Abstract

Purpose The purpose of this paper is to introduce types of hijackings in the academic world. Some of these hijacking are already known as hijacked journals, but some other type of hijacking are potential and unknown to most researchers. The author detected these hijacks by experimental study on journals, conferences and invitation emails and classifying them into groups which will be introduced in this paper. Design/methodology/approach The author can see other types of hijacks in the academic world that will introduce in this short paper with possible examples and general detection guideline for them. These were detected by experimental study on journals, conferences and invitation emails followed by classifying them into groups which will be introduced in the next section. Findings There are types of hijackings in the academic world that are introduced in this paper. Originality/value The author’s observation shows that hijacked journals and predatory publishers are only part of the problem.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call