Publications by authors named "Mehdi Dadkhah"

Purpose: Nowadays, many studies discuss scholarly publishing and associated challenges, but the problem of hijacked journals has been neglected. Hijacked journals are cloned websites that mimic original journals but are managed by cybercriminals. The present study uses a topic modeling approach to analyze published papers in hijacked versions of medical journals.

View Article and Find Full Text PDF

At the moment, the academic world is faced with various challenges that negatively impact science integrity. One is hijacked journals, a second, inauthentic website for indexed legitimate journals, managed by cybercriminals. These journals publish any manuscript by charging authors and pose a risk to scientific integrity.

View Article and Find Full Text PDF

Purpose: Academic and other researchers have limited tools with which to address the current proliferation of predatory and hijacked journals. These journals can have negative effects on science, research funding, and the dissemination of information. As most predatory and hijacked journals are not error free, this study used ChatGPT, an artificial intelligence (AI) technology tool, to conduct an evaluation of journal quality.

View Article and Find Full Text PDF

Purpose: Flattering emails are crucial in tempting authors to submit papers to predatory journals. Although there is ample literature regarding the questionable practices of predatory journals, the nature and detection of spam emails need more attention. Current research provides insight into fallacious calls for papers from potential predatory journals and develops a toolkit in this regard.

View Article and Find Full Text PDF

Objectives: Paper mills, companies that write scientific papers and gain acceptance for them, then sell authorships of these papers, present a key challenge in medicine and other healthcare fields. This challenge is becoming more acute with artificial intelligence (AI), where AI writes the manuscripts and then the paper mills sell the authorships of these papers. The aim of the current research is to provide a method for detecting fake papers.

View Article and Find Full Text PDF

Most of the countries with elderly populations are currently facing with chronic diseases. In this regard, Internet of Things (IoT) technology offers promising tools for reducing the chronic disease burdens. Despite the presence of fruitful works on the use of IoT for chronic disease management in literature, these are rarely overviewed consistently.

View Article and Find Full Text PDF

Scholarly publishing currently is faced by an upsurge in low-quality, questionable "predatory/hijacked" journals published by those whose only goal is profit. Although there are discussions in the literature warning about them, most provide only a few suggestions on how to avoid these journals. Most solutions are not generalizable or have other weaknesses.

View Article and Find Full Text PDF

Background: Today, numerous countries are fighting to protect themselves against the Covid-19 crisis, while the policymakers are confounded and empty handed in dealing with this chaotic circumstance. The infection and its impacts have made it difficult to make optimal and suitable decisions. New information technologies play significant roles in such critical situations to address and relieve stress during the coronavirus crisis.

View Article and Find Full Text PDF

Predatory journals (PJ) exploit the open-access model promising high acceptance rate and fast track publishing without proper peer review. At minimum, PJ are eroding the credibility of the scientific literature in the health sciences as they actually boost the propagation of errors. In this article, we identify issues with PJ and provide several responses, from international and interdisciplinary perspectives in health sciences.

View Article and Find Full Text PDF

Peer review is the most important aspect of reputable journals. Without it, we would be unsure about whether the material published was as valid and reliable as is possible. However, with the advent of the Internet, scientific literature has now become subject to a relatively new phenomenon: fake peer reviews.

View Article and Find Full Text PDF

Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked.

View Article and Find Full Text PDF

In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers.

View Article and Find Full Text PDF

In recent years, the academic world has been faced with much academic misconduct. Examples involve plagiarizing papers, manipulating data, and launching predatory or hijacked journals. The literature exposing these activities is growing exponentially, and so is the presentation of criteria or guidelines for counteracting the problem.

View Article and Find Full Text PDF

In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate.

View Article and Find Full Text PDF

At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals.

View Article and Find Full Text PDF

Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites.

View Article and Find Full Text PDF

Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors.

View Article and Find Full Text PDF