Skip to Main Content
Skip Nav Destination
Purpose

The purpose of this paper is to introduce types of hijackings in the academic world. Some of these hijacking are already known as hijacked journals, but some other type of hijacking are potential and unknown to most researchers. The author detected these hijacks by experimental study on journals, conferences and invitation emails and classifying them into groups which will be introduced in this paper.

Design/methodology/approach

The author can see other types of hijacks in the academic world that will introduce in this short paper with possible examples and general detection guideline for them. These were detected by experimental study on journals, conferences and invitation emails followed by classifying them into groups which will be introduced in the next section.

Findings

There are types of hijackings in the academic world that are introduced in this paper.

Originality/value

The author’s observation shows that hijacked journals and predatory publishers are only part of the problem.

Licensed re-use rights only
You do not currently have access to this content.
Don't already have an account? Register

Purchased this content as a guest? Enter your email address to restore access.

Please enter valid email address.
Pay-Per-View Access
$39.00
Rental

or Create an Account

Close Modal
Close Modal