{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T12:47:40Z","timestamp":1725367660642},"reference-count":14,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T00:00:00Z","timestamp":1491782400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"DOI":"10.1007\/s11948-017-9914-2","type":"journal-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T08:01:00Z","timestamp":1491811260000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Hijacked Journals by Using Classification Algorithms"],"prefix":"10.1007","author":[{"given":"Mona","family":"Andoohgin Shahri","sequence":"first","affiliation":[]},{"given":"Mohammad Davarpanah","family":"Jazi","sequence":"additional","affiliation":[]},{"given":"Glenn","family":"Borchardt","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Dadkhah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,10]]},"reference":[{"issue":"1","key":"9914_CR1","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11948-015-9747-9","volume":"23","author":"A Asadi","year":"2017","unstructured":"Asadi, A., Rahbar, N., Asadi, M., Asadi, F., & Khalili Paji, K. (2017). Online-based approaches to identify real journals and publishers from hijacked ones. Science and Engineering Ethics, 23(1), 305\u2013308. doi: 10.1007\/s11948-015-9747-9 .","journal-title":"Science and Engineering Ethics"},{"issue":"6263","key":"9914_CR2","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1126\/science.350.6263.903","volume":"350","author":"J Bohannon","year":"2015","unstructured":"Bohannon, J. (2015). How to hijack a journal. Science, 350(6263), 903\u2013905.","journal-title":"Science"},{"issue":"7442","key":"9914_CR3","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1038\/495421a","volume":"495","author":"D Butler","year":"2013","unstructured":"Butler, D. (2013). Sham journals scam authors. Nature, 495(7442), 421\u2013422. doi: 10.1038\/495421a .","journal-title":"Nature"},{"issue":"6","key":"9914_CR4","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1093\/asj\/sjw026","volume":"36","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., & Borchardt, G. (2016). Hijacked journals: An emerging challenge for scholarly publishing. Aesthetic Surgery Journal, 36(6), 739\u2013741. doi: 10.1093\/asj\/sjw026 .","journal-title":"Aesthetic Surgery Journal"},{"issue":"4","key":"9914_CR5","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1080\/0144929X.2015.1128975","volume":"35","author":"M Dadkhah","year":"2016","unstructured":"Dadkhah, M., Maliszewski, T., & Lyashenko, V. V. (2016). An approach for preventing the indexing of hijacked journal articles in scientific databases. Behaviour and Information Technology, 35(4), 298\u2013303. doi: 10.1080\/0144929X.2015.1128975 .","journal-title":"Behaviour and Information Technology"},{"issue":"2","key":"9914_CR6","doi-asserted-by":"crossref","first-page":"83","DOI":"10.11591\/eei.v4i2.449","volume":"4","author":"M Dadkhah","year":"2015","unstructured":"Dadkhah, M., Obeidat, M. M., Jazi, M. D., Sutikno, T., & Riyadi, M. A. (2015a). How can we identify hijacked journals? Bulletin of Electrical Engineering and Informatics, 4(2), 83\u201387.","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"issue":"2","key":"9914_CR7","doi-asserted-by":"crossref","first-page":"373","DOI":"10.12928\/telkomnika.v13i2.1436","volume":"13","author":"M Dadkhah","year":"2015","unstructured":"Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015b). An introduction to journal phishings and their detection approach. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13(2), 373\u2013380.","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"issue":"4","key":"9914_CR8","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1007\/s11948-014-9595-z","volume":"21","author":"MH Esfe","year":"2015","unstructured":"Esfe, M. H., Wongwises, S., Asadi, A., & Akbari, M. (2015). Fake journals: Their features and some viable ways to distinguishing them. Science and Engineering Ethics, 21(4), 821\u2013824. doi: 10.1007\/s11948-014-9595-z .","journal-title":"Science and Engineering Ethics"},{"key":"9914_CR9","volume-title":"Data mining: Concepts and techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., & Kamber, M. (2011). Data mining: Concepts and techniques. Amsterdam: Elsevier."},{"issue":"3","key":"9914_CR10","doi-asserted-by":"crossref","first-page":"283","DOI":"10.4103\/0976-237X.161852","volume":"6","author":"M Jalalian","year":"2015","unstructured":"Jalalian, M. (2015). Solutions for commandeered journals, debatable journals, and forged journals. Contemporary Clinical Dentistry, 6(3), 283.","journal-title":"Contemporary Clinical Dentistry"},{"issue":"2","key":"9914_CR11","doi-asserted-by":"crossref","first-page":"73","DOI":"10.5937\/GeoPan1502073J","volume":"19","author":"M Jalalian","year":"2015","unstructured":"Jalalian, M., & Dadkhah, M. (2015). The full story of 90 hijacked journals from August 2011 to June 2015. Geographica Pannonica, 19(2), 73\u201387.","journal-title":"Geographica Pannonica"},{"issue":"5","key":"9914_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.2004\/wjst.v11i5.1004","volume":"11","author":"M Jalalian","year":"2014","unstructured":"Jalalian, M., & Mahboobi, H. (2014). Hijacked journals and predatory publishers: Is there a need to re-think how to assess the quality of academic research? Walailak Journal of Science and Technology, 11(5), 6. doi: 10.2004\/wjst.v11i5.1004 .","journal-title":"Walailak Journal of Science and Technology"},{"issue":"3","key":"9914_CR13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.5937\/GeoPan1403069L","volume":"18","author":"T Luki\u0107","year":"2014","unstructured":"Luki\u0107, T., Ble\u0161i\u0107, I., Basarin, B., Ivanovi\u0107, B., Milo\u0161evi\u0107, D., & Sakulski, D. (2014). Predatory and fake scientific journals\/publishers\u2014A global outbreak with rising trend: A review. Geographica Pannonica, 18(3), 69\u201381.","journal-title":"Geographica Pannonica"},{"issue":"4","key":"9914_CR14","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1614\/WS-D-16-00080.1","volume":"64","author":"SM Ward","year":"2016","unstructured":"Ward, S. M. (2016). The rise of predatory publishing: How to avoid being scammed. Weed Science, 64(4), 772\u2013778.","journal-title":"Weed Science"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9914-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9914-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9914-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T17:26:41Z","timestamp":1569000401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9914-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,10]]},"references-count":14,"alternative-id":["9914"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9914-2","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,10]]}}}