Logo-apb
Adv Pharm Bull. 2024;14(2): 255-261.
doi: 10.34172/apb.2024.029
PMID: 39206400
PMCID: PMC11347746
  Abstract View: 424
  PDF Download: 165

Editorial

Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals

Mehdi Dadkhah 1* ORCID logo, Mihály Hegedűs 2 ORCID logo, Prema Nedungadi 3 ORCID logo, Raghu Raman 4 ORCID logo, Lóránt Dénes Dávid 5,6,7 ORCID logo

1 Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
2 Tomori Pál College, Chamber of Hungarian Auditors, Budapest, Hungary.
3 Amrita School of Computing, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
4 Amrita School of Business, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India.
5 John von Neumann University, Faculty of Economics and Business, Department of Tourism and Hospitality, HU-6000 Kecskemét, Hungary.
6 Hungarian University of Agriculture and Life Sciences (MATE), Institute of Rural Development and Sustainable Economy, Department of Sustainable Tourism, HU-2100 Gödöllő, Hungary.
7 Eötvös Loránd University, Faculty of Social Sciences, Savaria University Centre, Savaria Department of Business Economics, HU-9700 Szombathely, Hungary.
*Corresponding Author: Mehdi Dadkhah, Email: d_mehdi@av.amrita.edu

Abstract

Purpose: Nowadays, many studies discuss scholarly publishing and associated challenges, but the problem of hijacked journals has been neglected. Hijacked journals are cloned websites that mimic original journals but are managed by cybercriminals. The present study uses a topic modeling approach to analyze published papers in hijacked versions of medical journals.

Methods: A total of 3384 papers were downloaded from 21 hijacked journals in the medical domain and analyzed by topic modeling algorithm.

Results: Results indicate that hijacked versions of medical journals are published in most fields of the medical domain and typically respect the primary domain of the original journal.

Conclusion: The academic world is faced with the third-generation of hijacked journals, and their detection may be more complex than common ones. The usage of artificial intelligence (AI) can be a powerful tool to deal with the phenomenon.

First Name
 
Last Name
 
Email Address
 
Comments
 
Security code


Abstract View: 420

Your browser does not support the canvas element.


PDF Download: 165

Your browser does not support the canvas element.

Submitted: 09 Feb 2024
Accepted: 28 Feb 2024
ePublished: 02 Mar 2024
EndNote EndNote

(Enw Format - Win & Mac)

BibTeX BibTeX

(Bib Format - Win & Mac)

Bookends Bookends

(Ris Format - Mac only)

EasyBib EasyBib

(Ris Format - Win & Mac)

Medlars Medlars

(Txt Format - Win & Mac)

Mendeley Web Mendeley Web
Mendeley Mendeley

(Ris Format - Win & Mac)

Papers Papers

(Ris Format - Win & Mac)

ProCite ProCite

(Ris Format - Win & Mac)

Reference Manager Reference Manager

(Ris Format - Win only)

Refworks Refworks

(Refworks Format - Win & Mac)

Zotero Zotero

(Ris Format - Firefox Plugin)