Submit manuscript...
eISSN: 2379-6383

Public Health

Letter to Editor Volume 2 Issue 4

Journal hijacking an imminent threat Journal hijacking an imminent threat

Snehal Patil,1 Tatyasaheb Patil,2 Siddhi Hathiwala3

1Department of Public Health Dentistry, Krishna Institute of Medical Sciences Deemed University, India
2Department of Pharmacology, Bharati Vidyapeeth Medical College and Hospital, India
3Department of Public Health Dentistry, Guru Govind Singh College of Dental Science and Research Centre, India

Correspondence: Snehal Patil, Assistant professor, Department of Public Health Dentistry School of Dental Sciences Krishna Institute of Medical Sciences Deemed University, Karad, Maharashtra, India, Tel 9764136089

Received: June 25, 2015 | Published: July 4, 2015

Citation: Patil S, Patil T, Hathiwala S. Journal hijacking an imminent threat. MOJ Public Health. 2015;2(4):125. DOI: 10.15406/mojph.2015.02.00033

Download PDF


Hijacking in the real terms means ‘’To take control of (something) without permission or authorization and use it for one's own purposes’’. Hijacking in the real world has not remained limited to materials but now have encroached the research world as well, seriously compromising and challenging the reliability of the scientific data. This phenomenon came to light in early 2012 when the online hijackers started creating counterfeit websites which mimic the legitimate websites of renowned journals.1 The fake websites are carefully engineered and fine tuned to mimic the genuine points, like title of the genuine/authentic original journal, the impact factors, postal address, list of the journal’s editorial board and even the international standard serial number (ISSN).2 They provide a link from a fake website to the authentic journal’s profile in the master journal list of Thomson Reuters. Sometimes, authors are aware that there should be a link between the Thomson Reuters’ and the journal’s website, but they would not notice that this link should be from Thomson Reuters to the Journal, not from the Journal to Thomson Reuters.3

Emails are sent under the ‘’call for papers’’ to various researchers with the incentive of rapid processing and acceptance of articles within period of time ranging from few days to 2 weeks. Usually journals with not very high impact factors, those with individual publisher with single journal, being published in non English language are being targeted. Well known journals like “Vulfenia Journal” , “Archives des Sciences,”, Emergencias (an emergency medicine journal from Spain), the Journal of the American Medical Association (JAMA), Vitae-Revista (The Official Publication of the Faculty of Pharmaceutical Chemistry at the University of Antioquia, Colombia), Amala (published by the Amala Cancer Research Center in India), TERAPEVTICHESKII ARKHIV (from Russia), Kardiologiya (from Russia) and Revue Scientifique et Technique (published by the World Organization for Animal Health) have been the recent victims of the same.4

During the last few years, there has been dramatic increase in such incidences raising the number to nearly 64 journals as on June 2015. ( Such articles are published without the necessary peer review therefore/ thus compromising the reliability and validity of the scientific information subsequently affecting the outcomes of systematic reviews misleading the decision makers like/may it be the clinicians, academicians, researchers or policy makers.4 There is an urgent need to sensitise and train the stakeholders involved in identifying such websites so as to avoid being victimized by the cyber criminals. In years to come various organizations like International Committee of Medical Journal Editors, World Association of Medical Editors and Committee on Publication Ethics would be able to contribute significantly in the anti hijacking strategy.



Conflict of interest

The author declares no conflict of interest.


Creative Commons Attribution License

©2015 Patil, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.