Journal of
Systemics, Cybernetics and Informatics

ISSN: 1690-4524 (Online)

Indexed by
EBSCO, Cabell, DOAJ (Directory of Open Access Journals)Benefits of supplying DOAJ with metadata:
  • DOAJ's statistics show more than 900 000 page views and 300 000 unique visitors a month to DOAJ from all over the world.
  • Many aggregators, databases, libraries, publishers and search portals collect our free metadata and include it in their products. Examples are Scopus, Serial Solutions and EBSCO.
  • DOAJ is OAI compliant and once an article is in DOAJ, it is automatically harvestable.
  • DOAJ is OpenURL compliant and once an article is in DOAJ, it is automatically linkable.
  • Over 95% of the DOAJ Publisher community said that DOAJ is important for increasing their journal's visibility.
  • DOAJ is often cited as a source of quality, open access journals in research and scholarly publishing circles.
JSCI Supplies DOAJ with Meta Data
, Academic Journals Database, and Google Scholar

Listed in
Cabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory

Re-Published in
(A Community of about 40.000.000 Academics)

Editorial Advisory Board's Chair
William Lesso

Nagib C. Callaos

Sponsored by
The International Institute of
Informatics and Systemics

Editorial Advisory Board


Journal's Reviewers

Description and Aims

Submission of Articles

Areas and Subareas

Information to Contributors

Editorial Peer Review Methodology

Integrating Reviewing Processes

Effect of Flow on Cultured Cell at Micro-Pattern of Ridge Lines
Haruka Hino, Shigehiro Hashimoto, Yusuke Shinozaki, Hiromi Sugimoto, Yusuke Takahashi
(pages: 1-7)

Bridging the Semantic and Lexical Webs: Concept-Validating and Hypothesis-Exploring Ontologies for the Nexus-PORTAL-DOORS System
Adam Craig, Seung-Ho Bae, Carl Taswell
(pages: 8-13)

The Learning Science through Theatre Initiative in the Context of Responsible Research and Innovation
Zacharoula Smyrnaiou, Elena Georgakopoulou, Menelaos Sotiriou, Sofoklis Sotiriou
(pages: 14-22)

Perceptions and Preferences of High School Students in STEM: A Case Study in Connecticut and Mississippi
Bin (Brenda) Zhou, Clifford Anderson, Feng Wang, Lin Li
(pages: 23-26)

A Study on the Meaning of the ‘Lifelong Learning to Be’ Implicated in the Philosophy of Nietzsche
Kwanchun Lee, Soo Yeon Choi, Un Shil Choi
(pages: 27-32)

Barriers to Social Innovation and Ways of Overcoming them in Latvia
Karine Oganisjana, Yuliya Eremina, Salome Gvatua, Benjamin Ngongo Kabwende, Ozoemena Joseph Chukwu
(pages: 33-38)

Unmanned Aerial Vehicle-Based Automobile License Plate Recognition System for Institutional Parking Lots
Julian Dasilva, Ricardo Jiménez, Roland Schiller, Sanja Zivanovic González
(pages: 39-43)

Dialectal Atlas of the Arab World - between Intention and Reality
Oleg Redkin, Olga Bernikova
(pages: 44-47)

IT Risk and Chaos Theory: Effect on the Performance of South African SMEs
Anass Bayaga, Stephen Flowerday, Liezel Cilliers
(pages: 48-53)

How to Apply the User Profile Usability Technique in the User Modelling Activity for an Adaptive Food Recommendation System for People on Special Diets
Lucrecia Llerena, Nancy Rodríguez, Pablo Gómez-Abajo, John W. Castro
(pages: 54-63)

Policies, Legislation and Regulatory Compliance Governance Impact on Strategic Management of Higher Education and Research Institutions in Latvia
Anita Straujuma, Inga Lapina, Elina Gaile-Sarkane, Modris Ozolins
(pages: 64-69)

Parallel Prediction of Stock Volatility
Priscilla Jenq, John Jenq
(pages: 70-73)

Hacking a Bridge: An Exploratory Study of Compliance-Based Information Security Management in Banking Organization
Tesleem Fagade, Theo Tryfonas
(pages: 74-80)

Improvement in the Physical and Psychological Well-Being of Persons with Spinal Cord Injuries by Means of Powered Wheelchairs Driven by Dual Power Wheels and Mobile Technologies
Yee-Pien Yang, Li-Jen Weng, Ye-Yu Yeh, Hui-Fen Mao, Ray-I. Chang
(pages: 81-87)

Data Mediation with Enterprise Level Security
Kevin E. Foltz, William R. Simpson
(pages: 88-93)





Procedure for Submitting, Reviewing, and Publishing Articles in the Journal of Systemic, Cybernetics, and Informatics: JSCI

The Journal of Systemics, Cybernetics, and Informatics (JSCI) is an open access journal that has been publishing, with no article processing charges (APCs), the best 25%-30% of the papers presented at conferences organized by the International Institute of Informatics and Systemics (IIIS,, since 2003. This is equivalent to the 12%-20% of the articles submitted to these conferences.

The above editorial policy will continue, but on July 19th, 2016, JSCI initiated the reception of submissions made directly to the journal. This procedure has two steps, which do not include any submission or fast-tracking charges. (More details regarding this procedure and the acceptance policy are provided in the following sections):

Step 1. The submission of an abstract (200-400 words) written for inter-disciplinary communication to JSCI at for its internal review-

Step 2. If your abstract is accepted then you will be asked to submit your draft paper (about 5000 words) as submission for a virtual presentation at the next IIIS conference (two yearly conferences are usually organized). This is a necessary step to be made in order to meet the same kind of four-tier reviewing methodology and selection policy that has been applied since 2002. This reviewing methodology includes the following reviewing processes:
  1. The mandatory two-tier methodology (double-blind and non-blind) that has been applied, since 2006, to the papers published in the journal (,
  1. The potential reviewing you might receive from our participative peer-to-peer reviewing (PPPR,, and
  1. The potential reviewing you might receive from the virtual session in which your paper will be included. Each face-to-face session will have a corresponding virtual session through which the respective authors can interact, via non-synchronous means, three days before and during the conference, as well as up to three weeks after the conference ends. Details for virtual sessions and participation can be found at
The two-tier mandatory reviewing and the additional two-tier potential reviewing are required for the acceptance and publication of any article submitted to the journal, especially because the articles published up to the present went through, at least, these four-tier reviewing (two mandatory and two potential ones).  The two-tier mandatory reviewing is necessary for the paper acceptance and possible improvement. The additional two-tier potential reviewing is desirable for the improvement of the final version of the paper.

Please read below for more details regarding the submission procedure, selection policy, and, submission for fast track reviewing.


As stated above, the procedure of submitting abstracts will be via email and the submissions of the full paper draft will be via the respective conference web site (according the topic of the submitted paper). This two-step procedure corresponds to internal and external reviewing.

In the first step (internal review) the author submits an extended abstract (200-400 words), which should be 1) written for inter-disciplinary communication, i.e. academics from different disciplines should be able to understand the extended abstract, and 2) contain at least the following three parts:
  • Objectives achieved and/or results attained.
  • Means, methods, and/or methodologies used.
  • Conclusions and/or possible next suggested steps.
If the full paper is accepted in the second reviewing step (external review), then the extended abstract for inter-disciplinary communication might be used (by the author or JSCI) in the academic social media (e.g. linking it to the published full paper and, consequently, increasing the visibility of the paper.

By submitting this kind of extended abstract the authors, or co-authors, would be agreeing on making the commitment of:
  1. Submitting the full article draft according the respective deadline;
  2. Not submitting the same article for its potential review and publication via another venue while it is being reviewed by JSCI according the respective deadline of “notification to authors”;
  3. Not utilizing texts from other publications without making the respective references, and not using curves, diagrams, photos, tableaus, etc. without obtaining the respective permissions, if they are copyrighted. By not meeting this commitment the JSCI will stop the reviewing process of the article and will free the author from his/her commitment and expected ethical behavior of not submitting the same article for its potential publication in other venues, while it is being reviewed by JSCI; and
  4. Submitting the final version of the full paper if it is accepted in the second step of its reviewing process, described below.

Acceptance Policy

Final acceptance depends on two kinds of reviews, but an article should be recommended by non-blind (i.e. non-anonymous) reviewers AND double-blind (anonymous) reviewers in order to be accepted for its publication.
Recommendations of acceptance made by non-anonymous reviewers are necessary but not sufficient condition for paper’s final acceptance. A submitted paper, should also have a majority of its double-blind reviewers recommending its acceptance. If an article has been accepted by one of these two methods of reviewing but not by the other one, it would not be accepted unless it is modified according to the comments and to the requirements of those reviewers who recommended not accepting it as it is.
Together, both of these conditions generate a more reliable and rigorous review than a reviewing processes based on just one of the indicated methods. More details for the supporting reasoning of this two-tier reviewing methodology can be found at This level of reliability and quality assurance is required for a journal that has been publishing the best 25%-30% of the articles presented at a conference.

Fast Track Submissions

An additional requirement is needed if the author want to submit his/her paper for a fast track review process, which will allow for the publication of the paper before the selection process required for identifying the best papers. The procedure require a more rigorous reviewing because it requires the exclusion of the last step of selection, which is associated with the relative evaluation required for identifying the best 25%-30% of all accepted papers that have been (virtually or face-to-face) presented at the conference. The two-step procedures for a fast track review process are the following:

1. This step is the same as the one described above for regular submission, while also making it explicit that the extended abstract is being sent for a fast track review process.
2. This step is similar to the second step in a regular submission (described above) with addition of the following requirements:
  • The author should suggest at least three non-anonymous reviewers and no more than four for the non-blind reviewing  process
  • The organizing Committee will randomly select twice as many anonymous reviewers as the number selected for the regular submission, i.e. it will select at least 6 anonymous reviewers for the double blind review of the paper.
  • A submission, to be accepted, should be recommended by the majority of both kinds of reviewers, as well as at least 65% of both of them combined.
Papers accepted via fast track reviewing will also be included in a virtual session of the associated conference.

Special Issues

Special Issues of the Journal might have different reviewing methodologies and acceptance policies. Any difference regarding the information provided here for the regular issues of the journal will be announced in the respective call for papers. Otherwise, the information provided here will also be applicable.


In the context of ethical and academic misconduct, deception or the intention to deceive are the defining characteristics of self-plagiarism, How and whom you deceive is what generate the variety of different kinds of self-plagiarism. In a legal context, it depends on the signed contract, but, in any case, it is always related to the text, the prose and not the ideas.

This is why reuse of one’s text or prose might be 1) legal but unethical, 2) illegal, but ethical (as for example in an unfair interpretation of the copyright agreement or attorney skills in interpreting the fair-use in a way that benefit the copyright holder), 3) illegal and unethical, and 4) legal and ethical.

Consequently, Langdon-Neuner* (2008, p. 3) makes the following conclusions,

"... Authors should be advised that:
   Republication of an article is only acceptable if the journal that published the original consents and publication is accompanied by a statement that the article is a republication.
   Republication of parts of an article is acceptable provided the articles report on different data or use different analysis of the same data and provided the articles cite each other and the source of the data is clear and
   On submission to a journal the editor is informed of the existence of related submissions or publications, even if they are in a different language" [this evidently includes journals with readers from different disciplines]

* Langdon-Neuner, E. (2008). Publication more than once: duplicate publication and reuse of text, retrieved on 7/4/2017 from

All these conclusions and recommendations are in agreement with the characterization of self-plagiarism as related to an act or the intention of deceiving and agree with the Journal’s policy regarding to what should an author do in order to avoid the misconduct of self-plagiarism. Consequently, we subscribe the advices given, above, by Langdon-Neuner (Publication more than once: duplicate publication and reuse of text., 2008, p. 3). They are among the clearest we could find in the literature.

Authors of the papers published in this journal should make the commitment to follow this policy before submitting the initial and the final versions of their papers to the journal of Systemics, Cybernetics, and Informatics (JSCI).

More details regarding the notion of Self-plagiarism could be found at

International Ethical Standards

The Journal of Systemic, Cybernetics, and Informatics: JSCI follows the “International standards for editors and authors” developed by the  Committee of Publication Ethics (COPE) during  the 2nd World Conference on Research Integrity in Singapore in 2010. These ethical standards have been published as part of the conference proceedings under a Creative Commons license*. Wager E & Kleinert S (2011), Responsible research publication: international standards for authors. A position statement developed at the 2nd World Conference on Research Integrity, Singapore, July 22-24, 2010. Chapter 50 in: Mayer T & Steneck N (eds) Promoting Research Integrity in a Global Environment. Imperial College Press / World Scientific Publishing, Singapore (pp 309-16). (ISBN 978-981-4340-97-7).

International Standards for Editors According to COPE
  • Editors are accountable and should take responsibility for everything  they publish
  • Editors should make fair and unbiased decisions independent from commercial consideration and ensure a fair and appropriate peer review process.
  • Editors should adopt editorial policies that encourage maximum transparency and complete, honest reporting. Editors should guard the integrity of the published record by issuing corrections and retractions when needed and pursuing suspected or alleged research and publication misconduct.
  • Editors should pursue reviewer and editorial misconduct.
  • Editors should critically assess the ethical conduct of studies in humans and animals.
  • Peer reviewers and authors should be told what is expected of them.
  • Editors should have appropriate policies in place for handling editorial conflicts of interest.
The text above was copied from:

International Standards for Authors According to COPE.
  • The research being reported should have been conducted in an ethical and responsible manner and should comply with all relevant legislation.
  • Researchers should present their results clearly, honestly, and without fabrication, falsification or inappropriate data manipulation.
  • Researchers should strive to describe their methods clearly and unambiguously so that their findings can be confirmed by others. Researchers should adhere to publication requirements that submitted work is original, is not plagiarised, and has not been published elsewhere.
  • Authors should take collective responsibility for submitted and published work.
  • The authorship of research publications should accurately reflect individuals’ contributions to the work and its reporting.
  • Funding sources and relevant conflicts of interest should be disclosed.
The text above was copied from: