Academic Search Engine Spam and Google Scholar's Resilience Against itSkip other details (including permanent urls, DOI, citation information)
This work is protected by copyright and may be linked to without seeking permission. Permission must be received for subsequent distribution in print or electronically. Please contact email@example.com for more information. :
For more information, read Michigan Publishing's access and usage policy.
Meta tags are rarely used by spammers since most search engines ignore meta tags due to spam issues
We do not claim that the author of the example paper did duplicate spam. It is likely that Google was not able to identify the different pages as duplicates. However, this illustrates what duplicate spam might look like.
The amount of indexed files of a certain type (e.g. ppt) are identifiable via the search query “filetype:ppt”
We took a sample of 10 presentations and Microsoft Word documents that contained citations and all citations in these files were counted.
It could be that Google Scholar weights citations differently when using them for ranking articles. However, third parties parsing Google Scholar cannot identify any distinctions.
Due to these recommendations we decided to withdraw the submitted papers.
It has to be mentioned that we published this book under our real names. However, it would have been just as easy to publish it with a fake identity (though this would have violated the terms of service of the print on demand publisher).