Cloned or Hijacked Journal


Cloned or Hijacked journals mimic legitimate journals by adopting their titles, ISSNs, and other metadata. Usually, hijacked journals mirror legitimate journals without permission from the original journal.  Scholars can be duped into publishing in hijacked journals – many of which require fees – by offers of fast publication and indexing in databases such as Scopus; being indexed in such databases is viewed by many universities and governments as a mark of legitimacy.

A hijacked journal refers to a fraudulent or deceptive publication that mimics the name, website, or identity of a legitimate scholarly journal. These hijacked journals often operate as predatory journals, seeking to exploit researchers by charging exorbitant fees for publishing their work without providing proper peer review or editorial services.

Here are some key points to understand about hijacked journals:

  • Deceptive Practices: Hijacked journals employ deceptive tactics to appear legitimate. They may use names, logos, or website designs that closely resemble reputable journals. Researchers may be misled into thinking that these journals are reputable and submit their work to them.
  • Lack of Rigorous Peer Review: One of the hallmarks of reputable journals is a rigorous peer review process, where experts in the field evaluate the quality and validity of submitted manuscripts. Hijacked journals often lack or have a superficial peer review process, leading to the publication of low-quality or unverified research.
  • Publication Fees: Predatory or hijacked journals primarily aim to generate revenue. They often charge high article processing fees or publication fees without offering the necessary editorial support, rigorous peer review, or other standard services provided by legitimate journals.
  • Indexing and Impact Factor Manipulation: Some hijacked journals falsely claim to be indexed in reputable databases or manipulate metrics such as the impact factor to create a false impression of quality. Researchers should exercise caution and independently verify the indexing and reputation of journals they consider submitting their work to.
  • Researcher Exploitation: Hijacked journals target researchers, particularly those seeking to publish their work, often from developing countries or early in their careers. Researchers may unknowingly submit their work to these journals and pay hefty fees, only to have their research published in a substandard or non-reputable outlet.
  • Negative Impact on Research and Reputation: The proliferation of hijacked journals undermines the credibility of the academic publishing system and can harm the reputation of researchers and institutions associated with them. It can also hinder the dissemination of reliable and high-quality research.

To protect themselves from hijacked journals, researchers should exercise caution and consider the following measures:

  • Verify Journal Credibility: Thoroughly investigate the legitimacy of a journal before submitting your work. Check the journal's reputation, indexing in reputable databases, editorial board members, and the transparency of the peer review process.
  • Evaluate Publication Practices: Assess the journal's publication fees, copyright policies, turnaround times, and the overall quality of their published articles. Reputable journals often have clear policies and guidelines for authors.
  • Seek Recommendations and Feedback: Consult with colleagues, mentors, or trusted experts in your field to seek their recommendations for reputable journals. Consider their experiences and feedback regarding various publishing outlets.
  • Consult Whitelists and Blacklists: Consult established whitelists and blacklists of journals, such as those provided by the Directory of Open Access Journals (DOAJ), Cabells, or the Beall's List (now archived). These resources can help identify predatory or hijacked journals.

It is essential to remain vigilant and exercise due diligence when selecting journals for publication to safeguard the integrity of your research and contribute to the advancement of scientific knowledge.

Tracking these journals is no mean feat but knowing which journals may have been hijacked is vital to the world of publishing integrity. 

List of cloned or hijacked Journal: 

https://docs.google.com/spreadsheets/d/1ak985WGOgGbJRJbZFanoktAN_UFeExpE/edit#gid=5255084 

This list of cloned/hijacked journal is dynamic; more journals will be added as their hijacked status are uncovered.

Post a Comment

0 Comments