{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T12:07:06Z","timestamp":1648814826857},"reference-count":18,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T00:00:00Z","timestamp":1491782400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"DOI":"10.1007\/s11948-017-9907-1","type":"journal-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T05:46:37Z","timestamp":1491803197000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Academic Information Security Researchers: Hackers or Specialists?"],"prefix":"10.1007","author":[{"given":"Mehdi","family":"Dadkhah","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Lagzian","sequence":"additional","affiliation":[]},{"given":"Glenn","family":"Borchardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,10]]},"reference":[{"issue":"10","key":"9907_CR1","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1177\/0141076814548526","volume":"107","author":"RE Bartholomew","year":"2014","unstructured":"Bartholomew, R. E. (2014). Science for sale: The rise of predatory journals. Journal of the Royal Society of Medicine, 107(10), 384\u2013385. doi: 10.1177\/0141076814548526 .","journal-title":"Journal of the Royal Society of Medicine"},{"issue":"19","key":"9907_CR2","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.2146\/ajhp160150","volume":"73","author":"J Beall","year":"2016","unstructured":"Beall, J. (2016). Pharmacy research and predatory journals: Authors beware. American Journal of Health System Pharmacy, 73(19), 1548\u20131550. doi: 10.2146\/ajhp160150 .","journal-title":"American Journal of Health System Pharmacy"},{"issue":"1","key":"9907_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2519\/jospt.2017.0601","volume":"47","author":"J Beall","year":"2017","unstructured":"Beall, J. (2017). Predatory journals threaten the quality of published medical research. Journal of Orthopaedic and Sports Physical Therapy, 47(1), 3\u20135. doi: 10.2519\/jospt.2017.0601 .","journal-title":"Journal of Orthopaedic and Sports Physical Therapy"},{"key":"9907_CR4","doi-asserted-by":"publisher","DOI":"10.1111\/jan.13090","author":"AM Clark","year":"2016","unstructured":"Clark, A. M., & Thompson, D. R. (2016). Five (bad) reasons to publish your research in predatory journals. Journal of Advanced Nursing, n\/a-n\/a.. doi: 10.1111\/jan.13090 .","journal-title":"Journal of Advanced Nursing, n\/a-n\/a."},{"issue":"4","key":"9907_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/IJWLTT.2016100104","volume":"11","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., & Bianciardi, G. (2016a). Fake universities as an emerging issue. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 11(4), 49\u201352. doi: 10.4018\/IJWLTT.2016100104 .","journal-title":"International Journal of Web-Based Learning and Teaching Technologies (IJWLTT)"},{"issue":"11","key":"9907_CR6","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s13312-016-0983-0","volume":"53","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., & Bianciardi, G. (2016b). Hackers spy scientists. Indian Pediatrics, 53(11), 1027.","journal-title":"Indian Pediatrics"},{"issue":"2","key":"9907_CR7","doi-asserted-by":"crossref","first-page":"73","DOI":"10.12816\/0027564","volume":"8","author":"M Dadkhah","year":"2015","unstructured":"Dadkhah, M., Elias, N., Jazi, M. D., Christova-Bagdassarian, V., & Abu-Elteen, K. H. (2015a). A new challenge in the academic world: Earning real money and eminence by paper publishing. Jordan Journal of Biological Sciences, 8(2), 73\u201375.","journal-title":"Jordan Journal of Biological Sciences"},{"issue":"2","key":"9907_CR11","doi-asserted-by":"crossref","first-page":"373","DOI":"10.12928\/telkomnika.v13i2.1436","volume":"13","author":"M Dadkhah","year":"2015","unstructured":"Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015b). An introduction to journal phishings and their detection approach. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13(2), 373\u2013380.","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"issue":"2","key":"9907_CR8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.18329\/09757597\/2016\/9210","volume":"9","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., Lagzian, M., & Borchardt, G. (2016a). The game of hacking academic websites. World Digital Libraries-An International Journal, 9(2), 131\u2013133.","journal-title":"World Digital Libraries-An International Journal"},{"issue":"5","key":"9907_CR10","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1111\/aor.12729","volume":"40","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., Stefanutti, C., & Bianciardi, G. (2016b). Scientific information security in information science and Academic Publishing. Artificial Organs, 40(5), 425\u2013430. doi: 10.1111\/aor.12729 .","journal-title":"Artificial Organs"},{"key":"9907_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9867-x","author":"M Dadkhah","year":"2017","unstructured":"Dadkhah, M., Lagzian, M., & Borchardt, G. (2017). Identity theft in the academic world leads to junk science. Science and Engineering Ethics. doi: 10.1007\/s11948-016-9867-x .","journal-title":"Science and Engineering Ethics"},{"issue":"2","key":"9907_CR12","doi-asserted-by":"crossref","first-page":"94","DOI":"10.5152\/jaem.2015.48569","volume":"14","author":"GP G\u00fcnaydin","year":"2015","unstructured":"G\u00fcnaydin, G. P., & Dogan, N. \u00d6. (2015). A growing threat for academicians: Fake and predatory journals. Journal of Academic Emergency Medicine, 14(2), 94.","journal-title":"Journal of Academic Emergency Medicine"},{"issue":"3","key":"9907_CR13","doi-asserted-by":"crossref","first-page":"283","DOI":"10.4103\/0976-237X.161852","volume":"6","author":"M Jalalian","year":"2015","unstructured":"Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283.","journal-title":"Contemporary Clinical Dentistry"},{"issue":"3","key":"9907_CR14","doi-asserted-by":"publisher","first-page":"685","DOI":"10.14661\/2013.685-686","volume":"5","author":"M Jalalian","year":"2013","unstructured":"Jalalian, M., & Mahboobi, H. (2013). New corruption detected: Bogus impact factors compiled by fake organizations. Electronic Physician, 5(3), 685\u2013686. doi: 10.14661\/2013.685-686 .","journal-title":"Electronic Physician"},{"key":"9907_CR15","volume-title":"The art of deception: Controlling the human element of security","author":"KD Mitnick","year":"2011","unstructured":"Mitnick, K. D., & Simon, W. L. (2011). The art of deception: Controlling the human element of security. London: Wiley."},{"key":"9907_CR16","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1186\/s12916-015-0423-3","volume":"13","author":"D Moher","year":"2015","unstructured":"Moher, D., & Srivastava, A. (2015). You are invited to submit\u2026. BMC Medicine, 13, 180. doi: 10.1186\/s12916-015-0423-3 .","journal-title":"BMC Medicine"},{"key":"9907_CR17","doi-asserted-by":"crossref","unstructured":"Mooloo, D., & Fowdur, T. (2013). An SSL-based client-oriented anti-spoofing email application. Paper presented at the AFRICON, 2013.","DOI":"10.1109\/AFRCON.2013.6757757"},{"issue":"8","key":"9907_CR18","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1093\/asj\/sjv085","volume":"35","author":"F Nahai","year":"2015","unstructured":"Nahai, F. (2015). The rise of predatory journals: What difference does it make? Aesthetic Surgery Journal, 35(8), 1042\u20131043. doi: 10.1093\/asj\/sjv085 .","journal-title":"Aesthetic Surgery Journal"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9907-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9907-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9907-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T17:18:08Z","timestamp":1568999888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9907-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,10]]},"references-count":18,"alternative-id":["9907"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9907-1","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,10]]}}}