Archiving and Privacy Policy
ARCHIVING POLICY
AJESS (Academic Journal of Education and Social Sciences) is committed to ensuring the long-term digital preservation and accessibility of all published content. Our journal follows archiving and digital preservation processes in line with international best practices.
Digital Archiving and Preservation
-
PKP Private LOCKSS Network (PKP PLN) Participation: AJESS is an active participant in the PKP Private LOCKSS Network (PKP PLN). As an OJS-based (Open Journal Systems) journal, we have accepted the terms of use of this network to ensure the continuous and secure preservation of our content. This ensures that our content is automatically archived, safeguarding it against data loss, corruption, or server failures.
-
LOCKSS and CLOCKSS: To ensure that content remains permanently accessible and secure, the LOCKSS system and, for additional security, the CLOCKSS system are utilized. These decentralized preservation systems guarantee that even if the journal ceases publication, the content remains available through library networks for the benefit of the public and the academic community.
-
Institutional Collaboration: AJESS collaborates with university libraries, national archives, and institutional repositories to ensure the preservation of published articles.
-
Persistent Identifiers: All content published in AJESS is assigned a DOI (Digital Object Identifier), ensuring that articles remain accessible and citable over time.
Author Self-Archiving Rights
Authors are encouraged to self-archive their work in the following venues:
-
Personal websites and academic profiles (e.g., ResearchGate, Academia.edu).
-
Institutional repositories (University libraries, national academic archives).
-
Non-commercial preprint servers (provided that the original source of the work is appropriately cited).
In accordance with the CC BY 4.0 license, authors must ensure that the final published version is shared without modification.
Post-Publication Content Integrity
To ensure the integrity of the scholarly record:
-
Retractions, corrections, or updates are clearly marked and publicly announced.
-
Even if the journal is no longer in operation, published articles remain accessible through LOCKSS, CLOCKSS, institutional archives, and DOI databases.
PRIVACY POLICY
AJESS operates in compliance with international data protection regulations (e.g., GDPR, US Privacy Laws) regarding data privacy, confidentiality, and the protection of personal data.
Collection and Use of Personal Data
-
User Information: AJESS collects only necessary personal information (name, surname, email, institutional affiliation, etc.) from authors, reviewers, and readers, and uses this information solely for editorial and communication purposes.
-
Non-Disclosure to Third Parties: Personal data is not shared, sold, or transferred to third parties without explicit consent, except in cases of legal obligation.
-
Cookies and Tracking: The journal website may use cookies, but tracking is conducted in a manner that does not constitute a privacy violation.
Article Confidentiality
-
Manuscripts submitted to AJESS are treated as confidential documents. Editors, reviewers, and journal staff may not share any information regarding the manuscript with unauthorized persons.
-
Thanks to the double-blind peer review system, the identities of both authors and reviewers remain confidential to each other.
Reviewer and Author Anonymity
-
Reviewer identities are not disclosed to authors.
-
Author identities are not disclosed to reviewers during the manuscript evaluation process.
-
Communication between authors, reviewers, and editors is conducted in a confidential and secure manner.
Data Retention and Deletion
-
Manuscript submission records, peer review reports, and editorial decisions are stored securely for at least five (5) years.
-
Personal data can be deleted upon request, in accordance with data protection laws.
Security Measures
AJESS implements strict security protocols to protect user data:
-
Securing all data transfers through encrypted communication.
-
Preventing unauthorized access via secure server storage.
-
Conducting regular system audits to identify and fix security vulnerabilities.
Data Protection Ethics
-
Authors, reviewers, and editors must act in accordance with ethical data processing principles and ensure that sensitive research data is appropriately anonymized.
-
In the event of a breach of privacy or confidentiality, the journal management must be notified immediately.