Research Article
BibTex RIS Cite

Predatory E-mails Management through Analysis of Non-Academic Scientist Account: International Challenge in Scientific Publishing

Year 2023, , 566 - 580, 21.10.2023
https://doi.org/10.33712/mana.1161847

Abstract

Scientific distant education and learning have become fast and straightforward in the internet era for information dissemination and sharing through e-publishing. However, this breakthrough has a severe drawback as misinformation and inaccurate scientific pieces of literature might be delivered to the audience. One of the most significant sources of this kind of flaw is the fraudulent publishing that is progressively growing. We aimed in this study to analyze predatory behavior communication through investigation of the e-mail account of a non-academic researcher. The study involved a text analysis of the identified different spam mail types. First, we have transformed e-mails that were considered spam into an Excel database. Then, categorization was executed to identify types of scientific fraud and their rate of delivery in the account during a definite time frame. Common keywords and country names were analyzed to spot the predatory markers. The study showed five categories of scientific predatory e-mails with a remarkable alarming rate of occurrence for invitations received for contribution to journal publishing. More than half of the received e-mails from these types involved country names embracing India, USA and UK. Among the screened 50 words/keywords from suspicious e-mails, only six of them contributed by 60% in frequency of occurrence. The spotting of patterns using text analysis coupled with Pareto charting would be helpful in e-mail management for researchers and scientists, especially non-academicians who do not have a frame of reference in scientific publishing and any qualified mentors or librarian available who could guide the publication process.

References

  • AGATHOKLEOUS, Evgenios (2021), “Mastering the Scientific Peer Review Process: Tips for Young Authors from a Young Senior Editor”, Journal of Forestry Research, S.33(1), ss.1-20.
  • BEALL, Jeffrey (2022), “Beall's List – of Potential Predatory Journals and Publishers”, Beallslist.net, https://beallslist.net (Access Date: 25.07.2022).
  • BROWN, Chris (2022), "How to Export Yahoo Emails to Excel? - Using Yahoo to Excel Extractor", Turgs Blog, https://turgs.com/blog/export-yahoo-emails-to-excel/ (Access Date: 27.07.2022).
  • DIVISION OF INFORMATION TECHNOLOGY (2016), “Moving a Gmail Message Out of Trash or Spam and Preventing Messages from Being Sent to Spam/Trash | Division of Information Technology”, it.stonybrook.edu, https://it.stonybrook.edu/help/kb/moving-misfiled-gmail-messages-out-of-trash-or-spam (Access Date: 29.07.2022).
  • DONEV, Doncho (2020), "Predatory in Scientific Publishing - A Burning Issue in Science", International Journal on Biomedicine and Healthcare, S.8(2), ss.108-112.
  • DUC, Nguyen Minh, HIEP, Dang Vinh, THONG, Pham Minh, ZUNIC, Lejla, ZILDZIC, Muharem, DONEV, Doncho, JANKOVIC, Slobodan M., HOZO, Izet, and MASIC, Izet (2020), "Predatory Open Access Journals Are Indexed in Reputable Databases: A Revisiting Issue or an Unsolved Problem", Medical Archives, S.74(4), ss.318-322.
  • EISSA, Mostafa Essam (2018), “Mobility of Antibiotic Resistance Through PharmaceuticalProducts: A Microbiological Prospective Risk”, Asian Journal of Biological Sciences, S.11(2), ss.98-101.
  • EISSA, Mostafa Essam (2019a), “Avian Schistosomes Impact on Public Health: A Long-Term Disease Observation”, Annals of Medical Research, S.26(8), ss.1723-1724.
  • EISSA, Mostafa Essam (2019b), “Food Outbreak: an Overview on Selected Cases over Long-Term Web-Based Monitoring”, SM Journal of Nutrition and Metabolism, S.5(1), ss.1029(1-3).
  • EISSA, Mostafa Essam (2019c), “Science Predators Should be Eliminated. How to Remove This Proliferating Disease That Attacked Science?”, Research Gate Corporate Web Page, https://www.researchgate.net/post/Science_predators_should_be_eliminated_How_to_remove_this_proliferating_disease_that_attacked_science/5df1d231aa1f0931611e42e5/citation/download (Access Date: 26.07.2022).
  • HUISMAN, Janine and SMITS, Jeroen (2017), "Duration and Quality of the Peer Review Process: The Author’s Perspective", Scientometrics, S.113(1), ss.633-650.
  • IBRAHIM, Sharaf and SAW, Aik (2020), "The Perils of Predatory Journals and Conferences", Malaysian Orthopaedic Journal, S.14(2), ss.1-6.
  • JAWAID, Shaukat Ali (2021), "Problems Faced by Researchers and Pressure on Impact Factor Journal Editors", Pakistan Journal of Medical Sciences, S.37(3), ss.616-620.
  • KIBBEE, Jo (2022), "The World Wide Web as an Information Resource: Pitfalls and Potential", Simmons Universiy Corporate Web Page (E-Article), http://web.simmons.edu/~chen/nit/NIT'96/96-151-Kibbee.html (Access Date: 01.08.2022)
  • LAINE, Christine and WINKER, Margaret A. (2017), "Identifying Predatory or Pseudo-Journals", Biochemia Medica, S.27(2), ss.285-291.
  • LEONARD, Michelle, STAPLETON, Suzanne, COLLINS, Perry, SELFE, Terry Kit and CATALDO, Tara (2021), "Ten Simple Rules For Avoiding Predatory Publishing Scams", PLOS Computational Biology, S.17(9), ss.(e1009377).
  • MALLET, James (2019), “Science Predators Should be Eliminated. How to Remove This Proliferating Disease That Attacked Science?”, Research Gate Corporate Web Page, https://www.researchgate.net/post/Science_predators_should_be_eliminated_How_to_remove_this_proliferating_disease_that_attacked_science/5dec1ed53d48b7e74b7aa859/citation/download (Access Date: 02.08.2022).
  • MAZŪRA, Justinas (2022), “What is Email Spoofing & How to Protect Yourself?”, Cybernews, https://cybernews.com/secure-email-providers/email-spoofing/ (Access Date: 03.08.2022).
  • McGRATH, Naomi (2022), “Why and How to Avoid Publishing in a Predatory Journal”, ifis.org Corporate Web Page, https://www.ifis.org/en/research-skills-blog/why-and-how-to-avoid-publishing-in-a-predatory-journal (Access Date: 04.08.2022).
  • MERCIER, Eric, TARDIF, Pier-Alexandre, MOORE, Lynne, SAGE, Natalie Le and CAMERON, Peter A. (2017), "Invitations Received from Potential Predatory Publishers and Fraudulent Conferences: A 12-Month Early-Career Researcher Experience", Postgraduate Medical Journal, S.94(1108), ss.104-108.
  • MINITAB (2022), “Technical Support”, Minitab Corporate Web Page, https://www.minitab.com/en-us/support/ (Access Date: 09.08.2022).
  • MONKEY LEARN (2022), “How to Use AI in Excel for Automated Text Analysis: Text Analysis with Machine Learning”, Monkey Learn Blog, https://monkeylearn.com/blog/how-to-use-ai-in-excel-for-automated-text-analysis/#:~:text=A%20text%20analysis%20model%20can,and%20expressions%20 and%20categorize%20them (Access Date: 05.08.2022).
  • MUSICK, Chad (2020), “8 Questions and Answers about Predatory Journals: Protecting your Research, Reputation, and Funding from Theft and Fraud”, Thinkscience.co.jp Corporate Web Page, https://thinkscience.co.jp/en/articles/predatory-journals (Access Date: 07.08.2022).
  • PARKER, Michael (2014), “How to Run a Pareto Chart in Minitab”, Lean Sigma Corporation, https://www.leansigmacorporation.com/how-to-run-pareto-chart-in-minitab/ (Access Date: 08.08.2022).
  • PAXTON, Ken (2022), “How to Spot and Report Internet and E-mail Scams”, Office of the Attorney General: texasattorneygeneral.gov Corporate Web Page, https://www.texasattorneygeneral.gov/consumer-protection/how-spot-and-report-internet-and-e-mail-scams (Access Date: 30.07.2022).
  • SOLMS, Rossouw von (2016), "Publish or Perish – But Where?", South African Computer Journal, S.28(1), ss.44-58.
  • UNAB - UNESCO NETEXPLO ADVISORY BOARD (2022), “Human Learning in the Digital Era”, UNAB Corporate Web Page, https://unesdoc.unesco.org/ark:/48223/pf0000367761?posInSet=1&queryId=N-EXPLORE-8fa8c367-f815-4a6a-a30b-a46391348f26 (Access Date: 10.08.2022).
  • USC LIBRARIES (2022), “Research Guides: Evaluating Information Sources - Predatory Publishing”, Libguides.usc.edu Corporate Web Page, https://libguides.usc.edu/c.php?g=741391&p=5367265 (Access Date: 10.08.2022).
  • VILHELMSSON, Andreas (2022), “Predatory Publishing 2.0: Why it is Still a Thing and What We Can do about it - ECR Community”, ECR Community Corporate Web Page, https://ecrcommunity.plos.org/2022/04/14/predatory-publishing-2-0-why-it-is-still-a-thing-and-what-we-can-do-about-it/ (Access Date: 11.08.2022).
  • WITMAN, Emma (2020), “How to Retrieve Deleted E-Mails from Yahoo Mail, either by Undeleting Messages or Submitting a 'Restore Request'”, Business Insider Corporate Web Page, https://www.businessinsider.com/how-to-retrieve-deleted-emails-from-yahoo (Access Date: 12.08.2022).
  • YAP, Keith (2016), “Text Analysis using Excel”, Keithyap Corporate Web Page, https://www.keithyap.com.au/text-analysis-using-excel/ (Access Date: 13.08.2022).

Akademik Olmayan Bilim Adamlarının Hesaplarının Analizi Yoluyla Yıkıcı E-posta Yönetimi: Bilimsel Yayıncılıkta Uluslararası Zorluk

Year 2023, , 566 - 580, 21.10.2023
https://doi.org/10.33712/mana.1161847

Abstract

Bilimsel uzaktan eğitim ve öğrenme, internet çağında e-yayıncılık yoluyla bilginin yayılması ve paylaşılması için hızlı ve anlaşılır hale geldi. Bununla birlikte, yanlış bilgi ve yanlış bilimsel literatür parçaları izleyiciye iletilebileceğinden, bu atılımın ciddi bir dezavantajı vardır. Bu tür kusurların en önemli kaynaklarından biri, giderek büyüyen hileli yayıncılıktır. Bu çalışmada, akademik olmayan bir araştırmacının e-posta hesabını inceleyerek saldırgan davranış iletişimini analiz etmeyi amaçladık. Çalışma, tanımlanan farklı spam posta türlerinin bir metin analizini içeriyordu. İlk olarak, spam olarak kabul edilen e-postaları bir Excel veritabanına dönüştürdük. Ardından, bilimsel dolandırıcılık türlerini ve bunların belirli bir zaman diliminde hesapta teslim edilme oranlarını belirlemek için kategorizasyon yapıldı. Yırtıcı işaretleri tespit etmek için yaygın anahtar kelimeler ve ülke adları analiz edildi. Çalışma, dergi yayıncılığına katkı için alınan davetler için dikkate değer endişe verici bir oranda ortaya çıkan beş bilimsel yırtıcı e-posta kategorisi gösterdi. Bu türlerden gelen e-postaların yarısından fazlası Hindistan, ABD ve İngiltere'yi kapsayan ülke adlarını içeriyordu. Şüpheli e-postalardan taranan 50 kelime/anahtar kelimeden sadece altı tanesi görülme sıklığına %60 oranında katkıda bulunmuştur. Pareto şemasıyla birleştirilmiş metin analizi kullanılarak kalıpların tespit edilmesi, araştırmacılar ve bilim adamları için, özellikle bilimsel yayıncılıkta bir referans çerçevesi olmayan akademisyen olmayanlar ve mevcut herhangi bir kalifiye danışman veya kütüphaneci için e-posta yönetiminde yardımcı olacaktır.

References

  • AGATHOKLEOUS, Evgenios (2021), “Mastering the Scientific Peer Review Process: Tips for Young Authors from a Young Senior Editor”, Journal of Forestry Research, S.33(1), ss.1-20.
  • BEALL, Jeffrey (2022), “Beall's List – of Potential Predatory Journals and Publishers”, Beallslist.net, https://beallslist.net (Access Date: 25.07.2022).
  • BROWN, Chris (2022), "How to Export Yahoo Emails to Excel? - Using Yahoo to Excel Extractor", Turgs Blog, https://turgs.com/blog/export-yahoo-emails-to-excel/ (Access Date: 27.07.2022).
  • DIVISION OF INFORMATION TECHNOLOGY (2016), “Moving a Gmail Message Out of Trash or Spam and Preventing Messages from Being Sent to Spam/Trash | Division of Information Technology”, it.stonybrook.edu, https://it.stonybrook.edu/help/kb/moving-misfiled-gmail-messages-out-of-trash-or-spam (Access Date: 29.07.2022).
  • DONEV, Doncho (2020), "Predatory in Scientific Publishing - A Burning Issue in Science", International Journal on Biomedicine and Healthcare, S.8(2), ss.108-112.
  • DUC, Nguyen Minh, HIEP, Dang Vinh, THONG, Pham Minh, ZUNIC, Lejla, ZILDZIC, Muharem, DONEV, Doncho, JANKOVIC, Slobodan M., HOZO, Izet, and MASIC, Izet (2020), "Predatory Open Access Journals Are Indexed in Reputable Databases: A Revisiting Issue or an Unsolved Problem", Medical Archives, S.74(4), ss.318-322.
  • EISSA, Mostafa Essam (2018), “Mobility of Antibiotic Resistance Through PharmaceuticalProducts: A Microbiological Prospective Risk”, Asian Journal of Biological Sciences, S.11(2), ss.98-101.
  • EISSA, Mostafa Essam (2019a), “Avian Schistosomes Impact on Public Health: A Long-Term Disease Observation”, Annals of Medical Research, S.26(8), ss.1723-1724.
  • EISSA, Mostafa Essam (2019b), “Food Outbreak: an Overview on Selected Cases over Long-Term Web-Based Monitoring”, SM Journal of Nutrition and Metabolism, S.5(1), ss.1029(1-3).
  • EISSA, Mostafa Essam (2019c), “Science Predators Should be Eliminated. How to Remove This Proliferating Disease That Attacked Science?”, Research Gate Corporate Web Page, https://www.researchgate.net/post/Science_predators_should_be_eliminated_How_to_remove_this_proliferating_disease_that_attacked_science/5df1d231aa1f0931611e42e5/citation/download (Access Date: 26.07.2022).
  • HUISMAN, Janine and SMITS, Jeroen (2017), "Duration and Quality of the Peer Review Process: The Author’s Perspective", Scientometrics, S.113(1), ss.633-650.
  • IBRAHIM, Sharaf and SAW, Aik (2020), "The Perils of Predatory Journals and Conferences", Malaysian Orthopaedic Journal, S.14(2), ss.1-6.
  • JAWAID, Shaukat Ali (2021), "Problems Faced by Researchers and Pressure on Impact Factor Journal Editors", Pakistan Journal of Medical Sciences, S.37(3), ss.616-620.
  • KIBBEE, Jo (2022), "The World Wide Web as an Information Resource: Pitfalls and Potential", Simmons Universiy Corporate Web Page (E-Article), http://web.simmons.edu/~chen/nit/NIT'96/96-151-Kibbee.html (Access Date: 01.08.2022)
  • LAINE, Christine and WINKER, Margaret A. (2017), "Identifying Predatory or Pseudo-Journals", Biochemia Medica, S.27(2), ss.285-291.
  • LEONARD, Michelle, STAPLETON, Suzanne, COLLINS, Perry, SELFE, Terry Kit and CATALDO, Tara (2021), "Ten Simple Rules For Avoiding Predatory Publishing Scams", PLOS Computational Biology, S.17(9), ss.(e1009377).
  • MALLET, James (2019), “Science Predators Should be Eliminated. How to Remove This Proliferating Disease That Attacked Science?”, Research Gate Corporate Web Page, https://www.researchgate.net/post/Science_predators_should_be_eliminated_How_to_remove_this_proliferating_disease_that_attacked_science/5dec1ed53d48b7e74b7aa859/citation/download (Access Date: 02.08.2022).
  • MAZŪRA, Justinas (2022), “What is Email Spoofing & How to Protect Yourself?”, Cybernews, https://cybernews.com/secure-email-providers/email-spoofing/ (Access Date: 03.08.2022).
  • McGRATH, Naomi (2022), “Why and How to Avoid Publishing in a Predatory Journal”, ifis.org Corporate Web Page, https://www.ifis.org/en/research-skills-blog/why-and-how-to-avoid-publishing-in-a-predatory-journal (Access Date: 04.08.2022).
  • MERCIER, Eric, TARDIF, Pier-Alexandre, MOORE, Lynne, SAGE, Natalie Le and CAMERON, Peter A. (2017), "Invitations Received from Potential Predatory Publishers and Fraudulent Conferences: A 12-Month Early-Career Researcher Experience", Postgraduate Medical Journal, S.94(1108), ss.104-108.
  • MINITAB (2022), “Technical Support”, Minitab Corporate Web Page, https://www.minitab.com/en-us/support/ (Access Date: 09.08.2022).
  • MONKEY LEARN (2022), “How to Use AI in Excel for Automated Text Analysis: Text Analysis with Machine Learning”, Monkey Learn Blog, https://monkeylearn.com/blog/how-to-use-ai-in-excel-for-automated-text-analysis/#:~:text=A%20text%20analysis%20model%20can,and%20expressions%20 and%20categorize%20them (Access Date: 05.08.2022).
  • MUSICK, Chad (2020), “8 Questions and Answers about Predatory Journals: Protecting your Research, Reputation, and Funding from Theft and Fraud”, Thinkscience.co.jp Corporate Web Page, https://thinkscience.co.jp/en/articles/predatory-journals (Access Date: 07.08.2022).
  • PARKER, Michael (2014), “How to Run a Pareto Chart in Minitab”, Lean Sigma Corporation, https://www.leansigmacorporation.com/how-to-run-pareto-chart-in-minitab/ (Access Date: 08.08.2022).
  • PAXTON, Ken (2022), “How to Spot and Report Internet and E-mail Scams”, Office of the Attorney General: texasattorneygeneral.gov Corporate Web Page, https://www.texasattorneygeneral.gov/consumer-protection/how-spot-and-report-internet-and-e-mail-scams (Access Date: 30.07.2022).
  • SOLMS, Rossouw von (2016), "Publish or Perish – But Where?", South African Computer Journal, S.28(1), ss.44-58.
  • UNAB - UNESCO NETEXPLO ADVISORY BOARD (2022), “Human Learning in the Digital Era”, UNAB Corporate Web Page, https://unesdoc.unesco.org/ark:/48223/pf0000367761?posInSet=1&queryId=N-EXPLORE-8fa8c367-f815-4a6a-a30b-a46391348f26 (Access Date: 10.08.2022).
  • USC LIBRARIES (2022), “Research Guides: Evaluating Information Sources - Predatory Publishing”, Libguides.usc.edu Corporate Web Page, https://libguides.usc.edu/c.php?g=741391&p=5367265 (Access Date: 10.08.2022).
  • VILHELMSSON, Andreas (2022), “Predatory Publishing 2.0: Why it is Still a Thing and What We Can do about it - ECR Community”, ECR Community Corporate Web Page, https://ecrcommunity.plos.org/2022/04/14/predatory-publishing-2-0-why-it-is-still-a-thing-and-what-we-can-do-about-it/ (Access Date: 11.08.2022).
  • WITMAN, Emma (2020), “How to Retrieve Deleted E-Mails from Yahoo Mail, either by Undeleting Messages or Submitting a 'Restore Request'”, Business Insider Corporate Web Page, https://www.businessinsider.com/how-to-retrieve-deleted-emails-from-yahoo (Access Date: 12.08.2022).
  • YAP, Keith (2016), “Text Analysis using Excel”, Keithyap Corporate Web Page, https://www.keithyap.com.au/text-analysis-using-excel/ (Access Date: 13.08.2022).
There are 31 citations in total.

Details

Primary Language English
Subjects Library and Information Studies, Other Fields of Education, Ethics, Behaviour-Personality Assessment in Psychology
Journal Section Articles
Authors

Mostafa Eissa 0000-0003-3562-5935

Engy Refaat Rashed 0000-0002-6593-378X

Dalia Essam Eissa 0000-0002-6340-8973

Publication Date October 21, 2023
Published in Issue Year 2023

Cite

APA Eissa, M., Rashed, E. R., & Eissa, D. E. (2023). Predatory E-mails Management through Analysis of Non-Academic Scientist Account: International Challenge in Scientific Publishing. Uluslararası Yönetim Akademisi Dergisi, 6(3), 566-580. https://doi.org/10.33712/mana.1161847