These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
192 related articles for article (PubMed ID: 27637600)
1. Fraud in Academic Publishing: Researchers Under Cyber-Attacks. Dadkhah M; Borchardt G; Maliszewski T Am J Med; 2017 Jan; 130(1):27-30. PubMed ID: 27637600 [TBL] [Abstract][Full Text] [Related]
2. Academic Information Security Researchers: Hackers or Specialists? Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172 [TBL] [Abstract][Full Text] [Related]
3. [Spams in doctors' mailbox: their threat to health education, to patient information and to scientific research]. Felkai P; Lengyel I Orv Hetil; 2019 Oct; 160(43):1706-1710. PubMed ID: 31630551 [TBL] [Abstract][Full Text] [Related]
4. Current and potential cyber attacks on medical journals; guidelines for improving security. Dadkhah M; Seno SAH; Borchardt G Eur J Intern Med; 2017 Mar; 38():25-29. PubMed ID: 27919525 [TBL] [Abstract][Full Text] [Related]
6. Predatory Journals Spamming for Publications: What Should Researchers Do? Memon AR Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439 [TBL] [Abstract][Full Text] [Related]
7. Ethical aspects in medical publishing in Belgium. Moreels TG Acta Gastroenterol Belg; 2018; 81(1):45-48. PubMed ID: 29562377 [TBL] [Abstract][Full Text] [Related]
8. Identity Theft in the Academic World Leads to Junk Science. Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Feb; 24(1):287-290. PubMed ID: 28074375 [TBL] [Abstract][Full Text] [Related]
9. Detecting Hijacked Journals by Using Classification Algorithms. Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175 [TBL] [Abstract][Full Text] [Related]
11. Characteristics of E-Mail Solicitations From Predatory Nursing Journals and Publishers. Lewinski AA; Oermann MH J Contin Educ Nurs; 2018 Apr; 49(4):171-177. PubMed ID: 29596704 [TBL] [Abstract][Full Text] [Related]
12. End of 2016: Can We Save Research from Predators in 2017? Memon AR Sci Eng Ethics; 2018 Aug; 24(4):1339-1345. PubMed ID: 28616840 [TBL] [Abstract][Full Text] [Related]
13. The persistence of fraud in the literature: the Darsee case. Kochan CA; Budd JM J Am Soc Inf Sci; 1992 Aug; 43(7):488-93. PubMed ID: 11653988 [No Abstract] [Full Text] [Related]
14. Cheating in science and publishing. Altman LK CBE Views; 1981; 4(4):19-25. PubMed ID: 11649550 [No Abstract] [Full Text] [Related]
15. What do we know about fraud and other forms of intellectual dishonesty in science? Part 2: why does fraud happen and what are its effects? Garfield E Curr Contents Clin Med; 1987 Apr; 15(15):3-10. PubMed ID: 11649943 [No Abstract] [Full Text] [Related]
16. Scientific misconduct and editorial and peer review processes. Fox MF J Higher Educ; 1994; 65(3):298-309. PubMed ID: 11653366 [No Abstract] [Full Text] [Related]
17. The exposure of a scientific fraud. Swan N New Sci; 1988 Dec; 120(1641):30-1. PubMed ID: 11655909 [No Abstract] [Full Text] [Related]
18. A Method for Improving the Integrity of Peer Review. Dadkhah M; Kahani M; Borchardt G Sci Eng Ethics; 2018 Oct; 24(5):1603-1610. PubMed ID: 28812275 [TBL] [Abstract][Full Text] [Related]