Classification Algorithms
Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for detecting hijacked journals by using a classification algorithm. The number of published articles exposing hijacked journals is limited and most of them use simple techniques that are limited to specific journals. Hence we needed to amass Internet addresses and pertinent data for analyzing this type of attack. We inspected the websites of 104 scientific journals by using a classification algorithm that used criteria common to reputable journals. We then prepared a decision tree that we used to test five journals we knew were authentic and five we knew were hijacked.
KeywordsHijacked journals Internet fraud Academic ethics Editorial process Spam emails
Compliance with Ethical Standards
Conflict of interest
The authors have no conflicts of interest to declare.
- Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques. Amsterdam: Elsevier.Google Scholar
- Jalalian, M., & Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica, 19(2), 73–87.Google Scholar
- Lukić, T., Blešić, I., Basarin, B., Ivanović, B., Milošević, D., & Sakulski, D. (2014). Predatory and fake scientific journals/publishers—A global outbreak with rising trend: A review. Geographica Pannonica, 18(3), 69–81.Google Scholar