PREDATORY JOURNALS ARE INDEXING IN REPUTED DATABASES: A CASE STUDY OF UNSOLVED ISSUES JOURNALS ARE INDEXING IN REPUTED DATABASES: A CASE STUDY OF UNSOLVED ISSUES.

(3), Abstract: The aim of this study is to identify the features of fraudulent journals. Fraudulent and clone journals wasted valuable manuscripts when scholars and authors publish their works in these journals. Fraud journals publish the articles without reviewing process with a high rate of fee while the name and ISSN of clone journals are identical to the original journals. Purposive sampling technique as well as document analysis method have been used to conduct this research. Two clone versions and two fraud journals of the SCOPUS indexing journals have been selected for reviewing their articles. Based on the discussion of this study, researchers found some characteristics of predatory/fraud/ clone journals that will help the scholars to avoid publishing on fake journals.

publications for which they seek article processing fees (APC) and specifically guarantee the approval of manuscripts without the rigorous peer review procedure normally adopted by reputable index journals, thus jeopardizing the validity of research on behalf of reputable index journals (Conn, 2015;Bartholomew, 2014).
Predatory journals employ many strategies and techniques to prove themselves respectable and draw the interest of young naive researchers or who would like to publish too quickly to achieve promotion (Duc, Thong & Masic, 2020;Duc, Khoa & Thong, 2020;. This practice of enticing prey researchers to publish valid work in fake journals not only causes tremendous loss of funds and precious resources, but also causes the loss of significant validated study that may have been a breakthrough in research progress (Masic, 2020;2017;2012).
Most young and novice researchers, along with a few respectable researchers, actively using fraudulent or fake journals to develop their resume and curriculum vitae for publications, to obtain jobs, finance more studies, grants, and even promotions in their qualified carriers (Duc, Thong & Masic, 2020;Duc, Khoa & Thong, 2020;. Thus, the scholars who are also aware of unethical presence of a journal may notwithstanding be writing in it regardless of request to publish it (Memon, 2019;Eriksson & Helgesson, 2018). Tragically, a few fake journals are really pervading into reliable sources like Pubmed, Pubmed Central, Medline, SCOPUS, and Web of Science; therefore, it poses an important anxiety as to what do we do in the face of this troublesome matter?

Open Access Model and the Establishment of Predatory Journals
Authors who desire to make their articles more accessible to the public can now pay out of pocket or find a funding source to buy the copyright of the article from a traditional publisher. This way, the publisher will maintain all the quality control because they will still be lucrative while the scientific work is still open to the community for open access (OA). The OA model has been established around since the 1990s and has accompanied the development of high-speed Internet to become a strong trend, competing with the traditional model where the reader must pay (Toll-Access, TA). OA journals thrive in such a context, but with it the goal changes. In the traditional model, readers are customers. For many OA journals, the author of the article is the subject. A new reality appears -the more articles a publication publishes, the more money the OA journals will generate from the authors in the form of article processing charges (APC) (Memon, 2019;Laakso et al., 2011).

Predatory Journals are Indexing in Reputable Databases
The credibility and significance of the citation databases such as PubMed, Scopus, and the Web of Science, on which all scholars rely as credible research articles, are now being questioned. Databases of citations are irradiated with journals of doubtful quality from predatory publications (Fernández et al., 2016;Gasparyan et al., 2017;Cortegiani et al., 2020;Manca et al., 2018;Manca et al., 2017;Cortegiani et al., 2019;Beall, 2020;Severin & Low, 2019).
An indexing analysis of 944 evidently corrupt journals have reported that the Science Citation Index Expanded (SCIE) database indexes only 9 journals. Unfortunately, the Emerging Sources Citation Index (ESCI) covers 28 abusive journals, and Scopus database covers 56 journals. Surprisingly, MEDLINE indexes only 5 predatory journals, and EMBASE covers 3 (Fernández et al., 2016). Manca et al. (2017) scrutinized the scientometric descriptions of possible predatory journals identified in the Beall's list of current, possible or likely predatory journals in recovery and neurology. They showed that 7/59 rehabilitation journals and 14/87 neurology journals were indexed in PubMed databases. In critical care medicine field, Cortegiani et al. also manifested that there were two journals indexed in Beall's list that were also appeared in Scopus database (Cortegiani et al., 2019). In a previous report by Beall, the Journal of Current Research in Science, a questionable journal, allowed up to 40% plagiarism in its articles and proclaims several completely fake impact factors. Surprisingly, it was indexed in ESCI (Beall, 2020).
Latest studies suggest that PubMed, one of the top biomedical databases in the world, contains illicit papers and their publications, is a major concern. The strict requirements and conditions for inclusion of a publication in MEDLINE set out above are not necessary for inclusion in PubMed and PubMed Central. Consequently, Pubmed and Pubmed Central could well contain publications that have not qualified for MEDLINE database. It is also noted that respondent journals are being evaluated by MEDLINE's Literature Collection Technical Review Committee to be considered for inclusion in PubMed Central. Furthermore, the title of the journal and the name of the publisher will not be considered as a crucial point in the evaluation process. Predatory journals sometimes introduce journal titles that are somewhat close to royally registered journals and may not be regarded as fraudulent. Subsequently, some predatory open-access journals can leak into the PubMed and Pubmed Central (Fernández et al., 2016;Gasparyan et al., 2017;Manca et al., 2018;Manca et al., 2017;Cortegiani et al., 2019;Beall, 2020).

Objective
The main objective of this study is to find out the characteristics of fraudulent journals.

Methodology
Four predatory journals (Journal of Xi'an University of Architecture & Technology, Test Engineering and Management, International Journal of Advanced Science and Technology, and International Journal of Psychosocial Rehabilitation) were selected for reviewing their articles. Two of them are clone and remaining are fraud journals. Purposive/Authoritative sampling technique and document analysis method had been used to conduct this research. The researchers had read the articles of these journals carefully to conduct this study.
The Science and Engineering Research Support Society (SERSC) is an international center to help distinguished scholars and students who are studying different scientific and technical fields. The Science and Engineering Research Support Society wishes to provide academic and industry professionals with good opportunities to address recent developments in various science and technology fields. Every year SERSC organizes numerous international conferences, symposia and workshops, and offers funding or technical assistance to researchers who wish to organize their own conferences and workshops. SERSC also publishes specialized journals with high quality academic journals (for example, IJAST) in various areas of Science and Technology.
The International Journal of Advanced Science and Technology (IJAST) aims to promote and support research related to technology and its applications in control and automation. It offers an opportunity for professionals from academia and industry to address recent developments in the field of control and automation. Bridging the gap of users who don't have subscription to major databases where one can pay for any downloaded article; as part of our contribution to global science society, this online publishing platform is open to all readers. The website of this journal is http://sersc.org/journals/index.php/ijast The subjects covered by IJAST include BIO-science and Bio-technology, communication and networking, computer science and its software, control and automation, database theory and implementation, grid and distributed computing, security and information assurance technology, signal processing, image processing and pattern recognition, software engineering and so on.
There are thousands of mistakes in their published articles. For example, objective two and objective three are inconsistent with other parts (like Data analysis, discussion) of the selected article (Image 4, 5&6).
Website of the clone journal is https://www.xajzkjdx.cn (Image 12). This domain has been registered on January 2020. Info about original link: https://www.scopus.com/sourceid/37099 The topics of interest at Xi'an University of Architecture & Technology are engineering and technology, arts, social sciences and humanities, biomedical & medical sciences, management and trade, physical science and environment. Normally, the journal accepts article within 2-5 days and publishes after the payment of USD 100 (international) or, RS. 4000 (for Indian Authors).

Suggested Features of Predatory Journals
Based on the characteristics of above journals, we can discuss the suggested features of a predatory journal. a. Accepting the articles very quickly, usually without independent criticism or quality control even articles with irrational content. b. Rapid publication (no correction, direct publication; accepted within 7-10 days and published 30-45 days). c. Only notify the author of the Article Processing Charge (APC) after the paper has been accepted or APC is unclear or APC can be negotiated after acceptance. d. Actively sending unsolicited or bulk spam emails to invite to submit articles in upcoming issues or special issues or participate in the editorial board or reviewer of journals. e. Bringing scholars to the editorial board without permission, and not letting them leave the editorial board. f. Unqualified international scholars to the editorial board (lacking ORCID ID and/ fake research ID). g. Use a name or website design that closely resembles prestigious journals; h. Fake impact factor or databases, or not available. i. There are unclear procedures for handling manuscripts and workflows of journals. j. The website demands that papers must be sent via a private email. k. There is no withdrawn and retraction policy. l. Information about where and how articles will be digitally conserved is absent. m. Fraudulent placement of the Committee on Publication Ethics (COPE) logo on the journal website without really being a member of COPE. n. "International Standard Serial Number" (ISSN) of one OA journal cannot be checked in DOAJ and/or ROAD. o. Falsely claiming indexing in various reputed databases like PubMed, Pubmed Central, Medline, SCOPUS, and/or Web of Science p. The articles of these journals contain faults in grammar and spelling, data analysis, result discussion. Images and logos are unprofessional, distorted, and fuzzy.

Conclusion
The prevailing scholarly ethos of "publish or perish" and the OA model cooperatively contributed to the present state of affairs. Prior to new submission, researchers can decide to submit their papers not only on the basis of checking 'black lists,' but also through carefully evaluating the characteristics of journals' DOAJ, ROAD, COPE, and ICMJE registries, and indexing reputable databases such as PubMed, Pubmed Central, Medline, SCOPUS, and/or Web of Science through their official websites. To avoid potential predatory journals, researchers should take into consideration some aforementioned suggested features of predatory journals. In a word, both as readers and as authors, we should fully boycott fake journals.

Acknowledgment
The Author has followed the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/).

Disclaimers
The materials and information in the article are presented for educational purposes only and the author has no intention to hurt people's feelings as well as their reputation.
"According to Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, Drafted in October 2003. The aim of OA is to make scientific and scholarly literature and materials freely accessible to all internet users -that is, to make them accessible online free of charge and as free of technical and legal barriers as