Matches in SemOpenAlex for { <https://semopenalex.org/work/W2516463757> ?p ?o ?g. }
Showing items 1 to 46 of
46
with 100 items per page.
- W2516463757 abstract "Dear Editor, We read the brief report by Khadem-Rezaiyan and Moghadam, “Hijacking by Email: A New Fraud Method” (1), and would like to present some details and correct some issues in their report. We applaud these authors for increasing awareness of the problem. It appears that the phenomenon is growing faster than attempts to expose it and eliminate it. In paragraph two, the authors used the word “highjack,” while the correct word is “hijack,” which according to the Oxford dictionary (2), includes three different meanings: 1. Illegally seize (an aircraft, ship, or vehicle) while in transit and force it to go to a different destination or use it for one’s own purposes. 2. Steal (goods) by seizing them in transit. 3. Takeover (something) and use it for a different purpose In the academic world, we usually use the term “hijack,” to reflect the third concept. For instance, we use it for exposing hijacked journals. These appear as websites produced under a slightly different name than the websites of the legitimate journals from which they were copied. Researchers are encouraged to submit papers that receive little or no review, have exorbitant page charges, are seldom read or cited, and disappear after the legitimate journals take legal action. This may seem like a mere quibble, but we suggest that this particular fraudulent practice involving scam emails, might better be designated by the term “phishing” instead of “Hijacking by Email.” The authors presented two examples that they believe are a type of “Hijacking by Email.” Actually, they really do not involve hijacking, as no papers are ever published. Indeed, they are clearly phishing attacks. In phishing attacks, hackers use fraudulent emails to lure responders to their fake websites (3). Any sensitive information entered at the fake websites becomes the property of the phishers, as mentioned in the example given by Khadem-Rezaiyan and Moghadam. Phishers then use such data in their subsequent attacks, which contain exact information about researchers once again directing them to a phishing website. Most of these phishing attacks have financial goals, with the gathered information being used for hacking credit cards. Nowadays, a new type of scam is appearing. Some sites and companies claim that they can share authors’ publications such as eBooks and papers between many researchers. They state that their main goal is to promote the books and papers. They list authors’ books as free ebooks, always say there have been more downloads already, and have one-word reviews that are always the same for each of them. They get the credit card numbers from authors and others who sign up, charge them monthly, but seldom have any eBooks. They do not stop the monthly charges after complaints, so applicants are forced have to close their credit card accounts. As mentioned in the report, there are many frauds affecting scholarly publication. Among these are: faked declarations, tempting impact factors, email spoofing, cheating publishers, fake editorial boards, and fake conferences (4). These frauds are proliferating, and researchers should be aware of all of them." @default.
- W2516463757 created "2016-09-16" @default.
- W2516463757 creator A5007475178 @default.
- W2516463757 creator A5024265182 @default.
- W2516463757 date "2016-08-22" @default.
- W2516463757 modified "2023-09-26" @default.
- W2516463757 title "Victimizing Researchers by Phishing" @default.
- W2516463757 cites W2134750673 @default.
- W2516463757 cites W2406055667 @default.
- W2516463757 cites W2569324054 @default.
- W2516463757 doi "https://doi.org/10.17795/rijm40304" @default.
- W2516463757 hasPublicationYear "2016" @default.
- W2516463757 type Work @default.
- W2516463757 sameAs 2516463757 @default.
- W2516463757 citedByCount "0" @default.
- W2516463757 crossrefType "journal-article" @default.
- W2516463757 hasAuthorship W2516463757A5007475178 @default.
- W2516463757 hasAuthorship W2516463757A5024265182 @default.
- W2516463757 hasBestOaLocation W25164637571 @default.
- W2516463757 hasConcept C110875604 @default.
- W2516463757 hasConcept C136764020 @default.
- W2516463757 hasConcept C38652104 @default.
- W2516463757 hasConcept C41008148 @default.
- W2516463757 hasConcept C83860907 @default.
- W2516463757 hasConceptScore W2516463757C110875604 @default.
- W2516463757 hasConceptScore W2516463757C136764020 @default.
- W2516463757 hasConceptScore W2516463757C38652104 @default.
- W2516463757 hasConceptScore W2516463757C41008148 @default.
- W2516463757 hasConceptScore W2516463757C83860907 @default.
- W2516463757 hasLocation W25164637571 @default.
- W2516463757 hasOpenAccess W2516463757 @default.
- W2516463757 hasPrimaryLocation W25164637571 @default.
- W2516463757 hasRelatedWork W187449784 @default.
- W2516463757 hasRelatedWork W2129393269 @default.
- W2516463757 hasRelatedWork W2748952813 @default.
- W2516463757 hasRelatedWork W2946227865 @default.
- W2516463757 hasRelatedWork W3107785169 @default.
- W2516463757 hasRelatedWork W3158909107 @default.
- W2516463757 hasRelatedWork W3196677571 @default.
- W2516463757 hasRelatedWork W4283756153 @default.
- W2516463757 hasRelatedWork W4285817102 @default.
- W2516463757 hasRelatedWork W4313029393 @default.
- W2516463757 isParatext "false" @default.
- W2516463757 isRetracted "false" @default.
- W2516463757 magId "2516463757" @default.
- W2516463757 workType "article" @default.