International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 9, Issue 4 (April 2022), Pages: 6-14

----------------------------------------------

 Original Research Paper

 Title: Publishing in hijacked Web of Science journals: Analytical and legal study

 Author(s): Ayman Nawwaf Sharif Alhawawsheh 1, *, Yaser Mohamad Mohamad Al Sawy 2

 Affiliation(s):

 1Criminal Law Department, College of Law, American University in the Emirates, Dubai, UAE
 2College of Education and Arts, Northern Border University, Arar, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-0356-1896

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2022.04.002

 Abstract:

This study aimed at a legal and scientific analysis of the plagiarized journals within the Web of Science system, in a time when the phenomenon of plagiarism and piracy spread to the titles of scientific and humanities magazines. Researchers sought to analyze the concept of plagiarism of international scientific journals based on its definition in scientific publishing, its dimensions and danger at the academic level of the researcher, and the academic and institutional level of the university. It also analyzed the types of plagiarism that include cloning, copying, substitution, mixing, and repetition as well as the scientific publishing of forged magazines that are no less dangerous and effective than the spoofed magazines. The study obtained several results, the most important of which is the risk for researchers to lose academic promotion and face direct penalties that hinder their path when appropriating funds through unaccredited scientific publications. The study has also reached specific criteria that the researcher must adhere to when seeking publication, the most important of which is the use of accredited websites of scientific journals and international publishers. 

 © 2022 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Hijacked journals, Forged scientific publication, Fake journals, Academic advancement, Web of Science

 Article History: Received 20 October 2021, Received in revised form 22 January 2022, Accepted 1 February 2022

 Acknowledgment 

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Alhawawsheh ANS and Al Sawy YMM (2022). Publishing in hijacked Web of Science journals: Analytical and legal study. International Journal of Advanced and Applied Sciences, 9(4): 6-14

 Permanent Link to this page

 Figures

 No Figure

 Tables

 No Table   

----------------------------------------------    

 References (16)

  1. Al-Sharaa HM (2010). Electronic litigation, and electronic courts. House of Culture publishing, Amman, Jordan.   [Google Scholar]
  2. Bergman EML (2012). Finding citations to social work literature: The relative benefits of using Web of Science, Scopus, or Google Scholar. The Journal of Academic Librarianship, 38(6): 370-379. https://doi.org/10.1016/j.acalib.2012.08.002   [Google Scholar]
  3. Bethany RD (2016). The plagiarism polyconundrum. Journal of International Students, 6(4): 1045-1052. https://doi.org/10.32674/jis.v6i4.334   [Google Scholar]
  4. Bianco M, Gras N, and Sutz J (2016). Academic evaluation: Universal instrument? Tool for development? Minerva, 54(4): 399-421. https://doi.org/10.1007/s11024-016-9306-9   [Google Scholar]
  5. Burnette MH (2015). The "research audit" model: A prototype for data-driven discovery of interdisciplinary biomedical research. Portal: Libraries and the Academy, 15(4): 645-659. https://doi.org/10.1353/pla.2015.0052   [Google Scholar]
  6. Clapham A, Vickers R, and Eldridge J (2016). Legitimation, performativity and the tyranny of a ‘hijacked’ word. Journal of Education Policy, 31(6): 757-772. https://doi.org/10.1080/02680939.2016.1181789   [Google Scholar]
  7. Dadkhah M and Maliszewski T (2015). Hijacked journals-threats and challenges to countries' scientific ranking. International Journal of Technology Enhanced Learning, 7(3): 281-288. https://doi.org/10.1504/IJTEL.2015.072819   [Google Scholar]
  8. Fuller JR (2013). Criminal justice: Mainstream and crosscurrents. 3rd Edition, Oxford University Press, Oxford, UK.   [Google Scholar]
  9. Grabosky PN (2007). Electronic crime. Prentice-Hall, Hoboken, USA.   [Google Scholar]
  10. Haywood ME (2021). Making the grade: Using COBIT to study computer crime at Bucks County Community College (Pennsylvania). Journal of Information Systems Education, 32(2): 115-118.   [Google Scholar]
  11. Kovacevic A, Ivanovic D, Milosavljevic B, Konjovic Z, and Surla D (2011). Automatic extraction of metadata from scientific publications for CRIS systems. Program: Electronic Library and Information Systems, 45(4): 376-396. https://doi.org/10.1108/00330331111182094   [Google Scholar]
  12. Lamanauskas V and Augienė D (2017). Scientific research activity of students pre-service teachers of sciences at university: The aspects of understanding, situation and improvement. Eurasia Journal of Mathematics, Science and Technology Education, 13(1): 223-236. https://doi.org/10.12973/eurasia.2017.00613a   [Google Scholar]
  13. O'Connor P and O'Hagan C (2015). Excellence in university staff evaluation: A problematic reality? Studies in Higher Education, 41(11): 1943-1957. https://doi.org/10.1080/03075079.2014.1000292   [Google Scholar]
  14. Puslednik L and Brennan PC (2020). An Australian-based authentic science research programme transforms the 21st century learning of rural high school students. Australian Journal of Education, 64(2): 98-112. https://doi.org/10.1177/0004944120919890   [Google Scholar]
  15. Vekaria KB, Calyam P, Wang S, Payyavula R, Rockey M, and Ahmed N (2021). Cyber range for research-inspired learning of “Attack Defense by Pretense” principle and practice. IEEE Transactions on Learning Technologies, 14(3): 322-337. https://doi.org/10.1109/TLT.2021.3091904   [Google Scholar]
  16. Wang L and Li M (2012). On the cultivation of automation majors' research innovation ability based on scientific research projects. Higher Education Studies, 2(4): 137-141. https://doi.org/10.5539/hes.v2n4p137   [Google Scholar]