6 found
Order:
  1.  13
    Identity Theft in the Academic World Leads to Junk Science.Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (1):287-290.
    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  8
    Do You Ignore Information Security in Your Journal Website?Mehdi Dadkhah, Glenn Borchardt & Mohammad Lagzian - 2017 - Science and Engineering Ethics 23 (4):1227-1231.
    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  8
    A Method for Improving the Integrity of Peer Review.Mehdi Dadkhah, Mohsen Kahani & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (5):1603-1610.
    Peer review is the most important aspect of reputable journals. Without it, we would be unsure about whether the material published was as valid and reliable as is possible. However, with the advent of the Internet, scientific literature has now become subject to a relatively new phenomenon: fake peer reviews. Some dishonest researchers have been manipulating the peer review process to publish what are often inferior papers. There are even papers that explain how to do it. This paper discusses one (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  8
    Detecting Hijacked Journals by Using Classification Algorithms.Mehdi Dadkhah, Glenn Borchardt, Mohammad Jazi & Mona Andoohgin Shahri - 2018 - Science and Engineering Ethics 24 (2):655-668.
    Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  6
    Detecting Hijacked Journals by Using Classification Algorithms.Mona Andoohgin Shahri, Mohammad Davarpanah Jazi, Glenn Borchardt & Mehdi Dadkhah - 2018 - Science and Engineering Ethics 24 (2):655-668.
    Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  5
    Academic Information Security Researchers: Hackers or Specialists?Mehdi Dadkhah, Mohammad Lagzian & Glenn Borchardt - 2018 - Science and Engineering Ethics 24 (2):785-790.
    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark