Skip to main content
Log in

Do You Ignore Information Security in Your Journal Website?

  • Opinion
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Daud, M. I. (2010). Secure software development model: A guide for secure software life cycle. In Proceedings of the international multiconference of engineers and computer scientists, Hong Kong (Vol. 1, pp. 17–19).

  • Laakso, M., Welling, P., Bukvova, H., Nyman, L., Björk, B. C., & Hedlund, T. (2011). The development of open access journal publishing from 1993 to 2009. PLoS ONE, 6(6), e20961.

    Article  Google Scholar 

  • Lancor, L., & Workman, R. (2007). Using Google hacking to enhance defense strategies. In ACM SIGCSE Bulletin (Vol. 39, No. 1, pp. 491–495). ACM.

  • Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. (2007). Survey of information security. Science in China Series F: Information Sciences, 50(3), 273–298.

    Article  Google Scholar 

  • Tewari, T. K., & Singh, S. K. (2010). Survey of conference management systems. International Journal of Computer Applications, 2(2), 14–20.

    Article  Google Scholar 

  • Willinsky, J. (2005). Open journal systems: An example of open source software for journal management and publishing. Library hi tech, 23(4), 504–519.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehdi Dadkhah.

Ethics declarations

Conflict of interest

There is no conflict of interest statement for all authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dadkhah, M., Borchardt, G. & Lagzian, M. Do You Ignore Information Security in Your Journal Website?. Sci Eng Ethics 23, 1227–1231 (2017). https://doi.org/10.1007/s11948-016-9849-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-016-9849-z

Keywords

Navigation