{"title":"Challenges posed by hijacked journals in Scopus","authors":"Anna Abalkina","doi":"10.1002/asi.24855","DOIUrl":null,"url":null,"abstract":"<p>This study presents and explains the phenomenon of <i>indexjacking</i>, which involves the systematic infiltration of hijacked journals into international indexing databases, with Scopus being one of the most infiltrated among these databases. Through an analysis of known lists of hijacked journals, the study identified at least 67 hijacked journals that have penetrated Scopus since 2013. Of these, 33 journals indexed unauthorized content in Scopus and 23 compromised the homepage link in the journal's profile, while 11 did both. As of September 2023, 41 hijacked journals are still compromising the data of legitimate journals in Scopus. The presence of hijacked journals in Scopus is a challenge for scientific integrity due to the legitimization of unreliable papers that have not undergone peer review and compromises the quality of the Scopus database. The presence of hijacked journals in Scopus has far-reaching effects. Papers published in these journals may be cited, and unauthorized content from these journals in Scopus is thus imported into other databases, including ORCID and the WHO COVID-19 Research Database. This poses a particular challenge for research evaluation in those countries, where cloned versions of approved journals may be used to acquire publications and verifying their authenticity can be difficult.</p>","PeriodicalId":48810,"journal":{"name":"Journal of the Association for Information Science and Technology","volume":"75 4","pages":"395-422"},"PeriodicalIF":2.8000,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/asi.24855","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the Association for Information Science and Technology","FirstCategoryId":"91","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/asi.24855","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This study presents and explains the phenomenon of indexjacking, which involves the systematic infiltration of hijacked journals into international indexing databases, with Scopus being one of the most infiltrated among these databases. Through an analysis of known lists of hijacked journals, the study identified at least 67 hijacked journals that have penetrated Scopus since 2013. Of these, 33 journals indexed unauthorized content in Scopus and 23 compromised the homepage link in the journal's profile, while 11 did both. As of September 2023, 41 hijacked journals are still compromising the data of legitimate journals in Scopus. The presence of hijacked journals in Scopus is a challenge for scientific integrity due to the legitimization of unreliable papers that have not undergone peer review and compromises the quality of the Scopus database. The presence of hijacked journals in Scopus has far-reaching effects. Papers published in these journals may be cited, and unauthorized content from these journals in Scopus is thus imported into other databases, including ORCID and the WHO COVID-19 Research Database. This poses a particular challenge for research evaluation in those countries, where cloned versions of approved journals may be used to acquire publications and verifying their authenticity can be difficult.
期刊介绍:
The Journal of the Association for Information Science and Technology (JASIST) is a leading international forum for peer-reviewed research in information science. For more than half a century, JASIST has provided intellectual leadership by publishing original research that focuses on the production, discovery, recording, storage, representation, retrieval, presentation, manipulation, dissemination, use, and evaluation of information and on the tools and techniques associated with these processes.
The Journal welcomes rigorous work of an empirical, experimental, ethnographic, conceptual, historical, socio-technical, policy-analytic, or critical-theoretical nature. JASIST also commissions in-depth review articles (“Advances in Information Science”) and reviews of print and other media.