Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sci Eng Ethics ; 24(1): 287-290, 2018 02.
Artigo em Inglês | MEDLINE | ID: mdl-28074375

RESUMO

In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.


Assuntos
Enganação , Roubo de Identidade/prevenção & controle , Revisão da Pesquisa por Pares , Editoração/legislação & jurisprudência , Pesquisadores , Ciência , Má Conduta Científica/legislação & jurisprudência , Humanos , Propriedade Intelectual , Internet , Publicações Periódicas como Assunto , Editoração/normas
2.
Sci Eng Ethics ; 24(2): 785-790, 2018 04.
Artigo em Inglês | MEDLINE | ID: mdl-28397172

RESUMO

In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.


Assuntos
Segurança Computacional , Fraude/prevenção & controle , Internet , Editoração , Pesquisadores , Especialização , Humanos , Organizações
3.
J Cell Commun Signal ; 11(2): 181-185, 2017 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-28215004

RESUMO

In recent years, the academic world has been faced with much academic misconduct. Examples involve plagiarizing papers, manipulating data, and launching predatory or hijacked journals. The literature exposing these activities is growing exponentially, and so is the presentation of criteria or guidelines for counteracting the problem. Most of the research is focused on predatory or hijacked journal detection and providing suitable warnings. Overlooked in all this is the fact that papers published in these journals are questionable, but nevertheless show up in standard citation databases. We need some way to flag them so future researchers will be aware of their questionable nature and prevent their use in literature review.

4.
Sci Eng Ethics ; 23(4): 1227-1231, 2017 08.
Artigo em Inglês | MEDLINE | ID: mdl-27885544

RESUMO

Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.


Assuntos
Disseminação de Informação/ética , Internet/normas , Publicações Periódicas como Assunto/ética , Publicações Periódicas como Assunto/normas , Internet/ética
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...