Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 30
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Diagnosis (Berl) ; 2024 Jul 03.
Artigo em Inglês | MEDLINE | ID: mdl-38953515

RESUMO

At the moment, the academic world is faced with various challenges that negatively impact science integrity. One is hijacked journals, a second, inauthentic website for indexed legitimate journals, managed by cybercriminals. These journals publish any manuscript by charging authors and pose a risk to scientific integrity. This piece compares a journal's original and hijacked versions regarding authority in search engines. A list of 16 medical journals, along with their hijacked versions, has been collected. The MOZ Domain Authority has been used to check the authority of both original and hijacked journals, and the results have been discussed. It indicates that hijacked journals are gaining more credibility than original ones. This should alarm academia and highlights a need for serious action against hijacked journals. The related policies should be planned, and tools should be developed to support easy detection of hijacked journals. On the publishers' side, the visibility of journals' websites must be enhanced to address this issue.

2.
Adv Pharm Bull ; 14(1): 1-4, 2024 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-38585462

RESUMO

Purpose: Academic and other researchers have limited tools with which to address the current proliferation of predatory and hijacked journals. These journals can have negative effects on science, research funding, and the dissemination of information. As most predatory and hijacked journals are not error free, this study used ChatGPT, an artificial intelligence (AI) technology tool, to conduct an evaluation of journal quality. Methods: Predatory and hijacked journals were analyzed for reliability using ChatGPT, and the reliability of result have been discussed. Results: It shows that ChatGPT is an unreliable tool for journal quality evaluation for both hijacked and predatory journals. Conclusion: To show how to address this gap, an early trial version of Journal Checker Chatbot has been developed and is discussed as an alternative chatbot that can assist researchers in detecting hijacked journals.

3.
Adv Pharm Bull ; 13(4): 627-634, 2023 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-38022802

RESUMO

Purpose: Flattering emails are crucial in tempting authors to submit papers to predatory journals. Although there is ample literature regarding the questionable practices of predatory journals, the nature and detection of spam emails need more attention. Current research provides insight into fallacious calls for papers from potential predatory journals and develops a toolkit in this regard. Methods: In this study, we analyzed three datasets of calls for papers from potential predatory journals and legitimate journals using a text mining approach and R programming language. Results: Overall, most potential predatory journals use similar language and templates in their calls for papers. Importantly, these journals praise themselves in glorious terms involving positive words that may be rarely seen in emails from legitimate journals. Based on these findings, we developed a lexicon for detecting unsolicited calls for papers from potential predatory journals. Conclusion: We conclude that calls for papers from potential predatory journals and legitimate journals are different, and it can help to distinguish them. By providing an educational plan and easily usable tools, we can deal with predatory journals better than previously.

4.
Diagnosis (Berl) ; 10(4): 390-397, 2023 Nov 01.
Artigo em Inglês | MEDLINE | ID: mdl-37587910

RESUMO

OBJECTIVES: Paper mills, companies that write scientific papers and gain acceptance for them, then sell authorships of these papers, present a key challenge in medicine and other healthcare fields. This challenge is becoming more acute with artificial intelligence (AI), where AI writes the manuscripts and then the paper mills sell the authorships of these papers. The aim of the current research is to provide a method for detecting fake papers. METHODS: The method reported in this article uses a machine learning approach to create decision trees to identify fake papers. The data were collected from Web of Science and multiple journals in various fields. RESULTS: The article presents a method to identify fake papers based on the results of decision trees. Use of this method in a case study indicated its effectiveness in identifying a fake paper. CONCLUSIONS: This method to identify fake papers is applicable for authors, editors, and publishers across fields to investigate a single paper or to conduct an analysis of a group of manuscripts. Clinicians and others can use this method to evaluate articles they find in a search to ensure they are not fake articles and instead report actual research that was peer reviewed prior to publication in a journal.


Assuntos
Inteligência Artificial , Revisão por Pares , Humanos
5.
Ir J Med Sci ; 191(3): 1435-1439, 2022 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-34232462

RESUMO

Scholarly publishing currently is faced by an upsurge in low-quality, questionable "predatory/hijacked" journals published by those whose only goal is profit. Although there are discussions in the literature warning about them, most provide only a few suggestions on how to avoid these journals. Most solutions are not generalizable or have other weaknesses. Here, we use a novel information technology, i.e., blockchains, to expose and prevent the problems produced by questionable journals. Thus, this work presented here sheds light on the advantages of blockchain for producing safe, fraud-free scholarly publishing.


Assuntos
Blockchain , Publicações Periódicas como Assunto , Humanos , Editoração
6.
J Med Signals Sens ; 11(2): 138-157, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34268102

RESUMO

Most of the countries with elderly populations are currently facing with chronic diseases. In this regard, Internet of Things (IoT) technology offers promising tools for reducing the chronic disease burdens. Despite the presence of fruitful works on the use of IoT for chronic disease management in literature, these are rarely overviewed consistently. The present study provides an overview on the use of IoT for chronic disease management, followed by ranking different chronic diseases based on their priority for using IoT in the developing countries. For this purpose, a structural coding was used to provide a list of technologies adopted so far, and then latent Dirichlet allocation algorithm was applied to find major topics in literature. In order to rank chronic diseases based on their priority for using IoT, a list of common categories of chronic diseases was subjected to fuzzy analytic hierarchy process. The research findings include lists of IoT technologies for chronic disease management and the most-discussed chronic diseases. In addition, with the help of text mining, a total of 18 major topics were extracted from the relevant pieces of literature. The results indicated that the cardiovascular disease and to a slightly lesser extent, diabetes mellitus are of the highest priorities for using IoT in the context of developing countries.

9.
10.
Eur J Clin Invest ; 50(11): e13391, 2020 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-32939771

RESUMO

BACKGROUND: Today, numerous countries are fighting to protect themselves against the Covid-19 crisis, while the policymakers are confounded and empty handed in dealing with this chaotic circumstance. The infection and its impacts have made it difficult to make optimal and suitable decisions. New information technologies play significant roles in such critical situations to address and relieve stress during the coronavirus crisis. This article endeavours to recognize the challenges policymakers have typically experienced during pandemic diseases, including Covid-19, and, accordingly, new information technology capabilities to encounter with them. MATERIAL AND METHODS: The current study utilizes the synthesis of findings of experts' opinions within the systematic review process as the research method to recognize the best available evidence drawn from text and opinion to offer practical guidance for policymakers. RESULTS: The results illustrate that the challenges fall into two categories including; encountering the disease and reducing the results of the disease. Furthermore, Internet of things, cloud computing, machine learning and social networking play the most significant roles to address these challenges.


Assuntos
Infecções por Coronavirus/prevenção & controle , Tecnologia da Informação/estatística & dados numéricos , Avaliação de Resultados em Cuidados de Saúde , Pandemias/prevenção & controle , Pneumonia Viral/prevenção & controle , COVID-19 , Infecções por Coronavirus/epidemiologia , Prova Pericial , Feminino , Política de Saúde , Humanos , Internet , Aprendizado de Máquina , Masculino , Pandemias/estatística & dados numéricos , Pneumonia Viral/epidemiologia , Formulação de Políticas , Mídias Sociais
11.
Sci Eng Ethics ; 24(1): 287-290, 2018 02.
Artigo em Inglês | MEDLINE | ID: mdl-28074375

RESUMO

In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.


Assuntos
Enganação , Roubo de Identidade/prevenção & controle , Revisão da Pesquisa por Pares , Editoração/legislação & jurisprudência , Pesquisadores , Ciência , Má Conduta Científica/legislação & jurisprudência , Humanos , Propriedade Intelectual , Internet , Publicações Periódicas como Assunto , Editoração/normas
12.
Sci Eng Ethics ; 24(5): 1603-1610, 2018 10.
Artigo em Inglês | MEDLINE | ID: mdl-28812275

RESUMO

Peer review is the most important aspect of reputable journals. Without it, we would be unsure about whether the material published was as valid and reliable as is possible. However, with the advent of the Internet, scientific literature has now become subject to a relatively new phenomenon: fake peer reviews. Some dishonest researchers have been manipulating the peer review process to publish what are often inferior papers. There are even papers that explain how to do it. This paper discusses one of those methods and how editors can defeat it by using a special review ID. This method is easy to understand and can be added to current peer review systems easily.


Assuntos
Enganação , Fraude/prevenção & controle , Revisão da Pesquisa por Pares/ética , Má Conduta Científica , Humanos , Internet , Revisão por Pares , Editoração/ética , Pesquisadores
13.
Sci Eng Ethics ; 24(2): 785-790, 2018 04.
Artigo em Inglês | MEDLINE | ID: mdl-28397172

RESUMO

In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.


Assuntos
Segurança Computacional , Fraude/prevenção & controle , Internet , Editoração , Pesquisadores , Especialização , Humanos , Organizações
14.
Sci Eng Ethics ; 24(2): 655-668, 2018 04.
Artigo em Inglês | MEDLINE | ID: mdl-28397175

RESUMO

Invalid journals are recent challenges in the academic world and many researchers are unacquainted with the phenomenon. The number of victims appears to be accelerating. Researchers might be suspicious of predatory journals because they have unfamiliar names, but hijacked journals are imitations of well-known, reputable journals whose websites have been hijacked. Hijacked journals issue calls for papers via generally laudatory emails that delude researchers into paying exorbitant page charges for publication in a nonexistent journal. This paper presents a method for detecting hijacked journals by using a classification algorithm. The number of published articles exposing hijacked journals is limited and most of them use simple techniques that are limited to specific journals. Hence we needed to amass Internet addresses and pertinent data for analyzing this type of attack. We inspected the websites of 104 scientific journals by using a classification algorithm that used criteria common to reputable journals. We then prepared a decision tree that we used to test five journals we knew were authentic and five we knew were hijacked.


Assuntos
Algoritmos , Enganação , Fraude/prevenção & controle , Internet , Publicações Periódicas como Assunto , Editoração , Registros , Árvores de Decisões , Correio Eletrônico , Humanos , Roubo de Identidade , Organizações , Publicações Periódicas como Assunto/classificação , Publicações Periódicas como Assunto/normas , Pesquisa , Pesquisadores , Roubo
15.
Ann Glob Health ; 84(4): 584-589, 2018 11 05.
Artigo em Inglês | MEDLINE | ID: mdl-30779504

RESUMO

Predatory journals (PJ) exploit the open-access model promising high acceptance rate and fast track publishing without proper peer review. At minimum, PJ are eroding the credibility of the scientific literature in the health sciences as they actually boost the propagation of errors. In this article, we identify issues with PJ and provide several responses, from international and interdisciplinary perspectives in health sciences. Authors, particularly researchers with limited previous experience with international publications, need to be careful when considering potential journals for submission, due to the current existence of large numbers of PJ. Universities around the world, particularly in developing countries, might develop strategies to discourage their researchers from submitting manuscripts to PJ or serving as members of their editorial committees.


Assuntos
Pesquisa Biomédica/métodos , Publicação de Acesso Aberto/organização & administração , Revisão da Pesquisa por Pares/métodos , Publicações Periódicas como Assunto , Saúde Global , Humanos
17.
J Cell Commun Signal ; 11(2): 181-185, 2017 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-28215004

RESUMO

In recent years, the academic world has been faced with much academic misconduct. Examples involve plagiarizing papers, manipulating data, and launching predatory or hijacked journals. The literature exposing these activities is growing exponentially, and so is the presentation of criteria or guidelines for counteracting the problem. Most of the research is focused on predatory or hijacked journal detection and providing suitable warnings. Overlooked in all this is the fact that papers published in these journals are questionable, but nevertheless show up in standard citation databases. We need some way to flag them so future researchers will be aware of their questionable nature and prevent their use in literature review.

18.
Eur J Intern Med ; 38: 25-29, 2017 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-27919525

RESUMO

At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks.


Assuntos
Segurança Computacional/normas , Publicações Periódicas como Assunto/normas , Guias como Assunto
19.
Am J Med ; 130(1): 27-30, 2017 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-27637600

RESUMO

Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors.


Assuntos
Editoração , Má Conduta Científica , Segurança Computacional , Fraude , Humanos , Editoração/legislação & jurisprudência , Pesquisadores
20.
Sci Eng Ethics ; 23(4): 1227-1231, 2017 08.
Artigo em Inglês | MEDLINE | ID: mdl-27885544

RESUMO

Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.


Assuntos
Disseminação de Informação/ética , Internet/normas , Publicações Periódicas como Assunto/ética , Publicações Periódicas como Assunto/normas , Internet/ética
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...