1 / 24

Fake Websites Scams in Open Access Publishing

Fake Websites Scams in Open Access Publishing. A Rising Threat to the Integrity of Open Access Publishers, Writers & Institutions. Issue at Hand. Fraudulent Websites: Fake websites that duplicate and/or imitate official Open Access Publishing Portals .

Télécharger la présentation

Fake Websites Scams in Open Access Publishing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fake Websites Scams in Open Access Publishing A Rising Threat to the Integrity of Open Access Publishers, Writers & Institutions.

  2. Issue at Hand • Fraudulent Websites: • Fake websites that duplicate and/or imitate official Open Access Publishing Portals. • Contain no legitimacy whatsoever with any recognized institution • Prey upon desperate authors in a “publish or perish” situation in terms of academic/professional standing.

  3. Modus Operandi of Fraudulent Web Publishing Scams • Similar-to-Original Names: • Adopt web-addresses & names with slight alpha-numeric alterations. • Duplicative Appearances: • Fake website’s appearance is made to look almost exactly like the original, often by making slight changes to the original source codes.

  4. Modus Operandi of Fraudulent Web Publishing Scams • Offer of “Cheap” publication. • Offer fractional prices for publication under the tags of “Special Promotion Offer” etc. to unsuspected authors • Engaged in Inadequate Peer-review Systems • Use a time period of only 4-7 days to review the articles and then guarantee the publication even for a piece consisting entirely of gibberish.

  5. Case Study“www.scialert.com” • Name Duplication: • www.sciEalert.com instead of www.scialert.com • Data Duplication: • All data from the original website had been copied exactly in the phish site.

  6. Case Study“www.scialert.com” • Alteration & Publication: • Scammers published two articles in a journal taken from a link present at the original website. • Retreat: • After being promptly pointed-out, the scammers turned out to be Iran-based scientists. • Upon contact via telephone, the phishing website was taken down immediately and unpublished.

  7. Name Duplication

  8. Data Duplication

  9. Targeted Link

  10. Targeted Journal

  11. Targeted Year

  12. Targeted Issues

  13. Targeted Article1

  14. Replacement of the article

  15. Targeted Article 2

  16. Replacement of the Article

  17. Another example of cybercrime in Scientific Publishing • Identity theft of Two European Science Journals by counterfeit journal websites • Crooked websites are masquerading as Archives des Sciences( Switzerland) and Wulfenia (Austria) • Austrian Police closed down a fake website in Austria but multiple replicas popped up on servers in other countries. Ref: http://www.nature.com/news/sham-journals-scam-authors-1.12681

  18. Threats & Challenges • Publishers: • Web portals vulnerable to phishing and duplication. • Possibility of Content Theft from web portals. • Damage to repute and social image within online publishing communities. • Possibility of Identity Theft of Existing registered users.

  19. Threats & Challenges • Authors: • Financial Loss to fake publishing websites. • Personal Identity Theft. • Damage to personal repute due to shady publications. • Institutions: • Risk of hiring wrong resources based on fake-publications. • Damage to organizational repute. • Risk of funding illegitimate projects

  20. Countermeasures & Prevention Protocols • Publishers: • Increased monitoring for phishing websites & scams. • Enforcing Vigilant Cyber Security Initiatives. • Establishing Content Security Protocols on organizational & publication data.

  21. Countermeasures & Prevention Protocols • Authors: • Proper research before making financial commitments to any website. • Using secure & traceable protocols for online payments. • Emphasis upon content review before publishing. • Institutions: • Standardized plagiarism & data structure control on submitted content. • Thorough background research on newly hired resources.

  22. The Way Forward • Scientific literacy must include the ability to recognize publishing fraud. • If you find any such cyber crime activity ,you must report to ACSE as ACSE aims to highlight and condemn such criminal activities related to scientific publishing.

  23. The Way Forward • By working together in collaboration with each other all stake holders can avoid becoming a victim to such online criminals. • ACSE aims to provide such comprehensive and official platform for stakeholders in scientific publishing where all of them can collaborate and work together to ensure mutual safety and progress along with implementing ethical practices.

  24. Thank you

More Related