ArticlePDF Available

The full story of 90 hijacked journals from August 2011 to June 2015


Abstract and Figures

During recent years, the academic world has suffered a lot from the threats of hijacked journals and fake publishers that have called into question the validity and reliability of scientific publications. The purpose of this paper is to tell the in-depth story of hijacked journals. This paper addresses the hijackers themselves, the methods they use to find their victims in the academic world, the methods they use to collect money from unsuspecting researchers by charging them to publish in hijacked journals, how they hide their identities, and how the academic world can best protect itself from these cyber-criminals. Without identifying specific journal hijackers, we tell the story of how an assistant professor of computer and information science from Saudi Arabia (who holds a Ph.D. from a Malaysian university) and his team of Word Press experts from Pakistan hijacked at least six journals including journal of technology, BRI's Journal of Advances in Science and Technology, Magnt Research Report, Scientific Khyber, Saussurea, and created one of the four fake websites for Texas Journal of Science. We also tell the story of how some conferences are integrated with hijacked journals, and how a cybercrimi-nal with a fake address in United Arab Emirates used the pseudonym " James Robinson " to mass hijack more than 20 academic journals (Journal of Balkan Tribological Association, Scientia Guaianae, Journal of American Medical Association, Cadmo, Entomon, Italianistica, Revue scientifique et technique, Kar-diologiya, Agrochimica, Terapevticheskii Arkhiv, Ama, Tekstil, Fauna Rossii I Sopredel Nykh Stran, Azari-ana, PSR health research bulletin, etc.). We also address the European cybercriminal with pseudonym " Ruslan Boranbaev " who hijacked the Archives des Sciences in October 2011 and created the " Science record journals " (to host three hijacked journals Including " Science series data report " , Innovaciencia, and " Science and nature " ; and seven fake journals) for the first time in the academic world in August 2011. We tell how Ruslan Boranbaev designed a systematic approach to mass hijack more than 25sci-entific journals, including Bothalia, Jokull, Cienia e tecnica, Wulfenia, Doriana, Revista Kasmera, Mit-teilungen Klosterneuburg, Sylwan, HFSP journal, Natura, and Cahiers des Sciences Naturelles. We also tell the story how this genius cybercriminal, whom we could call the king of hijacked journals, created a fake " web of sciences " portal in 2015 on a dedicated server in France to launch an automated spam broadcasting machine of calls for papers for his hijacked journals. We also present how the Ruslan Bo-ranbaev created numerous online payment portals for collecting the publication charges of hijacked journals, and cheated the Thomson Reuters to provide hyperlinks to the fake website of three hijacked journals in his masterpiece " ". We also tell the story of how someone adopted the Ruslan Boranbaev approach to cheat the Thomson Reuters to create hyperlinks from master journal list of Thomson Reuters to two of his hijacked journals (GMP review:, Allgemeine Forst und Jagdzeitung: Finally, we present the most comprehensive list of hijacked journals available, including all of those that we have detected from August 11, 2011 to June 15, 2015. The full story of 90 hijacked journals from August 11, 2011 to June 15, 2015.
Content may be subject to copyright.
73Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Mehrdad JalalianA, Mehdi DadkhahB
Received: May 22, 2015 | Revised: June 16, 2015 | Accepted: June 22, 2015
The full story of  hijacked journals
from August  to June 
A Editor in-Chief, Electronic Physician, Mashhad, Iran
B Young Researchers and Elite Club, Tiran Branch, Islamic Azad University, Tiran, Iran
* Corresponding Author: Mehrdad Jalalian, e-mail:
ISSN 0354-8724 (hard copy) | ISSN 1820-7138 (online)
During recent years, the academic world has suffered a lot from the threats of hijacked journals and
fake publishers that have called into question the validity and reliability of scientific publications. The
purpose of this paper is to tell the in-depth story of hijacked journals. This paper addresses the hijack-
ers themselves, the methods they use to find their victims in the academic world, the methods they
use to collect money from unsuspecting researchers by charging them to publish in hijacked journals,
how they hide their identities, and how the academic world can best protect itself from these cyber-
criminals. Without identifying specific journal hijackers, we tell the story of how an assistant profes-
sor of computer and information science from Saudi Arabia (who holds a Ph.D. from a Malaysian uni-
versity) and his team of Word Press experts from Pakistan hijacked at least six journals including journal
of technology, BRI’s Journal of Advances in Science and Technology, Magnt Research Report, Scientif-
ic Khyber, Saussurea, and created one of the four fake websites for Texas Journal of Science. We also
tell the story of how some conferences are integrated with hijacked journals, and how a cybercrimi-
nal with a fake address in United Arab Emirates used the pseudonym “James Robinson” to mass hijack
more than  academic journals (Journal of Balkan Tribological Association, Scientia Guaianae, Journal
of American Medical Association, Cadmo, Entomon, Italianistica, Revue scientifique et technique, Kar-
diologiya, Agrochimica, Terapevticheskii Arkhiv, Ama, Tekstil, Fauna Rossii I Sopredel Nykh Stran, Azari-
ana, PSR health research bulletin, etc.). We also address the European cybercriminal with pseudonym
“Ruslan Boranbaev” who hijacked the Archives des Sciences in October  and created the “Science
record journals” (to host three hijacked journals Including “Science series data report”, Innovaciencia,
and “Science and nature”; and seven fake journals) for the first time in the academic world in August
. We tell how Ruslan Boranbaev designed a systematic approach to mass hijack more than sci-
entific journals, including Bothalia, Jokull, Cienia e tecnica, Wulfenia, Doriana, Revista Kasmera, Mit-
teilungen Klosterneuburg, Sylwan, HFSP journal, Natura, and Cahiers des Sciences Naturelles. We also
tell the story how this genius cybercriminal, whom we could call the king of hijacked journals, creat-
ed a fake “web of sciences” portal in  on a dedicated server in France to launch an automated spam
broadcasting machine of calls for papers for his hijacked journals. We also present how the Ruslan Bo-
ranbaev created numerous online payment portals for collecting the publication charges of hijacked
journals, and cheated the Thomson Reuters to provide hyperlinks to the fake website of three hijacked
journals in his masterpiece “”. We also tell the story of how someone adopted
the Ruslan Boranbaev approach to cheat the Thomson Reuters to create hyperlinks from master jour-
nal list of Thomson Reuters to two of his hijacked journals (GMP review:,
Allgemeine Forst und Jagdzeitung: Finally, we present the most
comprehensive list of hijacked journals available, including all of those that we have detected from Au-
gust ,  to June , .
The full story of 90 hijacked journals
from August 2011 to June 2015
74 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
e current atmosphere in academia demands profes-
sors, lecturers, postgraduate students, and researchers
publish as many journal papers as possible (Jalalian,
Mahboobi, 2014; Jalalian, 2014a). Some of the policy-
makers in various academic areas consider research
ndings to be of value only if they are published in an
internationally indexed journal. Starting on August 11,
2011, the online hackers and cybercriminals opened a
new line in their business, i.e., building fake websites
that mimic reputable journals that are mostly indexed
by Web of Science (WOS), a omson Reuters product,
and that have their Impact Factor calculated by Journal
Citation Reports (JCR) (Jalalian, Mahboobi, 2014). In
early 2012, Mehrdad Jalalian, detected this systematic
academic misconduct and unocially introduced the
term “hijacked journal” to the academic world (Jala-
lian, Mahboobi, 2014; Jalalian, 2014a). During the re-
cent years, journal hijackers have created numerous
counterfeit websites for other scientic journals, most-
ly the print-only ones (Jalalian, Mahboobi, 2014). e
cybercriminals broadcast calls-for-paper spams to mil-
lions of email addresses of authors and lecturers (Jala-
lian, Mahboobi, 2014; Jalalian, 2014a). Following the
cybercriminals’ successful marketing of hijacked and
fake journals, they introduced a second product in 2013,
i.e., bogus impact factors and misleading metrics that
were compiled by unknown organizations (Jalalian,
Mahboobi, 2013; Jalalian, 2015a). Also, some of the jour-
nal hijackers targeted scientic conferences and pub-
lished dozens of conference papers in their hijacked
journals for an extra payment by the authors. Irrespec-
tive of their technique of recruiting (i.e., cheating) au-
thors, it is obvious that the articles that are published
in hijacked journals without the benet of peer reviews
will be incorporated in the literature reviews of future
research, and, in this way, the hijacked journals violate
and undermine the validity and reliability of published
research and complicate the open access movement
(Jalalian, 2014a; Jalalian, 2014b). A second signicant
problem is the validity and reliability of the metric val-
ues and other indexing measures developed by scientif-
ic indexing databases, because the people who operate
and maintain these databases do not know how to re-
move citations of articles that are published in hijacked
and fake journals (Jalalian, 2014a). It seems the jour-
nal hijackers have attacked the reputation and money
of researchers and also the reliability of research nd-
ings and metric measures in legitimate networks, such
as Web of Science (WOS), Scopus, Google Scholar Ci-
tation, and Index Copernicus (Jalalian, 2014a; Jalalian,
We should mention that, in this paper, we have re-
moved the sensitive information related to the cyber-
criminals, such as their real names, their real email
addresses, and any other information that could be
used to identify them, as it was not the purpose of this
research to identify the journal hijackers. roughout
this paper, we used the word “[redacted]” to avoid pre-
senting any sensitive information. However, most of
the technical information we presented in this article
are available from “whois” information of the regis-
tered websites, and are available for public.
History of hijacked journals
On August 11, 2011, a cybercriminal registered the ex-
pired domain “” to misuse it as a
place for a mixed project of three hijacked journals
and seven fake journals, including hijacked journals:
Science Series data report, Innova Ciencia, and “Sci-
ence and nature”, and fake journals: America scientist,
International research journal of humanities, Inter-
national research journal of engineering and tech-
nologies, International journal of medical discovery,
International journal of professional artist, Pioneer
architects &urban designers, and International re-
search journal of basic and applied sciences. However,
he launched those hijacked and fake journals in Jan-
uary 2012, aer his other work “Archives des scienc-
es” that was online in 2011.We should say that a fake
journal is dierent from a hijacked journal in that it
has never been registered by a person or organization.
In the case of those seven fake journals under the cat-
egory of science record journals, all of them had fake
ISSN numbers that never have been assigned to any
journal by ISSN organization.
On October 23, 2011, the same person who had reg-
istered the expired domain for science record journals,
registered the domain “,” which
he intended to be mistaken for the authentic web-
site for a Swiss journal entitled “Archives des Scienc-
es” (Jalalian, Mahboobi, 2014; Jalalian, 2014a). During
2012 and 2013, other journals have been hijacked, but
they numbered to a few cases such as Tekstil, Pensee,
Jokull, and Revistas Academicas journals.
In early 2014, a cybercriminal using the pseudonym
“James Robinson” and a fake address in Dubai, Unit-
ed Arab Emirates, brought a new phenomenon to the
world of academic publishing, i.e., “Mass journal hi-
jacking”. He created fake websites for too many aca-
demic journals, including the “Journal of the Ameri-
can Medical Association” (one of the world’s leading
journals in publishing high-quality medical research),
the Journal of the Balkan Tribological Association, Sci-
entia Guaianae, Cadmo, Entomon, Revue Scientique
et Technique, Agrochimica, Terapevticheskii Arkh-
iv, Ama: Agricultural Mechanization in Asia, Africa
& Latin America, Fauna Rossii I Sopredel Nykh Stran,
Kardiologiya, PSR health research bulletin, Teoriiai
Mehrdad Jalalian,
Mehdi Dadkhah
75Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Praktika Fizicheskoi Kul’tury, Azariana, Italianistica:
Rivista di Letteratura Italiana, etc. We have some infor-
mation that support the James Robinson is also behind
of the hijacked journal “Epistemology” the Tomas Pub
journals (Tomas Publishing), and other journals; how-
ever, we need more supportive information. Regard-
ing the “Tomas Publishing”, it was a full fake publisher
with the same strategy and concept that we have seen
behind two other fake publishers (Revistas Academi-
cas, and Science Record Journals). e full scale fake
publisher Tomas Publishing was a fake brand and place
for hijacking six scientic journals including Der Prä-
parator (Praparator), Education, Systems Science, Polit-
ica Economica (Journal of economic policy), Philippine
scientist, and Chemical modelling. We assume that the
Tomas Publishing was the rst job of the mass journal
hijacker “James Robinson”.
Another cyber criminal who used the pseudonym
“Ruslan Boranbaev”, is the person who hijacked the
rst academic journal (Archives des Science) in Oc-
tober 2011, and registered the rst domain for ten hi-
jacked and fake journals under the title of “Science re-
cord journals” on August 11, 2011. Later, he designed a
systematic plan for hijacking too many journals and
hiding his identity. He also used the fake copyright
of “Academic Information Press” under each of the
science record journals, and under hijacked journal
“Pensee” later, but never used that fake copyright un-
der his other works.
Among the science record journals, the “Science
Series Data Report” had an irregular ISSN and was
the former title for “Fisheries research data report”
(ISSN: 0264-5130), but its information was availa-
ble on the master journal list of omson Reuters to-
gether with the second journal, Innova Ciencia. e
science record journals had a stormy presence in the
academic world till September 2013; we guess those
journals might stole hundreds of articles from schol-
ars around the world. We should note that the cyber-
criminal behind the science record journals used the
manuscript templates of the “Canadian Center of Sci-
ence and Education (CCSE)” and owned a laptop with
brand “Sony”. Indeed, he is not only the man who hi-
jacked the rst academic journals in the world (in-
cluding Archives des science, Wulfenia, and science
record journals), but also he has been behind of about
25 hijacked journals. Science record journals, Ar-
chives des sciences, wulfenia, and Pensee were the
rst and beginner jobs by the Ruslan Boranbaev and
he le them all; however, he learned from his weak-
nesses and mistakes and later, in his second perfor-
mance he used very expert and systematic approach
to hijack too many other academic journals including
Sylwan, Ciência e TécnicaVitivinícola, Revista Kas-
mera, Doriana, Natura, and others.
Another sad story that began in July 2014 was the
story of an Assistant Professor of computer science and
information systems from Saudi Arabia, along with his
team members from Pakistan, who created fake web-
sites for at least six journals including Journal of tech-
nology, BRI’s Journal of Advances in Science and Tech-
nology, Magnt Research Report, Scientic Khyber,
Saussurea: Journal de la Société botanique de Genève,
and one of the four fake websites for Texas Journal of
Science. We know that he is originally from Pakistan,
his ocial and routine email address is [redacted], he
holds a Ph.D. degree from university [redacted] in Ma-
laysia, and he owned a laptop with brand “HP” during
2013-2015.anks to his excellent contribution to the
quality of the scientic publications, he was promot-
ed to a managerial position in the university [redacted]
in Saudi Arabia. e question is that what he is really
teaching to his postgraduate students!
During January-June 2014 (and later in 2015), some
the journal hijackers tried to convince authors of con-
ferences papers to publish the full text of their papers
in hijacked journals as a “value-added service” if they
would pay a publication fee of a few hundred Euros
(over and above the conference fees) (Jalalian, Mah-
boobi, 2014; Jalalian, 2014a). is deceptive approach
is known to have occurred at an inactive monograph
entitled “Reef Resources Assessment and Manage-
ment Technical Paper”, a De Gruyter journal entitled
“Chemical and Process Engineering” that is a quarter-
ly scientic journal with a 50-year tradition in Poland,
“Fourrages”, “Allgemeine Forst und Jagdzeitung”, and
“Revue Internationale de Psychologie Sociale”.
Finally, the most recent and notable project in
the history of hijacked journals is that in early 2015,
Ruslan Boranbaev designed an automated call for pa-
per spam system under the title of “Web of Sciences”.
Also, his latest work was hijacking the journal HFSP
in May 2015, a few days before we write this paper.
Literature review
We searched the literature and contacted the people
who maintain some of the hijacked journal lists on
their personal weblogs and asked them if they have
published journal papers on the topic of hijacked jour-
nals. Since very few journal papers have addressed the
issue of hijacked journals, we present the list of all
such papers in chronological order. Aer unocial-
ly reporting the rst cases of journal hijacking in 2012,
a 2013 research reported another academic scam: Fake
impact factors (Jalalian, Mahboobi, 2013). e authors
addressed the progressive threat of hijacked journals,
fake publishers, fake impact factor companies, and
misleading metrics in a short paper entitled “New
corruption detected: Bogus impact factors compiled
The full story of 90 hijacked journals
from August 2011 to June 2015
76 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
by fake organizations” (Jalalian, Mahboobi, 2013). In
February 2014, an Iranian journalist published an ar-
ticle entitled “Hijacked Journals and Predatory Pub-
lishers: Is ere a Need to Re-ink How to Assess
the Quality of Academic Research?” (Jalalian, Mah-
boobi, 2014). at article was the rst comprehensive
academic document on hijacked journals, and it list-
ed some of the techniques the journal hijackers use
to create fake websites mimicking real journals, to
broadcast call-for-paper spams, and to hide their iden-
tities. e article also suggested some ways to detect
and avoid hijacked journals; however, the new genera-
tion of journal hijackers is more expert than ever, and
they are using new methods to hijack journals, collect
publication charges, and hide their identities.
Later, in June 2014, a report entitled “Hijacked Jour-
nal List 2014” listed 19 hijacked journals and fake pub-
lishers. At that time, this was the most comprehensive
list of hijacked journals available. However, just one
year later, the number of hijacked journals is in the
dozens. In August 2014, “Research Information” (Cam-
bridge) published an interview with Mehrdad Jalalian
and a paper entitled “Journal hijackers target science
and open access” (Jalalian, 2014a). e author answered
four main questions on hijacked journals, i.e., “1) How
do hijacked journals occur? 2) What problems do they
cause? 3) How can you identify hijacked journals? and
4) What can authors, readers, publishers, and others do
about hijacked journals?” (Jalalian, 2014a).
In 2014, Serbian scholars Lukić et al. in their article
“Predatory and Fake Scientic Journals/Publishers – A
Global Outbreak with Rising Trend: A Review” dis-
cussed the problem caused by questionable journals
and hijacked journals (Lukić, et al., 2014). In Novem-
ber 2014, Mehrdad Jalalian published a short article
entitled “Hijacked journals are attacking the relia-
bility and validity of medical research” and reported
seven cases in which medical journals had been hi-
jacked and warned the legitimate scientic communi-
ty about the destructive eect of hijacked journals on
the validity and reliability of medical research (Jala-
lian, 2014b). In December 2014, Mehdi Dadkhah and
Aida Quliyeva wrote a short paper entitled “Social en-
gineering in academic world” and stated that forg-
ers use current practices of social engineering to trick
their victims (Dadkhah, Quliyeva, 2014). ey also re-
ported some cases of social engineering attacks in the
academic world. In March 2015, Mehdi Dadkhah and
colleagues discussed a new problem, “the fake con-
ferences” in their article entitled “Fake Conferenc-
es for Earning Real Money” (Dadkhah, et al., 2015a).
According to the authors, setting up fake conferences
has become an eective way of getting researchers’ ar-
ticles and publishing them in hijacked journals (Dad-
khah, et al., 2015a). In May 2015, Mehdi Dadkhah and
Mohammad Davarpanah Jazi published a letter to the
editor entitled “Anare Research Notes Journal Is Hi-
jacked” in the International Journal of Pharmacy and
Pharmaceutical Sciences (Dadkhah, Jazi, 2015a).
“How Can We Identify Hijacked Journals?” is the
title of another paper by Mehdi Dadkhah and col-
leagues in June 2015 that says most of the victims of
hijacked journals to date were from developing coun-
tries (Dadkhah, et al., 2015b). ey also mentioned
that the titles of many of hijacked journals did not ex-
press a particular subject area, and that helped the
hijackers publish articles in all areas of science. “An
Introduction to Journal Phishings and eir Detec-
tion Approach” is the title of technical paper by Me-
hdi Dadkhah and colleagues published in June 2015
(Dadkhah, et al., 2015c). In this paper, hijacked jour-
nals have been introduced as a new type of phishing
attacks because of the great use of techniques relat-
ed to such attacks. Another article (in press) by the
same authors, entitled “Hiring an Editorial Member
for Receiving Papers from Authors” addressed a new
technique by journal hijackers, i.e., “call for editor” in
hijacked journals (Dadkhah, Jazi, 2015b). ey stat-
ed that some of the journal hijackers were “pretend-
ing their fake website belongs to a real and prestig-
ious journal” and began to accept new editorial board
members by sending multiple calls for editorials to
respected and famous academic people, adding their
names to their editorial boards, and misusing those
names and the people’s reputations to engender trust
in other researchers and potential authors.
In June 2015, Mehrdad Jalalian published a rapid
communication entitled “e story of fake impact fac-
tor companies and how we detected them” (Jalalian,
2015a). In that article, he presented the story of some
of the main bogus impact factors including Universal
Impact Factor (UIF), Global Impact Factor (GIF), Cit-
efactor, and even a fake omson Reuters Company
(, that are most-
ly originated from the South Asian country [redacted].
Finally, “A second chance for authors of hijacked jour-
nals to publish in legitimate journals” is the title of
the most recent article about hijacked journals in June
2015 (Jalalian, 2015b). at article discusses the log-
ics behind allowing the victims of hijacked journals
to publish their article somewhere else, but in a real
journal without being concerned of duplicate publica-
tion (Jalalian, 2015b).
The journal hijackers; who are they?
Indeed, investigating the identity of journal hijackers
was not the purpose of our scientic research on hi-
jacked journals. However, we used the technical infor-
mation of any registered domain of hijacked journals
Mehrdad Jalalian,
Mehdi Dadkhah
77Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
that is publicly available in their “whois” section, and
other technical information to nd the similarities
between the dierent hijacked journals and to help us
to decide whether or not a journal has been hijacked.
Some of the journal hijackers have used various tech-
niques and approaches, including marketing, social
engineering, collecting publication fees, hiding their
identities when they register the domain names of the
fake websites, and using the same webhosting com-
panies or servers to host the content of their websites.
Researching every single case of hijacked journals and
putting all of the information together gave us a clear-
er image of the phenomenon of journal hijacking, and
we found that just a few people are behind most of the
dozens of hijacked journals.
As we mentioned earlier in the section on the his-
tory of hijacked journals, three of the persons of in-
terest in the world of journal hijackers are “the man
behind the pseudonym “James Robinson” who uses
a fake address in Dubai, United Arab Emirates, an
East European IT scientist (that we know he is an ex-
pert web designer because of his works) whom we call
“king of hijacked journals” and he uses the pseudo-
nym “Ruslan Boranbaev”, and an Assistant Professor
of the Saudi Arabia university [redacted] and his team
of WordPress experts from Pakistan. e so-called
“James Robinson”, however, is a man who used a sys-
tematic approach to accomplish his criminal goals,
but the design of his hijacked journals show that he
clearly has average or less knowledge of what happens
in the academic world, and his “limited” knowledge
and expertise related to web design and online jour-
nal management systems resulted in his creating low-
quality web pages for the aected journals. In fact, he
used the beginner level of Open Journal Systems (OJS)
soware, a product that was developed by the Pub-
lic Knowledge Project (PKP), a non-prot research in-
itiative. e only notable thing about “James Robin-
son” is that he is the man who mass hijacked too many
journals. He was very careful to hide his identity, but
he forgot to remove his footprints from his work es-
pecially when he used other pseudonyms for register-
ing fake websites, using some random emails in lling
the OJS contents (i.e., in the process of uploading the
stolen articles to the counterfeit websites), and using
the same server for hosting many of his fake websites.
e third person of interest in the world of jour-
nal hijackers, “Ruslan Boranbaev”, deserves to wear
the crown as the “king of the cybercriminals who
have hijacked journals”. As we stated earlier, he is the
man who registered the domain “”
on October 23, 2011,to hijack the Swiss journal “Ar-
chives des Science” the rst time such a foul act had
been committed in the history of academic world. He
also hijacked the journal “Wulfenia”, and created the
mixed hijacked-fake publisher “Science record jour-
nals” in August 2011 to host three hijacked journals
and seven fake journals. Later, he created fake web-
sites for many other journals, such as Pensee, Bothal-
ia, Jokull, Ciência e Técnica Vitivinícola, Doriana, Re-
vista Kasmera, Mitteilungen Klosterneuburg, Sylwan,
HFSP journal (his May 2015’s product), Cahiers des
Sciences Naturelles, and Natura.
Among all of the journal hijackers, the king of hi-
jacked journals is special for some not-so-special rea-
sons. First, he has hijacked almost as many journals
as “James Robinson”. Second, he did so using sever-
al techniques that are his hallmarks. ose hallmarks
have given us a clear understanding of what he has
done in the criminal eld of hijacking journals and
how he went about his dishonest and unscrupulous
work. One of his main hallmarks, which later were
used by “James Robinson”, the Saudi Arabia professor,
and others, is that he used services that hide the iden-
tity of the person who registered the domain name.
We know that he is also a reseller of the domain reg-
istration company [redacted], an ICANN accredited
registrar and a trusted name in the world of informa-
tion technology since 2001. He also uses the service of
“Whoisguard” to hide his identity but we can easily see
his footprints on his earliest hijacking jobs (Archives
des Sciences and Wulfenia).
Another notable nding in the journals hijacked
by “Ruslan Boranbaev” is that he designed sever-
al payment portals (such as leadingpublishersportal.
com, novelscientic, and taylorspublica- to collect money from authors and read-
ers (publication charges and subscription fees). Using
the online payment portals, he is paid by credit cards,
and he never discloses any personal information that
would be required for direct wire transfer to his bank
account. However, he collected publication fees for
his beginner journal-hijacking jobs (Archives des Sci-
ences and Wulfenia) using a bank account in Arme-
nia. Another main feature of the journals hijacked by
“Ruslan Boranbaev” is that he did not simply use email
soware, such as Microso Outlook; rather, he used
an online service that is used mainly for automated
broadcasting of mass emails and spam to make sure
the IP number of the servers of his hijacked journals
would not be blocked in the Internet for broadcast-
ing spam. Also, as another layer of security, “the geni-
us journal hijacker” uses dedicated servers to host his
fake websites. Nowadays, he also uses the [redacted]
service as another layer of security.
“Ruslan Boranbaev” has launched another brilliant
service in his factory of mass journal hijacking, i.e.,
“Web of Sciences!” Yes, this is exactly the title of the new
service provided to the world of journal hijackers in
2015 by the so-called “king of hijacked journals”. By reg-
The full story of 90 hijacked journals
from August 2011 to June 2015
78 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
istering the domain “” and hosting
it on a dedicated server in France, while using a mail-
ing list research facility in England, he has introduced
an automated system for collecting the email addresses
of academic people around the world! eir names are
related to specic keywords, and he can automatically
send call-for-paper spams to them. By adding this ser-
vice to his work, he is using a method that none of the
real academic publishers has used to date, which indi-
cates that he is using scientic methods and a system-
atic approach to do his dishonest work. e novel ideas
of “Ruslan Boranbaev” are not limited to what we have
presented so far; his masterpiece is creating a fake pub-
lisher entitled “Revistas Academicas”, when he added
four international journals, including Natura and Do-
riana, under the title of Revistas Academicas and cheat-
ed the omson Reuters and convinced them to cre-
ate hyperlinks from the master journal list of omson
Reuters to the counterfeit website “revistas-academicas.
com”. Later, Mehrdad Jalalian called omson Reuters
and informed them about the hyperlinks to hijacked
journals from their database, and they removed the hy-
Interesting cases of hijacked journals
is section presents the latest update of hijacked jour-
nals and consists of all of the hijacked journals we de-
tected till June 15, 2015. Reading the story of some hi-
jacked journals will inform readers about how they
came into existence, how they are managed, and the
approaches they use to cheat and steal money from aca-
demic researchers; we expect that the readers will want
to use this information to avoid such hijacked journals
in the future. Since telling the full story of each of the
dozens of hijacked journals may not be of interest to
the readers and since a journal paper with its word and
page number limitations is not the appropriate place
for it, only the interesting stories that have some educa-
tional value are presented here. Even so, we did list all
of the hijacked journals we detected in Table 1. It is also
important to note that some of the hijacked journals
have more than one fake website address, as evidenced
by what happened to the Texas Journal of Science, Ar-
chives des Sciences, Wulfenia, Anidad, and the Jokull
journal. Also, some of the fake websites for single jour-
nals are registered by the same journal hijacker, and
some of them are registered by dierent individuals.
Cases group 1:
Afinidad journal and its three fake websites
According to the Journal Citation Report (JCR,
omson Reuters), Anidad is a bimonthly journal
published by “Asociacion de Quimicos del Institu-
to Quimico de Sarria” in Barcelona (Spain) that cov-
ers Chemistry science. e Anidad journal has been
hijacked four times using four dierent counterfeit
websites, i.e. “http://www.a” (registered
in November 2013), “http://www.a”
(registered in January 2014), “http://www.bdssmg-” (registered in January 2014) and “http://www.
a” (registered in January 2014). e
domain “a” was registered rst by Francis
B. Anidad in December 2000, using the email ad-
dress [redacted] as the domain registrant. We have
no idea what the purpose and content of this website
were during 2000-2005, but it seems that Mr. Anidad
was a distinguished researcher in a university in the
U.S. It seems he did not used his website for long time
and the website has been oine at least since Febru-
ary 2005. We know that the domain name was for sale
in 2011, and a journal hijacker bought it on November
26, 2013, and hide his identity using the service pro-
vided by [redacted]. According to the who is techni-
cal detail, the hijacked journal on “A” used
“” and “ns829. websitewel-” as the Name Servers. e journal hijack-
er used the Joomla open-source content management
system (CMS) to design the pages of the hijacked jour-
nal. Figure 1 shows the text that was available on the
homepage of the hijacked journal on December 23,
2013. e hijacked journal (the fake website at ani- was active at least until December 2014, but,
currently, it is inactive. It seems that the hijacker stole
both the articles and money of the academic research-
ers and ran away.
e second counterfeit domain for the Anidad
journal was “A”. is domain was
registered on January 14, 2014, by a journal hijacker,
using the pseudonym “Jane Madlan” and the email
address [redacted]. We believe that the pseudonym
“Jane Madlan” and its related email address belong to
the mass journal hijacker “James Robinson”, whose
story was presented earlier in this paper. e domain
used the servers named “”
and “” from the time of
registration to the present time. In contrast to “A-,” which used Joomla CMS, the fake website
of “A” used the open journal system
(OJS) to manage the content of the website. Again, in
contrast to the rst fake website, the second fake web-
site set the “robot.txt” le on the root or the server to
be inaccessible by any robots that could archive the
content of its pages.
Figure 1 shows that a link to the prole of the real
journal in the master journal list (MJL) of omson
Reuters was available from the homepage of the fake
website to show readers that the journal was listed
with omson Reuters; however, we checked om-
son Reuters, and there was no link to the fake web-
Mehrdad Jalalian,
Mehdi Dadkhah
79Geographica Pannonica • Volume 19, Issue 2, 73-87 ( June 2015)
site in the MJL, but there was a link to the real journal
website at “” Our research showed
that the exact Uniform Resource Locator (URL) for
the real journal is “nidad.
asp”.We contacted the sta in the editorial oce of
the real journal, and they conrmed that “Anidad-” is a fake website, and the contact details of
the journal are “”andlidia.sirera@ e current URL for the legitimate journal is
We also found a “hijacker against hijacker” sto-
ry between the two hijackers who created two dier-
ent fake websites for Anidad journal. On January
6, 2015, we received an email from a researcher who
had contacted the “A” website and asked
which website was real, “A” or “Anidad-”. We should mention that we did not edit
the content of the web pages (wherever we present-
ed them in this paper) or their email replies. e hi-
jacker behind the “A” responded to the au-
thor as follows: “Respected Author, anks for your
kind message, please note that http://anidadjournal.
es was not journal real website which was a fake. Do
not send papers to that site. Submit your papers di-
rectly to our email ID at a,
an k in g Yo u”.
As we mentioned earlier, there are four counter-
feit websites for the Anidad Journal. e third and
fourth counterfeit websites for this journal are “http://
www.a” and “http:///www.bdssmg-”.Both of these domains were registered by the
mass journal hijacker “James Robinson” on January
12, 2014, using the registrant email address [redact-
ed] and the pseudonym “James Robinson” exactly two
days before he registered the second domain “anid-” for Anidad journal. As we see, this is
the only case in the history of hijacked journals that
three fake websites are created for a single journal
within two days. At the time of registration of third
fake domain, he set the Name Servers of this website
to [redacted] servers, but three days later, he set them
to “,”, exactly the Name Servers that were used for
the second counterfeit website. He also used the ser-
vice of [redacted] to hide his identity on January 15,
2015. It seems that, aer registering the “.org” domain
for Anidad journal, he thought it would be better to
register the“.es” domain (the domain extension that
is specic to Spain). e obvious intent was to have
the authors think that the “.es” domain for that jour-
nal was the real website of Anidad in case they had
concerns that the “.org” domain was fake. As has been
noted so far in this paper and as we shall continue to
see from here to the end of the paper, the journal hi-
jackers are quite good in their social engineering tech-
niques! Finally, on May 5, 2015, we checked the web-
site of “a,” and it seemed that the
website currently is being used for testing purposes
for other journals that have been hijacked by “James
Cases group 2:
Archives des Sciences and Wulfenia
We tell the story of these two hijacked journals togeth-
er because we believe they were hijacked by the same
person. Also, they were the rst journals in the aca-
demic world to be hijacked, together with the three
hijacked journals in the list of science record journals
Figure 1. Homepage content of the hijacked journal Afinidad on ‘” on December 23, 2013*
* Using the word “Researches” shows the hijacker behind Afinidad is not a native English speaker (In English, the words “research,”
equipment,” and “literature” are considered to be collective nouns, and the plural versions are never used)
The full story of 90 hijacked journals
from August 2011 to June 2015
80 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
(Jalalian, Mahboobi, 2014; Jalalian, 2014a). As we men-
tioned earlier, Archives des Sciences is the rst journal
in the world that cybercriminals hijacked (Although
before registering fake website for it, the same cyber-
criminal had registered the website for science record
journals in August 2011), and the cybercriminal did so
by creating the fake domain “” for
it on October 23, 2011 (Jalalian, Mahboobi, 2014; Jala-
lian, 2014a). e same person created a second fake
website for this journal by registering the domain “ar-” on September 2, 2012; and this
person was the man we called the King of hijacked
journals. In designing the website for this hijacked
journal, his Majesty, the King of hijacked journals,
stole the peer review template form from the Canadi-
an Center of Science and Education (CCSE) (Jalalian,
Mahboobi, 2014), a reputable publisher in Canada. He
also got the idea of 35$ discount for wire transferred
publication fees, from that Canadian publisher, that
seems the website of CCSE was an origin of his copy-
paste jobs in creating and managing the rst hijacked
journals. e rst counterfeit website later was redi-
rected to a second counterfeit website, i.e., “archiveof-”, just one day aer “Ruslan Boranbaev”
registered the second fake domain for that hijacked
journal. Having hijacked several other journals, e.g.,
Sylwan, Doriana, Nature, Kasmera, and other, the
King failed to maintain his love for his very rst work,
“” and he did not renew that do-
main aer the rst two years. e domain of his rst
hijacked journal was made available for sale in Janu-
ary 2014, shortly aer the redemption period.
e domain “” used the Name
Servers “”and “ns3044.hostga-” when they were registered, but, later, they
were moved to “” and “,
which were exactly the same servers that were used by
the second fake website, “”. On
September 4, 2014, the registrant and administrative
email of the second fake website were changed to sci-, and the name of adminis-
trator of the domain was changed to the pseudonym,
“Ruslan Boranbaev” with a fake address in the Unit-
ed States. at pseudonym also was used to register
a fake website for Wulfenia journal and some of the
online portals for collecting the publication charges
of the hijacked journal “Achieves des Sciences”. e
second domain for the hijacked journal also expired,
and the King never renewed it. All of the articles that
were submitted by authors to both of the fake web-
sites also were gone; however, someone from Israel has
owned the domain of the stolen journal since Decem-
ber 4, 2014.
Regarding the Wulfenia journal, the cybercrim-
inals registered three fake domains, i.e., “wulfenia-,” “,” and “multidis-” for the journal on August 2,
August 5, and September 13, 2012, respectively. We be-
lieve that two of them, i.e., multidisciplinarywulfenia.
org and, were hijacked by “Ruslan
Boranbaev,”and the other one, i.e., wulfeniajournal.
com, was registered by “James Robinson” or someone
who uses a similar technical approach. Among the
three fake websites, two of them have gone oine, but
the “” website is still
doing its work.
e way the hijacked journals Archives des Science
and Wulfenia collected publication charges from au-
thors is notable. e person of interest used several
types of payment methods by which the authors could
pay the journal hijackers, including wire transfer to
two bank accounts in Armenia, e-currency trans-
fer service “Alertpay”, and online payment by credit
cards through a payment portal (novelscienticnd- It seems that to make sure the identity of
“the genius king” was not discovered, he used a third-
party account number as the operator instead of his
own bank account number. e “Alertpay” money
transfer system also protects the identity of the recipi-
ent. Also, rather than using the online payment portal
of other companies, “Ruslan Boranbaev”, in 2012, cre-
ated his own online payment portal at http://novelsci-
entic However, his rst online payment
portal, was gone, and he created other online payment
portals for his other fraudulent sites. He also regis-
tered a second portal on “” for
online payments by authors of Archives des Science
and Wulfenia. It seems that hijacking the journals Ar-
chives des Science and Wulfenia, and his work on “sci-
ence record journals” acted as his self-training course
to test and improve his abilities on all aspects of hi-
jacking journals, hiding the identity, stealing articles,
and collecting money without revealing his name.
us, he developed his own style and approach in all
aspects of hijacking journals, and he used his expe-
rience to successfully hijack the journals Sylwan, Re-
vista Kasmera, and Ciência e Técnica Vitivinícola, as
well as his 2013 and 2015 masterpieces:“Revistas Aca-
demicas” and the fake “Web of sciences”.
Cases group 3:
Bothalia, Pensee, Jokull, Ciência e Técnica
Vitivinícola, Doriana, Kasmera, Mitteilungen
Klosterneuburg, Sylwan, HFSP journal, Cahiers
des Sciences Naturelles, and Natura
e rst hijacked journal among these cases was “Pen-
see”. e acceptance letters and the technical detail of
the domains under this category are essentially the
same, and all of them used the same online payment
portals to collect the publication charges. None of
Mehrdad Jalalian,
Mehdi Dadkhah
81Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
these domains accepted money via wire transfer, Pay-
pal, Western Union, or any other method that would
allow the payer to identify the recipient; rather, all
of the domains required that payments be made on-
line using a credit card. e person of interest cre-
ated several online payment portals, including “re-”. “”,
“”, “”, and “re-” to collect the publication charg-
es of the Revistas Academicas journals, one of the
Jokull hijacked journals(the one that uses the domain
“” rather than the one that uses the
domain “”), Ciência e TécnicaVitiviní-
cola, and Sylwan. We also found that our King of hi-
jacked journals also created many other websites and
online payment portals to be used for his other busi-
ness, which is fake online shopping centers that pre-
tend to sell herbal medicine, Viagra, and other health-
related products; the customer pays the price, but the
goods never come! Indeed, we have some informa-
tion that supports the people behind academic scam
are also involved in other similar jobs; the owner of
multiple big publishers of tens of questionable jour-
nals in North America is involved in online gambling
and the founder of one of the most famous fake im-
pact factor companies in India seems to be also in-
volved in online escort service using the porno and
escort website of [redacted]. Maybe these pieces of in-
formation can be used in psychological and behavio-
ral analysis of the academic cybercriminals in future
by cyber psychology researchers.
e hijacked journal Sylwan has an interesting sto-
ry. We think that Sylwan was the most active hijacked
journal in 2014. e technical detail we found in hi-
jacked journal Sylwan were the golden keys that gave
us valuable information that showed all of the jour-
nals in this group have been hijacked by the same per-
son (i. e., the same acceptance letters, the same on-
line portals for collecting the publication charges, the
same web design, the same call for paper spams, etc.).
e domain “” was registered on July
31, 2008, for the rst time, and it became inactive and
expired in 2010.On April 25, 2014,it was registered
again by “Ruslan Boranbaev” to be misused in hijack-
ing of the journal Sylwan. In our investigation of the
web pages of the Sylwan journal, we found a specif-
ic web page at “
html. e web designer of that website used the term
“artykul.html” instead of “article.html” in that URL.
We considered this information as a key to the con-
rmation of the mother tongue of “Ruslan Boranbaev”
because web designers sometimes use their mother
tongue in choosing lenames.
Among the journals in this category, the South Af-
rican journal “Bothalia” has a unique story. is jour-
nal experienced a double attack by the same hijack-
er who created two fake websites for it, but it seems
(not conrmed yet) the real journal was victorious in
changing the ownership of one of those fake websites
to the real journal. e rst fake domain (Bothalia.
com) was registered by “Ruslan Boranbaev” on July
29, 2013, and he hide his identity as the registrant of
that domain on the same day using the service of
[redacted],however, beginning on August 20, 2014, he
used [redacted] to hide the identity of the owner of
the domain. Later, in December 2014, the journal ad-
min detail changed and the domain was redirected to
the website of the legitimate journal. We did not con-
tact the real journal, but it seems that the South Afri-
can publisher of the journal “Bothalia” was victorious
in defeating the hijackers, or for any other reason, the
fake domain is redirected to the real journal. However,
“Ruslan Boranbaev”, seeking revenge, decided to cre-
ate a second fake domain entitled “”
for the aected journal.
Other famous hijacked journals in this category are
“Mitteilungen Klosterneuburg” and “Pensee”; and the
newest one in this category is the HFSP journal that
has been hijacked in May 2015.We think that hijack-
ing of the journal “Pensee” acted as the Renaissance
in the history of hijacked journals as it was the techni-
cal advance from the rst cases of journal hijackings
to the era of modern and scientic approaches in jour-
nal hijacking. Also, the journal “Pensee” provided us
some key information that linked Ruslan Boranbaev
to the “Science record journals”.
Finally, the main notable work among the jour-
nals in this category is “Revistas Academicas”. Aer
his amateur work of gathering three hijacked journals
and seven fake journals under the title of “Science re-
cord journals” in during 2011-2013, Ruslan Boranbaev
registered the domain “” on
October 16, 2012, using a fake address in Dublin, Ire-
land, to launch the most dangerous project to date in
journal hijackings. is website began by hosting four
hijacked journals with the rst three being om-
son Reuter’s indexed journals, i.e., “Natura” from e
Netherlands, “Doriana” from Italy, and “Cahiers des
Sciences Naturelles” from Switzerland. He also add-
ed two completely fake journals to the revistas aca-
demicas: Mexican Journal of International Studies,
and Mexico Journal of Multidisciplinary Sciences.
Having a mixture of hijacked journals and fake jour-
nals under the same title was exactly what he did be-
fore on his ‘Science record journals” in August 2011.
e most notable thing about the “Revistas academi-
cas” is that “the genius king of hijacked journals” con-
vinced omson Reuters to provide a hyperlink from
their master journal list to the fake websites of the rst
three journals ( is made
The full story of 90 hijacked journals
from August 2011 to June 2015
82 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
the authors feel that website was the real website of
those journals, and omson Reuters validated those
websites. We called omson Reuters’ oce and pro-
vided them with proof that “”
is a counterfeit website that was created by journal hi-
jackers. Subsequently, omson Reuters removed the
hyperlinks to the fake website of the journals Doriana,
Natura, and Cahiers des Sciences Naturelles. However,
there is still a big concern about the standard operat-
ing procedures (if there are any) in omson Reuters
when they add the link to a website from their master
journal list. e big question is that how they add hy-
perlinks to fake websites simply aer a journal hijack-
er asks them to do so! We also found that the same
problem happened on the hijacked journal “GMP re-
view” from England, and “Allgemeine Forst und Jag-
dzeitung” from Germany. On May 17, 2015, we con-
tacted the omson Reuters to remove the hyperlink
to the fake website of GMP review ( We should say that both of the Eng-
land and Germany journals are hijacked by the same
person and it seems the journal hijackers learn from
each other.
e King also upgraded the equipment of his jour-
nal hijacking factory by creating another portal that
uses technical research on the Internet to acquire the
email addresses of academic people around the world
by misusing the name of the University of [redacted]
in England. An example of the online laboratory for
development of call for papers spam for the hijacked
journal “Revista Kasmera” on the fake ‘web of scienc-
es’ portal was available during May 2015 on the link
Was it the full story?
Did we miss any interesting case?
We stop telling the stories of the hijacked journals at
this point. ere are still a lot shocking stories about
this phenomenon, including cybercriminals who can
be compared with James Robinson and the Ruslan
Boranbaev, especially those who “intentionally” hi-
jacked some journals to integrate them with specic
conferences, but we prefer to keep silent about those
cases. Telling their stories could uncover the identi-
ty of some famous individuals, including professors
and lecturers, managers of some of the English edit-
ing companies who are actively involved in publishing
the articles of their clients in hijacked journals, some
of the executive directors of international conferenc-
es (who unintentionally integrated their conferences
with some of the hijacked journals and tried to pub-
lish the full text articles of their authors in hijacked
journals), some IT technicians, some postgraduate
students, and some Ph.D. scholars. We prefer to think
about the reasons the academic world is infected by
the virus of hijacked journals and fake publishers
than to waste our time and energy to identify the jour-
nal hijackers or any other cybercriminals by name.
Hijacked journal list 2015
We already have given a lot of thought to hijacked jour-
nals, and the hijacked journal list 2015 (Table 1) is the
second list aer we published the rst list of hijacked
journals in June 2014. Other lists of hijacked journals
have been developed and is being maintained by tens
of other scholars in their weblogs. However, we believe
that publishing a list of hijacked journals and also a
list of questionable journals is just a short-term med-
icine for the progressive threat to the validity and re-
liability of published science. We believe that the new
hijacked journals will publish tens or hundreds of ar-
ticles before they are detected and added to any list of
hijacked journals. e same story is true for the ques-
tionable journals. e great man of the history of lit-
erature, the Iranian ancient poet “Ferdowsi” criticizes
using antidotes aer death in his epic poem and story
“Rostam and Sohrab” by saying that it is “too late for
herbicide”. erefore, we believe it is better to vacci-
nate the academic world against the poisonous eects
of both the hijacked and questionable journals before
it is too late. We specically mean that developing a
list of “GOOD JOURNALS” is a far better and more
eective way to achieve that goal than publishing lists
of “BAD JOURNALS” (at refers to the questiona-
ble journals), “HIJACKED JOURNALS” (that refers
to the legitimate journals that their online identity is
stolen by cybercriminals), and “FAKE PUBLISHERS”
(that refers to the publishers of journals that are not
registered ocially by real persons or companies). De-
veloping lists of quality journals and evaluating the
quality of the academic journals on each of the main
aspects of scientic publishing, such as the editorial
workow, peer-review process, data quality, readabili-
ty, searchability, accessibility, and other aspects, is our
current concern and the topic of our research. Ask-
ing the researchers and authors to stick only to the list
of quality journals will automatically protect the aca-
demic world against any threat by questionable jour-
nals, hijacked journals and fake publishers.
We believe that the quantitative measures (Impact
factors, H-index, etc.) are not developed to evaluate
the quality of scientic journals; but to be used for li-
brary and information science research; and their
metrics should not be presented on the rst page of
scientic journals, otherwise they will mislead the re-
searchers, authors, and even the research policy mak-
ers. We also know that it is the most dicult job to
develop criteria for evaluating the quality of scientif-
ic journals when it is a matter of quality, not quantity
Mehrdad Jalalian,
Mehdi Dadkhah
83Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
and metrics. By saying that we believe the qualitative
approach in evaluating the quality of scientic jour-
nals has advantages over the metrics and quantitative
measures, we mean that even a new journal that con-
siders all of the standards of high-quality peer review,
editorial workow, and publishing, can also be treat-
ed as a top-quality journal even though it may be in its
rst year of publication.
Speaking on hijacked journals, another piece of in-
formation that we are going to share with academ-
ia is that we believe that the authors who published
in hijacked journals should have a second chance to
publish their articles in legitimate journals (Jalalian,
2015b). Finally, we close this discussion by presenting
the current list of hijacked journals (Table 1).
Table 1. List of 90 hijacked journals from August 11, 2011 to June 15, 2015,
developed by Mehrdad Jalalian and Mehdi Dadkhah
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
1Afinidad (0001-9704)
2Agrochimica (0002-1857)
3 Allgemeine Forst und Jagdzeitung (0002-5852)
4 Ama, Agricultural Mechanization in Asia, Africa & Latin America (
5 Anais da Academia Brasileira de Ciências (0001-3765)
6 Anare Research Notes (0729-6533)
7Archives des sciences
8 Aula Orientalis (0212-5730)
9 Ayer: revista de historia contemporánea (1134-2277)
10 Azariana (2075-7271, 2075-4191)
11 Baltica (0067-3064)
12 Bars (1800 -556X)
13 Boletim de Ciências Geodésicas (1413-4853)
14 Bothalia (0006-8241, 2311-9284) (The counterfeit domain
“” is currently redirected to the authentic website of the
legitimate journal)
15 Bradleya (0265-086X)
16 BRI’s Journal of Advances in Science and Technology (0971-9563)
17 Bulletin des Seances de l’Academie Royale des Sciences d’Outre-Mer
18 Cadmo (1122-5165)
The full story of 90 hijacked journals
from August 2011 to June 2015
84 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
19 Cahiers de paiolive (1969-2803)
20 Cahiers des Sciences Naturelles (1420-4223)
21 Chemical and Process Engineering (0208-6425)
22 Chemical modelling (1472-0973, 1472-0965)
23 Ciência e TécnicaVitivinícola (0254-0223)
issues&pid=0254-0223&lng=pt&nrm=iso (old issues)
24 Contributions in Science (Natural History Museum of Los Angeles
County Contributions in Science) (0459-8113)
25 Der Präparator (Praparator) (0032-6542)
26 Doriana (Annali del MuseoCivico di Storia Naturali Giacomo Doria,
Supplemento) (0417-9927)
27 Du-Die Zeitschrift der Kultur (0012-6837)
(This is a free subdomain on the domain “”
which is a free hosting provider)
28 Education (0013-1172)
29 Emergencias (1137-6821)
30 Entomon (0377-9335)
31 Ephemera (1298-0595)
32 Epistemologia (0392-9760, 1825-652X)
33 Fauna Rossii I Sopredel Nykh Stran (1026-5619)
34 Forschungsberichte - Nationalpark Berchtesgaden (0172-0023)
35 Fourrages (0429-2766), and
36 Gaia (Athens) (1107-311X)
37 Gazi Univertesi Gazi Egitim Fakultesi Dergisi (1300-1876)
38 Glasnik Odjeljenja Prirodnih Nauka -
CrnogorskaAkademijaNaukaiUmjetnosti (0350-5464)
39 GMP Review (1476-4547)
40 HFSP journal.
Formerly known as HFSP Journal (2007-2010 ISSN 2155-3769 (Print),
2155-3777 (Online) (The journal has ceased publication):
Currently known as Frontiers in Life Science (2011-current):
41 Hospital Purchasing Management (0163-1322)
42 Innovaciencia
43 Inteciencia (0378-1844)
Mehrdad Jalalian,
Mehdi Dadkhah
85Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
44 Jamaican Journal of Science and Technology (1016-2054)
45 Italianistica: Rivista di Letteratura Italiana (0391-3368, 1724-1677)
46 Jökull (0449-0576)
47 Journal of the American Medical Association (JAMA) (0098-7484,
48 Journal of scientific research and development (1115-7569)
49 Kardiologiia (0022-9040)
50 LudusVitalis (1133-5165)
51 Magnt Research Report (1444-8939)
52 Martinia (0297-0902)
53 Mitteilungen Klosterneuburg (0007-5922)
54 Multitemas (1414-512X)
55 Nationalpark-Forschung In Der Schweiz (1022-9493)
56 Natura (0028-0631)
57 Nautilus (0028-1344)
58 Odonatological Abstract Service (1438-0269)
59 OtechestvennaiaIstoriia (ISSN: 0869-5687)
60 Pensee (Pensée, La) (0031-4773)
61 Philippine Scientist (0079-1466)
62 Politica Economica ( Journal of economic policy) (1120-9496)
63 Proceeding of the Bulgarian Academy of Sciences (1310-1331)
64 PSR health research bulletin
65 Reef Resources Assessment and Management Technical Paper (1607-
66 Research-Technology Management (0895-6308)
67 Revista Kasmera (0075-5222)
68 Rivista di Biologia (Perugia) (Also known as Biology forum) (ISSN:
0035- 6050)
69 Revue Internationale de PsychologieSociale (0992-986X)
70 Revue scientifique et technique (Revistacientifica y técnica) (Scientific
and technical review) (0253-1933)
The full story of 90 hijacked journals
from August 2011 to June 2015
86 Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
Legitimate journal (ISSN), authentic website(s) Hijacked journal, the counterfeit website(s)
71 Saussurea: Journal de la Société botanique de Genève (0373-2525)
72 Scholarly Research Exchange (1687-8302)
(This is a free subdomain on the domain “”
which is a free hosting provider)
73 Science and Nature (0193-3396). Also known as “The journal of
Marxist philosophy for natural scientists”
74 Science Series data report (Irregular ISSN), former title for “Fisheries
research data report” (ISSN: 0264-5130)
75 Scientia Guaianae (0798-1120)
76 Scientific Khyber (1017-3471)
77 Social Behavior and Personality (0301–2212)
78 Survey methodology (0714-0045)
79 Sylwan (0039-7660)
80 Systems Science (2077-5423, 0137-1223)
81 Tekstil (0492-5882)
82 Teoriiai Praktika Fizicheskoi Kul’tury (0040-3601)
83 Terapevticheskii Arkhiv (0040-3660)
84 Texas Journal of Science
85 The Journal Of Technology (1012340-7)
86 The Veliger (0042-3211)
87 Vitae Revista (0121-4004)
88 Walia (1026-3861)
89 WIWO report (1385-3287)
90 Wulfenia (1561-882X)
Mehrdad Jalalian,
Mehdi Dadkhah
87Geographica Pannonica • Volume 19, Issue 2, 73-87 (June 2015)
e authors deeply thank all of the scholars around the
world that updated us with valuable information and
shared their experience on publishing in hijacked jour-
nals; the omson Reuter’s technical ocers and edi-
tors for their action against fake websites of hijacked
journals based on our reports, the editors of the legit-
imate journals for their contribution in this research
and providing us valuable and valid information, Dr.
David Bimler from new Zealand for being our original
source for identifying the hijacked journal “Intercien-
tia”, Dr. Amin Daneshmand Malayeri from Iran for
being a source of valuable information about some of
the hijacked journals, and professor Dr. Filistea Naudé
from Unisa Science Library in South Africa for provid-
ing us valid and useful library information about the
legitimate journal of some of hijacked journals.
Jalalian, M., Mahboobi, H. 2014. Hijacked Journals
and Predatory Publishers: Is ere a Need to Re-
ink How to Assess the Quality of Academic Re-
search? Walailak J Sci Technol. (WJST) 11-5, 389-94.
doi: 10.14456/wjst.2014.16. Available from: http://
Jalalian M. 2014a. Journal hijackers target science and
open access. Research information. Available from:
Jalalian, M., Mahboobi, H. 2013. New corruption de-
tected: Bogus impact factors compiled by fake or-
ganizations. Electronic physician 5-3, 685-6. doi:
Jalalian, M. 2015a. e story of fake impact factor
companies and how we detected them. Electronic
physician 7-2, 1069-70. doi: 10.14661/2015.1069-1072.
Jalalian, M. 2015b. A second chance for authors of
hijacked journals to publish in legitimate jour-
nals. Electronic physician 7-2, 1017-1018. DOI:
Jalalian, M. 2014b. Hijacked journals are attacking the
reliability and validity of medical research. Elec-
tronic physician 6-4, 925-6. doi: 10.14661/2014.925-
926. PMID: 25763169, PMCID: PMC4324258.
Lukić, T., Blešić, I., Basarin, B., Ivanovićm Bibić, Lj.,
Milošević, D., Sakulski, D. 2014. Predatory and
Fake Scientic Journals/Publishers– A Global Out-
break with Rising Trend: A Review. Geographica
Pannonica 18-3, 69-81.
Dadkhah, M., Quliyeva, A. 2014. Social engineering
in academic world. J Contemp Appl Math. 4-2, 3-5.
Dadkhah, M., Davarpanah, J.M., Pacukaj, S. 2015a.
Fake Conferences for Earning Real Money. Mediterr
J Soc Sci. 6-2, 11-12. doi: 10.5901/mjss.2015.v6n2p11.
Dadkhah, M., Jazi, M.D. 2015a. Anare Research Notes
Journal Is Hijacked. International Journal of Phar-
macy and Pharmaceutical Sciences 7-5, pp. 1.
Dadkhah, M., Obeidat, M.M., Jazi, M.D., Sutikno, T.,
Riyadi, M.A. 2015b. How Can We Identify Hijacked
Journals? Bulletin of Electrical Engineering and In-
formatics 4-2, 83-87. DOI: 10.12928/eei.v4i2.449
Dadkhah, M., Sutikno, T., Jazi, M.D., Stiawan, D.
2015c. An Introduction to Journal Phishings and
eir Detection Approach. TE L KOM NIK A Te le-
communication, Computing, Electronics and Con-
trol 13-2, 373-380, 2015. DOI:10.12928/TELKOMNI-
Dadkhah, M., Jazi, M. D. 2015 (In Press). Hiring Edi-
torial Member for Receiving Papers from Authors.
Mediterranean Journal of Social Sciences 6-4.
... There is a voluminous literature on predatory journals and publishers, but another dangerous and unethical phenomena in academic publishing are 'hijacked journals'. This term was coined by Dr. Mehrdad Jalalian, an Iranian editor, to describe fake websites that mimic authentic journals to attract submissions (Jalalian & Dadkhah, 2015). Hijacked journals are often more difficult to detect than other publishing predators. ...
... Hijackers receive publication charges and may actually post the prospective author's papers on the fake website-for a while. Hijackers use the ISSN and name of the original journal in their fake website (or sometimes by doing small changes in the name of original journal) (Jalalian & Dadkhah, 2015). Exposing hijacked journals is not possible without developing good information technology solutions and an educational plan. ...
... A number of examples can demonstrate that criminals are willing to work hard to deceive academics. In the case of journal hijacking, criminals have made the effort to convince Thomson Reuters to add links to their fake websites for legitimate journals onto the master journal list (Jalalian & Dadkhah, 2015). In one case-study, Trapp (2020) reports how hijackers have identified email addresses and profiles of legitimate academics, create fake copies of these digital identities, and contacted a journal to lead special issues, assumedly to demand money for publishing articles. ...
Full-text available
The internet has brought both benefits and risks for academia. Predatory publishing and conferences are well‐known, and less common academic cybercrime has also been identified, such as fraudulent conferences and journal hijacking. This study aimed to explore one further possible method for deceiving academics, namely, fraudulent accounts on social media. The study focused on two easily exploitable gaps in journals' social media engagement: whether journals have accounts on the most common social media platforms and whether journals use the same username across all their accounts. Evidence of fraudulent social media accounts was also sought. Drawing from a sample of 50 journals, the results indicate that many journals do not use social media, journals often use multiple usernames and fewer than half the accounts were officially verified. Some apparently fraudulent activity was found, but this was notably limited in scope and appeared to be politically rather than economically oriented. Further potential for deception was evident in accounts unaffiliated with a journal but registered with the journal's usernames and in the opportunity to create new social media accounts with journals' usernames. Journals are recommended to recognize this threat and some possible countermeasures are suggested.
... Сериозен проблем на научното публикуване е и появата на имитиращи версии на реномирани научни списания. Терминът е използван за първи път в началото на 2012 г. и означава кражба на престижа на законно научно списание чрез изграждане на фалшив уебсайт (Jalalian et al., 2015). Фалшивите издатели или списания имат характеристики, близки до тези на маргиналните, а именно обикновено не спазват цел и обхват на оригиналното автентично списание, а публикуваните документи са достъпни за кратък период от време Dadkhah & Borchardt, 2016;Esfe et al., 2015;Mehrpour et al., 2014). ...
Limiting fake scientific publishing requires future authors, especially PhD students, postdoctoral researchers and young scientists, to be aware of the dangers of marginal and fake journals and to be extremely careful when submitting their manuscripts. The study, analysis and summary of advanced practices is presented in the paper which is related with the experience concerning the development of adequate trainings for the formation of oral and written communication skills in higher education. The results show that they are mostly focused on the creation of the scientific text and its successful presentation, but not to the recognition of the emerging risks in scientific publishing. On the other hand, a survey of 232 people from the academic community of Sofia University shows that some of them (mainly PhD students and young scientists) is not familiar with the manifestations of "predatory" publishing. One of the effective ways to overcome these existing deficits is to organize and to conduct specialized trainings aimed at familiarizing and clarifying the problems of scientific communication and opening up opportunities for the formation of skills for successful publishing. The article proposes a curriculum for a university training course for PhD students and young scientists. The training focus is the practical skills forming about choice of suitable journals for presentation the scientific results as well as the manifestations of marginal scientific publishing and ways to avoid them by solving different cases. The proposed course is approbated and evaluated within the realized trainings of Master’s students, PhD students and young scientists from the Faculty of Chemistry and Pharmacy of Sofia University through a survey that shows its usefulness and proves the necessity of including such trainings in the curricula of all levels of education in Bulgarian universities.
... Park et al. (2019) regarded all the predatory journals, pseudo journals and hijacked journals (Jalalian. & Mahboobi, 2014;Jalalian & Dadkhah, 2015) that represent the undesirable aspects of the scholarly communication ecosystem as 'questionable journals', thereby regarding 'questionable' as a deviation from the normal practice of the scholarly ecosystem. Anderson (2019) broadens the term by distinguishing between 'red-light practices that are patently deceptive and yellow-light practices that are less clearly deceptive but still questionable'. ...
Full-text available
There is widespread agreement that questionable journals pose a threat to the integrity of scholarly publishing and the credibility of academic research. However, there is currently no agreed upon definition of what constitutes a questionable journal. The characteristics of questionable journals have not been delineated, standardized, nor broadly accepted. A series of policy initiatives by the central Chinese government has culminated in the now Early Warning List of International Journals, released by the National Science Library of the Chinese Academy of Sciences – 65 journals that Chinese scholars should be wary of publishing in. Taking this List as a litmus test, we analyze the characteristics of each journal focusing on a definitive set of factors that may see a journal included on the List. We not only include the factors applied by the publisher of the List, such as the article processing charges, the retraction rate etc., but also investigate several other factors. Most of the factors are found to influence the List, while some are not. In fact, many of the journals on the List are highly ranked by impact factors. Our study aims to provide empirical information supporting global attempts to mitigate the pervading phenomenon of questionable journals.
... In addition, let us note that the observed changes in the operational mode of the journal, most notably, the increased output, bear some resemblance to how hijacked journals operate (Abalkina, in press;Jalalian & Dadkhah, 2015). ...
Probabilistic text generators have been used to produce fake scientific papers for more than a decade. Such nonsensical papers are easily detected by both human and machine. Now more complex AI-powered generation techniques produce texts indistinguishable from that of humans and the generation of scientific texts from a few keywords has been documented. Our study introduces the concept of tortured phrases: unexpected weird phrases in lieu of established ones, such as 'counterfeit consciousness' instead of 'artificial intelligence.' We combed the literature for tortured phrases and study one reputable journal where these concentrated en masse. Hypothesising the use of advanced language models we ran a detector on the abstracts of recent articles of this journal and on several control sets. The pairwise comparisons reveal a concentration of abstracts flagged as 'synthetic' in the journal. We also highlight irregularities in its operation, such as abrupt changes in editorial timelines. We substantiate our call for investigation by analysing several individual dubious articles, stressing questionable features: tortured writing style, citation of non-existent literature, and unacknowledged image reuse. Surprisingly, some websites offer to rewrite texts for free, generating gobbledegook full of tortured phrases. We believe some authors used rewritten texts to pad their manuscripts. We wish to raise the awareness on publications containing such questionable AI-generated or rewritten texts that passed (poor) peer review. Deception with synthetic texts threatens the integrity of the scientific literature.
Cel/Teza: Przedmiotem badania jest struktura tytułów drapieżnych periodyków zarejestrowanych na liście Potential, possible, or probable predatory scholarly open-access journals autorstwa Jeffreya Bealla. Celem badania jest przedstawienie mechanizmów komponowania tytułów drapieżnych periodyków wypracowanych przez ich wydawców. Badanie ma za zadanie podnieść poziom świadomości społeczności naukowej odnośnie taktyk stosowanych przez drapieżnych wydawców podczas nadawania tytułów czasopismom, co w przyszłości ma się przełożyć na większą skuteczność procesu diagnostycznego drapieżnych periodyków. Koncepcja/Metody badań: Przegląd literatury na temat specyfiki tytułów drapieżnych czasopism przeprowadzono przy użyciu metody analizy i krytyki piśmiennictwa naukowego za lata 2009–2021. W badaniu struktury leksykalnej tytułów drapieżnych periodyków zastosowano wybrane elementy metody statystycznej. Wyniki i wnioski: Przeprowadzona analiza struktury leksykalnej tytułów drapieżnych czasopism potwierdziła określony dobór słów i ich kolejność w tytułach drapieżnych periodyków. Dominujący model tytułu, który wyłonił się jako wynik badania, pokazuje, że w pierwszej części tytułu najczęściej występują określniki geograficzne oraz rdzeń, a w drugiej części tytułu są zwykle umiejscowione określniki jakości i multidyscyplinarności lub nazwa dyscypliny naukowej. Oryginalność/Wartość poznawcza: W polskiej literaturze przedmiotu nie podejmowano dotychczas tematyki struktury leksykalnej tytułów drapieżnych czasopism. W recenzowanej literaturze anglojęzycznej również brak artykułów omawiających to zagadnienie.
The age-old metric associated with traditional print academic journals—the journal impact factor (JIF)—has carried over into some electronic open access journals (OA). JIF receives a fair share of criticism (e.g., easy to manipulate, relied on too much for academic promotions), but while some OA journals continue to embrace the system to validate their relevance, others are embracing new metrics, such as alternative journal impact factors (A-JIFs). This essay examines the suitability, validation, and problems with journal impact factors and alternative measures of impact and considers whether traditional metrics can continue to be a useful measure of impact. The piece concludes with the suggestion that qualitative and quantitative measures will need to be employed and perfected to ensure impact factor methods can achieve better validation. Academic librarians will need to be especially aware of all these methods as they advise their tenure-track faculty on the preferred publishing methods and metrics available to them.
Full-text available
This paper presents a case report on detecting hijacked journals. Towards identification of a fake journal website and preventing a hijacked paper, we can use different tools including Google Scholar and Web of Science (WoS) and Scopus (both as scientometric databases) to distinguish a fake website from a legal journal website. Our evaluation shows that analysis of a doubtful website for a targeted journal based on Google Scholar is not reliable. In fact, the use of scientometric tools for tracking prior publications of the targeted journal is compulsory. Another result of this study is that in some uncommon cases, fake websites (clone versions) may sometimes convince a scientometric database in order to be fully/partially indexed along with an abstracting of their hijacked papers while these websites steal identity of the legal journals. Therefore, as a result, we should check both of WoS and Scopus at the same time for verifying a fake website to obtain more reliability.
Full-text available
This paper reviews the proliferation of hijacked journals in scientific communication. Hijacked journals mimic genuine journals, deceive potential authors, use more sophisticated methods of fraud and compromise the content and information of legitimate journals in international and national scientometric databases. The lists of hijacked journals are not replenished regularly and this creates a challenge to the international and Russian academic community. In order to warn authors and journals, this paper reviews the characteristics of hijacked journals and presents recommendations on how to avoid fake journals.
Full-text available
In recent times some publishers are intensively exploiting the model of open access publishing. During the last several years, studies have shown that there was a substantial increase in the number of fake publishers and hijacked journals. These cyber criminals make money by stealing the identities of legitimate journals and collecting the article processing charges on the papers that are submitted. This is all accomplished by a well developed framework that includes web development steps, intensive e-mail marketing and victim selections. This review article strives to recommend that the Beall's list of predatory publishers and journals should be consulted every time when an author plans to submit scientific work to some of the journals that are indexed by Thomson Reuters/Institute for Scientific Information-ISI and covered by the Journal Citation Report. Also, the authors are advised to be "up to date" with new information regarding this controversial topic by informing themselves through various websites and specialized scientific portals. The review paper itself strives to summarize the most recent investigations on predatory and spurious journals/publishers which affect the entire scientific community, thus representing an outbreak with rising trend not only on national and regional level, but on global level as well.
Full-text available
it is worth nowadays to highlight the rise of a new kind of unethical concern that is increasingly growing between some predatory low level journals. The problem faced by these journals lies in the fact that they lack the existence of papers to be published in their issues and therefore they resorted to the solution of hiring editorial board for encouraging authors to send their researching work to their respective journals. In other terms, the strategy of that kind of journals is to invite well-known and popular practitioners in some fields to hire them as editorial members for receiving papers from authors all around the world. More specifically, some of these journals impose on their editorial members to send them their papers for publication at the condition of being removed from the editorial members list if they don’t approve their requests.
Full-text available
Researchers have always considered conferences as scientific societies and many conferences on different subjects are held annually which will lead to the development of the countries. Moreover, conferences provide researchers with the newest advances in their field of study on the one hand, and on the other hand gives them new ideas for their coming researches. Newly, virtual conferences have come into existence and removed physical distances and cut down on expenses and attracted the attention of researchers. The problem which may rise here is that some of these conferences have no intention, but to make money and no scientific information is presented there. In this article we will introduce these conferences.
Full-text available
By developing research and academic centers, the number of performed research articles has also increased. On the other hand, publishing the results of these articles in scientific journals shall also grow. In the meantime, researchers are trying to publish the findings of their research in journals which have been approved by one or more international indices so that such findings can be seen. In order to enhance the academic standards of Universities, proper journal choice will be of interest to researchers, especially those that are indexed in websites such as Thomson Reuters. However, certain forgery frauds researchers by launching fake Web sites that have been named by academic journal titles. In this paper, we introduce an approach to identify this type of journals that will be applicable by researchers in various academic disciplines. 1. Introduction Hijacked Journals are the journals that attempt to fraud researchers by using the name and reputation of their main, original journals. Forgers introduce themselves as the main journal editors by launching a website for journals that have printed copies and lacked electronic copies and then fraud researchers. In other words, they use the conventional methods of social engineering to deceive their victims [1], [2]. So far, a number of reputable sites of indexing journals have been got deceived by journal forgers. Among these indexed websites, we can mention Cite Factor ( that has indexed almost all hijacked journals together with their forged address. According to surveys conducted in 40 sites related to hijacked journals, it was understood that victims often belong to developing countries. Those journals are being targeted primarily due to their broad and various scope or topics (such as The Journal of Technology). In some cases, the forgers use the weaknesses in the TCP/IP protocol [3] among which they can name " sending faked call emails " (email spoofing) to researchers with prestigious institutions address for publishing articles in fake journals [4]. Figure 1 shows number of published papers in some hijacked journals per issue (the last available issues, some journals have not more than four issues). According to this figure, the number of paper tended to increase in each issue because forgers used many deception techniques for cheating of authors and for each issue they will receive more papers from authors. However, after a time authors will understand that the journal is faked and number of paper in next issues eventually decrease. Previously, invalid and hijacked journals discussion has been raised in [5], [6] and general guidelines to deal with them are given to researchers. However, this paper aims to provide a simple approach to researchers so that they can identify fake journals.
This article proposes the republication of articles that have previously been published in counterfeit websites of hijacked journals. The paper also discusses the technical and ethical aspects of republishing such articles.
Beginning about three years ago, the world of academic publishing has become infected by fake impact factors and misleading metrics that are launched by bogus companies. The misleading metrics and fake impact factors have damaged the prestige and reliability of scientific research and scholarly journals. This article presents the in-depth story of some of the main bogus impact factors, how they approached the academic world, and how the author identified them. Some names that they use are Universal Impact Factor (UIF), Global Impact Factor (GIF), and Citefactor, and there even is a fake Thomson Reuters Company.
Hijacked journals are journals that use the same name and ISSN like authentic journals. Forger select journals that have a print version and create the fake website for them and cheat researchers. They ask money for publishing papers and sell author's papers [1-3]. The newly identified hijacked journal " ANARE Research Notes, " has no website, is published by an Australian National in Australia, titled as Antarctic Research Expeditions-ANARE. This journal is indexed in Thomson Reutersjournals master list and has Zoological Record indexing. Fake website has this URL http://arnjournal. com. It is proved fake by the following process.-Journal appears in Thomson Reuters website (http://ip-science. but the link to this website is not opening.-Using journal seek ( searched for the particular journal in the database, and found in the database that ANARE Research Notes currently does not have a website.-Inspected domain for identification in Whois information, through " Whois " database ( The extracted information stated that the domain of this site had been created in Feb 2015 and would expire in Feb 2016; while journal setup was claimed as 1982 and there are inconsistencies between journal setup time and website registration time. In the evaluated journal web site, the database access will have in live at most three recent issues. This journal is not indexed in Scopus, had it been we can accept it to be genuine and search for papers. This case also supports that the journal ANARE is a hijacked one. Going through the ANARE journal aim and scope, it is ambiguous how the journal accepts and publishes papers in any domain. There is no mention of the editorial board or specialization of the journal. The only contact to the Journal papers is the personal email id of the authors and there is no official email or website for the journal ANARE. On further search into the papers of each issue, we can find authors are from certain countries such as Iran. web sites created later than the dated of paper acceptance, such as the one referred is Feb 2015 but found a paper in the journal ( pdf) that accepted in " 5 Jan
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
In the academic world there is different samples of cheating the researchers, that itwill be better to categorize these samples in a new category as social engineering in theacademic world. On the other hand, it is very necessary for researchers to be familiar withthese social engineering attacks, because the number of these social engineering techniquesis increasing every day. In this article, some cases of social engineering in the academicworld have been introduced In the information security literature, social engineering is called to the art of utilization of peoples vulnerable behaviors to create security gap without making victim to be doubted. Social engineering cheats people from different ways, and by persuading those people misuse them to achieve to its aims. Kevin Mitnick had been creator of social engineering method [1 and 2]. Social engineering cheat people from different ways and by misuse of humans natural tendency to trust, achieve its goals [2]. In the todays academic world, we can see samples of social engineering that their goal is cheating the researchers, these samples will be introduced in this article. In the academic world there is different samples of cheating the researchers, that it will be better to categorize these samples in a new category as social engineering in the academic world. On the other hand, it is very necessary for researchers to be familiar with these social engineering attacks, because the number of these social engineering techniques is increasing every day. In this article, some cases of social engineering in the academic world have been introduced. Hijacked journals: these journals are the clear samples of social engineering attacks in the academic world. Forgers set up faked sites by using name and ISSN of famous journals, and cheating researchers by sending a lot of requests and by giving promise for quick publishing of articles [3 and 4]. Faked declarations: Some of low validated journals use valid indexing centers (such as Thomson Reuters) and expose logos and declare themselves indexed in this scientific bases, however they are not really indexed. Many of researchers are cheated too, because most of beginner researchers have not enough information for working with
Maximizing the reliability and validity of the findings of clinical research and reducing publication bias are unquestionable challenges for peer-reviewed medical journals as they are devoted to being reliable sources for clinical judgments, medical practice, and heath policymaking (1). In addition, where to publish medical research and how to avoid questionable journals are additional challenges for clinical researchers (2, 3). However, the world of medical science recently has been attacked by a new phenomenon, i.e., hijacked journals. The cybercriminals have been involved in creating counterfeit websites for scientific journals since early in 2012 (4-7). They extended their scam to the medical and clinical science journals recently by hijacking seven prestigious medical journals, including Emergencias (an emergency medicine journal from Spain), the Journal of the American Medical Association (JAMA), Vitae-Revista (The Official Publication of the Faculty of Pharmaceutical Chemistry at the University of Antioquia, Colombia), Amala (published by the Amala Cancer Research Center in India), TERAPEVTICHESKII ARKHIV (from Russia), Kardiologiya (from Russia), and Revue Scientifique et Technique (published by the World Organization for Animal Health). A main concern about this new phenomenon is that the unreviewed manuscripts that are published on counterfeit websites become a source for clinical practice and health policy making, since such articles definitely will appear in the search result of any attempt at a systematic review on the clinical literature. A second significant threat the hijacked journals impose on medical science is that their unreviewed findings will be a source for new medical hypotheses that can be used to attack the reliability and validity of future clinical research findings (7). Warning the world of medical science about this new scam and considering rigorous technical review of the citations to and from medical articles could be the most practical measures in the short term; however, we must determine long-term measures to protect the reliability and validity of published medical research (4).