ArticlePDF Available

The full story of 90 hijacked journals from August 2011 to June 2015

Authors:

Abstract and Figures

During recent years, the academic world has suffered a lot from the threats of hijacked journals and fake publishers that have called into question the validity and reliability of scientific publications. The purpose of this paper is to tell the in-depth story of hijacked journals. This paper addresses the hijackers themselves, the methods they use to find their victims in the academic world, the methods they use to collect money from unsuspecting researchers by charging them to publish in hijacked journals, how they hide their identities, and how the academic world can best protect itself from these cyber-criminals. Without identifying specific journal hijackers, we tell the story of how an assistant professor of computer and information science from Saudi Arabia (who holds a Ph.D. from a Malaysian university) and his team of Word Press experts from Pakistan hijacked at least six journals including journal of technology, BRI's Journal of Advances in Science and Technology, Magnt Research Report, Scientific Khyber, Saussurea, and created one of the four fake websites for Texas Journal of Science. We also tell the story of how some conferences are integrated with hijacked journals, and how a cybercrimi-nal with a fake address in United Arab Emirates used the pseudonym " James Robinson " to mass hijack more than 20 academic journals (Journal of Balkan Tribological Association, Scientia Guaianae, Journal of American Medical Association, Cadmo, Entomon, Italianistica, Revue scientifique et technique, Kar-diologiya, Agrochimica, Terapevticheskii Arkhiv, Ama, Tekstil, Fauna Rossii I Sopredel Nykh Stran, Azari-ana, PSR health research bulletin, etc.). We also address the European cybercriminal with pseudonym " Ruslan Boranbaev " who hijacked the Archives des Sciences in October 2011 and created the " Science record journals " (to host three hijacked journals Including " Science series data report " , Innovaciencia, and " Science and nature " ; and seven fake journals) for the first time in the academic world in August 2011. We tell how Ruslan Boranbaev designed a systematic approach to mass hijack more than 25sci-entific journals, including Bothalia, Jokull, Cienia e tecnica, Wulfenia, Doriana, Revista Kasmera, Mit-teilungen Klosterneuburg, Sylwan, HFSP journal, Natura, and Cahiers des Sciences Naturelles. We also tell the story how this genius cybercriminal, whom we could call the king of hijacked journals, created a fake " web of sciences " portal in 2015 on a dedicated server in France to launch an automated spam broadcasting machine of calls for papers for his hijacked journals. We also present how the Ruslan Bo-ranbaev created numerous online payment portals for collecting the publication charges of hijacked journals, and cheated the Thomson Reuters to provide hyperlinks to the fake website of three hijacked journals in his masterpiece " revistas-academicas.com ". We also tell the story of how someone adopted the Ruslan Boranbaev approach to cheat the Thomson Reuters to create hyperlinks from master journal list of Thomson Reuters to two of his hijacked journals (GMP review: http://www.euromed.uk.com, Allgemeine Forst und Jagdzeitung: http://www.sauerlander-verlag.com). Finally, we present the most comprehensive list of hijacked journals available, including all of those that we have detected from August 11, 2011 to June 15, 2015. The full story of 90 hijacked journals from August 11, 2011 to June 15, 2015.
Content may be subject to copyright.
73Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Mehrdad JalalianA, Mehdi DadkhahB
Received: May 22, 2015 | Revised: June 16, 2015 | Accepted: June 22, 2015
The full story of  hijacked journals
from August  to June 
A Editor in-Chief, Electronic Physician, Mashhad, Iran
B Young Researchers and Elite Club, Tiran Branch, Islamic Azad University, Tiran, Iran
* Corresponding Author: Mehrdad Jalalian, e-mail: mehrdad.medic@gmail.com
ISSN 0354-8724 (hard copy) | ISSN 1820-7138 (online)
Abstract
During recent years, the academic world has suffered a lot from the threats of hijacked journals and
fake publishers that have called into question the validity and reliability of scientific publications. The
purpose of this paper is to tell the in-depth story of hijacked journals. This paper addresses the hijack-
ers themselves, the methods they use to find their victims in the academic world, the methods they
use to collect money from unsuspecting researchers by charging them to publish in hijacked journals,
how they hide their identities, and how the academic world can best protect itself from these cyber-
criminals. Without identifying specific journal hijackers, we tell the story of how an assistant profes-
sor of computer and information science from Saudi Arabia (who holds a Ph.D. from a Malaysian uni-
versity) and his team of Word Press experts from Pakistan hijacked at least six journals including journal
of technology, BRI’s Journal of Advances in Science and Technology, Magnt Research Report, Scientif-
ic Khyber, Saussurea, and created one of the four fake websites for Texas Journal of Science. We also
tell the story of how some conferences are integrated with hijacked journals, and how a cybercrimi-
nal with a fake address in United Arab Emirates used the pseudonym “James Robinson” to mass hijack
more than  academic journals (Journal of Balkan Tribological Association, Scientia Guaianae, Journal
of American Medical Association, Cadmo, Entomon, Italianistica, Revue scientifique et technique, Kar-
diologiya, Agrochimica, Terapevticheskii Arkhiv, Ama, Tekstil, Fauna Rossii I Sopredel Nykh Stran, Azari-
ana, PSR health research bulletin, etc.). We also address the European cybercriminal with pseudonym
“Ruslan Boranbaev” who hijacked the Archives des Sciences in October  and created the “Science
record journals” (to host three hijacked journals Including “Science series data report”, Innovaciencia,
and “Science and nature”; and seven fake journals) for the first time in the academic world in August
. We tell how Ruslan Boranbaev designed a systematic approach to mass hijack more than sci-
entific journals, including Bothalia, Jokull, Cienia e tecnica, Wulfenia, Doriana, Revista Kasmera, Mit-
teilungen Klosterneuburg, Sylwan, HFSP journal, Natura, and Cahiers des Sciences Naturelles. We also
tell the story how this genius cybercriminal, whom we could call the king of hijacked journals, creat-
ed a fake “web of sciences” portal in  on a dedicated server in France to launch an automated spam
broadcasting machine of calls for papers for his hijacked journals. We also present how the Ruslan Bo-
ranbaev created numerous online payment portals for collecting the publication charges of hijacked
journals, and cheated the Thomson Reuters to provide hyperlinks to the fake website of three hijacked
journals in his masterpiece “revistas-academicas.com”. We also tell the story of how someone adopted
the Ruslan Boranbaev approach to cheat the Thomson Reuters to create hyperlinks from master jour-
nal list of Thomson Reuters to two of his hijacked journals (GMP review: http://www.euromed.uk.com,
Allgemeine Forst und Jagdzeitung: http://www.sauerlander-verlag.com). Finally, we present the most
comprehensive list of hijacked journals available, including all of those that we have detected from Au-
gust ,  to June , .
The full story of 90 hijacked journals
from August 2011 to June 2015
74 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Background
e current atmosphere in academia demands profes-
sors, lecturers, postgraduate students, and researchers
publish as many journal papers as possible (Jalalian,
Mahboobi, 2014; Jalalian, 2014a). Some of the policy-
makers in various academic areas consider research
ndings to be of value only if they are published in an
internationally indexed journal. Starting on August 11,
2011, the online hackers and cybercriminals opened a
new line in their business, i.e., building fake websites
that mimic reputable journals that are mostly indexed
by Web of Science (WOS), a omson Reuters product,
and that have their Impact Factor calculated by Journal
Citation Reports (JCR) (Jalalian, Mahboobi, 2014). In
early 2012, Mehrdad Jalalian, detected this systematic
academic misconduct and unocially introduced the
term “hijacked journal” to the academic world (Jala-
lian, Mahboobi, 2014; Jalalian, 2014a). During the re-
cent years, journal hijackers have created numerous
counterfeit websites for other scientic journals, most-
ly the print-only ones (Jalalian, Mahboobi, 2014). e
cybercriminals broadcast calls-for-paper spams to mil-
lions of email addresses of authors and lecturers (Jala-
lian, Mahboobi, 2014; Jalalian, 2014a). Following the
cybercriminals’ successful marketing of hijacked and
fake journals, they introduced a second product in 2013,
i.e., bogus impact factors and misleading metrics that
were compiled by unknown organizations (Jalalian,
Mahboobi, 2013; Jalalian, 2015a). Also, some of the jour-
nal hijackers targeted scientic conferences and pub-
lished dozens of conference papers in their hijacked
journals for an extra payment by the authors. Irrespec-
tive of their technique of recruiting (i.e., cheating) au-
thors, it is obvious that the articles that are published
in hijacked journals without the benet of peer reviews
will be incorporated in the literature reviews of future
research, and, in this way, the hijacked journals violate
and undermine the validity and reliability of published
research and complicate the open access movement
(Jalalian, 2014a; Jalalian, 2014b). A second signicant
problem is the validity and reliability of the metric val-
ues and other indexing measures developed by scientif-
ic indexing databases, because the people who operate
and maintain these databases do not know how to re-
move citations of articles that are published in hijacked
and fake journals (Jalalian, 2014a). It seems the jour-
nal hijackers have attacked the reputation and money
of researchers and also the reliability of research nd-
ings and metric measures in legitimate networks, such
as Web of Science (WOS), Scopus, Google Scholar Ci-
tation, and Index Copernicus (Jalalian, 2014a; Jalalian,
2015a).
We should mention that, in this paper, we have re-
moved the sensitive information related to the cyber-
criminals, such as their real names, their real email
addresses, and any other information that could be
used to identify them, as it was not the purpose of this
research to identify the journal hijackers. roughout
this paper, we used the word “[redacted]” to avoid pre-
senting any sensitive information. However, most of
the technical information we presented in this article
are available from “whois” information of the regis-
tered websites, and are available for public.
History of hijacked journals
On August 11, 2011, a cybercriminal registered the ex-
pired domain “sciencerecord.com” to misuse it as a
place for a mixed project of three hijacked journals
and seven fake journals, including hijacked journals:
Science Series data report, Innova Ciencia, and “Sci-
ence and nature”, and fake journals: America scientist,
International research journal of humanities, Inter-
national research journal of engineering and tech-
nologies, International journal of medical discovery,
International journal of professional artist, Pioneer
architects &urban designers, and International re-
search journal of basic and applied sciences. However,
he launched those hijacked and fake journals in Jan-
uary 2012, aer his other work “Archives des scienc-
es” that was online in 2011.We should say that a fake
journal is dierent from a hijacked journal in that it
has never been registered by a person or organization.
In the case of those seven fake journals under the cat-
egory of science record journals, all of them had fake
ISSN numbers that never have been assigned to any
journal by ISSN organization.
On October 23, 2011, the same person who had reg-
istered the expired domain for science record journals,
registered the domain “sciencesarchive.com,” which
he intended to be mistaken for the authentic web-
site for a Swiss journal entitled “Archives des Scienc-
es” (Jalalian, Mahboobi, 2014; Jalalian, 2014a). During
2012 and 2013, other journals have been hijacked, but
they numbered to a few cases such as Tekstil, Pensee,
Jokull, and Revistas Academicas journals.
In early 2014, a cybercriminal using the pseudonym
“James Robinson” and a fake address in Dubai, Unit-
ed Arab Emirates, brought a new phenomenon to the
world of academic publishing, i.e., “Mass journal hi-
jacking”. He created fake websites for too many aca-
demic journals, including the “Journal of the Ameri-
can Medical Association” (one of the world’s leading
journals in publishing high-quality medical research),
the Journal of the Balkan Tribological Association, Sci-
entia Guaianae, Cadmo, Entomon, Revue Scientique
et Technique, Agrochimica, Terapevticheskii Arkh-
iv, Ama: Agricultural Mechanization in Asia, Africa
& Latin America, Fauna Rossii I Sopredel Nykh Stran,
Kardiologiya, PSR health research bulletin, Teoriiai
Mehrdad Jalalian,
Mehdi Dadkhah
75Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Praktika Fizicheskoi Kul’tury, Azariana, Italianistica:
Rivista di Letteratura Italiana, etc. We have some infor-
mation that support the James Robinson is also behind
of the hijacked journal “Epistemology” the Tomas Pub
journals (Tomas Publishing), and other journals; how-
ever, we need more supportive information. Regard-
ing the “Tomas Publishing”, it was a full fake publisher
with the same strategy and concept that we have seen
behind two other fake publishers (Revistas Academi-
cas, and Science Record Journals). e full scale fake
publisher Tomas Publishing was a fake brand and place
for hijacking six scientic journals including Der Prä-
parator (Praparator), Education, Systems Science, Polit-
ica Economica (Journal of economic policy), Philippine
scientist, and Chemical modelling. We assume that the
Tomas Publishing was the rst job of the mass journal
hijacker “James Robinson”.
Another cyber criminal who used the pseudonym
“Ruslan Boranbaev”, is the person who hijacked the
rst academic journal (Archives des Science) in Oc-
tober 2011, and registered the rst domain for ten hi-
jacked and fake journals under the title of “Science re-
cord journals” on August 11, 2011. Later, he designed a
systematic plan for hijacking too many journals and
hiding his identity. He also used the fake copyright
of “Academic Information Press” under each of the
science record journals, and under hijacked journal
“Pensee” later, but never used that fake copyright un-
der his other works.
Among the science record journals, the “Science
Series Data Report” had an irregular ISSN and was
the former title for “Fisheries research data report”
(ISSN: 0264-5130), but its information was availa-
ble on the master journal list of omson Reuters to-
gether with the second journal, Innova Ciencia. e
science record journals had a stormy presence in the
academic world till September 2013; we guess those
journals might stole hundreds of articles from schol-
ars around the world. We should note that the cyber-
criminal behind the science record journals used the
manuscript templates of the “Canadian Center of Sci-
ence and Education (CCSE)” and owned a laptop with
brand “Sony”. Indeed, he is not only the man who hi-
jacked the rst academic journals in the world (in-
cluding Archives des science, Wulfenia, and science
record journals), but also he has been behind of about
25 hijacked journals. Science record journals, Ar-
chives des sciences, wulfenia, and Pensee were the
rst and beginner jobs by the Ruslan Boranbaev and
he le them all; however, he learned from his weak-
nesses and mistakes and later, in his second perfor-
mance he used very expert and systematic approach
to hijack too many other academic journals including
Sylwan, Ciência e TécnicaVitivinícola, Revista Kas-
mera, Doriana, Natura, and others.
Another sad story that began in July 2014 was the
story of an Assistant Professor of computer science and
information systems from Saudi Arabia, along with his
team members from Pakistan, who created fake web-
sites for at least six journals including Journal of tech-
nology, BRI’s Journal of Advances in Science and Tech-
nology, Magnt Research Report, Scientic Khyber,
Saussurea: Journal de la Société botanique de Genève,
and one of the four fake websites for Texas Journal of
Science. We know that he is originally from Pakistan,
his ocial and routine email address is [redacted], he
holds a Ph.D. degree from university [redacted] in Ma-
laysia, and he owned a laptop with brand “HP” during
2013-2015.anks to his excellent contribution to the
quality of the scientic publications, he was promot-
ed to a managerial position in the university [redacted]
in Saudi Arabia. e question is that what he is really
teaching to his postgraduate students!
During January-June 2014 (and later in 2015), some
the journal hijackers tried to convince authors of con-
ferences papers to publish the full text of their papers
in hijacked journals as a “value-added service” if they
would pay a publication fee of a few hundred Euros
(over and above the conference fees) (Jalalian, Mah-
boobi, 2014; Jalalian, 2014a). is deceptive approach
is known to have occurred at an inactive monograph
entitled “Reef Resources Assessment and Manage-
ment Technical Paper”, a De Gruyter journal entitled
“Chemical and Process Engineering” that is a quarter-
ly scientic journal with a 50-year tradition in Poland,
“Fourrages”, “Allgemeine Forst und Jagdzeitung”, and
“Revue Internationale de Psychologie Sociale”.
Finally, the most recent and notable project in
the history of hijacked journals is that in early 2015,
Ruslan Boranbaev designed an automated call for pa-
per spam system under the title of “Web of Sciences”.
Also, his latest work was hijacking the journal HFSP
in May 2015, a few days before we write this paper.
Literature review
We searched the literature and contacted the people
who maintain some of the hijacked journal lists on
their personal weblogs and asked them if they have
published journal papers on the topic of hijacked jour-
nals. Since very few journal papers have addressed the
issue of hijacked journals, we present the list of all
such papers in chronological order. Aer unocial-
ly reporting the rst cases of journal hijacking in 2012,
a 2013 research reported another academic scam: Fake
impact factors (Jalalian, Mahboobi, 2013). e authors
addressed the progressive threat of hijacked journals,
fake publishers, fake impact factor companies, and
misleading metrics in a short paper entitled “New
corruption detected: Bogus impact factors compiled
The full story of 90 hijacked journals
from August 2011 to June 2015
76 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
by fake organizations” (Jalalian, Mahboobi, 2013). In
February 2014, an Iranian journalist published an ar-
ticle entitled “Hijacked Journals and Predatory Pub-
lishers: Is ere a Need to Re-ink How to Assess
the Quality of Academic Research?” (Jalalian, Mah-
boobi, 2014). at article was the rst comprehensive
academic document on hijacked journals, and it list-
ed some of the techniques the journal hijackers use
to create fake websites mimicking real journals, to
broadcast call-for-paper spams, and to hide their iden-
tities. e article also suggested some ways to detect
and avoid hijacked journals; however, the new genera-
tion of journal hijackers is more expert than ever, and
they are using new methods to hijack journals, collect
publication charges, and hide their identities.
Later, in June 2014, a report entitled “Hijacked Jour-
nal List 2014” listed 19 hijacked journals and fake pub-
lishers. At that time, this was the most comprehensive
list of hijacked journals available. However, just one
year later, the number of hijacked journals is in the
dozens. In August 2014, “Research Information” (Cam-
bridge) published an interview with Mehrdad Jalalian
and a paper entitled “Journal hijackers target science
and open access” (Jalalian, 2014a). e author answered
four main questions on hijacked journals, i.e., “1) How
do hijacked journals occur? 2) What problems do they
cause? 3) How can you identify hijacked journals? and
4) What can authors, readers, publishers, and others do
about hijacked journals?” (Jalalian, 2014a).
In 2014, Serbian scholars Lukić et al. in their article
“Predatory and Fake Scientic Journals/Publishers – A
Global Outbreak with Rising Trend: A Review” dis-
cussed the problem caused by questionable journals
and hijacked journals (Lukić, et al., 2014). In Novem-
ber 2014, Mehrdad Jalalian published a short article
entitled “Hijacked journals are attacking the relia-
bility and validity of medical research” and reported
seven cases in which medical journals had been hi-
jacked and warned the legitimate scientic communi-
ty about the destructive eect of hijacked journals on
the validity and reliability of medical research (Jala-
lian, 2014b). In December 2014, Mehdi Dadkhah and
Aida Quliyeva wrote a short paper entitled “Social en-
gineering in academic world” and stated that forg-
ers use current practices of social engineering to trick
their victims (Dadkhah, Quliyeva, 2014). ey also re-
ported some cases of social engineering attacks in the
academic world. In March 2015, Mehdi Dadkhah and
colleagues discussed a new problem, “the fake con-
ferences” in their article entitled “Fake Conferenc-
es for Earning Real Money” (Dadkhah, et al., 2015a).
According to the authors, setting up fake conferences
has become an eective way of getting researchers’ ar-
ticles and publishing them in hijacked journals (Dad-
khah, et al., 2015a). In May 2015, Mehdi Dadkhah and
Mohammad Davarpanah Jazi published a letter to the
editor entitled “Anare Research Notes Journal Is Hi-
jacked” in the International Journal of Pharmacy and
Pharmaceutical Sciences (Dadkhah, Jazi, 2015a).
“How Can We Identify Hijacked Journals?” is the
title of another paper by Mehdi Dadkhah and col-
leagues in June 2015 that says most of the victims of
hijacked journals to date were from developing coun-
tries (Dadkhah, et al., 2015b). ey also mentioned
that the titles of many of hijacked journals did not ex-
press a particular subject area, and that helped the
hijackers publish articles in all areas of science. “An
Introduction to Journal Phishings and eir Detec-
tion Approach” is the title of technical paper by Me-
hdi Dadkhah and colleagues published in June 2015
(Dadkhah, et al., 2015c). In this paper, hijacked jour-
nals have been introduced as a new type of phishing
attacks because of the great use of techniques relat-
ed to such attacks. Another article (in press) by the
same authors, entitled “Hiring an Editorial Member
for Receiving Papers from Authors” addressed a new
technique by journal hijackers, i.e., “call for editor” in
hijacked journals (Dadkhah, Jazi, 2015b). ey stat-
ed that some of the journal hijackers were “pretend-
ing their fake website belongs to a real and prestig-
ious journal” and began to accept new editorial board
members by sending multiple calls for editorials to
respected and famous academic people, adding their
names to their editorial boards, and misusing those
names and the people’s reputations to engender trust
in other researchers and potential authors.
In June 2015, Mehrdad Jalalian published a rapid
communication entitled “e story of fake impact fac-
tor companies and how we detected them” (Jalalian,
2015a). In that article, he presented the story of some
of the main bogus impact factors including Universal
Impact Factor (UIF), Global Impact Factor (GIF), Cit-
efactor, and even a fake omson Reuters Company
(http://www.isi-thomsonreuters.com), that are most-
ly originated from the South Asian country [redacted].
Finally, “A second chance for authors of hijacked jour-
nals to publish in legitimate journals” is the title of
the most recent article about hijacked journals in June
2015 (Jalalian, 2015b). at article discusses the log-
ics behind allowing the victims of hijacked journals
to publish their article somewhere else, but in a real
journal without being concerned of duplicate publica-
tion (Jalalian, 2015b).
The journal hijackers; who are they?
Indeed, investigating the identity of journal hijackers
was not the purpose of our scientic research on hi-
jacked journals. However, we used the technical infor-
mation of any registered domain of hijacked journals
Mehrdad Jalalian,
Mehdi Dadkhah
77Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
that is publicly available in their “whois” section, and
other technical information to nd the similarities
between the dierent hijacked journals and to help us
to decide whether or not a journal has been hijacked.
Some of the journal hijackers have used various tech-
niques and approaches, including marketing, social
engineering, collecting publication fees, hiding their
identities when they register the domain names of the
fake websites, and using the same webhosting com-
panies or servers to host the content of their websites.
Researching every single case of hijacked journals and
putting all of the information together gave us a clear-
er image of the phenomenon of journal hijacking, and
we found that just a few people are behind most of the
dozens of hijacked journals.
As we mentioned earlier in the section on the his-
tory of hijacked journals, three of the persons of in-
terest in the world of journal hijackers are “the man
behind the pseudonym “James Robinson” who uses
a fake address in Dubai, United Arab Emirates, an
East European IT scientist (that we know he is an ex-
pert web designer because of his works) whom we call
“king of hijacked journals” and he uses the pseudo-
nym “Ruslan Boranbaev”, and an Assistant Professor
of the Saudi Arabia university [redacted] and his team
of WordPress experts from Pakistan. e so-called
“James Robinson”, however, is a man who used a sys-
tematic approach to accomplish his criminal goals,
but the design of his hijacked journals show that he
clearly has average or less knowledge of what happens
in the academic world, and his “limited” knowledge
and expertise related to web design and online jour-
nal management systems resulted in his creating low-
quality web pages for the aected journals. In fact, he
used the beginner level of Open Journal Systems (OJS)
soware, a product that was developed by the Pub-
lic Knowledge Project (PKP), a non-prot research in-
itiative. e only notable thing about “James Robin-
son” is that he is the man who mass hijacked too many
journals. He was very careful to hide his identity, but
he forgot to remove his footprints from his work es-
pecially when he used other pseudonyms for register-
ing fake websites, using some random emails in lling
the OJS contents (i.e., in the process of uploading the
stolen articles to the counterfeit websites), and using
the same server for hosting many of his fake websites.
e third person of interest in the world of jour-
nal hijackers, “Ruslan Boranbaev”, deserves to wear
the crown as the “king of the cybercriminals who
have hijacked journals”. As we stated earlier, he is the
man who registered the domain “sciencesarchive.com”
on October 23, 2011,to hijack the Swiss journal “Ar-
chives des Science” the rst time such a foul act had
been committed in the history of academic world. He
also hijacked the journal “Wulfenia”, and created the
mixed hijacked-fake publisher “Science record jour-
nals” in August 2011 to host three hijacked journals
and seven fake journals. Later, he created fake web-
sites for many other journals, such as Pensee, Bothal-
ia, Jokull, Ciência e Técnica Vitivinícola, Doriana, Re-
vista Kasmera, Mitteilungen Klosterneuburg, Sylwan,
HFSP journal (his May 2015’s product), Cahiers des
Sciences Naturelles, and Natura.
Among all of the journal hijackers, the king of hi-
jacked journals is special for some not-so-special rea-
sons. First, he has hijacked almost as many journals
as “James Robinson”. Second, he did so using sever-
al techniques that are his hallmarks. ose hallmarks
have given us a clear understanding of what he has
done in the criminal eld of hijacking journals and
how he went about his dishonest and unscrupulous
work. One of his main hallmarks, which later were
used by “James Robinson”, the Saudi Arabia professor,
and others, is that he used services that hide the iden-
tity of the person who registered the domain name.
We know that he is also a reseller of the domain reg-
istration company [redacted], an ICANN accredited
registrar and a trusted name in the world of informa-
tion technology since 2001. He also uses the service of
“Whoisguard” to hide his identity but we can easily see
his footprints on his earliest hijacking jobs (Archives
des Sciences and Wulfenia).
Another notable nding in the journals hijacked
by “Ruslan Boranbaev” is that he designed sever-
al payment portals (such as leadingpublishersportal.
com, novelscienticnding.com, and taylorspublica-
tions.com) to collect money from authors and read-
ers (publication charges and subscription fees). Using
the online payment portals, he is paid by credit cards,
and he never discloses any personal information that
would be required for direct wire transfer to his bank
account. However, he collected publication fees for
his beginner journal-hijacking jobs (Archives des Sci-
ences and Wulfenia) using a bank account in Arme-
nia. Another main feature of the journals hijacked by
“Ruslan Boranbaev” is that he did not simply use email
soware, such as Microso Outlook; rather, he used
an online service that is used mainly for automated
broadcasting of mass emails and spam to make sure
the IP number of the servers of his hijacked journals
would not be blocked in the Internet for broadcast-
ing spam. Also, as another layer of security, “the geni-
us journal hijacker” uses dedicated servers to host his
fake websites. Nowadays, he also uses the [redacted]
service as another layer of security.
“Ruslan Boranbaev” has launched another brilliant
service in his factory of mass journal hijacking, i.e.,
“Web of Sciences!” Yes, this is exactly the title of the new
service provided to the world of journal hijackers in
2015 by the so-called “king of hijacked journals”. By reg-
The full story of 90 hijacked journals
from August 2011 to June 2015
78 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
istering the domain “webofsciences.com” and hosting
it on a dedicated server in France, while using a mail-
ing list research facility in England, he has introduced
an automated system for collecting the email addresses
of academic people around the world! eir names are
related to specic keywords, and he can automatically
send call-for-paper spams to them. By adding this ser-
vice to his work, he is using a method that none of the
real academic publishers has used to date, which indi-
cates that he is using scientic methods and a system-
atic approach to do his dishonest work. e novel ideas
of “Ruslan Boranbaev” are not limited to what we have
presented so far; his masterpiece is creating a fake pub-
lisher entitled “Revistas Academicas”, when he added
four international journals, including Natura and Do-
riana, under the title of Revistas Academicas and cheat-
ed the omson Reuters and convinced them to cre-
ate hyperlinks from the master journal list of omson
Reuters to the counterfeit website “revistas-academicas.
com”. Later, Mehrdad Jalalian called omson Reuters
and informed them about the hyperlinks to hijacked
journals from their database, and they removed the hy-
perlinks.
Interesting cases of hijacked journals
is section presents the latest update of hijacked jour-
nals and consists of all of the hijacked journals we de-
tected till June 15, 2015. Reading the story of some hi-
jacked journals will inform readers about how they
came into existence, how they are managed, and the
approaches they use to cheat and steal money from aca-
demic researchers; we expect that the readers will want
to use this information to avoid such hijacked journals
in the future. Since telling the full story of each of the
dozens of hijacked journals may not be of interest to
the readers and since a journal paper with its word and
page number limitations is not the appropriate place
for it, only the interesting stories that have some educa-
tional value are presented here. Even so, we did list all
of the hijacked journals we detected in Table 1. It is also
important to note that some of the hijacked journals
have more than one fake website address, as evidenced
by what happened to the Texas Journal of Science, Ar-
chives des Sciences, Wulfenia, Anidad, and the Jokull
journal. Also, some of the fake websites for single jour-
nals are registered by the same journal hijacker, and
some of them are registered by dierent individuals.
Cases group 1:
Afinidad journal and its three fake websites
According to the Journal Citation Report (JCR,
omson Reuters), Anidad is a bimonthly journal
published by “Asociacion de Quimicos del Institu-
to Quimico de Sarria” in Barcelona (Spain) that cov-
ers Chemistry science. e Anidad journal has been
hijacked four times using four dierent counterfeit
websites, i.e. “http://www.anidad.org” (registered
in November 2013), “http://www.anidadjournal.es”
(registered in January 2014), “http://www.bdssmg-
dl.org” (registered in January 2014) and “http://www.
anidadjournal.org” (registered in January 2014). e
domain “anidad.org” was registered rst by Francis
B. Anidad in December 2000, using the email ad-
dress [redacted] as the domain registrant. We have
no idea what the purpose and content of this website
were during 2000-2005, but it seems that Mr. Anidad
was a distinguished researcher in a university in the
U.S. It seems he did not used his website for long time
and the website has been oine at least since Febru-
ary 2005. We know that the domain name was for sale
in 2011, and a journal hijacker bought it on November
26, 2013, and hide his identity using the service pro-
vided by [redacted]. According to the who is techni-
cal detail, the hijacked journal on “Anidad.org” used
“ns830.websitewelcome.com” and “ns829. websitewel-
come.com” as the Name Servers. e journal hijack-
er used the Joomla open-source content management
system (CMS) to design the pages of the hijacked jour-
nal. Figure 1 shows the text that was available on the
homepage of the hijacked journal on December 23,
2013. e hijacked journal (the fake website at ani-
dad.org) was active at least until December 2014, but,
currently, it is inactive. It seems that the hijacker stole
both the articles and money of the academic research-
ers and ran away.
e second counterfeit domain for the Anidad
journal was “Anidadjournal.es”. is domain was
registered on January 14, 2014, by a journal hijacker,
using the pseudonym “Jane Madlan” and the email
address [redacted]. We believe that the pseudonym
“Jane Madlan” and its related email address belong to
the mass journal hijacker “James Robinson”, whose
story was presented earlier in this paper. e domain
used the servers named “ns1.md-30.webhostbox.net”
and “ns2.md-30.webhostbox.net” from the time of
registration to the present time. In contrast to “A-
nidad.org,” which used Joomla CMS, the fake website
of “Anidadjournal.es” used the open journal system
(OJS) to manage the content of the website. Again, in
contrast to the rst fake website, the second fake web-
site set the “robot.txt” le on the root or the server to
be inaccessible by any robots that could archive the
content of its pages.
Figure 1 shows that a link to the prole of the real
journal in the master journal list (MJL) of omson
Reuters was available from the homepage of the fake
website to show readers that the journal was listed
with omson Reuters; however, we checked om-
son Reuters, and there was no link to the fake web-
Mehrdad Jalalian,
Mehdi Dadkhah
79Geographica Pannonica • Volume 19, Issue 2, 73-87 ( June 2015)
site in the MJL, but there was a link to the real journal
website at “http://www.aiqs.es.” Our research showed
that the exact Uniform Resource Locator (URL) for
the real journal is “http://www.aiqs.es/catala/anidad.
asp”.We contacted the sta in the editorial oce of
the real journal, and they conrmed that “Anidad-
journal.es” is a fake website, and the contact details of
the journal are “lidia.sirera@iqs.es”andlidia.sirera@
aiqs.es. e current URL for the legitimate journal is
“http://www.raco.cat/index.php/anidad”.
We also found a “hijacker against hijacker” sto-
ry between the two hijackers who created two dier-
ent fake websites for Anidad journal. On January
6, 2015, we received an email from a researcher who
had contacted the “Anidad.org” website and asked
which website was real, “Anidad.org” or “Anidad-
journal.es”. We should mention that we did not edit
the content of the web pages (wherever we present-
ed them in this paper) or their email replies. e hi-
jacker behind the “Anidad.org” responded to the au-
thor as follows: “Respected Author, anks for your
kind message, please note that http://anidadjournal.
es was not journal real website which was a fake. Do
not send papers to that site. Submit your papers di-
rectly to our email ID at anidadjournal@gmail.com,
an k in g Yo u”.
As we mentioned earlier, there are four counter-
feit websites for the Anidad Journal. e third and
fourth counterfeit websites for this journal are “http://
www.anidadjournal.org” and “http:///www.bdssmg-
dl.org”.Both of these domains were registered by the
mass journal hijacker “James Robinson” on January
12, 2014, using the registrant email address [redact-
ed] and the pseudonym “James Robinson” exactly two
days before he registered the second domain “anid-
adjournal.es” for Anidad journal. As we see, this is
the only case in the history of hijacked journals that
three fake websites are created for a single journal
within two days. At the time of registration of third
fake domain, he set the Name Servers of this website
to [redacted] servers, but three days later, he set them
to “ns1.md-30.webhostbox.net, ns2.md-30.webhost-
box.net”, exactly the Name Servers that were used for
the second counterfeit website. He also used the ser-
vice of [redacted] to hide his identity on January 15,
2015. It seems that, aer registering the “.org” domain
for Anidad journal, he thought it would be better to
register the“.es” domain (the domain extension that
is specic to Spain). e obvious intent was to have
the authors think that the “.es” domain for that jour-
nal was the real website of Anidad in case they had
concerns that the “.org” domain was fake. As has been
noted so far in this paper and as we shall continue to
see from here to the end of the paper, the journal hi-
jackers are quite good in their social engineering tech-
niques! Finally, on May 5, 2015, we checked the web-
site of “anidadjournal.org,” and it seemed that the
website currently is being used for testing purposes
for other journals that have been hijacked by “James
Robinson”.
Cases group 2:
Archives des Sciences and Wulfenia
We tell the story of these two hijacked journals togeth-
er because we believe they were hijacked by the same
person. Also, they were the rst journals in the aca-
demic world to be hijacked, together with the three
hijacked journals in the list of science record journals
Figure 1. Homepage content of the hijacked journal Afinidad on ‘Afinidad.org” on December 23, 2013*
* Using the word “Researches” shows the hijacker behind Afinidad is not a native English speaker (In English, the words “research,”
equipment,” and “literature” are considered to be collective nouns, and the plural versions are never used)
The full story of 90 hijacked journals
from August 2011 to June 2015
80 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
(Jalalian, Mahboobi, 2014; Jalalian, 2014a). As we men-
tioned earlier, Archives des Sciences is the rst journal
in the world that cybercriminals hijacked (Although
before registering fake website for it, the same cyber-
criminal had registered the website for science record
journals in August 2011), and the cybercriminal did so
by creating the fake domain “sciencesarchive.com” for
it on October 23, 2011 (Jalalian, Mahboobi, 2014; Jala-
lian, 2014a). e same person created a second fake
website for this journal by registering the domain “ar-
chiveofscience.com” on September 2, 2012; and this
person was the man we called the King of hijacked
journals. In designing the website for this hijacked
journal, his Majesty, the King of hijacked journals,
stole the peer review template form from the Canadi-
an Center of Science and Education (CCSE) (Jalalian,
Mahboobi, 2014), a reputable publisher in Canada. He
also got the idea of 35$ discount for wire transferred
publication fees, from that Canadian publisher, that
seems the website of CCSE was an origin of his copy-
paste jobs in creating and managing the rst hijacked
journals. e rst counterfeit website later was redi-
rected to a second counterfeit website, i.e., “archiveof-
science.com”, just one day aer “Ruslan Boranbaev”
registered the second fake domain for that hijacked
journal. Having hijacked several other journals, e.g.,
Sylwan, Doriana, Nature, Kasmera, and other, the
King failed to maintain his love for his very rst work,
“sciencesarchive.com” and he did not renew that do-
main aer the rst two years. e domain of his rst
hijacked journal was made available for sale in Janu-
ary 2014, shortly aer the redemption period.
e domain “sciencesarchive.com” used the Name
Servers “ns3043.hostgator.com”and “ns3044.hostga-
tor.com” when they were registered, but, later, they
were moved to “ns1.ipage.com” and “ns2.ipage.com,
which were exactly the same servers that were used by
the second fake website, “archiveofscience.com”. On
September 4, 2014, the registrant and administrative
email of the second fake website were changed to sci-
encesarchive@gmail.com, and the name of adminis-
trator of the domain was changed to the pseudonym,
“Ruslan Boranbaev” with a fake address in the Unit-
ed States. at pseudonym also was used to register
a fake website for Wulfenia journal and some of the
online portals for collecting the publication charges
of the hijacked journal “Achieves des Sciences”. e
second domain for the hijacked journal also expired,
and the King never renewed it. All of the articles that
were submitted by authors to both of the fake web-
sites also were gone; however, someone from Israel has
owned the domain of the stolen journal since Decem-
ber 4, 2014.
Regarding the Wulfenia journal, the cybercrim-
inals registered three fake domains, i.e., “wulfenia-
journal.at,” “wulfeniajournal.com,” and “multidis-
ciplinarywulfenia.org” for the journal on August 2,
August 5, and September 13, 2012, respectively. We be-
lieve that two of them, i.e., multidisciplinarywulfenia.
org and wulfeniajournal.at, were hijacked by “Ruslan
Boranbaev,”and the other one, i.e., wulfeniajournal.
com, was registered by “James Robinson” or someone
who uses a similar technical approach. Among the
three fake websites, two of them have gone oine, but
the “multidisciplinarywulfenia.org” website is still
doing its work.
e way the hijacked journals Archives des Science
and Wulfenia collected publication charges from au-
thors is notable. e person of interest used several
types of payment methods by which the authors could
pay the journal hijackers, including wire transfer to
two bank accounts in Armenia, e-currency trans-
fer service “Alertpay”, and online payment by credit
cards through a payment portal (novelscienticnd-
ings.com). It seems that to make sure the identity of
“the genius king” was not discovered, he used a third-
party account number as the operator instead of his
own bank account number. e “Alertpay” money
transfer system also protects the identity of the recipi-
ent. Also, rather than using the online payment portal
of other companies, “Ruslan Boranbaev”, in 2012, cre-
ated his own online payment portal at http://novelsci-
enticndings.com. However, his rst online payment
portal, was gone, and he created other online payment
portals for his other fraudulent sites. He also regis-
tered a second portal on “taylorspublications.com” for
online payments by authors of Archives des Science
and Wulfenia. It seems that hijacking the journals Ar-
chives des Science and Wulfenia, and his work on “sci-
ence record journals” acted as his self-training course
to test and improve his abilities on all aspects of hi-
jacking journals, hiding the identity, stealing articles,
and collecting money without revealing his name.
us, he developed his own style and approach in all
aspects of hijacking journals, and he used his expe-
rience to successfully hijack the journals Sylwan, Re-
vista Kasmera, and Ciência e Técnica Vitivinícola, as
well as his 2013 and 2015 masterpieces:“Revistas Aca-
demicas” and the fake “Web of sciences”.
Cases group 3:
Bothalia, Pensee, Jokull, Ciência e Técnica
Vitivinícola, Doriana, Kasmera, Mitteilungen
Klosterneuburg, Sylwan, HFSP journal, Cahiers
des Sciences Naturelles, and Natura
e rst hijacked journal among these cases was “Pen-
see”. e acceptance letters and the technical detail of
the domains under this category are essentially the
same, and all of them used the same online payment
portals to collect the publication charges. None of
Mehrdad Jalalian,
Mehdi Dadkhah
81Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
these domains accepted money via wire transfer, Pay-
pal, Western Union, or any other method that would
allow the payer to identify the recipient; rather, all
of the domains required that payments be made on-
line using a credit card. e person of interest cre-
ated several online payment portals, including “re-
searchpioneers.com”. “leadingpublishersportal.com”,
“safeareapay.com”, “knowledge-insights.org”, and “re-
searchergate.com” to collect the publication charg-
es of the Revistas Academicas journals, one of the
Jokull hijacked journals(the one that uses the domain
“Jokulljournal.com” rather than the one that uses the
domain “jkljournal.com”), Ciência e TécnicaVitiviní-
cola, and Sylwan. We also found that our King of hi-
jacked journals also created many other websites and
online payment portals to be used for his other busi-
ness, which is fake online shopping centers that pre-
tend to sell herbal medicine, Viagra, and other health-
related products; the customer pays the price, but the
goods never come! Indeed, we have some informa-
tion that supports the people behind academic scam
are also involved in other similar jobs; the owner of
multiple big publishers of tens of questionable jour-
nals in North America is involved in online gambling
and the founder of one of the most famous fake im-
pact factor companies in India seems to be also in-
volved in online escort service using the porno and
escort website of [redacted]. Maybe these pieces of in-
formation can be used in psychological and behavio-
ral analysis of the academic cybercriminals in future
by cyber psychology researchers.
e hijacked journal Sylwan has an interesting sto-
ry. We think that Sylwan was the most active hijacked
journal in 2014. e technical detail we found in hi-
jacked journal Sylwan were the golden keys that gave
us valuable information that showed all of the jour-
nals in this group have been hijacked by the same per-
son (i. e., the same acceptance letters, the same on-
line portals for collecting the publication charges, the
same web design, the same call for paper spams, etc.).
e domain “sylwan.ibles.org” was registered on July
31, 2008, for the rst time, and it became inactive and
expired in 2010.On April 25, 2014,it was registered
again by “Ruslan Boranbaev” to be misused in hijack-
ing of the journal Sylwan. In our investigation of the
web pages of the Sylwan journal, we found a specif-
ic web page at “http://www.sylwan.ibles.org/artykul.
html. e web designer of that website used the term
“artykul.html” instead of “article.html” in that URL.
We considered this information as a key to the con-
rmation of the mother tongue of “Ruslan Boranbaev”
because web designers sometimes use their mother
tongue in choosing lenames.
Among the journals in this category, the South Af-
rican journal “Bothalia” has a unique story. is jour-
nal experienced a double attack by the same hijack-
er who created two fake websites for it, but it seems
(not conrmed yet) the real journal was victorious in
changing the ownership of one of those fake websites
to the real journal. e rst fake domain (Bothalia.
com) was registered by “Ruslan Boranbaev” on July
29, 2013, and he hide his identity as the registrant of
that domain on the same day using the service of
[redacted],however, beginning on August 20, 2014, he
used [redacted] to hide the identity of the owner of
the domain. Later, in December 2014, the journal ad-
min detail changed and the domain was redirected to
the website of the legitimate journal. We did not con-
tact the real journal, but it seems that the South Afri-
can publisher of the journal “Bothalia” was victorious
in defeating the hijackers, or for any other reason, the
fake domain is redirected to the real journal. However,
“Ruslan Boranbaev”, seeking revenge, decided to cre-
ate a second fake domain entitled “bthla-journal.org”
for the aected journal.
Other famous hijacked journals in this category are
“Mitteilungen Klosterneuburg” and “Pensee”; and the
newest one in this category is the HFSP journal that
has been hijacked in May 2015.We think that hijack-
ing of the journal “Pensee” acted as the Renaissance
in the history of hijacked journals as it was the techni-
cal advance from the rst cases of journal hijackings
to the era of modern and scientic approaches in jour-
nal hijacking. Also, the journal “Pensee” provided us
some key information that linked Ruslan Boranbaev
to the “Science record journals”.
Finally, the main notable work among the jour-
nals in this category is “Revistas Academicas”. Aer
his amateur work of gathering three hijacked journals
and seven fake journals under the title of “Science re-
cord journals” in during 2011-2013, Ruslan Boranbaev
registered the domain “revistas-academicas.com” on
October 16, 2012, using a fake address in Dublin, Ire-
land, to launch the most dangerous project to date in
journal hijackings. is website began by hosting four
hijacked journals with the rst three being om-
son Reuter’s indexed journals, i.e., “Natura” from e
Netherlands, “Doriana” from Italy, and “Cahiers des
Sciences Naturelles” from Switzerland. He also add-
ed two completely fake journals to the revistas aca-
demicas: Mexican Journal of International Studies,
and Mexico Journal of Multidisciplinary Sciences.
Having a mixture of hijacked journals and fake jour-
nals under the same title was exactly what he did be-
fore on his ‘Science record journals” in August 2011.
e most notable thing about the “Revistas academi-
cas” is that “the genius king of hijacked journals” con-
vinced omson Reuters to provide a hyperlink from
their master journal list to the fake websites of the rst
three journals (revistas-academicas.com). is made
The full story of 90 hijacked journals
from August 2011 to June 2015
82 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
the authors feel that website was the real website of
those journals, and omson Reuters validated those
websites. We called omson Reuters’ oce and pro-
vided them with proof that “revistas-academicas.com”
is a counterfeit website that was created by journal hi-
jackers. Subsequently, omson Reuters removed the
hyperlinks to the fake website of the journals Doriana,
Natura, and Cahiers des Sciences Naturelles. However,
there is still a big concern about the standard operat-
ing procedures (if there are any) in omson Reuters
when they add the link to a website from their master
journal list. e big question is that how they add hy-
perlinks to fake websites simply aer a journal hijack-
er asks them to do so! We also found that the same
problem happened on the hijacked journal “GMP re-
view” from England, and “Allgemeine Forst und Jag-
dzeitung” from Germany. On May 17, 2015, we con-
tacted the omson Reuters to remove the hyperlink
to the fake website of GMP review (http://www.eu-
romed.uk.com). We should say that both of the Eng-
land and Germany journals are hijacked by the same
person and it seems the journal hijackers learn from
each other.
e King also upgraded the equipment of his jour-
nal hijacking factory by creating another portal that
uses technical research on the Internet to acquire the
email addresses of academic people around the world
by misusing the name of the University of [redacted]
in England. An example of the online laboratory for
development of call for papers spam for the hijacked
journal “Revista Kasmera” on the fake ‘web of scienc-
es’ portal was available during May 2015 on the link
http://r.webofsciences.com/2ksmifmu4uesbf.html.
Was it the full story?
Did we miss any interesting case?
We stop telling the stories of the hijacked journals at
this point. ere are still a lot shocking stories about
this phenomenon, including cybercriminals who can
be compared with James Robinson and the Ruslan
Boranbaev, especially those who “intentionally” hi-
jacked some journals to integrate them with specic
conferences, but we prefer to keep silent about those
cases. Telling their stories could uncover the identi-
ty of some famous individuals, including professors
and lecturers, managers of some of the English edit-
ing companies who are actively involved in publishing
the articles of their clients in hijacked journals, some
of the executive directors of international conferenc-
es (who unintentionally integrated their conferences
with some of the hijacked journals and tried to pub-
lish the full text articles of their authors in hijacked
journals), some IT technicians, some postgraduate
students, and some Ph.D. scholars. We prefer to think
about the reasons the academic world is infected by
the virus of hijacked journals and fake publishers
than to waste our time and energy to identify the jour-
nal hijackers or any other cybercriminals by name.
Hijacked journal list 2015
We already have given a lot of thought to hijacked jour-
nals, and the hijacked journal list 2015 (Table 1) is the
second list aer we published the rst list of hijacked
journals in June 2014. Other lists of hijacked journals
have been developed and is being maintained by tens
of other scholars in their weblogs. However, we believe
that publishing a list of hijacked journals and also a
list of questionable journals is just a short-term med-
icine for the progressive threat to the validity and re-
liability of published science. We believe that the new
hijacked journals will publish tens or hundreds of ar-
ticles before they are detected and added to any list of
hijacked journals. e same story is true for the ques-
tionable journals. e great man of the history of lit-
erature, the Iranian ancient poet “Ferdowsi” criticizes
using antidotes aer death in his epic poem and story
“Rostam and Sohrab” by saying that it is “too late for
herbicide”. erefore, we believe it is better to vacci-
nate the academic world against the poisonous eects
of both the hijacked and questionable journals before
it is too late. We specically mean that developing a
list of “GOOD JOURNALS” is a far better and more
eective way to achieve that goal than publishing lists
of “BAD JOURNALS” (at refers to the questiona-
ble journals), “HIJACKED JOURNALS” (that refers
to the legitimate journals that their online identity is
stolen by cybercriminals), and “FAKE PUBLISHERS”
(that refers to the publishers of journals that are not
registered ocially by real persons or companies). De-
veloping lists of quality journals and evaluating the
quality of the academic journals on each of the main
aspects of scientic publishing, such as the editorial
workow, peer-review process, data quality, readabili-
ty, searchability, accessibility, and other aspects, is our
current concern and the topic of our research. Ask-
ing the researchers and authors to stick only to the list
of quality journals will automatically protect the aca-
demic world against any threat by questionable jour-
nals, hijacked journals and fake publishers.
We believe that the quantitative measures (Impact
factors, H-index, etc.) are not developed to evaluate
the quality of scientic journals; but to be used for li-
brary and information science research; and their
metrics should not be presented on the rst page of
scientic journals, otherwise they will mislead the re-
searchers, authors, and even the research policy mak-
ers. We also know that it is the most dicult job to
develop criteria for evaluating the quality of scientif-
ic journals when it is a matter of quality, not quantity
Mehrdad Jalalian,
Mehdi Dadkhah
83Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
and metrics. By saying that we believe the qualitative
approach in evaluating the quality of scientic jour-
nals has advantages over the metrics and quantitative
measures, we mean that even a new journal that con-
siders all of the standards of high-quality peer review,
editorial workow, and publishing, can also be treat-
ed as a top-quality journal even though it may be in its
rst year of publication.
Speaking on hijacked journals, another piece of in-
formation that we are going to share with academ-
ia is that we believe that the authors who published
in hijacked journals should have a second chance to
publish their articles in legitimate journals (Jalalian,
2015b). Finally, we close this discussion by presenting
the current list of hijacked journals (Table 1).
Table 1. List of 90 hijacked journals from August 11, 2011 to June 15, 2015,
developed by Mehrdad Jalalian and Mehdi Dadkhah
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
1Afinidad (0001-9704)
http://www.aiqs.es/catala/afinidad.asp
http://www.raco.cat/index.php/afinidad
http://www.afinidad.org
http://iheringiaserie.bdssmgdl.org
http://www.afinidadjournal.es
http://www.afinidadjournal.org
2Agrochimica (0002-1857)
http://www.pisauniversitypress.it/landing_page-le-riviste-
agrochimica-1497.html
http://www.agcjournal.org
http://www.agrochimicajournal.org
3 Allgemeine Forst und Jagdzeitung (0002-5852)
http://www.sauerlaender-verlag.com
http://www.sauerlander-verlag.com
4 Ama, Agricultural Mechanization in Asia, Africa & Latin America (
0084-5841)
http://www.amaala.org
5 Anais da Academia Brasileira de Ciências (0001-3765)
http://www.scielo.br/revistas/aabc/iaboutj.htm
http://www.aabc-scielo.com.br
6 Anare Research Notes (0729-6533)
https://www1.data.antarctica.gov.au/aadc/pubs/pubs_list.cfm?pub_
list=ARN
http://www.arnjournal.com
7Archives des sciences
http://www.unige.ch/sphn/
http://www.sciencesarchive.com
http://www.archiveofscience.com
8 Aula Orientalis (0212-5730)
http://www.editorialausa.com/cola12.asp
http://www.editorialusa.com
9 Ayer: revista de historia contemporánea (1134-2277)
http://www.ahistcon.org/revistaayer.html
http://www.ayer.netne.net
http://www.ayeronline.com
10 Azariana (2075-7271, 2075-4191)
http://www.faunaparaguay.com/azariana.html
http://www.azariana.org/
11 Baltica (0067-3064)
http://www.geo.lt/geo/?id=710
http://www.balticajournal.com
12 Bars (1800 -556X) http://www.barsjournal.net
13 Boletim de Ciências Geodésicas (1413-4853) http://www.bcg-online.com
14 Bothalia (0006-8241, 2311-9284)
http://abcjournal.org/index.php/ABC (The counterfeit domain
“bothalia.com” is currently redirected to the authentic website of the
legitimate journal)
http://www.bthla-journal.org
http://www.bothalia.com
15 Bradleya (0265-086X)
http://www.bcss.org.uk/brad.php
http://www.britishedu.org.uk
16 BRI’s Journal of Advances in Science and Technology (0971-9563) http://www.brisjast.com
17 Bulletin des Seances de l’Academie Royale des Sciences d’Outre-Mer
(0001-4176)
http://www.ardsj.com
18 Cadmo (1122-5165)
http://www.francoangeli.it/riviste/sommario.
asp?idRivista=117&lingua=en
http://www.cadmo.org
The full story of 90 hijacked journals
from August 2011 to June 2015
84 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
19 Cahiers de paiolive (1969-2803) http://www.ijiq.com
20 Cahiers des Sciences Naturelles (1420-4223) http://www.revistas-academicas.com
21 Chemical and Process Engineering (0208-6425)
http://www.degruyter.com/view/j/cpe
http://www.processengineering.net
22 Chemical modelling (1472-0973, 1472-0965) http://tomaspubs.com
23 Ciência e TécnicaVitivinícola (0254-0223)
http://www.ctv-jve-journal.org/
http://publications.edpsciences.org/
http://www.scielo.gpeari.mctes.pt/scielo.php?script=sci_
issues&pid=0254-0223&lng=pt&nrm=iso (old issues)
http://www.ciencia-e-tecnica.org
http://www.ciencia-e-tecnica.com
24 Contributions in Science (Natural History Museum of Los Angeles
County Contributions in Science) (0459-8113)
http://www.nhm.org/site/research-collections/research-tools/
publications
http://www.ijescs.org
25 Der Präparator (Praparator) (0032-6542) http://pra.tomaspubs.com
26 Doriana (Annali del MuseoCivico di Storia Naturali Giacomo Doria,
Supplemento) (0417-9927)
http://www.revistas-academicas.com
27 Du-Die Zeitschrift der Kultur (0012-6837)
http://www.dumag.ch/
http://dujournal.eu.pn
(This is a free subdomain on the domain “eu.pn”
which is a free hosting provider)
28 Education (0013-1172) http://tomaspubs.com/ej.htm
29 Emergencias (1137-6821)
http://www.semes.org/revista_EMERGENCIAS
http://www.sanidadediciones.com
30 Entomon (0377-9335) http://www.entomonjournal.org
31 Ephemera (1298-0595) http://www.ephemerajournal.com
http://www.ephemera.eu.pn
32 Epistemologia (0392-9760, 1825-652X)
http://www.francoangeli.it/riviste/sommario.
asp?IDRivista=173&lingua=en
http://epistemologia-journal.com
33 Fauna Rossii I Sopredel Nykh Stran (1026-5619) http://www.bpxo.com/index.php/FAUNARO
34 Forschungsberichte - Nationalpark Berchtesgaden (0172-0023)
http://www.nationalpark-berchtesgaden.bayern.de/08_
publikationen/01_forschungsberichte/index.htm
http://nationalpark-berchtesgaden.com
35 Fourrages (0429-2766)
http://www.afpf-asso.org, and http://www.afpf-asso.fr
http://www.agriturismosi.com
36 Gaia (Athens) (1107-311X) http://www.gix.info
37 Gazi Univertesi Gazi Egitim Fakultesi Dergisi (1300-1876) http://www.gugef.com
38 Glasnik Odjeljenja Prirodnih Nauka -
CrnogorskaAkademijaNaukaiUmjetnosti (0350-5464)
http://www.opncme.com
39 GMP Review (1476-4547)
http://www.euromedcommunications.com/publications/journals/197-
gmp-review
http://www.euromed.uk.com
40 HFSP journal.
Formerly known as HFSP Journal (2007-2010 ISSN 2155-3769 (Print),
2155-3777 (Online) (The journal has ceased publication):
http://www.ncbi.nlm.nih.gov/pmc/journals/811
and: http://hfspj.aip.org/
Currently known as Frontiers in Life Science (2011-current):
http://www.tandfonline.com/loi/tfls20#.VWuuJ8-qqko
http://www.hfsp-journal.org
41 Hospital Purchasing Management (0163-1322) http://www.medmanagement.org
42 Innovaciencia http://www.ic.sciencerecord.com
43 Inteciencia (0378-1844)
http://www.interciencia.org
http://www.ivic-gob.org
Mehrdad Jalalian,
Mehdi Dadkhah
85Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
44 Jamaican Journal of Science and Technology (1016-2054)
http://www.src.gov.jm/
http://src.gov.jm/volumes
http://src.gov.jm.jjst.org
45 Italianistica: Rivista di Letteratura Italiana (0391-3368, 1724-1677) http://italianrevistaletterjournal.org
46 Jökull (0449-0576)
http://jokulljournal.is
http://www.jokulljournal.com
http://www.jkljournal.org
47 Journal of the American Medical Association (JAMA) (0098-7484,
1538-3598)
http://jama.jamanetwork.com/
http://www.ama-journal.org
48 Journal of scientific research and development (1115-7569)
http://jsrd.unilag.edu.ng/
http://www.jsrad.org
49 Kardiologiia (0022-9040)
http://ores.su/en/journals/kardiologiya/
http://www.kardiologiyajournal.org
50 LudusVitalis (1133-5165)
http://www.centrolombardo.edu.mx/ludus-vitalis
http://www.ludusvitalis.org.mx
51 Magnt Research Report (1444-8939) http://www.brisjast.com
52 Martinia (0297-0902) http://www.martinia.com
53 Mitteilungen Klosterneuburg (0007-5922)
http://bundesamt.weinobstklosterneuburg.at/seiten/index.php/
view.408
http://www.mitt-klosterneuburg.com
54 Multitemas (1414-512X)
http://site.ucdb.br/pesquisa-e-inovacao/6/periodicos-ucdb/848/
revista-multitemas/872/
http://www.multitemas.com
55 Nationalpark-Forschung In Der Schweiz (1022-9493) http://www.naukpublication.org
56 Natura (0028-0631) http://www.revistas-academicas.com
57 Nautilus (0028-1344)
http://www.shellmuseum.org/nautilus/index.html
http://www.nautilusjournal.net
58 Odonatological Abstract Service (1438-0269) http://www.styleinternational.net
59 OtechestvennaiaIstoriia (ISSN: 0869-5687) http://www.ylau.com
60 Pensee (Pensée, La) (0031-4773)
http://www.gabrielperi.fr/spip.php?page=rubrique_base&id_
rubrique=321&lang=fr
http://www.penseejournal.com
61 Philippine Scientist (0079-1466) http://psc.tomaspubs.com
62 Politica Economica ( Journal of economic policy) (1120-9496) http://tomaspubs.com
63 Proceeding of the Bulgarian Academy of Sciences (1310-1331)
http://www.proceedings.bas.bg
http://www.science-bas.org
64 PSR health research bulletin http://www.psr-health.org
65 Reef Resources Assessment and Management Technical Paper (1607-
7393)
http://www.behaviorsciences.com
66 Research-Technology Management (0895-6308)
http://www.iriweb.org/Main/Library/RTM_Journal/Public_Site/
Navigation/Publications/Research-Technology_Management/index.
aspx
http://www.lriinc.org
67 Revista Kasmera (0075-5222)
http://www.scielo.org.ve/scielo.php?script=sci_serial&pid=0075-5222
http://www.kasmerajournal.com
68 Rivista di Biologia (Perugia) (Also known as Biology forum) (ISSN:
0035- 6050)
http://www.ylau.com
69 Revue Internationale de PsychologieSociale (0992-986X)
http://www.pug.fr/collection/69/Revue%20internationale%20de%20
psychologie%20sociale
http://www.psychologyterms.com
70 Revue scientifique et technique (Revistacientifica y técnica) (Scientific
and technical review) (0253-1933)
http://www.rstoide.org
The full story of 90 hijacked journals
from August 2011 to June 2015
86 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
71 Saussurea: Journal de la Société botanique de Genève (0373-2525)
http://www.socbotge.ch/saussurea.htm
http://www.saussurea.org
72 Scholarly Research Exchange (1687-8302) http://srej.wc.lt
(This is a free subdomain on the domain “wc.it”
which is a free hosting provider)
73 Science and Nature (0193-3396). Also known as “The journal of
Marxist philosophy for natural scientists”
http://www.san.sciencerecord.com
74 Science Series data report (Irregular ISSN), former title for “Fisheries
research data report” (ISSN: 0264-5130)
http://www.ssdr.sciencerecord.com
75 Scientia Guaianae (0798-1120) http://www.scientiaguaianae.org
76 Scientific Khyber (1017-3471) http://www.skhyber.com
http://www.skhyber.org
77 Social Behavior and Personality (0301–2212)
http://www.sbp-journal.com
http://www.psycholjournal.co.nz
78 Survey methodology (0714-0045)
http://www5.statcan.gc.ca/olc-cel/olc.action?objId=12-001-
X&objType=2&lang=en&limit=0
http://www.survmethodjournal.org
79 Sylwan (0039-7660)
http://sylwan.ibles.waw.pl/pls/apex/f?p=105:1:0
http://sylwan.ibles.org
80 Systems Science (2077-5423, 0137-1223) http://tomaspubs.com
81 Tekstil (0492-5882) http://www.tekstiljournal.org
82 Teoriiai Praktika Fizicheskoi Kul’tury (0040-3601) http://www.teorprakfizkul.org
83 Terapevticheskii Arkhiv (0040-3660) http://www.terapevticheskiiarkhiv.org
84 Texas Journal of Science http://www.texassciences.us
http://www.texassciences.com
http://www.texasacademyofscience.com
http://www.texasjournalofscience.info
85 The Journal Of Technology (1012340-7)
http://jot.ntust.edu.tw/index.php/jot/index
http://www.jotechno.com
86 The Veliger (0042-3211) http://www.theveliger.net
87 Vitae Revista (0121-4004)
http://aprendeenlinea.udea.edu.co/revistas/index.php/vitae/ind
http://www.vitae-udea.org
88 Walia (1026-3861) http://www.waliaj.com
89 WIWO report (1385-3287) http://www.web-journal.com
http://wiworeport.com
90 Wulfenia (1561-882X)
http://www.landesmuseum.ktn.gv.at/210226w_DE.htm?seite=15
http://www.multidisciplinarywulfenia.org
http://www.wulfeniajournal.com
http://www.wulfeniajournal.at
Mehrdad Jalalian,
Mehdi Dadkhah
87Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Acknowledgments
e authors deeply thank all of the scholars around the
world that updated us with valuable information and
shared their experience on publishing in hijacked jour-
nals; the omson Reuter’s technical ocers and edi-
tors for their action against fake websites of hijacked
journals based on our reports, the editors of the legit-
imate journals for their contribution in this research
and providing us valuable and valid information, Dr.
David Bimler from new Zealand for being our original
source for identifying the hijacked journal “Intercien-
tia”, Dr. Amin Daneshmand Malayeri from Iran for
being a source of valuable information about some of
the hijacked journals, and professor Dr. Filistea Naudé
from Unisa Science Library in South Africa for provid-
ing us valid and useful library information about the
legitimate journal of some of hijacked journals.
References
Jalalian, M., Mahboobi, H. 2014. Hijacked Journals
and Predatory Publishers: Is ere a Need to Re-
ink How to Assess the Quality of Academic Re-
search? Walailak J Sci Technol. (WJST) 11-5, 389-94.
doi: 10.14456/wjst.2014.16. Available from: http://
wjst.wu.ac.th/index.php/wjst/article/view/1004.
Jalalian M. 2014a. Journal hijackers target science and
open access. Research information. Available from:
http://www.researchinformation.info/news/news_
story.php?news_id=1660
Jalalian, M., Mahboobi, H. 2013. New corruption de-
tected: Bogus impact factors compiled by fake or-
ganizations. Electronic physician 5-3, 685-6. doi:
10.14661/2013.685-686.
Jalalian, M. 2015a. e story of fake impact factor
companies and how we detected them. Electronic
physician 7-2, 1069-70. doi: 10.14661/2015.1069-1072.
Jalalian, M. 2015b. A second chance for authors of
hijacked journals to publish in legitimate jour-
nals. Electronic physician 7-2, 1017-1018. DOI:
10.14661/2015.1017-1018.
Jalalian, M. 2014b. Hijacked journals are attacking the
reliability and validity of medical research. Elec-
tronic physician 6-4, 925-6. doi: 10.14661/2014.925-
926. PMID: 25763169, PMCID: PMC4324258.
Lukić, T., Blešić, I., Basarin, B., Ivanovićm Bibić, Lj.,
Milošević, D., Sakulski, D. 2014. Predatory and
Fake Scientic Journals/Publishers– A Global Out-
break with Rising Trend: A Review. Geographica
Pannonica 18-3, 69-81.
Dadkhah, M., Quliyeva, A. 2014. Social engineering
in academic world. J Contemp Appl Math. 4-2, 3-5.
Dadkhah, M., Davarpanah, J.M., Pacukaj, S. 2015a.
Fake Conferences for Earning Real Money. Mediterr
J Soc Sci. 6-2, 11-12. doi: 10.5901/mjss.2015.v6n2p11.
Dadkhah, M., Jazi, M.D. 2015a. Anare Research Notes
Journal Is Hijacked. International Journal of Phar-
macy and Pharmaceutical Sciences 7-5, pp. 1.
Dadkhah, M., Obeidat, M.M., Jazi, M.D., Sutikno, T.,
Riyadi, M.A. 2015b. How Can We Identify Hijacked
Journals? Bulletin of Electrical Engineering and In-
formatics 4-2, 83-87. DOI: 10.12928/eei.v4i2.449
Dadkhah, M., Sutikno, T., Jazi, M.D., Stiawan, D.
2015c. An Introduction to Journal Phishings and
eir Detection Approach. TE L KOM NIK A Te le-
communication, Computing, Electronics and Con-
trol 13-2, 373-380, 2015. DOI:10.12928/TELKOMNI-
KA.v13i2.1436
Dadkhah, M., Jazi, M. D. 2015 (In Press). Hiring Edi-
torial Member for Receiving Papers from Authors.
Mediterranean Journal of Social Sciences 6-4.
... Cyber criminals search for journals that are indexed in citation databases (mainly WoS and Scopus), with websites that are not popular, and create a second fake website for such journals (Dadkhah et al., in review). They claim the original website of the legitimate journal by copying the exact ISSN and name of the journal (Dadkhah et al., 2021(Dadkhah et al., , 2022Jalalian & Dadkhah, 2015). Such journals hurt researchers who believe they are publishing in legitimate journals, waste research funding, disseminate fake science often with errors (since there is no peer review), and have a negative impact on countries' and universities' scientific rank (Dadkhah & Maliszewski, 2015;Jalalian, 2014;Jalalian & Dadkhah, 2015;Memon, 2019). ...
... They claim the original website of the legitimate journal by copying the exact ISSN and name of the journal (Dadkhah et al., 2021(Dadkhah et al., , 2022Jalalian & Dadkhah, 2015). Such journals hurt researchers who believe they are publishing in legitimate journals, waste research funding, disseminate fake science often with errors (since there is no peer review), and have a negative impact on countries' and universities' scientific rank (Dadkhah & Maliszewski, 2015;Jalalian, 2014;Jalalian & Dadkhah, 2015;Memon, 2019). ...
... This means that a hijacker may develop multiple hijacked journals at the same time by using the same servers. This has been confirmed in research that the same cybercriminals are behind multiple hijacked journals (Abalkina, 2021;Jalalian & Dadkhah, 2015). This information can be used to identify hijacked journals using the features in Table 1. ...
... Hijacked journals are cloned websites of legitimate journals, imitating them by copying their titles and ISSN, aiming to deceive potential authors into submitting their work and paying publication fees (Jalalian and Dadkhah 2015;Moussa 2021). There are usually two methods of hijacking. ...
... The phenomenon of hijacked journals was first documented in 2012 (Jalalian and Dadkhah 2015), and since then, their proliferation has been observed. Despite numerous documented cases (Abalkina 2021a;Jalalian and Dadkhah 2015; The Retraction Watch Hijacked Journal Checker n.d.), thousands of scholars still choose these venues for publication. ...
... The phenomenon of hijacked journals was first documented in 2012 (Jalalian and Dadkhah 2015), and since then, their proliferation has been observed. Despite numerous documented cases (Abalkina 2021a;Jalalian and Dadkhah 2015; The Retraction Watch Hijacked Journal Checker n.d.), thousands of scholars still choose these venues for publication. Despite the growing challenges of hijacked journals, the question of scientific integrity and plagiarism in publications in these journals has not been studied. ...
Article
Full-text available
Background: The study examines the prevalence of plagiarism in hijacked journals, a category of problematic journals that have proliferated over the past decade. Methods: A quasi-random sample of 936 papers published in 58 hijacked journals that provided free access to their archive as of June 2021 was selected for the analysis. The study utilizes Urkund (Ouriginal) software and manual verification to investigate plagiarism and finds a significant prevalence of plagiarism in hijacked journals. Results: Out of the analyzed sample papers, 618 (66%) were found to contain instances of plagiarism, and 28% of papers from the sample (n = 259) displayed text similarities of 25% or more. The analysis reveals that a majority of authors originate from developing and ex-Soviet countries, with limited affiliation ties to developed countries and scarce international cooperation in papers submitted to hijacked journals. The absence of rigorous publication requirements, peer review processes, and plagiarism checks in hijacked journals creates an environment where authors can publish texts with a significant amount of plagiarism. Conclusions: These findings suggest a tendency for fraudulent journals to attract authors who do not uphold scientific integrity principles. The legitimization of papers from hijacked journals in bibliographic databases, along with their citation, poses significant challenges to scientific integrity.
... In an attempt to define what a predatory publication is Grudniewicz et al. (2019) described 'Predatory journals and publishers are entities that prioritise self-interest at the expense of scholarship and are characterised by false or misleading information, deviation from best editorial and publication practices, a lack of transparency and/or the use of aggressive and indiscriminate solicitation practices'. In addition and according to the literature a subset or variant of predatory publishing has emerged in the academic publishing industry, known as cloned journals or Hijacked Journals (Dadkhah and Maliszewski, 2015;Jalalian, 2015;Jalalian and Dadkhah, 2015). Cloned journals are fake scientific publications that mimic the appearance of legitimate journals, exploiting their metadata and accepting papers for publication by using mirror images of reputable journals (Dadkhah et al., 2016). ...
... These journals can also be called 'pseudo journals' 'duplicate journals' or 'dummy journals'. These journals accept articles for publication from the scholarly community by claiming the authority of the original journal with high impact factors, h-indexes and reputation in the scholarly world (Dadkhah et al., 2017;Jalalian and Dadkhah, 2015), Such parameters prove to be appealing to novice researchers who are in a hurry to publish their articles. According to some studies, these journals have lower article processing charges (APCs) compared to legitimate journals. ...
... The legitimacy of cloned journals is questionable but it may contain well written articles of some or great scholarly merit. The expiration of domain results in the loss of well written research and scholarly records, it also can erode trust in online academic publishing and researchers who have cited articles in their own work may find their references are no longer accessible (Jalalian and Dadkhah, 2015). The disappearance of URLs is not only a serious problem for web managers but also for academic researchers resorting to web citation in their research (Loan et al., 2023;Loan and Shah, 2020). ...
Article
The study examines two lists of cloned journals (Group I and Group II) compiled by the University Grants Commission-Consortium for Academic and Research Ethics (UGC-CARE) in India. India has emerged as a hotspot for predatory publishing, justifying the reliance on the UGC-CARE list. The study explores the role of language as a tool for cloning legitimate journals and reveals that cloned journals adopt the English language to deceive and attract submissions. Additionally, it investigates the techniques used by cloned journals to modify their appearance and nomenclature. The results indicate that 40.47% of cloned journals maintain the original title, 42.86% make minor changes by adding terms like ‘international’ and ‘journal’, and 16.67% undergo major alterations. The study also examines the permanence and stability of the domains associated with cloned journals, finding that 52.50% of URLs were active and a significant number were inactive. Among these, the highest domain names include .com (commercial), followed by.org (organisation), as cloned journals prefer these to appear more credible and trustworthy. Furthermore, the study analyses the subject coverage of cloned journals to understand whether their focus is on specific disciplines. The findings reveal that they adopt a multidisciplinary approach to their deceptive practices. By providing valuable insights and raising awareness of how cloned journals deceive authors, this study serves as a significant step against these fraudulent practices. The main limitation of this study is that it relies on a single data source, the UGC CARE List India.
... The history of hijacked journals comes back to about 2011, when a cybercriminal registered an expired domain "sciencerecord.com" and launched three hijacked journals "Science Series Data Report", "Innova Ciencia", and "Science and Nature" in 2012 after another hijacked journal "Archives des sciences" that was online in 2011 3 . From that date till now, there have been many cases of journal hijacking, from simple to advanced ones. ...
... The hijacked journals publish non-peer-reviewed science and compromise the integrity of the scientific record. 1,3 . This can hurt the trust of academic institutes. ...
Article
Purpose: Hijacked journals are fraudulent websites that mimic legitimate journals and, by charging authors, publish manuscripts. The current editorial endeavors to provide a close view of current literature. This editorial piece analyzes 10 years of research on hijacked journals and endeavors to shed light on future trends. Methods: Current research uses a bibliometric approach to analyze data and discuss results. The OpenAlex has been used for data collection. Some of the data analysis was conducted using OpenAlex. The other study was done using Bibliometrix, and the date is limited to publication between 2014 and 2024. Results: The findings provide a close view of the published literature in terms of access type, growth, topics, most frequent words, country contribution, top publishers, and alignment of literature with sustainable development goals. Conclusion: The gap in current literature is the limitation in easily usable methods to be accessible by all researchers for hijacked journal detection and data analysis. The use of artificial intelligence can be promising.
... The term has been coined by Dr. Mehrdad Jalalian. 8 However, in the literature, some researchers used other terms, such as journal phishing or cloned journals, to describe the same phenomenon. 9,10 The hijacked journal is a second fake website developed by cyber criminals and mimics the original journals. ...
... These journals usually (not always) publish as many papers as possible, regardless of the journal's aim and scope or subject area. 8 The second generation detected in early 2015, when hijackers registered expired domains of original journals, and early hijacked journals could be index their URLs in citation bases (i.e., Thomson Reuters, currently known as Clarivate Analytics). 22 They also mainly (not always) published papers A c c e p t e d M a n u s c r i p t regardless of the original journal's aim and scope or subject area. ...
Article
Full-text available
Purpose Nowadays, many studies discuss scholarly publishing and associated challenges, but the problem of hijacked journals has been neglected. Hijacked journals are cloned websites that mimic original journals but are managed by cybercriminals. The present study uses a topic modeling approach to analyze published papers in hijacked versions of medical journals. Methods A total of 3384 papers were downloaded from 21 hijacked journals in the medical domain and analyzed by topic modeling algorithm. Results Results indicate that hijacked versions of medical journals are published in most fields of the medical domain and typically respect the primary domain of the original journal. Conclusion The academic world is faced with the third-generation of hijacked journals, and their detection may be more complex than common ones. The usage of artificial intelligence (AI) can be a powerful tool to deal with the phenomenon.
... In their preprint (29), scientists carefully analysed articles in the computer science journal Microprocessors and Microsystems and concluded that PM could be involved in the production of some questionable articles containing "tortured phrases" because these papers have: 1) a similar structure; 2) most of the figures have the same standard set of colours, which means that the same software was used to produce them; 3) the methods of producing figures and tables differ little from each other, in particular flowcharts were widely used. In addition, we note that the authors also observed changes in the functioning of the journal, in particular an increase in the number of publications, which has some similarities with the functioning of 'hijacked journals' -fake websites of scientific journals that use the name, ISSN and other information of a real, reputable journal (31). Such duplicate sites are often created by malicious actors to deceptively offer scientists the opportunity to quickly publish their research for a fee, and PMs can use hijacked journals to meet the needs of their undemanding clients (32,33). ...
Chapter
Within the academic community, an escalating concern has emerged regarding the proliferation of paper mills, unscrupulous enterprises dedicated to crafting fraudulent scientific papers upon request. These organizations also offer a range of additional services, including manuscript submission and correspondence assistance, the procurement of counterfeit co-authors, citation manipulation, and the fraud inflation of metric indicators. Employing a multitude of deceitful tactics such as fabrication and falsification of data and images, plagiarism, multiple submissions, and fake peer review reports, these fraudulent entities strive to publication for the fake papers. Invariably, the products originating from paper mills lack genuine experimental data, rendering them false and misleading. Despite the growing body of evidence about paper mills, their activities are not easy to expose and prove. The current development of artificial intelligence (AI) tools, such as ChatGPT and other chatbots based on large language models (LLMs), presents novel challenges and opportunities for preventing research misconduct.
... The authors also noted that these cloned publications exploit the official title and ISSN number of the authentic journals. Mehrdad Jalalian and Mehdi Dadkhah [5] compiled a list of ninety periodicals that had been taken over by unauthorised parties between August 2011 and June 2015. They detailed the strategies utilised to hijack, as well as the ways in which they made money by publishing in journals that had been hijacked. ...
Article
Full-text available
Cloned journals refer to deceptive or counterfeit scientific journals that imitate genuine scholarly publications with the intention of misleading scholars into submitting their works. As early career researchers fall prey to these hijacked/cloned journals, research in this direction is important. In this paper, we present “PRAY—Published Research Attestation sYstem”, to validate the research papers published in a journal. We develop a novel random number generator to generate a journal secret key (jsk) based on satellite beacon signals. HMAC of ISSN number with manuscript DOI using keyed jsk; attestation code (ACODE) is generated. This attestation code is used to verify and attest the validity of the genuine publication. The system is tested and validated through verification in Scopus database.
Article
At the moment, the academic world is faced with various challenges that negatively impact science integrity. One is hijacked journals, a second, inauthentic website for indexed legitimate journals, managed by cybercriminals. These journals publish any manuscript by charging authors and pose a risk to scientific integrity. This piece compares a journal’s original and hijacked versions regarding authority in search engines. A list of 16 medical journals, along with their hijacked versions, has been collected. The MOZ Domain Authority has been used to check the authority of both original and hijacked journals, and the results have been discussed. It indicates that hijacked journals are gaining more credibility than original ones. This should alarm academia and highlights a need for serious action against hijacked journals. The related policies should be planned, and tools should be developed to support easy detection of hijacked journals. On the publishers’ side, the visibility of journals’ websites must be enhanced to address this issue.
Article
Full-text available
In recent times some publishers are intensively exploiting the model of open access publishing. During the last several years, studies have shown that there was a substantial increase in the number of fake publishers and hijacked journals. These cyber criminals make money by stealing the identities of legitimate journals and collecting the article processing charges on the papers that are submitted. This is all accomplished by a well developed framework that includes web development steps, intensive e-mail marketing and victim selections. This review article strives to recommend that the Beall's list of predatory publishers and journals should be consulted every time when an author plans to submit scientific work to some of the journals that are indexed by Thomson Reuters/Institute for Scientific Information-ISI and covered by the Journal Citation Report. Also, the authors are advised to be "up to date" with new information regarding this controversial topic by informing themselves through various websites and specialized scientific portals. The review paper itself strives to summarize the most recent investigations on predatory and spurious journals/publishers which affect the entire scientific community, thus representing an outbreak with rising trend not only on national and regional level, but on global level as well.
Article
Full-text available
it is worth nowadays to highlight the rise of a new kind of unethical concern that is increasingly growing between some predatory low level journals. The problem faced by these journals lies in the fact that they lack the existence of papers to be published in their issues and therefore they resorted to the solution of hiring editorial board for encouraging authors to send their researching work to their respective journals. In other terms, the strategy of that kind of journals is to invite well-known and popular practitioners in some fields to hire them as editorial members for receiving papers from authors all around the world. More specifically, some of these journals impose on their editorial members to send them their papers for publication at the condition of being removed from the editorial members list if they don’t approve their requests.
Article
Full-text available
Researchers have always considered conferences as scientific societies and many conferences on different subjects are held annually which will lead to the development of the countries. Moreover, conferences provide researchers with the newest advances in their field of study on the one hand, and on the other hand gives them new ideas for their coming researches. Newly, virtual conferences have come into existence and removed physical distances and cut down on expenses and attracted the attention of researchers. The problem which may rise here is that some of these conferences have no intention, but to make money and no scientific information is presented there. In this article we will introduce these conferences.
Article
Full-text available
By developing research and academic centers, the number of performed research articles has also increased. On the other hand, publishing the results of these articles in scientific journals shall also grow. In the meantime, researchers are trying to publish the findings of their research in journals which have been approved by one or more international indices so that such findings can be seen. In order to enhance the academic standards of Universities, proper journal choice will be of interest to researchers, especially those that are indexed in websites such as Thomson Reuters. However, certain forgery frauds researchers by launching fake Web sites that have been named by academic journal titles. In this paper, we introduce an approach to identify this type of journals that will be applicable by researchers in various academic disciplines. 1. Introduction Hijacked Journals are the journals that attempt to fraud researchers by using the name and reputation of their main, original journals. Forgers introduce themselves as the main journal editors by launching a website for journals that have printed copies and lacked electronic copies and then fraud researchers. In other words, they use the conventional methods of social engineering to deceive their victims [1], [2]. So far, a number of reputable sites of indexing journals have been got deceived by journal forgers. Among these indexed websites, we can mention Cite Factor (http://www.citefactor.org) that has indexed almost all hijacked journals together with their forged address. According to surveys conducted in 40 sites related to hijacked journals, it was understood that victims often belong to developing countries. Those journals are being targeted primarily due to their broad and various scope or topics (such as The Journal of Technology). In some cases, the forgers use the weaknesses in the TCP/IP protocol [3] among which they can name " sending faked call emails " (email spoofing) to researchers with prestigious institutions address for publishing articles in fake journals [4]. Figure 1 shows number of published papers in some hijacked journals per issue (the last available issues, some journals have not more than four issues). According to this figure, the number of paper tended to increase in each issue because forgers used many deception techniques for cheating of authors and for each issue they will receive more papers from authors. However, after a time authors will understand that the journal is faked and number of paper in next issues eventually decrease. Previously, invalid and hijacked journals discussion has been raised in [5], [6] and general guidelines to deal with them are given to researchers. However, this paper aims to provide a simple approach to researchers so that they can identify fake journals.
Article
This article proposes the republication of articles that have previously been published in counterfeit websites of hijacked journals. The paper also discusses the technical and ethical aspects of republishing such articles.
Article
Beginning about three years ago, the world of academic publishing has become infected by fake impact factors and misleading metrics that are launched by bogus companies. The misleading metrics and fake impact factors have damaged the prestige and reliability of scientific research and scholarly journals. This article presents the in-depth story of some of the main bogus impact factors, how they approached the academic world, and how the author identified them. Some names that they use are Universal Impact Factor (UIF), Global Impact Factor (GIF), and Citefactor, and there even is a fake Thomson Reuters Company.
Article
Hijacked journals are journals that use the same name and ISSN like authentic journals. Forger select journals that have a print version and create the fake website for them and cheat researchers. They ask money for publishing papers and sell author's papers [1-3]. The newly identified hijacked journal " ANARE Research Notes, " has no website, is published by an Australian National in Australia, titled as Antarctic Research Expeditions-ANARE. This journal is indexed in Thomson Reutersjournals master list and has Zoological Record indexing. Fake website has this URL http://arnjournal. com. It is proved fake by the following process.-Journal appears in Thomson Reuters website (http://ip-science. thomsonreuters.com/mjl/) but the link to this website is not opening.-Using journal seek (http://journalseek.net) searched for the particular journal in the database, and found in the database that ANARE Research Notes currently does not have a website.-Inspected domain for identification in Whois information, through " Whois " database (http://whois.domaintools.com). The extracted information stated that the domain of this site had been created in Feb 2015 and would expire in Feb 2016; while journal setup was claimed as 1982 and there are inconsistencies between journal setup time and website registration time. In the evaluated journal web site, the database access will have in live at most three recent issues. This journal is not indexed in Scopus, had it been we can accept it to be genuine and search for papers. This case also supports that the journal ANARE is a hijacked one. Going through the ANARE journal aim and scope, it is ambiguous how the journal accepts and publishes papers in any domain. There is no mention of the editorial board or specialization of the journal. The only contact to the Journal papers is the personal email id of the authors and there is no official email or website for the journal ANARE. On further search into the papers of each issue, we can find authors are from certain countries such as Iran. web sites created later than the dated of paper acceptance, such as the one referred is Feb 2015 but found a paper in the journal (http://arnjournal.com/images/1-20. pdf) that accepted in " 5 Jan
Article
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
Article
In the academic world there is different samples of cheating the researchers, that itwill be better to categorize these samples in a new category as social engineering in theacademic world. On the other hand, it is very necessary for researchers to be familiar withthese social engineering attacks, because the number of these social engineering techniquesis increasing every day. In this article, some cases of social engineering in the academicworld have been introduced In the information security literature, social engineering is called to the art of utilization of peoples vulnerable behaviors to create security gap without making victim to be doubted. Social engineering cheats people from different ways, and by persuading those people misuse them to achieve to its aims. Kevin Mitnick had been creator of social engineering method [1 and 2]. Social engineering cheat people from different ways and by misuse of humans natural tendency to trust, achieve its goals [2]. In the todays academic world, we can see samples of social engineering that their goal is cheating the researchers, these samples will be introduced in this article. In the academic world there is different samples of cheating the researchers, that it will be better to categorize these samples in a new category as social engineering in the academic world. On the other hand, it is very necessary for researchers to be familiar with these social engineering attacks, because the number of these social engineering techniques is increasing every day. In this article, some cases of social engineering in the academic world have been introduced. Hijacked journals: these journals are the clear samples of social engineering attacks in the academic world. Forgers set up faked sites by using name and ISSN of famous journals, and cheating researchers by sending a lot of requests and by giving promise for quick publishing of articles [3 and 4]. Faked declarations: Some of low validated journals use valid indexing centers (such as Thomson Reuters) and expose logos and declare themselves indexed in this scientific bases, however they are not really indexed. Many of researchers are cheated too, because most of beginner researchers have not enough information for working with
Article
Maximizing the reliability and validity of the findings of clinical research and reducing publication bias are unquestionable challenges for peer-reviewed medical journals as they are devoted to being reliable sources for clinical judgments, medical practice, and heath policymaking (1). In addition, where to publish medical research and how to avoid questionable journals are additional challenges for clinical researchers (2, 3). However, the world of medical science recently has been attacked by a new phenomenon, i.e., hijacked journals. The cybercriminals have been involved in creating counterfeit websites for scientific journals since early in 2012 (4-7). They extended their scam to the medical and clinical science journals recently by hijacking seven prestigious medical journals, including Emergencias (an emergency medicine journal from Spain), the Journal of the American Medical Association (JAMA), Vitae-Revista (The Official Publication of the Faculty of Pharmaceutical Chemistry at the University of Antioquia, Colombia), Amala (published by the Amala Cancer Research Center in India), TERAPEVTICHESKII ARKHIV (from Russia), Kardiologiya (from Russia), and Revue Scientifique et Technique (published by the World Organization for Animal Health). A main concern about this new phenomenon is that the unreviewed manuscripts that are published on counterfeit websites become a source for clinical practice and health policy making, since such articles definitely will appear in the search result of any attempt at a systematic review on the clinical literature. A second significant threat the hijacked journals impose on medical science is that their unreviewed findings will be a source for new medical hypotheses that can be used to attack the reliability and validity of future clinical research findings (7). Warning the world of medical science about this new scam and considering rigorous technical review of the citations to and from medical articles could be the most practical measures in the short term; however, we must determine long-term measures to protect the reliability and validity of published medical research (4).