Journal of
Systemics, Cybernetics and Informatics

ISSN: 1690-4524 (Online)

Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals)Benefits of supplying DOAJ with metadata:
  • DOAJ's statistics show more than 900 000 page views and 300 000 unique visitors a month to DOAJ from all over the world.
  • Many aggregators, databases, libraries, publishers and search portals collect our free metadata and include it in their products. Examples are Scopus, Serial Solutions and EBSCO.
  • DOAJ is OAI compliant and once an article is in DOAJ, it is automatically harvestable.
  • DOAJ is OpenURL compliant and once an article is in DOAJ, it is automatically linkable.
  • Over 95% of the DOAJ Publisher community said that DOAJ is important for increasing their journal's visibility.
  • DOAJ is often cited as a source of quality, open access journals in research and scholarly publishing circles.
JSCI Supplies DOAJ with Meta Data
, Academic Journals Database, and Google Scholar

Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory

Re-Published in
(A Community of about 40.000.000 Academics)

Editorial Advisory Board's Chair
William Lesso

Nagib C. Callaos

Sponsored by
The International Institute of
Informatics and Systemics

Editorial Advisory Board


Journal's Reviewers

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology

Integrating Reviewing Processes

No Warranty Express or Implied: Why Do We Have So Many Problems With the Computer Systems That Pervade Our Lives?
John W. Coffey
(pages: 1-6)

Can You Hear Me Now? An Innovative Approach to Assess and Build Connections with Online Learner’s
Tina M. Serafini, Risa Blair
(pages: 7-11)

End-to-end Security with Translation
Kevin E. Foltz
(pages: 12-17)

(Assistive) Technology at the Point of Instruction: Barriers and Possibilities
Lorayne Robertson
(pages: 18-24)

Supplementing Multiple Modalities and Universal Design in Learning with Goal-Setting
Russell Jay Hendel
(pages: 25-30)

Experts Informing Experts
Robert Hammond
(pages: 31-35)

Internet of Things – A New Epistemic Object
Rolf Dornberger, Terry Inglese, Safak Korkut
(pages: 36-44)

An Experiment in Interdisciplinary STEM Education: Insights from the Catholic Intellectual Tradition
Fr. Joseph R. Laracy, Thomas Marlowe, Fr. Gerald J. Buonopane
(pages: 45-53)

Big History Understanding of Complexity, Informatics and Cybernetics
John L. Motloch
(pages: 54-60)

Flourishing Organizations
Maria Jakubik
(pages: 61-72)

Pros & Cons of Smart ICT in Some Governmental Applications
Dusan Soltes
(pages: 73-75)

Information Exchange in Vehicles Ad-Hock Networks
Tomas Zelinka
(pages: 76-80)

Living in a Digital World: Improving Skills to Meet the Challenges of Digital Transformation Through Authentic and Game-Based Learning
Margit Scholl, Frauke Fuhrmann
(pages: 81-86)

Psychotherapy via the Internet as a Novel Tool for Clinical Use
Ulrich Sprick
(pages: 87-94)

Technology Intercepts for Cyber Security Applied to Critical Infrastructures
Mario La Manna
(pages: 95-100)

“And Then a Miracle Occurs …” – Engaging the Challenge of Operationalizing Theories of Success in Digital Transformation
Michael Von Kutzschenbach
(pages: 101-105)

Multidisciplinary Learning Extends Communication Skill, and Helps Cross Cultural Understandings: Biomedical Engineering
Shigehiro Hashimoto
(pages: 106-112)

Integrating Teaching, Research and Problem Solving: An Experience in Progress in the Mucuri Valley Region (Brazil)
Leônidas Conceição Barroso
(pages: 113-118)

Meeting Learning Challenges in Product Design Education with and through Additive Manufacturing
William Lavatelli Kempton, Steinar Killi, Andrew Morrison
(pages: 119-129)

Creating and Using Symbolic Mental Structures via Piaget’s Constructivism and Popper’s Three Worlds View with Falsifiability to Achieve Critical Thinking by Students in the Physical Sciences
Matthew E. Edwards
(pages: 130-134)

Creativity in Higher Education: Comparative Genetic Analyses on the Dopaminergic System in Relation to Creativity, Addiction, Schizophrenia in Humans and Non-Human Primates
Bernard Wallner, Sonja Windhager, Katrin Schaefer, Martin Fieder
(pages: 135-142)





Procedure for Submitting, Reviewing, and Publishing Articles in the Journal of Systemic, Cybernetics, and Informatics: JSCI

The Journal of Systemics, Cybernetics, and Informatics (JSCI) is an open access journal that has been publishing, with no article processing charges (APCs), the best 25%-30% of the papers presented at conferences organized by the International Institute of Informatics and Systemics (IIIS,, since 2003. This is equivalent to the 12%-20% of the articles submitted to these conferences.

The above editorial policy will continue, but on July 19th, 2016, JSCI initiated the reception of submissions made directly to the journal. This procedure has two steps, which do not include any submission or fast-tracking charges. (More details regarding this procedure and the acceptance policy are provided in the following sections):

Step 1. The submission of an abstract (200-400 words) written for inter-disciplinary communication to JSCI at for its internal review-

Step 2. If your abstract is accepted then you will be asked to submit your draft paper (about 5000 words) as submission for a virtual presentation at the next IIIS conference (two yearly conferences are usually organized). This is a necessary step to be made in order to meet the same kind of four-tier reviewing methodology and selection policy that has been applied since 2002. This reviewing methodology includes the following reviewing processes:
  1. The mandatory two-tier methodology (double-blind and non-blind) that has been applied, since 2006, to the papers published in the journal (,
  1. The potential reviewing you might receive from our participative peer-to-peer reviewing (PPPR,, and
  1. The potential reviewing you might receive from the virtual session in which your paper will be included. Each face-to-face session will have a corresponding virtual session through which the respective authors can interact, via non-synchronous means, three days before and during the conference, as well as up to three weeks after the conference ends. Details for virtual sessions and participation can be found at
The two-tier mandatory reviewing and the additional two-tier potential reviewing are required for the acceptance and publication of any article submitted to the journal, especially because the articles published up to the present went through, at least, these four-tier reviewing (two mandatory and two potential ones).  The two-tier mandatory reviewing is necessary for the paper acceptance and possible improvement. The additional two-tier potential reviewing is desirable for the improvement of the final version of the paper.

Please read below for more details regarding the submission procedure, selection policy, and, submission for fast track reviewing.


As stated above, the procedure of submitting abstracts will be via email and the submissions of the full paper draft will be via the respective conference web site (according the topic of the submitted paper). This two-step procedure corresponds to internal and external reviewing.

In the first step (internal review) the author submits an extended abstract (200-400 words), which should be 1) written for inter-disciplinary communication, i.e. academics from different disciplines should be able to understand the extended abstract, and 2) contain at least the following three parts:
  • Objectives achieved and/or results attained.
  • Means, methods, and/or methodologies used.
  • Conclusions and/or possible next suggested steps.
If the full paper is accepted in the second reviewing step (external review), then the extended abstract for inter-disciplinary communication might be used (by the author or JSCI) in the academic social media (e.g. linking it to the published full paper and, consequently, increasing the visibility of the paper.

By submitting this kind of extended abstract the authors, or co-authors, would be agreeing on making the commitment of:
  1. Submitting the full article draft according the respective deadline;
  2. Not submitting the same article for its potential review and publication via another venue while it is being reviewed by JSCI according the respective deadline of “notification to authors”;
  3. Not utilizing texts from other publications without making the respective references, and not using curves, diagrams, photos, tableaus, etc. without obtaining the respective permissions, if they are copyrighted. By not meeting this commitment the JSCI will stop the reviewing process of the article and will free the author from his/her commitment and expected ethical behavior of not submitting the same article for its potential publication in other venues, while it is being reviewed by JSCI; and
  4. Submitting the final version of the full paper if it is accepted in the second step of its reviewing process, described below.

Acceptance Policy

Final acceptance depends on two kinds of reviews, but an article should be recommended by non-blind (i.e. non-anonymous) reviewers AND double-blind (anonymous) reviewers in order to be accepted for its publication.
Recommendations of acceptance made by non-anonymous reviewers are necessary but not sufficient condition for paper’s final acceptance. A submitted paper, should also have a majority of its double-blind reviewers recommending its acceptance. If an article has been accepted by one of these two methods of reviewing but not by the other one, it would not be accepted unless it is modified according to the comments and to the requirements of those reviewers who recommended not accepting it as it is.
Together, both of these conditions generate a more reliable and rigorous review than a reviewing processes based on just one of the indicated methods. More details for the supporting reasoning of this two-tier reviewing methodology can be found at This level of reliability and quality assurance is required for a journal that has been publishing the best 25%-30% of the articles presented at a conference.

Fast Track Submissions

An additional requirement is needed if the author want to submit his/her paper for a fast track review process, which will allow for the publication of the paper before the selection process required for identifying the best papers. The procedure require a more rigorous reviewing because it requires the exclusion of the last step of selection, which is associated with the relative evaluation required for identifying the best 25%-30% of all accepted papers that have been (virtually or face-to-face) presented at the conference. The two-step procedures for a fast track review process are the following:

1. This step is the same as the one described above for regular submission, while also making it explicit that the extended abstract is being sent for a fast track review process.
2. This step is similar to the second step in a regular submission (described above) with addition of the following requirements:
  • The author should suggest at least three non-anonymous reviewers and no more than four for the non-blind reviewing  process
  • The organizing Committee will randomly select twice as many anonymous reviewers as the number selected for the regular submission, i.e. it will select at least 6 anonymous reviewers for the double blind review of the paper.
  • A submission, to be accepted, should be recommended by the majority of both kinds of reviewers, as well as at least 65% of both of them combined.
Papers accepted via fast track reviewing will also be included in a virtual session of the associated conference.

Special Issues

Special Issues of the Journal might have different reviewing methodologies and acceptance policies. Any difference regarding the information provided here for the regular issues of the journal will be announced in the respective call for papers. Otherwise, the information provided here will also be applicable.


In the context of ethical and academic misconduct, deception or the intention to deceive are the defining characteristics of self-plagiarism, How and whom you deceive is what generate the variety of different kinds of self-plagiarism. In a legal context, it depends on the signed contract, but, in any case, it is always related to the text, the prose and not the ideas.

This is why reuse of one’s text or prose might be 1) legal but unethical, 2) illegal, but ethical (as for example in an unfair interpretation of the copyright agreement or attorney skills in interpreting the fair-use in a way that benefit the copyright holder), 3) illegal and unethical, and 4) legal and ethical.

Consequently, Langdon-Neuner* (2008, p. 3) makes the following conclusions,

"... Authors should be advised that:
   Republication of an article is only acceptable if the journal that published the original consents and publication is accompanied by a statement that the article is a republication.
   Republication of parts of an article is acceptable provided the articles report on different data or use different analysis of the same data and provided the articles cite each other and the source of the data is clear and
   On submission to a journal the editor is informed of the existence of related submissions or publications, even if they are in a different language" [this evidently includes journals with readers from different disciplines]

* Langdon-Neuner, E. (2008). Publication more than once: duplicate publication and reuse of text, retrieved on 7/4/2017 from

All these conclusions and recommendations are in agreement with the characterization of self-plagiarism as related to an act or the intention of deceiving and agree with the Journal’s policy regarding to what should an author do in order to avoid the misconduct of self-plagiarism. Consequently, we subscribe the advices given, above, by Langdon-Neuner (Publication more than once: duplicate publication and reuse of text., 2008, p. 3). They are among the clearest we could find in the literature.

Authors of the papers published in this journal should make the commitment to follow this policy before submitting the initial and the final versions of their papers to the journal of Systemics, Cybernetics, and Informatics (JSCI).

More details regarding the notion of Self-plagiarism could be found at

International Ethical Standards

The Journal of Systemic, Cybernetics, and Informatics: JSCI follows the “International standards for editors and authors” developed by the  Committee of Publication Ethics (COPE) during  the 2nd World Conference on Research Integrity in Singapore in 2010. These ethical standards have been published as part of the conference proceedings under a Creative Commons license*. Wager E & Kleinert S (2011), Responsible research publication: international standards for authors. A position statement developed at the 2nd World Conference on Research Integrity, Singapore, July 22-24, 2010. Chapter 50 in: Mayer T & Steneck N (eds) Promoting Research Integrity in a Global Environment. Imperial College Press / World Scientific Publishing, Singapore (pp 309-16). (ISBN 978-981-4340-97-7).

International Standards for Editors According to COPE
  • Editors are accountable and should take responsibility for everything  they publish
  • Editors should make fair and unbiased decisions independent from commercial consideration and ensure a fair and appropriate peer review process.
  • Editors should adopt editorial policies that encourage maximum transparency and complete, honest reporting. Editors should guard the integrity of the published record by issuing corrections and retractions when needed and pursuing suspected or alleged research and publication misconduct.
  • Editors should pursue reviewer and editorial misconduct.
  • Editors should critically assess the ethical conduct of studies in humans and animals.
  • Peer reviewers and authors should be told what is expected of them.
  • Editors should have appropriate policies in place for handling editorial conflicts of interest.
The text above was copied from:

International Standards for Authors According to COPE.
  • The research being reported should have been conducted in an ethical and responsible manner and should comply with all relevant legislation.
  • Researchers should present their results clearly, honestly, and without fabrication, falsification or inappropriate data manipulation.
  • Researchers should strive to describe their methods clearly and unambiguously so that their findings can be confirmed by others. Researchers should adhere to publication requirements that submitted work is original, is not plagiarised, and has not been published elsewhere.
  • Authors should take collective responsibility for submitted and published work.
  • The authorship of research publications should accurately reflect individuals’ contributions to the work and its reporting.
  • Funding sources and relevant conflicts of interest should be disclosed.
The text above was copied from: