Open Access Statement
At Journal of Internet Services and Information Security, we are dedicated to fostering the open dissemination of scholarly knowledge. As an open-access journal, we ensure that all articles published in our issues are accessible to readers worldwide without any subscription or paywall barriers. We firmly believe that unrestricted access to research enhances visibility, amplifies citation potential, and broadens the impact of scholarly work across diverse academic communities. By making research available to everyone, we contribute to the democratization of knowledge and the advancement of global scholarship.
Our commitment to open access is rooted in the principles of transparency, inclusivity, and equity. Through our open-access model, we empower researchers, educators, students, and policymakers to access high-quality research that inspires innovation, fuels informed decision-making, and promotes societal progress. By facilitating the exchange of ideas, we aim to create a more interconnected and collaborative academic ecosystem.
In alignment with international open-access standards, Journal of Internet Services and Information Security adheres to the Creative Commons Attribution (CC BY) license or other similar open licenses. These licenses allow readers to read, download, copy, distribute, print, and use articles for lawful purposes with proper attribution to the original work. This licensing framework ensures that the intellectual property rights of authors are respected while maximizing the dissemination and impact of their research.
We are proud to support the global open-access movement as part of our mission to foster equitable knowledge sharing. By removing barriers to research access, we strive to bridge the gap between research and real-world application, enabling individuals and communities to benefit from the latest advancements across various fields. Our dedication to open access reflects our belief that knowledge thrives when it is shared openly, driving progress and innovation for the betterment of society as a whole.
Peer Review Statement
The Journal of Internet Services and Information Security (JISIS) is committed to upholding the highest standards of scholarly integrity and scientific rigor. To ensure the credibility, accuracy, and relevance of published work, every manuscript submitted to JISIS undergoes a double-blind peer review process. This method maintains anonymity for both authors and reviewers, thereby minimizing potential biases and fostering impartial evaluations.
Each submission is initially screened by the editorial board to ensure compliance with the journal’s scope and formatting guidelines. Manuscripts that meet these basic requirements are then forwarded to a minimum of two independent subject matter experts with relevant academic or industry experience. Reviewers are selected based on their expertise in internet technologies, cybersecurity, network protocols, data privacy, and related domains. Their evaluations focus on several key criteria including originality, technical quality, methodology, clarity of presentation, and the significance of the research contribution.
The reviewers provide detailed feedback, suggest revisions where necessary, and recommend whether the manuscript should be accepted, revised, or rejected. Authors are given an opportunity to address the reviewers’ comments and resubmit revised versions for further evaluation. This iterative process helps ensure that only thoroughly vetted, high-quality articles are published in JISIS. JISIS values transparency, timeliness, and constructive critique throughout the peer review process. The journal continuously monitors the performance and responsiveness of its reviewers to maintain efficiency and uphold academic integrity. Through this robust peer review framework, JISIS strives to support the advancement of knowledge in the dynamic field of internet services and information security while building trust among readers, authors, and the broader research community
Privacy Statement
At the Journal of Internet Services and Information Security (JISIS), we are committed to protecting the privacy and personal data of all individuals who interact with our journal, including authors, reviewers, editors, and readers. This privacy statement outlines how we collect, use, store, and safeguard personal information in compliance with relevant data protection regulations and ethical publishing practices.
When users engage with our journal—such as by submitting manuscripts, registering as reviewers, or subscribing to updates—we may collect personal data including names, email addresses, institutional affiliations, contact information, and ORCID IDs. This information is used strictly for academic and editorial purposes, such as managing submissions, facilitating peer review, sending journal notifications, and ensuring proper attribution in published articles. We do not sell or share this data with third parties for marketing or commercial purposes.
All collected data is stored securely and is accessible only to authorized editorial staff and technical personnel involved in journal operations. We use appropriate technical and organizational measures to prevent unauthorized access, data breaches, or misuse. Additionally, all third-party platforms we may use (such as submission systems or indexing services) are expected to comply with data protection and security standards.
JISIS respects the rights of individuals regarding their personal data. Users may request access to, correction of, or deletion of their personal information at any time by contacting the journal’s editorial office. Authors and reviewers also have the right to withdraw consent for certain types of data processing, although this may affect their ability to participate in the publication or review process. By submitting a manuscript or otherwise interacting with JISIS, users acknowledge and consent to the collection and use of their personal information as described in this statement. We periodically review our privacy practices and may update this statement to reflect changes in legal or operational requirements. Any updates will be posted on the journal’s website and communicated where appropriate.
Informed Consent Statement
Informed consent is essential for all research involving human participants. Authors must ensure that participants are fully aware of the nature and purpose of the study, and voluntarily agree to take part. This includes understanding any potential risks, benefits, and their right to withdraw from the study at any time without penalty.
Consent should be obtained prior to data collection and may be written or verbal, depending on the nature of the research and local ethical standards. However, written consent is strongly recommended and may be required for clinical or sensitive studies. Authors must confirm in the manuscript that consent was obtained from all participants.
For studies involving vulnerable populations, such as children or individuals with impaired decision-making capacity, consent must be obtained from a parent, legal guardian, or authorized representative. When appropriate, assent from the participant should also be secured.
In cases where identifiable personal information, photographs, or clinical data are to be published, additional explicit consent must be obtained for publication. All efforts should be made to protect participants’ privacy and confidentiality.
Failure to obtain proper informed consent may result in the rejection or retraction of the manuscript. Authors are responsible for adhering to ethical research practices and must provide documentation upon request.
Data Availability and Transparency Statement
The journal encourages authors to promote transparency and reproducibility by providing clear information on the availability of the data supporting their research findings. Authors must include a statement in their manuscript specifying where and how the data can be accessed, whether in a public repository, as supplementary material, or available upon reasonable request.
If the data is stored in a publicly accessible repository, authors should provide the repository name and a direct link or DOI. For proprietary or confidential data, authors should clearly explain the restrictions and outline any conditions under which access may be granted.
In cases where data cannot be shared due to ethical, legal, or privacy concerns, authors must explicitly state the reasons for the restriction. Efforts should be made to anonymize sensitive data where possible to allow partial or limited sharing.
For computational or experimental studies, authors are encouraged to provide code, software, or detailed protocols to facilitate replication. Proper citation of datasets and tools used in the research is also required.
The journal reserves the right to request raw data or supporting documentation during the review or post-publication process. Transparency in data availability is vital to uphold the integrity and reproducibility of published research.