Detecting a network of hijacked journals by its archive

A Abalkina - Scientometrics, 2021 - Springer
This study describes a method for identifying hijacked journal domains based on an analysis
of the archives of clone journals. This method is based on the argument that fraudulent …

False gold: Safely navigating open access publishing to avoid predatory publishers and journals

TV McCann, M Polacsek - Journal of advanced nursing, 2018 - Wiley Online Library
Aim The aim of this study was to review and discuss predatory open access publishing in the
context of nursing and midwifery and develop a set of guidelines that serve as a framework …

The rise of predatory publishing: How to avoid being scammed

SM Ward - Weed science, 2016 - cambridge.org
The rise of on-line open access (OA) has profound implications for academic publishing, not
least the shift from subscribers to authors as the primary transactional partners for peer …

The evolution of cybercrime, 2006–2016

P Grabosky - Cybercrime through an interdisciplinary lens, 2016 - taylorfrancis.com
Introduction Moore's law holds that the capacity of computers will double every two years.
One hardly needs to be reminded that developments occur rapidly in the digital age. While …

EĞİTİMDE BİLİMSEL YAYIN ETİĞİNE BÜYÜYEN TEHDİT: SAHTE DERGİLER VE KONGRELER

RS Cetinkaya - Mehmet Akif Ersoy Üniversitesi Eğitim Fakültesi …, 2019 - dergipark.org.tr
Bu derleme makalenin amacı, dünyada ve Türkiye'de bilimsel yayın etiğindebüyüyen bir
tehlike olan sahte dergiler ve kongreler konusunda eğitimalanındaki araştırmacıları …

Academic journals' usernames and the threat of fraudulent accounts on social media

A Coates - Learned Publishing, 2022 - Wiley Online Library
The internet has brought both benefits and risks for academia. Predatory publishing and
conferences are well‐known, and less common academic cybercrime has also been …

A content-based phishing email detection method

H Che, Q Liu, L Zou, H Yang, D Zhou… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Phishing emails have affected users seriously due to the enormous increasing in numbers
and exquisite camouflage. Users spend much more effort on distinguishing the email …

Jourchain: using blockchain to avoid questionable journals

M Dadkhah, F Rahimnia, S Rafati Niya… - Irish Journal of Medical …, 2022 - Springer
Scholarly publishing currently is faced by an upsurge in low-quality, questionable
“predatory/hijacked” journals published by those whose only goal is profit. Although there …

Scholarly black market

S Sorooshian - Science and engineering ethics, 2017 - Springer
Fake and unethical publishers' activities are known by most of the readers of Science and
Engineering Ethics. This letter tries to draw the readers' attention to the hidden side of some …

Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys

K Pavani, P Sriramya - AIP Conference Proceedings, 2024 - pubs.aip.org
The primary goal of this study is to provide hashed private keys of big size and
authentication mechanisms in order to increase security and decrease the time complexity of …