
{"id":23559,"date":"2024-06-12T11:21:19","date_gmt":"2024-06-12T11:21:19","guid":{"rendered":"http:\/\/staging.avdheshsharma.com\/case-study-avoiding-submission-to-a-hijacked-journal\/"},"modified":"2025-04-04T10:47:29","modified_gmt":"2025-04-04T10:47:29","slug":"case-study-avoiding-submission-to-a-hijacked-journal","status":"publish","type":"post","link":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal","title":{"rendered":"Case study: Avoiding submission to a hijacked journal"},"content":{"rendered":"<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">The ever-increasing number of journals in most disciplines can make it difficult to identify the right home for your research. What compounds this problem is the <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/theconversation.com\/rising-number-of-predatory-academic-journals-undermines-research-and-public-trust-in-scholarship-213107\">growing number of untrustworthy journals<\/a>.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Let\u2019s say you decide to stick to safe and reputable journals that you already know of and which your mentors or peers vouch for. Your submission\/publication process can certainly be simpler then. But this still doesn\u2019t mean you can let down your guard. That\u2019s because, unfortunately, you can be tricked into submitting your manuscript to a fake, copycat journal that has stolen the identity of an authentic one.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Such a journal, called a <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.editage.com\/insights\/what-you-need-to-know-about-hijacked-journals\">hijacked journal<\/a>, mimics an authentic journal\u2019s website, luring unsuspecting authors into paying article-processing charges (APCs). The success of hijacked journals rides on authors\u2019 trust in the journals they mimic, making this fraud tricky to recognize if you\u2019re not careful.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 11.0pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos',sans-serif;\">Editage\u2019s Publication Support team recently encountered a hijacked journal when helping a researcher get their manuscript published. Using this case study, I will try to show you what you can do to stay vigilant and avoid falling prey to such scams.<\/span><\/span><\/span><\/p>\n<h1 style=\"margin: 0.25in 0in 4pt;\"><span style=\"font-size: 20pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Sequence of events<\/span><\/span><\/span><\/span><\/span><\/h1>\n<h2 style=\"margin: 8pt 0in 4pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Landing up on an incorrect website <\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">The researcher in this case wanted to submit their manuscript to <i>Central European Management Journal<\/i>\u2014which is\u00a0published by Emerald Publishing and owned by Kozminski University, Poland. At the time, a Google search for this journal\u2019s name brought up the following URL, which ranked high on the results page: <a style=\"color: blue; text-decoration: underline;\" href=\"http:\/\/journals.kozminski.cem-j.org\/index.php\/pl_cemj\">http:\/\/journals.kozminski.cem-j.org\/index.php\/pl_cemj<\/a> (now defunct).<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Unfortunately, this was not the actual website of the journal\u2014a fact that came to light later, as you will see.<\/span><\/span><\/span><\/p>\n<h2 style=\"margin: 8pt 0in 4pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Not hearing from the journal at all<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">The manuscript was submitted through the website mentioned above. But the author did not receive any acknowledgment. Over the next month and a half, the author contacted the journal to request an update but got no response.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Finally, an extensive online search helped identify the e-mail address of the editorial team at the authentic journal, and the author wrote to them. The journal informed the author that they had not received any submission from them.<\/span><\/span><\/span><\/p>\n<h2 style=\"margin: 8pt 0in 4pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Altering the course<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">The response from the authentic journal confirmed that the journal to which the author had submitted their manuscript was a fake one. The author wrote to the fake journal one last time, saying that if they received no response within three days, they would consider their submission withdrawn.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">They still did not hear back and finally submitted their manuscript to the authentic journal. Their paper was eventually accepted and published there.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">In this case, the author was fortunate that they did not pay any APCs to the hijacked journal and that the journal did not demand that they pay these charges up front or pay a withdrawal fee if they wanted to submit elsewhere. The lack of any communication from the journal, in fact, helped in eventually discovering that it was fake.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">In other similar instances, <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.universityworldnews.com\/post.php?story=20231120151519174\">authors have not been as fortunate<\/a>.<\/span><\/span><\/span><\/p>\n<h1 style=\"margin: 0.25in 0in 4pt;\"><span style=\"font-size: 20pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">What you can learn from this case<\/span><\/span><\/span><\/span><\/span><\/h1>\n<h2 style=\"margin: 8pt 0in 4pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Don\u2019t be misled by online search results<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Hijacked journals often employ tactics that make their websites rank high in online searches for the journal titles they copy. In this case too, this tactic was what first misdirected the author to the wrong site.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Preferably, instead of looking for a journal\u2019s homepage through a web search, use a reputable journal database or index\u2014like Scopus, the Directory of Open Access Journals (DOAJ), or Web of Science. This reduces the chances of errors like this.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Bear in mind that some hijacked journals are <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.science.org\/content\/article\/leading-scholarly-database-listed-hundreds-papers-hijacked-journals\">known to have infiltrated these indexes as well<\/a>, although the affected indexes do take corrective action and remove them.<\/span><\/span><\/span><\/p>\n<h2 style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Watch out for signs hinting at lack of trustworthiness<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">In whichever way you may have found a journal\u2019s website, check it out carefully because even simple hints can help indicate that it may not be trustworthy.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">For instance, in this case, the URL of the hijacked journal (http:\/\/journals.kozminski.cem-j.org\/index.php\/pl_cemj) <i>appears<\/i> genuine at a cursory glance, but you will still notice that it begins with <i>http<\/i> and not <i>https<\/i>.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">That should be a red flag, because any site where you share\/upload sensitive or confidential information (in this case, your research manuscript and personal\/institutional details) needs to be secure and should begin with <i>https<\/i>. Reputable journals care about maintaining online security and the confidentiality of the submissions they receive.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Also, carefully check the information on the website for any other signs of fraud. Use the checklists and other resources provided by <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/thinkchecksubmit.org\/\">Think.Check.Submit<\/a>. These can help you identify trustworthy publishers.<\/span><\/span><\/span><\/p>\n<h2 style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Examine other journal websites thrown up in online searches<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Even if you do rely mainly on online searches of journal names, check out any other websites that come up, in case they lead you elsewhere. The URL of an authentic journal will very likely feature in the first page of the results.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">In the case of <i>Central European Management Journal<\/i>, <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.emeraldgrouppublishing.com\/journal\/cemj\">the authentic URL<\/a> does come up in the search results. And if you click on it, you\u2019ll find that the home page explicitly warns authors about the hijacked journal (see screenshot below).<\/span><\/span><\/span><\/p>\n<div class=\"well\"><img decoding=\"async\" class=\"media-element file-default\" title=\"Default Title Text\" src=\"https:\/\/insights.cactusglobal.com\/sites\/default\/files\/CEJM.png\" alt=\"Default Alt text\" \/><\/div>\n<div class=\"well\"><\/div>\n<h2 style=\"margin: 8pt 0in 4pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Refer to published lists of predatory and hijacked journals<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">The <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1ak985WGOgGbJRJbZFanoktAN_UFeExpE\/edit#gid=5255084\">Retraction Watch Hijacked Journals Checker<\/a> is an important resource that can help you avoid these journals. While it may not list every hijacked title, it is regularly updated. In fact, the fake journal mentioned in this case study features in this list (see screenshot below).<\/span><\/span><\/span><\/p>\n<p><img decoding=\"async\" class=\"media-element file-default\" title=\"Default Title Text\" src=\"https:\/\/insights.cactusglobal.com\/sites\/default\/files\/HJC_1.png\" alt=\"Default Alt text\" \/><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\"><span style=\"font-size: 12px;\"><u>Note<\/u>:\u00a0The hijacked URL mentioned in this list begins with <i>https<\/i>, likely because the journal has updated it since<\/span>.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11.0pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos',sans-serif;\">Several authorities now provide regularly updated lists of predatory journals or other journals of questionable nature, including hijacked ones. Some might be paid, but others are available free of charge, especially any that may be maintained by your institute\u2019s library or your funder. Find out if you can get access to these.<\/span><\/span><\/span><\/p>\n<h2 style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 16pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Cross-check the journal&#8217;s open access model against multiple databases<\/span><\/span><\/span><\/span><\/span><\/h2>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">If you read the full warning on the authentic journal\u2019s website, you\u2019ll see it clearly mentioning\u00a0that the journal does not charge any fee to the author.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Predatory journals, including hijacked journals, exploit the gold open access model of publishing\u2014that is, the model where authors pay APCs. <\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Gold open access journals charge APCs, whereas platinum\/diamond\u00a0open access journals don\u2019t (read more about the different open access models <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.editage.com\/insights\/free-handbook-what-every-researcher-should-know-about-open-access\">here<\/a>).<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">So, one level of check you should perform when you choose a journal is to find out which publishing model it uses. To do this, check out databases where the journal is indexed and read information about it.<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">For example, if you looked up <i>Central European Management Journal<\/i> in <a style=\"color: blue; text-decoration: underline;\" href=\"https:\/\/www.doaj.org\/\">DOAJ<\/a>, you\u2019ll find it clearly mentioned that it does not charge publication fees (see screenshot below).<\/span><\/span><\/span><\/p>\n<p style=\"margin: 0in 0in 8pt;\"><img decoding=\"async\" class=\"media-element file-default\" title=\"Default Title Text\" src=\"https:\/\/insights.cactusglobal.com\/sites\/default\/files\/DOAJ.png\" alt=\"Default Alt text\" \/><\/p>\n<h1 style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 20pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: 'Aptos Display',sans-serif;\"><span style=\"color: #2e74b5;\"><span style=\"font-weight: normal;\">Final thoughts<\/span><\/span><\/span><\/span><\/span><\/h1>\n<p style=\"margin: 0in 0in 8pt;\"><span style=\"font-size: 11pt;\"><span style=\"line-height: 107%;\"><span style=\"font-family: Aptos,sans-serif;\">Like many other researchers, you may be under a lot of pressure to have a paper published in a certain category of journals by a specific time. But remember to not compromise on due caution. It pays to be extra careful at the time of selecting a journal and submitting your research to it. As this case shows, a few simple checks can save you time, money, stress, and potential damage to your reputation.<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ever-increasing number of journals in most disciplines can make it difficult to identify the right home for your research. What compounds this problem is the growing number of untrustworthy journals. Let\u2019s say you decide to stick to safe and reputable journals that you already know of and which your mentors or peers vouch for. [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":28096,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2365,2389],"tags":[2625,2722,1036,2729,2634],"new_categories":[],"new_tags":[],"series":[],"class_list":["post-23559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-journal-selection-tips","category-submission-process","tag-academic-fraud","tag-journal-selection","tag-journal-submission","tag-predatory-journal","tag-predatory-publishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Case study: Avoiding submission to a hijacked journal | Editage Insights<\/title>\n<meta name=\"description\" content=\"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case study: Avoiding submission to a hijacked journal | Editage Insights\" \/>\n<meta property=\"og:description\" content=\"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\" \/>\n<meta property=\"og:site_name\" content=\"Editage Insights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Editage\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T11:21:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-04T10:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"656\" \/>\n\t<meta property=\"og:image:height\" content=\"468\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mriganka Awati\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Editage\" \/>\n<meta name=\"twitter:site\" content=\"@Editage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mriganka Awati\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\"},\"author\":{\"name\":\"Mriganka Awati\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/bcaac9acaf44a9f282b01628b2e586fb\"},\"headline\":\"Case study: Avoiding submission to a hijacked journal\",\"datePublished\":\"2024-06-12T11:21:19+00:00\",\"dateModified\":\"2025-04-04T10:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\"},\"wordCount\":1240,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg\",\"keywords\":[\"Academic Fraud\",\"journal selection\",\"journal submission\",\"predatory journal\",\"Predatory Publishing\"],\"articleSection\":[\"Journal Selection Tips\",\"Submission Process\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\",\"url\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\",\"name\":\"Case study: Avoiding submission to a hijacked journal | Editage Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg\",\"datePublished\":\"2024-06-12T11:21:19+00:00\",\"dateModified\":\"2025-04-04T10:47:29+00:00\",\"description\":\"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg\",\"width\":656,\"height\":468},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editage.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case study: Avoiding submission to a hijacked journal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editage.com\/insights\/#website\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"name\":\"Editage Insights\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editage.com\/insights\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\",\"name\":\"Editage Insights\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"width\":2560,\"height\":324,\"caption\":\"Editage Insights\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Editage\",\"https:\/\/x.com\/Editage\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/bcaac9acaf44a9f282b01628b2e586fb\",\"name\":\"Mriganka Awati\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0ef284e085cc6e4d8a6dadc0fafb9f9880aa51b2ffb59062d2e4dae05592444?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0ef284e085cc6e4d8a6dadc0fafb9f9880aa51b2ffb59062d2e4dae05592444?s=96&d=mm&r=g\",\"caption\":\"Mriganka Awati\"},\"url\":\"https:\/\/www.editage.com\/insights\/mriganka-awati\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Case study: Avoiding submission to a hijacked journal | Editage Insights","description":"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal","og_locale":"en_US","og_type":"article","og_title":"Case study: Avoiding submission to a hijacked journal | Editage Insights","og_description":"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.","og_url":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal","og_site_name":"Editage Insights","article_publisher":"https:\/\/www.facebook.com\/Editage","article_published_time":"2024-06-12T11:21:19+00:00","article_modified_time":"2025-04-04T10:47:29+00:00","og_image":[{"width":656,"height":468,"url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg","type":"image\/jpeg"}],"author":"Mriganka Awati","twitter_card":"summary_large_image","twitter_creator":"@Editage","twitter_site":"@Editage","twitter_misc":{"Written by":"Mriganka Awati","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#article","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal"},"author":{"name":"Mriganka Awati","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/bcaac9acaf44a9f282b01628b2e586fb"},"headline":"Case study: Avoiding submission to a hijacked journal","datePublished":"2024-06-12T11:21:19+00:00","dateModified":"2025-04-04T10:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal"},"wordCount":1240,"commentCount":0,"publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"image":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg","keywords":["Academic Fraud","journal selection","journal submission","predatory journal","Predatory Publishing"],"articleSection":["Journal Selection Tips","Submission Process"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal","url":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal","name":"Case study: Avoiding submission to a hijacked journal | Editage Insights","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage"},"image":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg","datePublished":"2024-06-12T11:21:19+00:00","dateModified":"2025-04-04T10:47:29+00:00","description":"Learn how you can take simple steps to avoid submitting your paper to a hijacked journal. This case study is based on an actual experience with a fake journal deceptively posing as an authentic one.","breadcrumb":{"@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#primaryimage","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/06\/Case-study-Avoiding-submission-to-a-hijacked-journal.jpg","width":656,"height":468},{"@type":"BreadcrumbList","@id":"https:\/\/www.editage.com\/insights\/case-study-avoiding-submission-to-a-hijacked-journal#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editage.com\/insights\/"},{"@type":"ListItem","position":2,"name":"Case study: Avoiding submission to a hijacked journal"}]},{"@type":"WebSite","@id":"https:\/\/www.editage.com\/insights\/#website","url":"https:\/\/www.editage.com\/insights\/","name":"Editage Insights","description":"","publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editage.com\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.editage.com\/insights\/#organization","name":"Editage Insights","url":"https:\/\/www.editage.com\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","width":2560,"height":324,"caption":"Editage Insights"},"image":{"@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Editage","https:\/\/x.com\/Editage"]},{"@type":"Person","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/bcaac9acaf44a9f282b01628b2e586fb","name":"Mriganka Awati","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0ef284e085cc6e4d8a6dadc0fafb9f9880aa51b2ffb59062d2e4dae05592444?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0ef284e085cc6e4d8a6dadc0fafb9f9880aa51b2ffb59062d2e4dae05592444?s=96&d=mm&r=g","caption":"Mriganka Awati"},"url":"https:\/\/www.editage.com\/insights\/mriganka-awati"}]}},"_links":{"self":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/23559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/comments?post=23559"}],"version-history":[{"count":0,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/23559\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media\/28096"}],"wp:attachment":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media?parent=23559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/categories?post=23559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/tags?post=23559"},{"taxonomy":"new_categories","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_categories?post=23559"},{"taxonomy":"new_tags","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_tags?post=23559"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/series?post=23559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}