With the joint cooperation of Payam Noor University and the Scientific Association of Iran Public Library Advancement

Document Type : Research Paper

Authors

1 MSc Student of Computer and Information Technology, Foulad Institute of Technology, Isfahan, Iran

2 Assistant Professor of Computer and Information Technology, Foulad Institute of Technology, Isfahan, Iran.

Abstract

purpose: This study was conducted for the analysis of hijacked journal and presenting new features to apply them and reduce internet frauds.
Methodology: To reach this goal, First according to studies done on the websites the of authentic and hijacked journals, the features of this kind of attacks are extracted and then a training dataset is created. The number of collected data records is 104 were collected and analyzed using WEKA data mining tools. The results showed that the applied method has an error rate of 1 percent.
Findings: The collected data of this research was analyzed by Weka data mining software. The algorithms used in this survey were developed by the Decision Tree Algorithm. An algorithm with a lower error rate is selected. The results showed that the applied method has an error rate of 9 percent.
Conclusion: The previous studies showed an increase in the number of fake publishers and hijacked journals. This article is dealt with finding a way to identify these type of journals. The results obtained from the data collected using a decision tree and the analysis thereof was shown.

Keywords

Main Subjects

Andoohgin, S. h., DavarpanahJazi, M. Borchardt, G. & Dadkhah, M. (2017). Detecting Hijacked Journals by Using Classification Algorithms. Science and engineering Ethics, 1-14.
Beall, J. (2016b). Retrieved 3 May 2016 from https://scholarlyoa.com/other-pages/hijacked-journals/.
Butler, D. (2013). Sham journals scam authors. Nature, 495, 421-422.
Dadkhah, M. & Borchardt, G. (2016). Hijacked Journals: An Emerging Challenge for Scholarly Publishing. Aesthetic Surgery Journal, 36(6), 739-741.
Dadkhah, M., Obeidat, M. M., Jazi, M. D., Sutikno, T. & Riyadi, M. A. (2015). How Can We Identify Hijacked Journals?. Bulletin of Electrical Engineering and Informatics, 4(2), 83-87.
Dadkhah, M., Sutikno, T., DavarpanahJazi, M. & Stiawan, D. (2015). An Introduction to Journal Phishings and Their Detection Approach. Telecommunication, Computing, Electronics and Control, 13(2), 656-660.
Han, J. & Kamber, M. (2006). Data Mining Concepts and Techniques. Second Edition, Diane Cerra, United States of America.
Jalalian, M. & Bimler, D. (2014). Retrieved 23 July from
http://www.cybernewsalerts.com/2014/07/the-scientific-journal-interciencia-has.html.
Jalalian, M. (2014a). Journal hijackers target science and open access. Research information. From
http://www.researchinformation.info/news/news_ story.php?news_id=1660
Jalalian, M. & Dadkhah, M. (2015). The full story of 90 hijacked journals. Geographica Pannonica, 19(2), 73-87.
Jalalian, M. & Mahboobi, H. (2014). Hijacked Journals and Predatory Publishers: Is There a Need to Re-Think How to Assess the Quality of Academic Research?. Walailak J. Sci & Tech, 11(5), 389-394.
Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283-285.
Lukić, T., Blešić, I., Ivanović, B. L. Milošević, D. & Sakulski, D. (2014). Predatory and Fake Scientific Journals/Publishers – A Global Outbreak with Rising Trend. Geographica Pannonica, 18(3), 69-81.
Scammed. Weed Science, 64(4), 772-778.