Publisher of Iranian Journals and Conference Proceedings

Please waite ..
CIVILICAWe Respect the Science
Publisher of Iranian Journals and Conference Proceedings
عنوان
Paper

Victimizing Researchers by Phishing

تعداد صفحات: 1 | تعداد نمایش خلاصه: 40 | نظرات: 0
سال انتشار: 1395
کد COI Paper: JR_RIJO-4-3_008
زبان Paper: Englishglish
متن کامل این Paper منتشر نشده است و فقط به صورت چکیده یا چکیده مبسوط در پایگاه موجود می باشد.
توضیح: معمولا کلیه مقالاتی که کمتر از ۵ صفحه باشند در پایگاه سیویلیکا اصل Paper (فول تکست) محسوب نمی شوند و فقط کاربران عضو بدون کسر اعتبار می توانند فایل آنها را دریافت نمایند.

راهنمای دانلود فایل کامل این Paper

متن کامل این مقاله منتشر نشده و در پایگاه سیویلیکا موجود نمی باشد.

منبع مقالات سیویلیکا دبیرخانه کنفرانس ها و مجلات می باشد. برخی دبیرخانه ها اقدام به انتشار اصل مقاله نمی نمایند.به منظور تکمیل بانک مقالات موجود چکیده این مقالات در سایت درج می شوند ولی به دلیل عدم انتشار اصل مقاله امکان ارائه آن وجود ندارد.

خرید و دانلود فایل Paper

متن کامل (فول تکست) این مقاله منتشر نشده و یا در سایت موجود نیست و امکان خرید آن فراهم نمی باشد.

مشخصات نویسندگان Paper Victimizing Researchers by Phishing

Mehdi Dadkhah - Information Science Scientist, Isfahan, IR Iran
Glenn Borchardt - Progressive Science Institute, Berkeley, California, USA

چکیده Paper:

We read the brief report by Khadem-Rezaiyan andMoghadam, Hijacking by Email: A New Fraud Method (1),and would like to present some details and correct someissues in their report. We applaud these authors for increasingawareness of the problem. It appears that the phenomenonis growing faster than attempts to expose it andeliminate it.In paragraph two, the authors used the word highjack, while the correct word is hijack, which accordingto the Oxford dictionary (2), includes three different meanings:1. Illegally seize (an aircraft, ship, or vehicle) while intransit and force it to go to a different destination or use itfor one’s own purposes.2. Steal (goods) by seizing them in transit.3. Takeover (something) and use it for a different purposeIn the academic world, we usually use the term hijack, to reflect the third concept. For instance, weuse it forexposing hijacked journals. These appear as websites producedunder a slightly different name than the websites ofthe legitimate journals from which they were copied. Researchersare encouraged to submit papers that receive littleor no review, have exorbitant page charges, are seldomread or cited, and disappear after the legitimate journalstake legal action.This may seem like a mere quibble, but we suggest thatthis particular fraudulent practice involving scam emails,might better be designated by the term phishing insteadof Hijacking by Email. The authors presented two examplesthat they believe are a type of Hijacking by Email. Actually, they really do not involve hijacking, as no papersare ever published. Indeed, they are clearly phishing attacks.In phishing attacks, hackers use fraudulent emails tolure responders to their fake websites (3). Any sensitive informationentered at the fake websites becomes the propertyof the phishers, as mentioned in the example given byKhadem-Rezaiyan and Moghadam. Phishers then use suchdata in their subsequent attacks, which contain exact informationabout researchers once again directing them toa phishing website. Most of these phishing attacks have financialgoals, with the gathered information being usedfor hacking credit cards.Nowadays, a new type of scam is appearing. Somesites and companies claim that they can share authors’publications such as eBooks and papers between many researchers.They state that their main goal is to promote thebooks and papers. They list authors’ books as free ebooks,always say there have been more downloads already, andhave one-word reviews that are always the same for eachof them. They get the credit card numbers from authorsand others who sign up, charge them monthly, but seldomhave any eBooks. They do not stop the monthly charges aftercomplaints, so applicants are forced have to close theircredit card accounts.As mentioned in the report, there are many frauds affectingscholarly publication. Among these are: faked declarations,tempting impact factors, email spoofing, cheatingpublishers, fake editorial boards, and fake conferences(4). These frauds are proliferating, and researchers shouldbe aware of all of them.

کلیدواژه ها:

Fraud, Spam Emails, Review

کد Paper/لینک ثابت به این Paper

برای لینک دهی به این Paper می توانید از لینک زیر استفاده نمایید. این لینک همیشه ثابت است و به عنوان سند ثبت Paper در مرجع سیویلیکا مورد استفاده قرار میگیرد:

https://civilica.com/doc/994499/

کد COI Paper: JR_RIJO-4-3_008

نحوه استناد به Paper:

در صورتی که می خواهید در اثر پژوهشی خود به این Paper ارجاع دهید، به سادگی می توانید از عبارت زیر در بخش منابع و مراجع استفاده نمایید:
undefined, undefined و undefined, undefined,1395,Victimizing Researchers by Phishing,,,,,https://civilica.com/doc/994499

در داخل متن نیز هر جا که به عبارت و یا دستاوردی از این Paper اشاره شود پس از ذکر مطلب، در داخل پارانتز، مشخصات زیر نوشته می شود.
برای بار اول: (1395, Dadkhah, Mehdi؛ Glenn Borchardt)
برای بار دوم به بعد: (1395, Dadkhah؛ Borchardt)
برای آشنایی کامل با نحوه مرجع نویسی لطفا بخش راهنمای سیویلیکا (مرجع دهی) را ملاحظه نمایید.
Support