Skip to main content

Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics

This is a preview of subscription content, access via your institution.


  1. 1.

    Bohannon J. Who’s afraid of peer review? Science. 2013;342:60–5.

    CAS  Article  PubMed  Google Scholar 

  2. 2.

    Lukić T, Blešić I, Basarin B, Ivanović Bibić L, Milošević D, Sakulski D. Predatory and fake scientific journals/publishers: a global outbreak with rising trend—a review. Geogr Pannonica. 2014;18:69–81.

    Google Scholar 

  3. 3.

    Byard RW. The forensic implications of predatory publishing. Forensic Sci Med Pathol. 2016. doi:10.1007/s12024-016-9771-3.

    Google Scholar 

  4. 4.

    Ferguson C, Marcus A, Oransky I. Publishing: the peer-review scam. Nature. 2014;515:480–2.

    CAS  Article  PubMed  Google Scholar 

  5. 5.

    Retraction Watch. 2015. Accessed 12 May 2016.

  6. 6.

    Retraction Watch. 2015. Accessed 12 May 2016.

  7. 7.

    Teixeira da Silva JA, Dobránszki J. Problems with traditional science publishing and finding a wider niche for post-publication peer review. Account Res. 2015;22:22–40.

    Article  PubMed  Google Scholar 

  8. 8.

    Teixeira da Silva JA. Archives of Biological Sciences: from falling star to glimmer of hope. 2015; self-publ:1-8. Accessed 12 May 2016.

  9. 9.

    Dadkhah M, Alharbi AM, Al-Khresheh MH, Sutikno T, Maliszewski T, Jazil MD, Shamshirband S. Affiliation oriented journals: don’t worry about peer review if you have good affiliation. Int J Elect Comput Eng. 2015;5:621–5.

    Google Scholar 

  10. 10.

    Teixeira da Silva JA, Dobránszki J. Multiple authorship in scientific manuscripts: ethical challenges, ghost and guest/gift authorship, and the cultural/disciplinary perspective. Sci Eng Ethics. 2015. doi:10.1007/s11948-015-9716-3.

    PubMed  Google Scholar 

  11. 11.

    Bowman JD. Predatory publishing, questionable peer review, and fraudulent conferences. Am J Pharm Educ. 2014;78:176.

    Article  PubMed  PubMed Central  Google Scholar 

  12. 12.

    Jalalian M, Mahboobi H. New corruption detected: bogus impact factors compiled by fake organizations. Electron Phys. 2013;5:685–6.

    Google Scholar 

  13. 13.

    Teixeira da Silva JA. Debunking post-publication peer review. Int J Educ Inf Technol. 2015;1:34–7.

    Google Scholar 

  14. 14.

    McCook A. Can journals get hijacked? Apparently, yes. 2015. Accessed 12 May 2016.

  15. 15.

    Dadkhah M, Maliszewski T. Hijacked journals—threats and challenges to countries’ scientific ranking. Int J Technol Enhanc Learn. 2015;7:281–8.

    Article  Google Scholar 

  16. 16.

    Dadkhah M, Obeidat MM, Jazi MD, Sutikno T, Riyadi MA. How can we identify hijacked journals? Bull Electr Eng Inf. 2015;4:83–7.

    Google Scholar 

  17. 17.

    Dadkhah M, Sutikno T, Jazi MD, Stiawan D. An introduction to journal phishings and their detection approach. Telkomnika. 2015;13:373–80.

    Article  Google Scholar 

  18. 18.

    Dadkhah M, Maliszewski T, Lyashenko VV. An approach for preventing the indexing of hijacked journal articles in scientific databases. Behav Inf Technol. 2016. doi:10.1080/0144929X.2015.1128975.

    Google Scholar 

  19. 19.

    Dadkhah M, Bianciardi G. Ranking predatory journals: solve the problem instead of removing it! Adv Pharm Bull. 2016;6:1–4.

    Article  PubMed  PubMed Central  Google Scholar 

  20. 20.

    Dadkhah M, Elias N, Jazi MD, Christova-Bagdassarian V, Abu-Elteen KH. A new challenge in the academic world: earning real money and eminence by paper publishing. Jordan J Biol Sci. 2015;8:73–5.

    Google Scholar 

  21. 21.

    Dadkhah M, Tarhini A, Lyashenko VV, Jazi MD. Hiring editorial member for receiving papers from authors. Mediterr J Soc Sci. 2015;6:11–2.

    Google Scholar 

  22. 22.

    Dadkhah M. Predatory journals/publishers are not sole questionable matter in open access scholarly publishing, they are part of problem. BMJ. 2015;350:h2470.

    Article  Google Scholar 

  23. 23.

    Jalalian M, Dadkhah M. The full story of 90 hijacked journals from August 2011 to June 2015. Geogr Pannonica. 2015;19:73–87.

    Google Scholar 

  24. 24.

    Teixeira da Silva JA, Dobránszki J. Potential dangers with open access files in the expanding open data movement. Publ Res Q. 2015;31:298–305.

    Article  Google Scholar 

Download references


The authors thank Prof. Marwan M. Obeidat (Department of English Language and Literature, Hashemite University, Jordan), Valentina Christova-Bagdassarian (National Center of Public Health and Analyses, Sofia, Bulgaria), and Claudia Stefanutti (Lipid Clinic and Atherosclerosis Prevention Centre, Immunohematology and Transfusion Medicine, “Umberto I” Hospital, Department of Molecular Medicine, “Sapienza” University of Rome, Italy) for limited suggestions on early versions of this manuscript.

Author information



Corresponding author

Correspondence to Mehdi Dadkhah.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Supplementary material 1 (SWF 9591 kb)

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Dadkhah, M., Maliszewski, T. & Teixeira da Silva, J.A. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics. Forensic Sci Med Pathol 12, 353–362 (2016).

Download citation


  • Open Access Journal
  • Academic Integrity
  • Scholarly Publishing
  • Page Ranking
  • Reputable Journal