FAKE WEBSITES SCAMS IN OPEN ACCESS PUBLISHING A Rising Threat to the Integrity of Open Access Publishers, Writers & Institutions.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Supporting Engagement in Open Access: a Publishers Perspective
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
OVER VIEW OF BANKING FRAUDS
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
1 Identity Theft and Phishing: What You Need to Know.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Internet Fraud By: Noelle Woodman.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Digital Citizenship Project
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Publishing in Perpetuity The importance of Digital Preservation for Publishers in Science, Medicine and Technology Drs Eefke Smit International STM Association.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Monitoring public satisfaction through user satisfaction surveys Committee for the Coordination of Statistical Activities Helsinki 6-7 May 2010 Steve.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
To:Employee From: impersonated official company Message: Give us personal information here.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Cybercrime What is it, what does it cost, & how is it regulated?
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Digital Citizen Project By: Frances Murphey Technology and Education.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
A threat to global security and economy Koushik Mannepalli CMPE 294.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Protecting Your Assets By Preventing Identity Theft
Cyberspace fraud and abuse
Mrs. Esman Computer Special
What is a Blog? short for Weblog journal on a website
SAM GDPR Assessment <Insert partner logo here>
Red Flags Rule An Introduction County College of Morris
INFORMATION SYSTEMS SECURITY and CONTROL
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Challenges and Successes in the Zambian ICT Security Sector
Business Compromise and Cyber Threat
Cyberspace fraud and abuse
Protecting Yourself from Fraud including Identity Theft
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

FAKE WEBSITES SCAMS IN OPEN ACCESS PUBLISHING A Rising Threat to the Integrity of Open Access Publishers, Writers & Institutions.

Issue at Hand  Fraudulent Websites:  Fake websites that duplicate and/or imitate official Open Access Publishing Portals.  Contain no legitimacy whatsoever with any recognized institution  Prey upon desperate authors in a “publish or perish” situation in terms of academic/professional standing.

Modus Operandi of Fraudulent Web Publishing Scams  Similar-to-Original Names:  Adopt web-addresses & names with slight alpha-numeric alterations.  Duplicative Appearances:  Fake website’s appearance is made to look almost exactly like the original, often by making slight changes to the original source codes.

Modus Operandi of Fraudulent Web Publishing Scams  Offer of “Cheap” publication.  Offer fractional prices for publication under the tags of “Special Promotion Offer” etc. to unsuspected authors  Engaged in Inadequate Peer-review Systems  Use a time period of only 4-7 days to review the articles and then guarantee the publication even for a piece consisting entirely of gibberish.

Case Study “  Name Duplication:  instead of  Data Duplication:  All data from the original website had been copied exactly in the phish site.

Case Study “  Alteration & Publication:  Scammers published two articles in a journal taken from a link present at the original website.  Retreat:  After being promptly pointed-out, the scammers turned out to be Iran-based scientists.  Upon contact via telephone, the phishing website was taken down immediately and unpublished.

Name Duplication OriginalFake wwww.scialert.comwwww.sciealert.com

Data Duplication OriginalFake

Targeted Link OriginalFake

Targeted Journal OriginalFake

Targeted Year OriginalFake

Targeted Issues OriginalFake

Targeted Article1 OriginalFake

Replacement of the article OriginalFake

Targeted Article 2 OriginalFake

Replacement of the Article OriginalFake

Another example of cybercrime in Scientific Publishing  Identity theft of Two European Science Journals by counterfeit journal websites  Crooked websites are masquerading as Archives des Sciences( Switzerland) and Wulfenia (Austria)  Austrian Police closed down a fake website in Austria but multiple replicas popped up on servers in other countries. Ref: authors

Threats & Challenges  Publishers:  Web portals vulnerable to phishing and duplication.  Possibility of Content Theft from web portals.  Damage to repute and social image within online publishing communities.  Possibility of Identity Theft of Existing registered users.

Threats & Challenges  Authors:  Financial Loss to fake publishing websites.  Personal Identity Theft.  Damage to personal repute due to shady publications.  Institutions:  Risk of hiring wrong resources based on fake-publications.  Damage to organizational repute.  Risk of funding illegitimate projects

Countermeasures & Prevention Protocols  Publishers:  Increased monitoring for phishing websites & scams.  Enforcing Vigilant Cyber Security Initiatives.  Establishing Content Security Protocols on organizational & publication data.

Countermeasures & Prevention Protocols  Authors:  Proper research before making financial commitments to any website.  Using secure & traceable protocols for online payments.  Emphasis upon content review before publishing.  Institutions:  Standardized plagiarism & data structure control on submitted content.  Thorough background research on newly hired resources.

The Way Forward  Scientific literacy must include the ability to recognize publishing fraud.  If you find any such cyber crime activity,you must report to ACSE as ACSE aims to highlight and condemn such criminal activities related to scientific publishing.

The Way Forward  By working together in collaboration with each other all stake holders can avoid becoming a victim to such online criminals.  ACSE aims to provide such comprehensive and official platform for stakeholders in scientific publishing where all of them can collaborate and work together to ensure mutual safety and progress along with implementing ethical practices.

THANK YOU