{"id":1503,"date":"2014-06-27T21:59:48","date_gmt":"2014-06-27T16:29:48","guid":{"rendered":"https:\/\/www.enago.com\/academy\/?p=1503"},"modified":"2021-10-26T16:15:01","modified_gmt":"2021-10-26T10:15:01","slug":"elsevier-hack-bogus-peer-review","status":"publish","type":"post","link":"https:\/\/www.enago.com\/academy\/elsevier-hack-bogus-peer-review\/","title":{"rendered":"Hacked Peer Review Process: A Reiteration of the Elsevier Hack"},"content":{"rendered":"<p>No one likes to receive a <a title=\"Surviving a Bad Peer Review\" href=\"https:\/\/www.enago.com\/academy\/surviving-bad-peer-review\/\" target=\"_blank\" rel=\"noopener\">bad review<\/a> on a submitted paper, since this may prevent publication. However,\u00a0there are times when a good review can be even worse, ultimately causing a <a href=\"https:\/\/www.enago.com\/academy\/when-should-a-paper-be-retracted\/\" target=\"_blank\" rel=\"noopener\">paper\u2019s retraction<\/a>. How? This can occur when the <a href=\"https:\/\/www.read.enago.com\" target=\"_blank\" rel=\"noopener\">peer review process<\/a> is bogus. In such cases, someone hacked into the publisher\u2019s system and submitted a fraudulent review in the name of an actual professor who knows nothing of the case. Bizarre as it sounds, this process happened recently at Elsevier.<\/p>\n<blockquote><p>About ten papers were affected and have been retracted from Elsevier journals.<\/p><\/blockquote>\n<p>Since there was no evidence of wrongdoing on the part of the authors, they will have the option of resubmitting the papers for legitimate reviews, and if the reviews are positive the research will officially re-enter the literature. Even in the best-case scenario, this incident is a blow to those involved and a speed bump in their careers.<\/p>\n<blockquote><p>As of now this affair appears to be a typical case of <a title=\"Graduate Student Fraud: Columbia University as a Case Study.\" href=\"https:\/\/www.enago.com\/academy\/research-misconduct-bengu-sezen-case\/\">mischievous hacking<\/a>, not some scheme to sabotage professors\u2019 careers.<\/p><\/blockquote>\n<p>Several hackers may have been involved since the quality of the bogus reviews varied. Some were badly written, displaying no chemical insight and scant attention to Elsevier guidelines. But some reviews were quite well written. However knowledgeable these hackers were, their true genius lay in writing positive reviews. Who is going to challenge a positive review? Not the authors. The editor might, but unless the fake review is markedly different from other legitimate reviews, it will likely pass across the editor\u2019s desk without comment.<\/p>\n<h2>Bogus Reviews: How to Avoid?<\/h2>\n<p>How can a researcher avoid being the victim of <a title=\"100 Gibberish Papers Published\u2014and Retracted\" href=\"https:\/\/www.enago.com\/academy\/fake-research-papers-published-retracted\/\" target=\"_blank\" rel=\"noopener\">bogus reviews<\/a>? One thing to do is check with the publication\u2019s review process to make sure it doesn\u2019t have any obvious security problems for submission of reviews. Elsevier\u2019s current system is probably a good model to compare others to, since Elsevier has now upgraded their review process to make it hard to hack.<\/p>\n<p>What should a researcher do if he suspects he has been the victim of a bogus review? Obviously, speak out at once. That way, the\u00a0solution of a problem comes before a retraction. What to look out for? A vague, generalized positive review would be one flag\u2014a review that betrays no real understanding of the paper. If there were any suspicions it would seem to be a trivial matter for the editor to check the reviewer\u2019s email address against that listed the supposed respondent\u2019s university webpage. If the two addresses don\u2019t match up, there may be trouble afoot. In fact, this step seems so obvious that it can be done routinely. Maybe it should be!<\/p>\n<p>How do you think the <a href=\"https:\/\/www.enago.com\/publication-support-services\/peer-review-process\" data-internallinksmanager029f6b8e52c=\"115\" title=\"Peer Review\" target=\"_blank\" rel=\"noopener\">peer review<\/a> process of such a reputed journal like Elsevier get hacked? Please share your thoughts with us in the comments section below.<\/p>\n<div style=\"display:flex; gap:10px;justify-content:\" class=\"wps-pgfw-pdf-generate-icon__wrapper-frontend\">\n\t\t<a  href=\"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/1503?action=genpdf&amp;id=1503\" class=\"pgfw-single-pdf-download-button\" ><img data-src=\"https:\/\/www.enago.com\/academy\/wp-content\/plugins\/pdf-generator-for-wp\/admin\/src\/images\/PDF_Tray.svg\" title=\"Generate PDF\" style=\"width:auto; height:45px;\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><\/a>\n\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>No one likes to receive a bad review on a submitted paper, since this may&hellip;<\/p>\n","protected":false},"author":6,"featured_media":1508,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[757,758],"tags":[44],"ppma_author":[1894],"class_list":["post-1503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","category-publishing-hot-topics","tag-peer-review"],"better_featured_image":{"id":1508,"alt_text":"Peer Review Fraud","caption":"","description":"","media_type":"image","media_details":{"width":930,"height":300,"hwstring_small":"height='41' width='128'","file":"2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack.jpg","sizes":{"thumbnail":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-170x150.jpg","width":170,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-170x150.jpg"},"medium":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-470x152.jpg","width":470,"height":152,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-470x152.jpg"},"medium_large":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-768x248.jpg","width":768,"height":248,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-768x248.jpg"},"better-amp-small":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-100x100.jpg","width":100,"height":100,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-100x100.jpg"},"better-amp-normal":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-260x200.jpg","width":260,"height":200,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-260x200.jpg"},"better-amp-large":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-450x300.jpg","width":450,"height":300,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-450x300.jpg"},"publisher-tb1":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-86x64.jpg","width":86,"height":64,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-86x64.jpg"},"publisher-sm":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-210x136.jpg","width":210,"height":136,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-210x136.jpg"},"publisher-mg2":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-279x220.jpg","width":279,"height":220,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-279x220.jpg"},"publisher-md":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-357x210.jpg","width":357,"height":210,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-357x210.jpg"},"publisher-lg":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-750x300.jpg","width":750,"height":300,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-750x300.jpg"},"publisher-tall-sm":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-180x217.jpg","width":180,"height":217,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-180x217.jpg"},"publisher-tall-lg":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-267x300.jpg","width":267,"height":300,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-267x300.jpg"},"publisher-tall-big":{"file":"Hacking-the-Review-Process-The-Elsevier-Hack-368x300.jpg","width":368,"height":300,"mime-type":"image\/jpeg","source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack-368x300.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":1503,"source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2016\/05\/Hacking-the-Review-Process-The-Elsevier-Hack.jpg"},"acf":{"faq_main_heading":"","faq_heading_one":"","faq_heading_two":"","faq_heading_three":"","faq_heading_four":"","faq_heading_five":"","faq_heading_six":"","faq_description_one":"","faq_description_two":"","faq_description_three":"","faq_description_four":"","faq_description_five":"","faq_description_six":""},"views":908,"single_webinar_page_date":null,"single_webinar_page_time":null,"session_agenda":null,"who_should_attend_this_session":null,"about_the_speaker_field":null,"co-webinar-sec":null,"co_webinar_sec_one":null,"speaker-name":null,"webinar-date":null,"webinar-time":null,"webinar-s-image":null,"custum_webinar_category":null,"authors":[{"term_id":1894,"user_id":6,"is_guest":0,"slug":"daveishan","display_name":"Enago Academy","avatar_url":{"url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2024\/03\/cropped-favicon-192x192-1.png","url2x":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2024\/03\/cropped-favicon-192x192-1.png"},"author_category":"","user_url":"","last_name":"","first_name":"","job_title":"","description":"Enago Academy, the knowledge arm of Enago, offers comprehensive and up-to-date resources on academic research and scholarly publishing to all levels of scholarly professionals: students, researchers, editors, publishers, and academic societies. It is also a popular platform for networking, allowing researchers to learn, share, and discuss their experiences within their network and community. The team, which comprises subject matter experts, academicians, trainers, and technical project managers, are passionate about helping researchers at all levels establish a successful career, both within and outside academia."}],"_links":{"self":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/1503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/comments?post=1503"}],"version-history":[{"count":0,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/1503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/media\/1508"}],"wp:attachment":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/media?parent=1503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/categories?post=1503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/tags?post=1503"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/ppma_author?post=1503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}