Как избежать журналов-клонов? Рекомендации для журналов и авторов
Научная статья
Для цитирования
Абалкина А. А. Как избежать журналов-клонов? Рекомендации для журналов и авторов // Управление наукой: теория и практика. 2021. Том 3. № 3. С. 183–192. DOI: https://doi.org/10.19181/smtp.2021.3.3.9
Аннотация
В этой статье рассматривается экспансия журналов-клонов в сфере научных коммуникаций. Журналы-клоны подделывают веб-сайты настоящих журналов, обманывают потенциальных авторов, используют всё более изощрённые методы мошенничества и компрометируют содержание и информацию настоящих журналов в международных наукометрических базах данных. Списки журналов-клонов регулярно не обновляются, что создаёт проблемы обнаружения мошеннических веб-сайтов для международного и российского академического сообщества. С целью предупреждения авторов и сотрудников журналов в этой статье обобщаются отличительные характеристики журналов-клонов и даются рекомендации, как избежать мошеннических журналов.
Ключевые слова:
журналы-клоны, публикационная этика, кибермошенничество
Литература
1. Dadkhah, M., Maliszewski, T. and Jasi, M. (2016). Characteristics of hijacked journals and predatory publishers: our observations in the academic world. Trends in Pharmacological Sciences. Vol. 37, no. 6. P. 415–418. DOI: https://doi.org/10.1016/j.tips.2016.04.002.
2. Memon, A. (2019). Hijacked journals: A challenge unaddressed to the developing world. Journal of the Pakistan Medical Association. Vol. 69, no. 10. P. 1413–1415.
3. Jalalian, M. and Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica. Vol. 19, no. 2. P. 73–87. DOI: https://doi.org/10.18421/GP19.02-06.
4. Abalkina, A. (2021). Detecting a network of hijacked journals by its archive. Scientometrics. Vol. 126, no. 8. P. 7123–7148. DOI: https://doi.org/10.1007/s11192-021-04056-0.
5. Abalkina, A. (2021). How hijacked journals keep fooling one of the world’s leading databases. Retraction Watch. https://retractionwatch.com/2021/05/26/how-hijackedjournals-keep-fooling-one-of-the-worlds-leading-databases/ (accessed 06.08.2021).
6. Al-Amr, M. (2020). How did content from a hijacked journal end up in one of the world’s most-used databases? Retraction Watch. September 1. URL: https://retractionwatch.com/2020/09/01/how-did-content-from-a-hijacked-journal-end-up-in-one-of-theworlds-most-used-databases/ (accessed 06.08.2021).
7. Khosravi, M. and Menon, V. (2019). Reliability of Hijacked Journal Detection Based on Scientometrics, Altmetric Tools and Web Informatics: A Case Report Using Google Scholar, Web of Science and Scopus. TechRxiv. DOI: 10.36227/techrxiv.11385849
8. Abalkina, A. (2021). Hijacked journals in Scopus. Preprint. ResearchGate. DOI: 10.13140/RG.2.2.21135.92328.
9. Abalkina, A. (2020). The case of the stolen journal. Retraction Watch. July 7. URL: https://retractionwatch.com/2020/07/07/the-case-of-the-stolen-journal/ (accessed 06.08.2021).
10. Butler, D. (2013). Sham journals scam authors. Nature. Vol. 495. P. 421–422. DOI: https://doi.org/10.1038/495421a.
11. Dony, C., Raskinet, M., Renaville, F., Simon, S. and Thirion, P. (2020). How reliable and useful is Cabell’s blacklist? A Data-Driven Analysis. LIBER Quarterly. Vol. 30. P. 1–38. DOI: https://doi.org/10.18352/lq.10339.
12. Dadkhah, M., Maliszewski, T. and Teixeira da Silva, J. A. (2016). Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics. Forensic Science Medicine and Pathology. Vol. 12. P. 353–362. DOI: https://doi.org/10.1007/s12024-016-9785-x.
13. Bohannon, J. (2015). How to hijack a journal. Science. Vol. 350 (6263). P. 903–905. DOI: https://doi.org/10.1126/science.aad7463.
14. Dadkhah M., Seno S. and Borchardt G. (2017). Current and potential cyber attacks on medical journals; guidelines for improving security. European Journal of Internal Medicine. Vol. 38. P. 25–29. DOI: https://doi.org/10.1016/j.ejim.2016.11.014.
15. Moussa, S. (2021). A “Trojan horse” in the reference lists: Citations to a hijacked journal in SSCI-indexed marketing journals. The Journal of Academic Librarianship. Vol. 47, is. 5. DOI: https://doi.org/10.1016/j.acalib.2021.102388.
16. Moussa, S. (2021). Journal hijacking: Challenges and potential solutions. Learned Publishing. DOI: https://doi.org/10.1002/leap.1412.
2. Memon, A. (2019). Hijacked journals: A challenge unaddressed to the developing world. Journal of the Pakistan Medical Association. Vol. 69, no. 10. P. 1413–1415.
3. Jalalian, M. and Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica. Vol. 19, no. 2. P. 73–87. DOI: https://doi.org/10.18421/GP19.02-06.
4. Abalkina, A. (2021). Detecting a network of hijacked journals by its archive. Scientometrics. Vol. 126, no. 8. P. 7123–7148. DOI: https://doi.org/10.1007/s11192-021-04056-0.
5. Abalkina, A. (2021). How hijacked journals keep fooling one of the world’s leading databases. Retraction Watch. https://retractionwatch.com/2021/05/26/how-hijackedjournals-keep-fooling-one-of-the-worlds-leading-databases/ (accessed 06.08.2021).
6. Al-Amr, M. (2020). How did content from a hijacked journal end up in one of the world’s most-used databases? Retraction Watch. September 1. URL: https://retractionwatch.com/2020/09/01/how-did-content-from-a-hijacked-journal-end-up-in-one-of-theworlds-most-used-databases/ (accessed 06.08.2021).
7. Khosravi, M. and Menon, V. (2019). Reliability of Hijacked Journal Detection Based on Scientometrics, Altmetric Tools and Web Informatics: A Case Report Using Google Scholar, Web of Science and Scopus. TechRxiv. DOI: 10.36227/techrxiv.11385849
8. Abalkina, A. (2021). Hijacked journals in Scopus. Preprint. ResearchGate. DOI: 10.13140/RG.2.2.21135.92328.
9. Abalkina, A. (2020). The case of the stolen journal. Retraction Watch. July 7. URL: https://retractionwatch.com/2020/07/07/the-case-of-the-stolen-journal/ (accessed 06.08.2021).
10. Butler, D. (2013). Sham journals scam authors. Nature. Vol. 495. P. 421–422. DOI: https://doi.org/10.1038/495421a.
11. Dony, C., Raskinet, M., Renaville, F., Simon, S. and Thirion, P. (2020). How reliable and useful is Cabell’s blacklist? A Data-Driven Analysis. LIBER Quarterly. Vol. 30. P. 1–38. DOI: https://doi.org/10.18352/lq.10339.
12. Dadkhah, M., Maliszewski, T. and Teixeira da Silva, J. A. (2016). Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics. Forensic Science Medicine and Pathology. Vol. 12. P. 353–362. DOI: https://doi.org/10.1007/s12024-016-9785-x.
13. Bohannon, J. (2015). How to hijack a journal. Science. Vol. 350 (6263). P. 903–905. DOI: https://doi.org/10.1126/science.aad7463.
14. Dadkhah M., Seno S. and Borchardt G. (2017). Current and potential cyber attacks on medical journals; guidelines for improving security. European Journal of Internal Medicine. Vol. 38. P. 25–29. DOI: https://doi.org/10.1016/j.ejim.2016.11.014.
15. Moussa, S. (2021). A “Trojan horse” in the reference lists: Citations to a hijacked journal in SSCI-indexed marketing journals. The Journal of Academic Librarianship. Vol. 47, is. 5. DOI: https://doi.org/10.1016/j.acalib.2021.102388.
16. Moussa, S. (2021). Journal hijacking: Challenges and potential solutions. Learned Publishing. DOI: https://doi.org/10.1002/leap.1412.
Статья
Поступила: 01.07.2021
Опубликована: 28.09.2021
Форматы цитирования
Другие форматы цитирования:
APA
Абалкина, А. А. (2021). Как избежать журналов-клонов? Рекомендации для журналов и авторов. Управление наукой: теория и практика, 3(3), 183–192. https://doi.org/10.19181/smtp.2021.3.3.9
Раздел
Наука и псевдонаука