These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
217 related articles for article (PubMed ID: 28397175)
1. Detecting Hijacked Journals by Using Classification Algorithms. Andoohgin Shahri M; Jazi MD; Borchardt G; Dadkhah M Sci Eng Ethics; 2018 Apr; 24(2):655-668. PubMed ID: 28397175 [TBL] [Abstract][Full Text] [Related]
2. Hijacked scientific journals: a warning to researchers. Martins TG; Costa AL; Moncada FJ; Martins RV Einstein (Sao Paulo); 2016; 14(1):113. PubMed ID: 27074242 [No Abstract] [Full Text] [Related]
3. Predatory Journals Spamming for Publications: What Should Researchers Do? Memon AR Sci Eng Ethics; 2018 Oct; 24(5):1617-1639. PubMed ID: 28815439 [TBL] [Abstract][Full Text] [Related]
4. Identity Theft in the Academic World Leads to Junk Science. Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Feb; 24(1):287-290. PubMed ID: 28074375 [TBL] [Abstract][Full Text] [Related]
5. Characteristics of Hijacked Journals and Predatory Publishers: Our Observations in the Academic World. Dadkhah M; Maliszewski T; Jazi MD Trends Pharmacol Sci; 2016 Jun; 37(6):415-418. PubMed ID: 27211004 [TBL] [Abstract][Full Text] [Related]
6. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics. Dadkhah M; Maliszewski T; Teixeira da Silva JA Forensic Sci Med Pathol; 2016 Sep; 12(3):353-62. PubMed ID: 27342770 [No Abstract] [Full Text] [Related]
7. Online-Based Approaches to Identify Real Journals and Publishers from Hijacked Ones. Asadi A; Rahbar N; Asadi M; Asadi F; Khalili Paji K Sci Eng Ethics; 2017 Feb; 23(1):305-308. PubMed ID: 26724811 [TBL] [Abstract][Full Text] [Related]
8. Hijacked journals: A challenge unaddressed to the developing world. Memon AR J Pak Med Assoc; 2019 Oct; 69(10):1413-1415. PubMed ID: 31622288 [No Abstract] [Full Text] [Related]
10. A Method for Improving the Integrity of Peer Review. Dadkhah M; Kahani M; Borchardt G Sci Eng Ethics; 2018 Oct; 24(5):1603-1610. PubMed ID: 28812275 [TBL] [Abstract][Full Text] [Related]
11. How to Recognize and Avoid Potential, Possible, or Probable Predatory Open-Access Publishers, Standalone, and Hijacked Journals. Danevska L; Spiroski M; Donev D; Pop-Jordanova N; Polenakovic M Pril (Makedon Akad Nauk Umet Odd Med Nauki); 2016 Nov; 37(2-3):5-13. PubMed ID: 27883329 [TBL] [Abstract][Full Text] [Related]
12. Masquerade of authority: hijacked journals are gaining more credibility than original ones. Hegedűs M; Dadkhah M; Dávid LD Diagnosis (Berl); 2024 Aug; 11(3):235-239. PubMed ID: 38953515 [TBL] [Abstract][Full Text] [Related]
13. Ethical issues in publishing in predatory journals. Ferris LE; Winker MA Biochem Med (Zagreb); 2017 Jun; 27(2):279-284. PubMed ID: 28694719 [TBL] [Abstract][Full Text] [Related]
14. Indexing by Bibliographic Databases of Journals Published in the Developing World. Memon AR; Waqas A Sci Eng Ethics; 2018 Aug; 24(4):1371-1375. PubMed ID: 28321686 [TBL] [Abstract][Full Text] [Related]
15. Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals. Dadkhah M; Hegedűs M; Nedungadi P; Raman R; Dávid LD Adv Pharm Bull; 2024 Jul; 14(2):255-261. PubMed ID: 39206400 [TBL] [Abstract][Full Text] [Related]
16. Current and potential cyber attacks on medical journals; guidelines for improving security. Dadkhah M; Seno SAH; Borchardt G Eur J Intern Med; 2017 Mar; 38():25-29. PubMed ID: 27919525 [TBL] [Abstract][Full Text] [Related]
17. Academic Information Security Researchers: Hackers or Specialists? Dadkhah M; Lagzian M; Borchardt G Sci Eng Ethics; 2018 Apr; 24(2):785-790. PubMed ID: 28397172 [TBL] [Abstract][Full Text] [Related]
18. Predatory conferences: Addressing researchers from developing countries. Memon AR; Azim ME J Pak Med Assoc; 2018 Nov; 68(11):1691-1695. PubMed ID: 30410151 [TBL] [Abstract][Full Text] [Related]
19. Unsolicited solicitations: identifying characteristics of unsolicited emails from potentially predatory journals and the role of librarians. Wilson P J Med Libr Assoc; 2022 Oct; 110(4):520-524. PubMed ID: 37101915 [TBL] [Abstract][Full Text] [Related]