{"title":"摆脱学术骗局:克隆期刊难题的五大思考","authors":"Rajadurai Vijay Solomon","doi":"10.1002/leap.1590","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>\n </p><ul>\n \n <li>Emerging as a novel cybercrime, cloned (or hijacked) journals with identical ISSNs to legitimate ones have surfaced.</li>\n \n <li>These cloned journals employ various tactics, and this article identifies and discusses the top five.</li>\n \n <li>Fraudulent journals primarily focus on print-only publications, using parallel websites to mislead researchers.</li>\n \n <li>Cloned journals are using videos on their homepages to deceitfully showcase indexing in databases like Scopus or Web of Science.</li>\n </ul>\n </div>","PeriodicalId":2,"journal":{"name":"ACS Applied Bio Materials","volume":null,"pages":null},"PeriodicalIF":4.6000,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/leap.1590","citationCount":"0","resultStr":"{\"title\":\"Breaking free from academic scams: Five key reflections on the cloned journal conundrum\",\"authors\":\"Rajadurai Vijay Solomon\",\"doi\":\"10.1002/leap.1590\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>\\n </p><ul>\\n \\n <li>Emerging as a novel cybercrime, cloned (or hijacked) journals with identical ISSNs to legitimate ones have surfaced.</li>\\n \\n <li>These cloned journals employ various tactics, and this article identifies and discusses the top five.</li>\\n \\n <li>Fraudulent journals primarily focus on print-only publications, using parallel websites to mislead researchers.</li>\\n \\n <li>Cloned journals are using videos on their homepages to deceitfully showcase indexing in databases like Scopus or Web of Science.</li>\\n </ul>\\n </div>\",\"PeriodicalId\":2,\"journal\":{\"name\":\"ACS Applied Bio Materials\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2023-12-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1002/leap.1590\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACS Applied Bio Materials\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/leap.1590\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATERIALS SCIENCE, BIOMATERIALS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Bio Materials","FirstCategoryId":"91","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/leap.1590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATERIALS SCIENCE, BIOMATERIALS","Score":null,"Total":0}
引用次数: 0
摘要
克隆(或劫持)期刊与合法期刊的 ISSN 相同,这是一种新型网络犯罪。这些克隆期刊采用了各种策略,本文将对其中五大策略进行识别和讨论。欺诈性期刊主要关注纯印刷出版物,利用平行网站误导研究人员。克隆期刊在其主页上利用视频欺骗性地展示在 Scopus 或 Web of Science 等数据库中的索引情况。