Abstract
This paper presents a case report on detecting hijacked journals. Towards identification of a fake journal website and preventing a hijacked paper, we can use different tools including Google Scholar and Web of Science (WoS) and Scopus (both as scientometric databases) to distinguish a fake website from a legal journal website. Our evaluation shows that analysis of a doubtful website for a targeted journal based on Google Scholar is not reliable. In fact, the use of scientometric tools for tracking prior publications of the targeted journal is compulsory. Another result of this study is that in some uncommon cases, fake websites (clone versions) may sometimes convince a scientometric database in order to be fully/partially indexed along with an abstracting of their hijacked papers while these websites steal identity of the legal journals. Therefore, as a result, we should check both of WoS and Scopus at the same time for verifying a fake website to obtain more reliability.
1. Introduction
Predatory journals and publishers have been a major threat to academic research community for many years [1–3]. The major challenge for researchers is always to identify and eliminate these predatory journals. Since the last few years, a similar type of fake publishers with many hijacked journals has attacked the research community extensively and intensively. Fake journals are indeed versions with hijacked identity for legitimate academic journals such that some duplicate/fake websites are created by malicious third party or criminals. Probably, a different type of Phishing attack is done by these fake websites to find some academicians as victim. These fake websites may copy all the contents available in the website of the legitimate journal such as Impact Factor (IF), ISSN, Editorial Board Members (EBMs) information, and indexing and archiving information. They then send attractive calls for papers to researchers around the world inviting them to publish with these fake journals for a high fee (but normally these fees are not much high compared with fees of legal open access journals in that area). These attackers particularly target the researchers in desperate need for publications. With the concept of Publish or Perish existing in many countries, many academicians fall in this trap. Authors receiving these e-mails are attracted by the indexing information such as Scopus, Web of Science (WoS), or the IF value of journal. They then click on the link of the hijacked version of the journal given in the e-mail and proceed with a submission and a short time later with payment of the authors’ fees and finally publication of their papers. Thus, money, time, and the research work would be lost (maybe!) forever through these fake websites [4–6].
Currently, the academic community is in a dilemma and unable to efficiently resolve this problem. Many right persons have started to display the list of fake journals in their own websites to help potential authors; however, having a general guideline to reveal any new case is more of interest which is tried to be handled in this paper. The objective of us here is to show to the research community how duplicate/fake journals can be identified using Google Scholar, Web of Science, and Scopus through a case study. We believe that the idea behind this paper would become a valuable reference for all the researchers [7–9].
The rest of this paper is organized as follows. First, the case study will be discussed, and then we try to verify its identity through different tools. At the end, a conclusion on the work will be given. This paper is the final publication for the preprint version published by TechRxiv [10].
2. Case Study
In this study, we aim to evaluate a major databases indexed journal entitled Journal of Engineering Technology (JET). This journal has some features which make it suitable for hijacking; see Table 1 for more details. According to Scopus/ScimagoJR in 2019, “JET is a refereed journal published semiannually, in spring and fall, by the Engineering Technology Division (ETD) of the American Society for Engineering Education (ASEE) and is indexed by the Engineering Index (EI) Compendex and the Science Citation Index (SCI). The journal was first published in 1984 and has since become one of the major publication venues of refereed scholarly works for engineering technology educators. The purpose of the Journal of Engineering Technology is spelled out in the JET Editorial Policy document.” In Figures 1 and 2, some papers published in a fake website for this journal are observable.



Although our paper is about a case study, e.g., JET, the final solution presented by us is completely general. The case study in our research is a very unique case in the first step of the study, done in 2019 (see the Acknowledgments section), so that we can show some shortcoming of the hijacked platforms detection process through it whereas no other case could reveal the lacks.
3. Google Scholar Results
In this section, result of searching the fake website of JET through Google Scholar search engine is discussed. As seen in Figure 4, Google Scholar as an altmetric tool for promoting scientific work is not a reliable way to verify originality of a journal website. These works are based on an artificial intelligence-assisted Google robot to extract scientific information and then to make abstracting of them.

4. Scopus Results
Here, we want to detail how to use Scopus database for identifying fake websites. Checking articles claimed as published documents of doubtful websites in Scopus and Web of Science (WoS) is a very reliable way to take a decision about authenticity of a journal website. If there are many recent papers (do not select online first/ahead of print/early cite papers and also papers from the last published issue because indexing may be time-consuming) which have not been abstracted in the claimed indexing databases, the website is then fake. For example, we could find the doubtful website claiming the Journal of Engineering Technology with “ISSN: 0747–9964” (as per Table 1 and Figure 5, this ISSN belongs to a journal indexed by both WoS and Scopus), and then we are going to verify it using Scopus.

Figure 1 shows some papers published in this doubtful website (http://www.joetsite.com). Two papers were selected which are observable in two color boxes (orange and blue boxes). In this step, we do analysis on the paper of Figure 2. As seen in Figure 6, its title has been searched through Scopus search engine, and the search result is according to Figure 7. The result is “No documents were found.” If we find many such cases in this website, therefore, we can surely say that this website is fake and there is a fraud here. In this specific case, it is fake because there many unavailable papers on Scopus.


In addition to the above case, some published papers of the original journal may be published in a fake website, so in the cases that some papers of a doubtful website are searchable through Scopus or WoS and some are not, you should carefully check its publishing information and resolve its Digital Object Identifier (DOI), if applicable (having a valid DOI related to a doubtful website is not important, so the main point is to resolve the mentioned DOI in Scopus or WoS towards that doubtful website). In a very infrequent case in 2017, we observed that the fake website could convince Scopus in order to indexing/abstracting of papers as the original source on which Scopus did abstracting for papers published in this website. A wonderful point in this experience was to see some papers of both original journal and hijacked version concurrently whereas they have different publishing information (volume, issue, and so on) but under a unique ISSN. As follows, we will detail the observation. Thus, as a result, we think that authors should check both WoS and Scopus, not just one of them (if applicable). In our case study on the journal described in Table 1, although Scopus has removed most of papers received from the fake website (in Nov. 2018 as starting point of our study, we could not find 2017 papers again on Scopus), we could still find a paper of this website published in 2018 among many papers from the original journal. Figure 3 indicates three papers for the journal with “ISSN: 0747–9964” whereas one of them is for the fake website and has some completely different publishing information. This paper is observable in blue box of Figure 1.
5. Web of Science Results
In this section, verification is performed by WoS. Fortunately, WoS in this specific case is clear and does not cover any document of the fake website (this last sentence does not mean that we believe WoS is prefered than Scopus! We only wish to say “check both for more reliability”). Its sample results are shown in Figure 8 without coverage of the fake website. In addition, statistics provided by WoS would clearly demonstrate a fact against the clone version (see Figures 9 and 10) interpreted as follows:(i)Finding from Figure 9: it is obvious that the number of published papers is about 10 yearly according to WoS, and this number is much less than the records observed in the clone version of the journal (when it was alive in 2018–2020, later this sentence will be explained).(ii)Finding from Figure 10: the clone version was an open access jounal, but Figure 10 shows a citation record as much less than a record for an open access venue considering the number of publications in Figure 9.



Since WoS has important features compared with the other two tools (Table 2), the checking with it as the final step is essential and highly recommended to be done.
6. General Findings and Discussion
Thus, researchers can avoid fake journals and can publish their research papers in legitimate journals with confidence [11–15]. Furthermore, we aim to come up with a comprehensive list of hijacked journals and a simple tool that can be used by researchers to detect these fake journals [13, 16, 17]. In the time of publishing this current version of our research, the clone version addressed in the paper is no longer available, maybe due to our first report about in 2019 [13] (also, see the Acknowledgments section) and repeating the same report in [16] based on our finding. However, this availability is not important because the same things will/may appear in future such that some of them have been reported in [16] just now. In total, it is a critical point that making a safer data environment for cloud-based big data services must be taken more seriously [18, 19], especially for the science. We hope this research with its historical view on a case study during over four years evaluation (2017–2021) can help the scientists find a secure way of publishing their academic and industrial findings. Security and privacy not only must be provided with computational methods but also in the modern form of data exchange; it is covered by intelligent and policy-based solutions [20, 21], similar to the approach of the current paper. As brief, our contributions are as follows:(i)This research is one of the first investigations around a clone version of an indexed journal with the ability of abstracting in one of the major indexing services, i.e., Scopus. As mentioned, the author of [16] could later list several similar cases including the case study of our work. Such clone versions are named advanced clones because of their success in convincing the major indexing services.(ii)We could suggest several solutions to avoid publishing in the advanced clones which are mainly a fake website for WoS/Scopus-indexed journals as follows: Paying attention to the volume/issue number of the published papers of any doubtful website through Scopus/WoS and comparing with other abstracted papers to find any inconsistency. The experience says that the inconsistency is mostly found in Scopus, but WoS must be also double-checked, specifically for explaning any found difference. The number of citations in Scopus/WoS is very important for the corresponding ISSN of the main journal (legitimate version)/fake website (clone version) to be monitored. Since clones are mainly open access and the main journal is not (whether having a website or not to have), thus we should expect a citation record similar to open access journals. When a clone version cannot do the abstracting of most/all of its publications, therefore, no citation will be found for those publications; for example, the JET citations are not considerable in WoS. The number of abstracted papers in WoS/Scopus should be checked and compared with the number of papers in a clone version (under-doubt website). Inconsistency in parallel WoS/Scopus indexing (= abstracting of published content here) of an under-doubt website claims both major indexes at the same time.(iii)In other cases, similar checklists can be redesigned per case according to all claims and demands.(iv)In the information retrieval about the case study in 2020/2021, some new happenings are seen as follows: The clone version of JET has been suspended from service. The last time of access to the clone was in 2020 from our side. Scopus has removed all publications of the clone version of JET. ScimajoJR as a linked product of Scopus has introduced the legitimate website of JET (seems to be a newly launched homepage) and an e-mail address for JET. This action of Scopus and launching the formal web page of JET can be also strong reasons of unavailability of the clone version in addition to our first report in [13] and the link provided in the Acknowledgments section. The Scopus-related new information can be found in [22]. Table 3 summarizes the background of our study on JET.
7. Conclusions
Initially, we discussed the importance of eliminating predatory publishers and journals and then highlighted a similar version of predatory journals, i.e., the hijacked journals. Currently, the major challenge faced by the research community is inaccurate identification of these fake websites. Our research aimed at displaying the research community, how duplicate/fake journals can be identified using Google Scholar, Web of Science, and Scopus with a case study. We used the example of the legitimate and well established journal Journal of Engineering Technology and showed how fake journals exist with similar name and content. We also showed the results with Google Scholar, Scopus, and Web of Science tools and made some deep analysis based on them. This solution can be easily replicated by other researchers and can be used to identify potential fake journals in any scientific field of research. Information science security concerning journal hijacking and clones is a kind of cybercrime analysis in computer and web technologies.
Abbreviations
ISSN: | International standard series number |
JET: | Journal of Engineering Technology. |
Data Availability
All the data can be tracked through the databases, and a copy of all is also accessible through the corresponding author.
Disclosure
An initial draft of this paper was published as a preprint by TechRxiv preprint service in 2019 and has been updated in 2020. The aim behind posting this version was to collect insightful comments from the research community and monitor any updates regarding the original and clone versions. The readers can follow this preprint version and all its updates through: https://doi.org/10.36227/techrxiv.11385849. This current document published in 2021 is the third and last update of our study.
Conflicts of Interest
The authors declare that they have no conflicts of interest.