CINXE.COM
Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity · IJGIS April 2024
<!DOCTYPE html><html lang="en" data-reactroot=""><head><meta charSet="utf-8"/><link rel="alternate" type="application/rss+xml" title="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity RSS Feed" href="https://ijgis.pubpub.org/rss.xml"/><title>Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity · IJGIS April 2024</title><meta property="og:title" content="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity"/><meta name="twitter:title" content="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity · IJGIS April 2024"/><meta name="twitter:image:alt" content="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity · IJGIS April 2024"/><meta name="citation_title" content="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity"/><meta name="dc.title" content="Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity"/><meta property="og:site_name" content="Home"/><meta property="og:url" content="https://ijgis.pubpub.org/pub/7drcnfbc/release/1"/><meta property="og:type" content="article"/><meta name="citation_publisher" content="The New World Foundation"/><meta name="citation_journal_title" content="International Journal of Global Innovations and Solutions (IJGIS)"/><meta name="citation_volume"/><meta name="citation_issue"/><meta name="citation_issn"/><meta name="citation_issn"/><meta name="citation_date"/><meta name="citation_pdf_url" content="https://ijgis.pubpub.org/pub/7drcnfbc/download/pdf"/><meta name="description" content="Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication"/><meta property="og:description" content="Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication"/><meta name="twitter:description" content="Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication"/><meta property="og:image" content="https://assets.pubpub.org/arwsae7h/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-71715538461454.webp"/><meta property="og:image:url" content="https://assets.pubpub.org/arwsae7h/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-71715538461454.webp"/><meta property="og:image:width" content="500"/><meta name="twitter:image" content="https://assets.pubpub.org/arwsae7h/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-71715538461454.webp"/><link rel="icon" type="image/png" sizes="256x256" href="https://assets.pubpub.org/36ow6479/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-01715538431153.webp"/><meta name="citation_author" content="Ashish Gupta"/><meta name="citation_author" content="Meenakshi Panda"/><meta name="citation_author" content="Anoop Gupta"/><meta name="dc.creator" content="Ashish Gupta"/><meta name="dc.creator" content="Meenakshi Panda"/><meta name="dc.creator" content="Anoop Gupta"/><meta property="article:published_time" content="Sat Apr 27 2024 21:38:31 GMT+0000 (Coordinated Universal Time)"/><meta property="dc.date" content="2024-3-27"/><meta name="citation_publication_date" content="2024/4/27"/><meta property="dc.publisher" content="The New World Foundation"/><meta name="citation_doi" content="doi:10.21428/e90189c8.406d2328"/><meta property="dc.identifier" content="doi:10.21428/e90189c8.406d2328"/><meta property="prism.doi" content="doi:10.21428/e90189c8.406d2328"/><link rel="canonical" href="https://ijgis.pubpub.org/pub/7drcnfbc"/><meta property="fb:app_id" content="924988584221879"/><meta name="twitter:card" content="summary"/><meta name="twitter:site" content="@pubpub"/><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"/><meta name="google-site-verification" content="jmmJFnkSOeIEuS54adOzGMwc0kwpsa8wQ-L4GyPpPDg"/><link rel="stylesheet" type="text/css" href="/dist/main.8953e10b2e394e83bb73.css"/><link rel="search" type="application/opensearchdescription+xml" title="Home" href="/opensearch.xml"/></head><body class="pub-body-wrapper active-pub-7drcnfbc"><script>0</script><div id="root"><div id="app" class=""><style type="text/css">:root { --community-accent-dark: #2D2E2F; --community-accent-dark-faded-30: rgb(63, 63, 63); --community-accent-dark-faded: rgba(45, 46, 47, 0.050000000000000044); }</style><style> .accent-background { background-color: #2D2E2F; } .accent-color { color: #FFFFFF; } .accent-background.header-component, .accent-background.nav-bar-component, .accent-background.footer-component, .accent-background.nav-item-background, .accent-background.image-wrapper{ background-color: #2D2E2F; } .accent-color.header-component, .accent-color.nav-bar-component, .accent-color.footer-component, .accent-color.nav-item { color: #FFFFFF; } .bp3-button.bp3-intent-primary:not(.bp3-outlined) { background-color: rgba(45, 46, 47, 0.6); color: #FFFFFF; } .bp3-button.bp3-intent-primary:not(.bp3-outlined):hover:not(.bp3-disabled) { background-color: rgba(45, 46, 47, 0.8); color: #FFFFFF; } .bp3-button.bp3-intent-primary:not(.bp3-outlined):active:not(.bp3-disabled), .bp3-button.bp3-intent-primary.bp3-active:not(.bp3-disabled) { background-color: #2D2E2F; color: #FFFFFF; } .bp3-button.bp3-intent-primary.bp3-outlined { border-color: #2D2E2F; color: #2D2E2F; } .bp3-button.bp3-intent-primary.bp3-outlined:hover:not(.bp3-disabled) { background-color: rgba(45, 46, 47, 0.09999999999999998); color: #2D2E2F; } .bp3-button.bp3-intent-primary.bp3-outlined:active:not(.bp3-disabled), .bp3-button.bp3-intent-primary.bp3-active:not(.bp3-disabled) { background-color: rgba(45, 46, 47, 0.19999999999999996); color: #2D2E2F; } .bp3-tree-node.bp3-tree-node-selected > .bp3-tree-node-content { background-color: #2D2E2F; } .bp3-tag.bp3-intent-primary { background: #2D2E2F; color: #FFFFFF; } .bp3-tag.bp3-minimal.bp3-intent-primary { background-color: rgba(45, 46, 47, 0.09999999999999998); color: inherit; } .accent-color .bp3-button:not([class*="bp3-intent-primary"]), .accent-color .bp3-button:not([class*="bp3-intent-success"]), .accent-color .bp3-button:not([class*="bp3-intent-warning"]), .accent-color .bp3-button:not([class*="bp3-intent-danger"]), .accent-color .bp3-button[class*="bp3-icon"]::before { color: inherit; } .accent-color a, .accent-color a:hover { color: inherit; } .bp3-tab[aria-selected="true"], .bp3-tab:not([aria-selected="true"]):hover { box-shadow: inset 0 -3px 0 rgba(45, 46, 47, 0.09999999999999998); } .bp3-tab[aria-selected="true"] { box-shadow: inset 0 -3px 0 #2D2E2F; } .thread:hover:after { background-color: #2D2E2F; } .bp3-slider-progress.bp3-intent-primary, .bp3-dark .bp3-slider-progress.bp3-intent-primary { background: #2D2E2F; } .bp3-slider-handle .bp3-slider-label { background: #2D2E2F; color: #FFFFFF; } .highlight-dot-wrapper .highlight-dot { background-color: #2D2E2F; } .changelog-callout { background: rgba(45, 46, 47, 0.09999999999999998) !important; } .changelog-callout .release-label { color: #2D2E2F; border: 1px dashed #2D2E2F; } span.citation:hover { color: #2D2E2F; } .overflow-gradient { background: linear-gradient(90deg, rgba(45, 46, 47, 0) 0%, rgba(45, 46, 47, 0) 85%, #2D2E2F 100%); } .accent-color.nav-bar-component { border-bottom: 2px solid #FFFFFF; } </style><a href="#main-content" tabindex="0" class="skip-link-component tab-to-show-component">Skip to main content</a><header class="header-component accent-background accent-color"><div class="main"><div class="container "><div class="row"><div class="col-12 main-content"><div class="logo-wrapper"><a href="/" aria-label="Home"><img alt="" src="https://assets.pubpub.org/ue8enmtx/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-41715538480850.webp"/></a></div><div class="global-controls-component"><a role="button" href="/search" aria-label="Search" class="bp3-button bp3-minimal mobile-aware-component__mobile" tabindex="0"><span icon="search" class="bp3-icon bp3-icon-search"><svg data-icon="search" width="16" height="16" viewBox="0 0 16 16"><path d="M15.55 13.43l-2.67-2.68a6.94 6.94 0 001.11-3.76c0-3.87-3.13-7-7-7s-7 3.13-7 7 3.13 7 7 7c1.39 0 2.68-.42 3.76-1.11l2.68 2.67a1.498 1.498 0 102.12-2.12zm-8.56-1.44c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5z" fill-rule="evenodd"></path></svg></span></a><a role="button" href="/search" aria-label="Search" class="bp3-button bp3-large bp3-minimal mobile-aware-component__desktop" tabindex="0"><span class="bp3-button-text">Search</span></a><button type="button" style="display:inline-flex;-webkit-appearance:unset" aria-expanded="false" aria-controls="id-2" aria-haspopup="menu" aria-label="Dashboard menu" class="bp3-button bp3-minimal mobile-aware-component__mobile"><span icon="settings" class="bp3-icon bp3-icon-settings"><svg data-icon="settings" width="16" height="16" viewBox="0 0 16 16"><path d="M3 1c0-.55-.45-1-1-1S1 .45 1 1v3h2V1zm0 4H1c-.55 0-1 .45-1 1v2c0 .55.45 1 1 1h2c.55 0 1-.45 1-1V6c0-.55-.45-1-1-1zm12-4c0-.55-.45-1-1-1s-1 .45-1 1v2h2V1zM9 1c0-.55-.45-1-1-1S7 .45 7 1v6h2V1zM1 15c0 .55.45 1 1 1s1-.45 1-1v-5H1v5zM15 4h-2c-.55 0-1 .45-1 1v2c0 .55.45 1 1 1h2c.55 0 1-.45 1-1V5c0-.55-.45-1-1-1zm-2 11c0 .55.45 1 1 1s1-.45 1-1V9h-2v6zM9 8H7c-.55 0-1 .45-1 1v2c0 .55.45 1 1 1h2c.55 0 1-.45 1-1V9c0-.55-.45-1-1-1zm-2 7c0 .55.45 1 1 1s1-.45 1-1v-2H7v2z" fill-rule="evenodd"></path></svg></span></button><button type="button" style="display:inline-flex;-webkit-appearance:unset" aria-expanded="false" aria-controls="id-2" aria-haspopup="menu" aria-label="Dashboard menu" class="bp3-button bp3-large bp3-minimal mobile-aware-component__desktop"><span class="bp3-button-text">Dashboard</span><span icon="caret-down" class="bp3-icon bp3-icon-caret-down"><svg data-icon="caret-down" width="16" height="16" viewBox="0 0 16 16"><desc>caret-down</desc><path d="M12 6.5c0-.28-.22-.5-.5-.5h-7a.495.495 0 00-.37.83l3.5 4c.09.1.22.17.37.17s.28-.07.37-.17l3.5-4c.08-.09.13-.2.13-.33z" fill-rule="evenodd"></path></svg></span></button><a role="button" href="/login?redirect=/pub/7drcnfbc/release/1" class="bp3-button bp3-minimal mobile-aware-component__mobile" tabindex="0"><span class="bp3-button-text">Login</span></a><a role="button" href="/login?redirect=/pub/7drcnfbc/release/1" class="bp3-button bp3-large bp3-minimal mobile-aware-component__desktop" tabindex="0"><span class="bp3-button-text">Login or Signup</span></a></div></div></div></div></div></header><nav class="nav-bar-component accent-background accent-color"><div class="container "><div class="row"><div class="col-12 "><div class="scrollable-nav"><ul class="nav-list"><li><a href="/"><span class="title">Home</span></a></li><li><a href="/aims-and-scope"><span class="title">Aims and Scope</span></a></li><li><a href="/editorial-board"><span class="title">Editorial Board</span></a></li><li><a href="/publishing-ethics"><span class="title">Ethics</span></a></li><li><a href="/open-access"><span class="title">Open Access</span></a></li><li><a href="/publishing-process"><span class="title">Process</span></a></li><li><a href="/plagiarism-policy"><span class="title">Plagiarism</span></a></li><li><a href="/peer-review-policy"><span class="title">Peer Review</span></a></li><li><a href="/repository"><span class="title">Repository</span></a></li></ul><div class="overflow-gradient"></div></div><ul class="social-list"><li><a href="https://thenewworld.foundation/" aria-label="Website"><span icon="globe" class="bp3-icon bp3-icon-globe"><svg data-icon="globe" width="16" height="16" viewBox="0 0 16 16"><path d="M4.45 7.83c-.26 0-.41.21-.41.46v1.75c0 .26.16.46.41.46h.29v1.77c0 .25.24.45.49.45s.49-.2.49-.45V11.2h-.01c.26 0 .44-.14.44-.4v-.3h.14c.26 0 .43-.2.43-.46v-.59s.01-.01 0-.01l-1.58-1.6h-.69zM8.51 3.9h.22c.06 0 .12-.01.12-.07 0-.06-.05-.07-.12-.07h-.22c-.06 0-.12.01-.12.07.01.06.06.07.12.07zm-2.33-.05c.07-.07.07-.19 0-.26l-.5-.5a.187.187 0 00-.26 0c-.07.07-.07.19 0 .26l.5.5c.07.07.19.07.26 0zm3.06.89c.07 0 .14-.06.14-.12v-.31c0-.07-.07-.12-.14-.12s-.14.06-.14.12v.31c0 .07.07.12.14.12zM8 0C3.58 0 0 3.58 0 8s3.58 8 8 8 8-3.58 8-8-3.58-8-8-8zm0 14c-3.31 0-6-2.69-6-6 0-.55.1-1.07.23-1.57h.11v.47c0 .2.18.37.39.37.03 0 .08-.01.11-.02l.78.77c.08.08.2.08.28 0 .08-.08.08-.2 0-.28l-.75-.78c0-.02.04-.04.04-.06v-.12c0-.16.09-.22.25-.36h.46c.09 0 .17-.01.24-.05h.02c.02-.01.03-.02.05-.03.01-.01.01-.01.02-.01l.02-.02 1.59-1.58c.18-.18.18-.46 0-.64s-.47-.15-.65.03l-.3.34h-.57v-.48c0-.01.05.05.05-.09h.64c.12 0 .22-.09.22-.21s-.1-.21-.22-.21H4.1c.18-.15.34-.31.54-.44l.01-.01c.21-.14.45-.25.68-.37.15-.07.29-.15.44-.21.17-.07.35-.11.53-.17.18-.05.35-.12.53-.16a6.05 6.05 0 013.47.35c.05.02.1.05.16.08.25.11.48.24.71.39.25.16.49.34.71.55H10.6s0-.03-.01-.03c-.04 0-.09 0-.13.03l-.51.51a.17.17 0 000 .23c.06.06.17.06.23 0l.42-.44.01-.02h.25c0 .14-.07.09-.07.12v.07c0 .22-.15.37-.36.37h-.38c-.19 0-.38.21-.38.4v.17h-.1c-.12 0-.2.06-.2.18v.25h-.23c-.17 0-.3.11-.3.28 0 .17.13.26.3.26.07 0 .14.03.19-.11l.04.01.49-.46h.17l.39.37c.03.03.08.02.12-.01.03-.03.03-.12 0-.15l-.32-.35h.23l.09.12c.18.18.48.17.66-.01l.09-.1h.4c.02 0 .08.05.08.05v.24l-.05-.01h-.36c-.11 0-.21.1-.21.21 0 .11.09.21.21.21h.41v.15c-.14.21-.24.42-.45.42h-.94v-.01l-.44-.44a.47.47 0 00-.66 0l-.42.43v.01H8.6c-.26 0-.49.21-.49.46v.92c0 .26.23.45.49.45h.9c.34.14.57.35.72.69v1.68c0 .26.17.44.42.44h.72c.26 0 .4-.18.4-.44V9l.89-.86.03-.02.02-.01h.03c.07-.08.15-.19.15-.31v-.91c0-.18-.16-.32-.31-.46H13c.01.28.21.42.46.42h.42c.08.37.12.76.12 1.15 0 3.31-2.69 6-6 6zm4.54-4.27c-.1 0-.21.08-.21.18v.57c0 .1.11.18.21.18.1 0 .21-.08.21-.18v-.57c0-.1-.11-.18-.21-.18zM8.37 3.19c0-.25-.2-.42-.46-.42h-.54c-.25 0-.42.18-.42.43 0 .03-.1.04.05.08v.47c0 .15.06.27.21.27s.21-.12.21-.27v-.14h.5c.24 0 .45-.16.45-.42z" fill-rule="evenodd"></path></svg></span></a></li><li><a href="https://linkedin.com/company/the-new-world-foundation/" aria-label="LinkedIn"><span class="bp3-icon" data-icon="linkedin" aria-label="" aria-hidden="true"><svg width="16px" height="16px" viewBox="0 0 24 24"><path d="M20.447 20.452h-3.554v-5.569c0-1.328-.027-3.037-1.852-3.037-1.853 0-2.136 1.445-2.136 2.939v5.667H9.351V9h3.414v1.561h.046c.477-.9 1.637-1.85 3.37-1.85 3.601 0 4.267 2.37 4.267 5.455v6.286zM5.337 7.433c-1.144 0-2.063-.926-2.063-2.065 0-1.138.92-2.063 2.063-2.063 1.14 0 2.064.925 2.064 2.063 0 1.139-.925 2.065-2.064 2.065zm1.782 13.019H3.555V9h3.564v11.452zM22.225 0H1.771C.792 0 0 .774 0 1.729v20.542C0 23.227.792 24 1.771 24h20.451C23.2 24 24 23.227 24 22.271V1.729C24 .774 23.2 0 22.222 0h.003z"></path></svg></span></a></li><li><a href="/cdn-cgi/l/email-protection#4e3e3c2b3d272a2b203a0e3a262b202b3939213c222a6028213b202a2f3a272120" aria-label="Contact"><span icon="envelope" class="bp3-icon bp3-icon-envelope"><svg data-icon="envelope" width="16" height="16" viewBox="0 0 16 16"><path d="M0 3.06v9.88L4.94 8 0 3.06zM14.94 2H1.06L8 8.94 14.94 2zm-6.41 8.53c-.14.14-.32.22-.53.22s-.39-.08-.53-.22L6 9.06 1.06 14h13.88L10 9.06l-1.47 1.47zM11.06 8L16 12.94V3.06L11.06 8z" fill-rule="evenodd"></path></svg></span></a></li></ul></div></div></div></nav><div id="main-content" tabindex="-1"><div id="pub-container"><div class="pub-header-background-component pub-header-theme-light pub-header-component"><div class="background-element background-white-layer"></div><div class="background-element background-color" style="background-color:hsla(210, 2.2%, 14.4%, 0.75)"></div><div class="background-element background-safety-layer"></div><div class="container pub"><div class="row"><div class="col-12 pub-header-column"><div class="pub-header-content-component"><div class="pub-header-top-area has-bottom-hairline"><div class="collections-bar-component"><button tabindex="0" style="display:inline-flex;-webkit-appearance:unset" type="button" aria-expanded="false" aria-controls="id-4" aria-haspopup="menu" aria-label="Browse this collection" class="collections-bar-button-component collection-browser-button"><span icon="manual" class="bp3-icon bp3-icon-manual spaced-icon-left"><svg data-icon="manual" width="14" height="14" viewBox="0 0 16 16"><path d="M15.99 1.13c-.02-.41-.33-.77-.78-.87C12.26-.36 9.84.13 8 1.7 6.16.13 3.74-.36.78.26.33.35.03.72.01 1.13H0v12c0 .08 0 .17.02.26.12.51.65.82 1.19.71 2.63-.55 4.59-.04 6.01 1.57.02.03.06.04.08.06.02.02.03.04.05.06.04.03.09.04.13.07.05.03.09.05.14.07.11.04.23.07.35.07h.04c.12 0 .24-.03.35-.07.05-.02.09-.05.14-.07.04-.02.09-.04.13-.07.02-.02.03-.04.05-.06.03-.02.06-.03.08-.06 1.42-1.6 3.39-2.12 6.01-1.57.54.11 1.07-.21 1.19-.71.04-.09.04-.18.04-.26l-.01-12zM7 12.99c-1.4-.83-3.07-1.14-5-.93V1.96c2.11-.28 3.75.2 5 1.46v9.57zm7-.92c-1.93-.21-3.6.1-5 .93V3.42c1.25-1.26 2.89-1.74 5-1.46v10.11z" fill-rule="evenodd"></path></svg></span>IJGIS April 2024<span icon="caret-down" class="bp3-icon bp3-icon-caret-down spaced-icon-right"><svg data-icon="caret-down" width="14" height="14" viewBox="0 0 16 16"><path d="M12 6.5c0-.28-.22-.5-.5-.5h-7a.495.495 0 00-.37.83l3.5 4c.09.1.22.17.37.17s.28-.07.37-.17l3.5-4c.08-.09.13-.2.13-.33z" fill-rule="evenodd"></path></svg></span></button><div class="bp3-overflow-list collections-list"><div class="bp3-overflow-list-spacer"></div></div></div><div class="basic-details"><span class="metadata-pair"><b class="pub-header-themed-secondary">Published on </b>Apr 27, 2024</span><span class="metadata-pair doi-pair"><b class="pub-header-themed-secondary">DOI</b><span class="bp3-popover-wrapper click-to-copy"><span class="bp3-popover-target"><button type="button" class="bp3-button bp3-minimal" tabindex="0"><span class="bp3-button-text">10.21428/e90189c8.406d2328</span></button></span></span></span><div class="show-details-placeholder"></div></div></div><div class="title-group-component"><h1 class="title"><span class="text-wrapper">Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity</span></h1><p class="description pub-header-themed-secondary"><span class="text-wrapper">Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication</span></p><div class="byline-component"><span class="text-wrapper"><span>by<!-- --> </span><span><a href="/user/ashish-gupta" class="hoverline">Ashish Gupta</a></span>, <span><a href="/user/meenakshi-panda" class="hoverline">Meenakshi Panda</a></span>, and <span><a href="/user/anoop-gupta" class="hoverline">Anoop Gupta</a></span></span></div><div class="published-date"><span class="pub-header-themed-secondary">Published on</span><span>Apr 27, 2024</span></div></div><div class="utility-buttons-component"><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left show-header-details-button"><div class="pub-header-themed-box icon-container"><span icon="info-sign" class="bp3-icon bp3-icon-info-sign"><svg data-icon="info-sign" width="14" height="14" viewBox="0 0 16 16"><path d="M8 0C3.58 0 0 3.58 0 8s3.58 8 8 8 8-3.58 8-8-3.58-8-8-8zM7 3h2v2H7V3zm3 10H6v-1h1V7H6V6h3v6h1v1z" fill-rule="evenodd"></path></svg></span></div></button><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left cite-button"><div class="pub-header-themed-box icon-container"><span class="bp3-icon" data-icon="cite" aria-label="" aria-hidden="true"><svg width="14px" height="14px" viewBox="0 0 24 24"><g><path d="M5.56 22.286v-2.548h-2.039v-15.476h2.039v-2.548h-5.56v20.573h5.56zM24 22.286v-20.573h-5.583v2.548h2.039v15.476h-2.039v2.548h5.583z"></path><path d="M13.918 5.993l-0.421 3.1h-2.409l0.438-3.1h-1.348l-0.421 3.1h-1.702v1.23h1.516l-0.404 2.982h-1.668v1.23h1.483l-0.438 3.083h1.331l0.438-3.083h2.393l-0.438 3.083h1.348l0.421-3.083h1.719v-1.23h-1.533l0.404-2.982h1.685v-1.23h-1.483l0.421-3.1h-1.331zM10.902 10.324h2.393l-0.388 2.982h-2.409l0.404-2.982z"></path></g></svg></span></div><div class="label">Cite</div></button><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left"><div class="pub-header-themed-box icon-container"><span class="bp3-icon" data-icon="share2" aria-label="" aria-hidden="true"><svg width="14px" height="14px" viewBox="0 0 32 32"><path d="M25.524 22.54c-1.206 0-2.286 0.476-3.111 1.222l-11.317-6.587c0.079-0.365 0.143-0.73 0.143-1.111s-0.063-0.746-0.143-1.111l11.19-6.524c0.857 0.794 1.984 1.286 3.238 1.286 2.635 0 4.762-2.127 4.762-4.762s-2.127-4.762-4.762-4.762c-2.635 0-4.762 2.127-4.762 4.762 0 0.381 0.064 0.746 0.143 1.111l-11.191 6.524c-0.857-0.794-1.984-1.286-3.238-1.286-2.635 0-4.762 2.127-4.762 4.762s2.127 4.762 4.762 4.762c1.254 0 2.381-0.492 3.238-1.286l11.302 6.603c-0.079 0.333-0.127 0.683-0.127 1.032 0 2.556 2.079 4.635 4.635 4.635s4.635-2.079 4.635-4.635c0-2.556-2.079-4.635-4.635-4.635z"></path></svg></span></div><div class="label">Social</div></button><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left"><div class="pub-header-themed-box icon-container"><span class="bp3-icon" data-icon="download2" aria-label="" aria-hidden="true"><svg width="14px" height="14px" viewBox="0 0 32 32"><path d="M28.963 11.37h-7.407v-11.111h-11.111v11.111h-7.407l12.963 12.963 12.963-12.963zM3.037 28.037v3.704h25.926v-3.704h-25.926z"></path></svg></span></div><div class="label">Download</div></button></div><div class="draft-release-buttons-component"><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left mobile-aware-component__mobile"><div class="pub-header-themed-box icon-container"><span icon="history" class="bp3-icon bp3-icon-history"><svg data-icon="history" width="14" height="14" viewBox="0 0 16 16"><path d="M8 3c-.55 0-1 .45-1 1v4c0 .28.11.53.29.71l2 2a1.003 1.003 0 001.42-1.42L9 7.59V4c0-.55-.45-1-1-1zm0-3a7.95 7.95 0 00-6 2.74V1c0-.55-.45-1-1-1S0 .45 0 1v4c0 .55.45 1 1 1h4c.55 0 1-.45 1-1s-.45-1-1-1H3.54C4.64 2.78 6.23 2 8 2c3.31 0 6 2.69 6 6 0 2.61-1.67 4.81-4 5.63v-.01c-.63.23-1.29.38-2 .38-3.31 0-6-2.69-6-6 0-.55-.45-1-1-1s-1 .45-1 1c0 4.42 3.58 8 8 8 .34 0 .67-.03 1-.07.02 0 .04-.01.06-.01C12.98 15.4 16 12.06 16 8c0-4.42-3.58-8-8-8z" fill-rule="evenodd"></path></svg></span></div></button><button style="display:inline-flex;-webkit-appearance:unset" type="button" class="large-header-button-component pub-header-themed-box-hover-target mobile-aware-component__desktop" aria-expanded="false" aria-controls="id-11" aria-haspopup="menu" aria-label="Choose a historical release of this Pub"><div class="button-box pub-header-themed-box no-label"><span icon="history" class="bp3-icon bp3-icon-history"><svg data-icon="history" width="22" height="22" viewBox="0 0 20 20"><path d="M10 0C6.71 0 3.82 1.6 2 4.05V2c0-.55-.45-1-1-1s-1 .45-1 1v4c0 .55.45 1 1 1h4c.55 0 1-.45 1-1s-.45-1-1-1H3.76C5.23 3.17 7.47 2 10 2c4.42 0 8 3.58 8 8s-3.58 8-8 8-8-3.58-8-8c0-.55-.45-1-1-1s-1 .45-1 1c0 5.52 4.48 10 10 10s10-4.48 10-10S15.52 0 10 0zm0 3c-.55 0-1 .45-1 1v6c0 .28.11.53.29.71l3 3a1.003 1.003 0 001.42-1.42L11 9.59V4c0-.55-.45-1-1-1z" fill-rule="evenodd"></path></svg></span><span icon="caret-down" class="bp3-icon bp3-icon-caret-down caret"><svg data-icon="caret-down" width="10" height="10" viewBox="0 0 16 16"><path d="M12 6.5c0-.28-.22-.5-.5-.5h-7a.495.495 0 00-.37.83l3.5 4c.09.1.22.17.37.17s.28-.07.37-.17l3.5-4c.08-.09.13-.2.13-.33z" fill-rule="evenodd"></path></svg></span></div><div class="outer-label"><div class="top pub-header-themed-secondary">last released</div><div class="bottom"><time dateTime="2024-04-27T21:38:31.966Z" title="2024-04-27 21:38">10 months ago</time></div></div></button></div></div><button type="button" class="small-header-button-component pub-header-themed-box-hover-target label-left details-button"><div class="pub-header-themed-box icon-container"><span icon="expand-all" class="bp3-icon bp3-icon-expand-all"><svg data-icon="expand-all" width="14" height="14" viewBox="0 0 16 16"><path d="M4 7c.28 0 .53-.11.71-.29L8 3.41l3.29 3.29c.18.19.43.3.71.3a1.003 1.003 0 00.71-1.71l-4-4C8.53 1.11 8.28 1 8 1s-.53.11-.71.29l-4 4A1.003 1.003 0 004 7zm8 2c-.28 0-.53.11-.71.29L8 12.59l-3.29-3.3a1.003 1.003 0 00-1.42 1.42l4 4c.18.18.43.29.71.29s.53-.11.71-.29l4-4A1.003 1.003 0 0012 9z" fill-rule="evenodd"></path></svg></span></div><div class="label">Show details</div></button></div></div></div><div class="pub-header-sticky-component"><div class="sticky-title">Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity</div><div class="sticky-buttons"><button type="button" class="bp3-button bp3-minimal"><span icon="double-chevron-up" class="bp3-icon bp3-icon-double-chevron-up"><svg data-icon="double-chevron-up" width="16" height="16" viewBox="0 0 16 16"><path d="M4 8c.28 0 .53-.11.71-.29L8 4.41l3.29 3.29c.18.19.43.3.71.3a1.003 1.003 0 00.71-1.71l-4-4C8.53 2.11 8.28 2 8 2s-.53.11-.71.29l-4 4A1.003 1.003 0 004 8zm4.71-.71C8.53 7.11 8.28 7 8 7s-.53.11-.71.29l-4 4a1.003 1.003 0 001.42 1.42L8 9.41l3.29 3.29c.18.19.43.3.71.3a1.003 1.003 0 00.71-1.71l-4-4z" fill-rule="evenodd"></path></svg></span></button></div></div></div><div class="pub-document-component"><div class="pub-grid"><div class="main-content"><main class="pub-body-component"><div class="editor ProseMirror read-only"><p id="nz05lvj5i0r"><strong>Abstract</strong>:<br/>The rapid adoption of Application Programming Interfaces (APIs) across digital platforms has significantly enhanced interconnectivity and functionality, driving the digital transformation of businesses. However, this expansion has also introduced substantial cybersecurity risks, primarily due to inadequate authentication mechanisms. This paper comprehensively reviews current API authentication methods, evaluates their security effectiveness, and discusses innovative trends such as Zero Trust Architecture and Continuous Authentication. We aim to provide insights into the strengths and weaknesses of each approach and recommend strategies for fortifying API ecosystems against evolving cybersecurity threats.</p><p id="n4em5t49tdy">1. <strong>Introduction</strong></p><p id="nweylaysqxn">The proliferation of Application Programming Interfaces (APIs) has been a cornerstone of modern digital infrastructure, catalyzing business innovation and operational efficiency. However, the increasing reliance on APIs has exposed organizations to heightened cybersecurity risks, necessitating robust mechanisms for authentication. This paper explores various authentication strategies, their integration within API ecosystems, and their role in mitigating potential security breaches.</p><p id="nrxhdbmqivw">2. <strong>Importance of APIs in Digital Transformation</strong></p><p id="nn0zipvw5ex">APIs have become integral to enterprises' digital transformation strategies, facilitating seamless interactions between distributed systems and supporting rapid scalability and innovation. The shift towards API-first approaches has allowed businesses to extend their reach and adapt to the dynamic demands of the digital market. Nevertheless, this dependency on APIs has made them a focal point for cyber-attacks, underscoring the need for effective security measures.</p><p id="nn5mounmvkc">3. <strong>Cybersecurity Concerns with APIs</strong></p><p id="nbln4pfbm1z">Recent developments in the digital landscape have seen APIs emerge as significant threat vectors. While beneficial for development and integration, the standardization of API protocols and architectures has also simplified the process for potential attackers. Common vulnerabilities include Broken User Authentication, Insufficient Logging and Monitoring, and insecure data transmission, which have been exploited in numerous recent breaches. This section examines these vulnerabilities and the implications for businesses lacking robust authentication protocols.</p><p id="n3dist85ve4">4. <strong>Review of API Authentication Mechanisms</strong></p><p id="n990p71d4ji">This section delves into various authentication mechanisms, providing a critical assessment of each in terms of security efficacy and implementation complexity:</p><ul id="n38s76ab9xk"><li><p id="nmjowim5x8h"><strong>Basic Authentication</strong>: Basic Authentication transmits credentials in an encoded format over HTTP headers, which is inherently insecure unless combined with SSL/TLS. The simplicity of this method makes it prone to various attacks, such as Man-in-the-Middle (MITM). Recent research suggests enhancing Basic Authentication with dynamic credentials and short-lived sessions to mitigate some of these risks. However, industry trends are moving towards more secure alternatives due to this method's inherent limitations.</p></li><li><p id="nvof09caxad"><strong>Bearer Authentication</strong>: Bearer tokens, particularly those used in OAuth 2.0 frameworks, are a standard method for securing APIs. They provide a layer of security that does not require continuous transmission of credentials. Recent advancements include JSON Web Encryption (JWE) for token encryption, which enhances the confidentiality and integrity of bearer tokens against exposure attacks. Research has focused on token lifecycle management, emphasizing the importance of secure token storage and renewal strategies to prevent unauthorized access.</p></li><li><p id="naw7uothmql"><strong>API Key Authentication</strong>: While convenient, API Key Authentication does not inherently distinguish between user types, making it less suitable for transactions requiring high granularity of access control. Recent studies have proposed the integration of API keys with more robust access control mechanisms, such as attribute-based access control (ABAC) or role-based access control (RBAC), to provide finer-grained security policies. Additionally, advancements in crucial management practices, such as automatic key rotations and the use of environmental variables for secure key storage, are being recommended to enhance security.</p></li><li><p id="n9l8xtd3qzc"><strong>Mutual TLS (mTLS)</strong>: Mutual TLS remains one of the most secure authentication methods available. It involves certificate-based mutual authentication to ensure that both client and server can trust each other. The overhead associated with managing certificates is a recognized challenge, prompting research into automated certificate management solutions and the integration of blockchain technology for decentralized certificate validation. This research aims to reduce the complexity and improve the scalability of mTLS implementations.</p></li><li><p id="naps6zb8nn4"><strong>OAuth and JWT</strong>: OAuth 2.0 and JSON Web Tokens (JWT) represent sophisticated authentication frameworks capable of supporting various applications. The recent focus has been on improving the security of these frameworks against attacks such as Cross-Site Request Forgery (CSRF) and token hijacking. Enhancements include Proof Key for Code Exchange (PKCE) for OAuth and the introduction of more secure algorithms for JWT signing. Additionally, research is exploring the use of machine learning to detect abnormal token usage patterns, providing an additional layer of security by identifying potential breaches early.</p></li><li><p id="npbvkmiae3u"><strong>Zero Trust Architecture</strong>: Zero Trust Architecture (ZTA) advocates for a 'never trust, always verify' approach, a significant shift from traditional network security paradigms. The latest research in this area includes the development of context-aware security policies, which use real-time data about the user's environment and behavior to make access decisions. This approach addresses dynamic and increasingly sophisticated cyber threats more effectively. Implementations of ZTA often incorporate micro-segmentation and least privilege strategies to minimize the attack surface and reduce internal movement possibilities for attackers. ZTA requires robust IAM to ensure secure API interactions, where access decisions are made dynamically based on identity verification and context. APIs must ensure secure interactions and provide additional security against credential compromise through multi-factor authentication (Ahmadi, 2024).</p></li><li><p id="n3ajivls2wq"><strong>Continuous Authentication</strong>: Building on the principles of Zero Trust, Continuous Authentication frequently reassesses the user's credentials throughout a session. This approach helps prevent unauthorized access from stolen or compromised credentials (Ahmadi, 2024). Innovations in this area include the use of behavioral biometrics, such as keystroke dynamics and mouse movements, which provide continuous user verification without interrupting the user experience. This research is particularly relevant in addressing insider threats and reducing the impact of credential theft.</p></li></ul><p id="nrf17vfr50z">5. <strong>Emerging Trends in API Security</strong></p><p id="n1d5x2dsi9p">This section discusses the evolution of API security frameworks and technologies, focusing on the innovations and trends that are setting new standards for securing API ecosystems against contemporary cyber threats.</p><ul id="n506jmkxi0b"><li><p id="nsbxjs2b3gz"><strong>Zero Trust Architecture (ZTA)</strong>:</p><ul id="na75cxiz3qz"><li><p id="nyzwtndf6h9"><strong>Concept and Implementation</strong>: Zero Trust is a security model that operates on the principle of "never trust, always verify." Unlike traditional security models that enforce perimeters, ZTA treats all users and devices as potential threats and requires continuous verification of their legitimacy before granting access to resources. Integrating ZTA with AI and machine learning can enhance anomaly detection and adaptive authentication methods for APIs(Ahmadi, 2024).</p></li><li><p id="no3cltv0rmx">Recent Developments: There is a growing trend towards integrating ZTA with microsegmentation and identity-aware proxies, further refining access control and ensuring that it is strictly necessary and based on the current context.</p></li><li><p id="nh5f6g7cxge"><strong>Benefits and Challenges</strong>: While ZTA significantly enhances security by reducing the attack surface, its implementation can be complex and resource-intensive. Organizations are exploring simplifying these deployments through automated policy management and machine learning-based context analysis.</p></li></ul></li><li><p id="n6lopcdjwzw"><strong>Artificial Intelligence and Machine Learning in Security</strong>:</p><ul id="n74lmw6ljwi"><li><p id="n1ndmsvod4t"><strong>Automated Threat Detection and Response</strong>: AI and ML are increasingly being used to enhance threat detection capabilities in API security. These technologies can analyze vast amounts of network data in real-time to identify unusual patterns that may indicate a security breach, thereby improving the efficiency of threat detection and response, potentially reducing the impact of API breaches as described by Qazi (2023)</p></li><li><p id="nhao27wp3zx"><strong>Predictive Capabilities</strong>: Advanced algorithms can predict potential attack vectors and automatically adjust security measures to counteract possible threats preemptively.</p></li><li><p id="n28t1dld9hz"><strong>Challenges</strong>: The main challenges are the potential for false positives and the need to train AI models to adapt to new threats continuously.</p></li></ul></li><li><p id="ndcsfamfw4d"><strong>Enhanced Authentication Mechanisms</strong>:</p><ul id="nm39fnrnfio"><li><p id="npqw2ugbuqx"><strong>Biometric Authentication</strong>: Biometrics (facial recognition, fingerprints, behavioral patterns) are becoming more prevalent in API authentication to ensure that legitimate users are making access requests.</p></li><li><p id="nizz7o5aobc"><strong>Multi-factor Authentication (MFA)</strong>: Multi-factor Authentication (MFA) is becoming more sophisticated. It incorporates physical devices (like mobile phones) and contextual information such as location, device health, and user behavior to adjust authentication requirements dynamically.</p></li><li><p id="nvvhnackad4"><strong>Tokenless Authentication</strong>: Emerging technologies are exploring ways to authenticate users without traditional tokens or cookies, using cryptographically secure, stateless methods that enhance security and user experience.</p></li></ul></li><li><p id="nv8yxneq0yy"><strong>Blockchain for Decentralized Security</strong>:</p><ul id="nvw8tm29z8r"><li><p id="nx57zu2n2bq"><strong>Application in API Security</strong>: Blockchain technology is being considered for its potential to decentralize security controls, creating a distributed ledger of transactions that can help prevent fraud and enhance the transparency of access logs.</p></li><li><p id="noba1vj4jk1"><strong>Smart Contracts for Access Control</strong>: Smart contracts on blockchain platforms can automate enforcing security policies and conditions, reducing the potential for human error and ensuring consistent application of security rules.</p></li></ul></li><li><p id="ne9djxzj7yb"><strong>Regulatory and Compliance Evolution</strong>:</p><ul id="n1svtt307zv"><li><p id="nn15h7t0zd6"><strong>Global Data Protection Regulations</strong>: As the regulatory landscape evolves with frameworks like GDPR, CCPA, and others, API security increasingly focuses on preventing access and ensuring that data handling and processing meet stringent compliance requirements.</p></li><li><p id="nkewqod7q0j"><strong>Compliance as Code</strong>: There is a trend towards embedding compliance requirements directly into the code that manages API interactions, ensuring that all transactions automatically adhere to legal and regulatory standards.</p></li></ul></li><li><p id="nym38cktkq6"><strong>Computable Compound Identity Measure (CCIM)</strong>: The Computable Compound Identity Measure (CCIM) generalizes the traditional user ID by incorporating extensive attributes and contextual data. This approach integrates authentication and authorization into a seamless process that dynamically adapts to the changing operational context and security needs. The CCIM scheme merges authentication, authorization, and access control into a single framework, eliminating the operational and security gaps between these functions and allowing for a more unified and secure approach to access management (Choudhary, 2023).</p></li></ul><p id="npuiectsha8">6. <strong>Conclusion:</strong></p><p id="nkq0li0qivg">The review highlights the critical role of advanced authentication mechanisms in safeguarding APIs from emerging cyber threats. As digital ecosystems evolve, so must the strategies employed to protect them. This paper recommends ongoing research and development into innovative authentication technologies and practices that can adapt to the increasingly sophisticated landscape of cybersecurity.</p><p id="neyswqj94t0">7. <strong>References</strong></p><p id="nbk3t92eg4e">Ahmadi, S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports, 26(2), 215–228. [<a href="https://doi.org/10.9734/jerr/2024/v26i21083" title="">https://doi.org/10.9734/jerr/2024/v26i21083</a>]</p><p id="nnkvcuz1ana">Itodo, C., & Ozer, M. (2024). Multivocal literature review on zero-trust security implementation. <em>Computers & Security</em>, <em>141</em>, 103827. [<a href="https://doi.org/10.1016/j.cose.2024.103827" title="">https://doi.org/10.1016/j.cose.2024.103827</a>]</p><p id="nw6bqeddbzx">Choudhary, A. (2023). Enhancing cybersecurity using a new dynamic approach to authentication and authorization. Issues in Information Systems. 24. 22–32. 10.48009/2_iis_2023_103. [<a href="https://www.researchgate.net/publication/374740535_Enhancing_cybersecurity_using_a_new_dynamic_approach_to_authentication_and_authorization" title="">https://www.researchgate.net/publication/374740535_Enhancing_cybersecurity_using_a_new_dynamic_approach_to_authentication_and_authorization</a>]</p><p id="nl5tt3kmdjs">Kubovy, Jan & Huber, Christian & Jäger, Markus & Küng, Josef. (2016). A Secure Token-Based Communication for Authentication and Authorization Servers. 237-250. 10.1007/978-3-319-48057-2_17.[<a href="https://www.researchgate.net/publication/309365153_A_Secure_Token-Based_Communication_for_Authentication_and_Authorization_Servers" title="">https://www.researchgate.net/publication/309365153_A_Secure_Token-Based_Communication_for_Authentication_and_Authorization_Servers</a>]</p><p id="ne2msxmk6gk">Sirisha, Avvari & Kumari, G.. (2010). API access control in cloud using the Role Based Access Control Model. Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, TISC-2010. 10.1109/TISC.2010.5714624. [<a href="https://www.researchgate.net/publication/251989694_API_access_control_in_cloud_using_the_Role_Based_Access_Control_Model" title="">https://www.researchgate.net/publication/251989694_API_access_control_in_cloud_using_the_Role_Based_Access_Control_Model</a>]</p><p id="nr8cor8q8wt">Pernpruner, Marco & Carbone, Roberto & Sciarretta, Giada & Ranise, Silvio. (2023). An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols. IEEE Transactions on Dependable and Secure Computing. PP. 1-16. 10.1109/TDSC.2023.3296210. [<a href="https://www.researchgate.net/publication/372431959_An_Automated_Multi-Layered_Methodology_to_Assist_the_Secure_and_Risk-Aware_Design_of_Multi-Factor_Authentication_Protocols" title="">https://www.researchgate.net/publication/372431959_An_Automated_Multi-Layered_Methodology_to_Assist_the_Secure_and_Risk-Aware_Design_of_Multi-Factor_Authentication_Protocols</a>]</p><p id="nv024tlzd8y">D. S. V. Madala, M. P. Jhanwar and A. Chattopadhyay, "Certificate Transparency Using Blockchain," 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore, 2018, pp. 71–80, doi: 10.1109/ICDMW.2018.00018. keywords: {Public key;Servers;Browsers;Blockchain;Protocols;Google;Computed tomography;Blockchain;PKI;Certificate Transparency;Hyperledger}, [<a href="https://ieeexplore.ieee.org/document/8637448" title="">https://ieeexplore.ieee.org/document/8637448</a>]</p><p id="nqay8ae0qhh">Auth0. (n.d.). Authorization Code Flow with PKCE. from <a href="https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce" title="">[https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce</a>]</p><p id="nbjqqxhkprp">Alharbi, Sattam J & Moulahi, Tarek. (2023). API Security Testing: The Challenges of Security Testing for Restful APIs. International Journal of Innovative Research in Science Engineering and Technology. 8. 1485-1499. 10.5281/zenodo.7988410. [<a href="https://www.researchgate.net/publication/371174422_API_Security_Testing_The_Challenges_of_Security_Testing_for_Restful_APIs" title="">https://www.researchgate.net/publication/371174422_API_Security_Testing_The_Challenges_of_Security_Testing_for_Restful_APIs</a>]</p><p id="nv4no5wl2n2">Dick Hardt (2012). “OAuth2 Authorization Framework” IETF RFC 6749 [<a href="https://datatracker.ietf.org/doc/html/rfc6749" title="">https://datatracker.ietf.org/doc/html/rfc6749</a>]</p><p id="n86lhfguaoh">Michael B. Jones, Dick Hardt (2012). “OAuth2 Authorization Framework: Bearer Token Usage” IETF RFC 6750 [<a href="https://datatracker.ietf.org/doc/html/rfc6750" title="">https://datatracker.ietf.org/doc/html/rfc6750</a>]</p><p id="n2rjk4mvs68">Michael B. Jones, Brian Campbell, Chuck Mortimore (2015). “JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants” IETF RFC 7523 [<a href="https://datatracker.ietf.org/doc/html/rfc7523" title="">https://datatracker.ietf.org/doc/html/rfc7523</a>]</p><p id="nr53xcm3ocj">Brian Campbell, John Bradley, Nat Sakimura, Torsten Lodderstedt (2020). “OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens” IETF RFC 8705 [<a href="https://datatracker.ietf.org/doc/html/rfc8705" title="">https://datatracker.ietf.org/doc/html/rfc8705</a>]</p><p id="n0xdvdmqi2p">OpenID Foundation (2007). “OpenID Specifications” [<a href="https://openid.net/developers/specs/" title="">https://openid.net/developers/specs/</a>]</p><p id="ncztrrstdmt">Nat Sakimura, John Bradley, Michael B. Jones, Edmund Jay (2023). “OpenID Connect Discovery” OpenID Foundation (OIDF) [<a href="https://openid.net/specs/openid-connect-discovery-1_0.html" title="">https://openid.net/specs/openid-connect-discovery-1_0.html</a>]</p><p id="nne246unxsv">Nat Sakimura, John Bradley, Michael B. Jones (2023). “OpenID Connect Dynamic Client Registration” OpenID Foundation (OIDF) [<a href="https://openid.net/specs/openid-connect-registration-1_0.html" title="">https://openid.net/specs/openid-connect-registration-1_0.html</a>]</p><p id="n925xvkeb2y">Breno de Medeiros, Naveen Agarwal, Nat Sakimura, John Bradley, Michael B. Jones (2022). “OpenID Connect Session Management” OpenID Foundation (OIDF) [<a href="https://openid.net/specs/openid-connect-session-1_0.html" title="">https://openid.net/specs/openid-connect-session-1_0.html</a>]</p><p id="ncifq3grs0z">Carl McGuinness (2020). “The Path to Continuous Authentication: Solving the best of breed problem” Okta [<a href="https://www.okta.com/blog/2020/06/the-path-to-continuous-authentication-solving-the-best-of-breed-problem/" title="">https://www.okta.com/blog/2020/06/the-path-to-continuous-authentication-solving-the-best-of-breed-problem/</a>]</p><p id="nmm2dnx5au5">Vittorio Bertocci, Brian Campbell (2023). “OAuth2.0 Step Up Authentication Challenge Protocol” IETF RFC 9450 [<a href="https://datatracker.ietf.org/doc/rfc9470/" title="">https://datatracker.ietf.org/doc/rfc9470/</a>]</p><p id="n5wx8u6wubm">Farhan Qazi (2023). “Application Programming Interface (API) Security in Cloud Applications“ Research Gate [<a href="https://www.researchgate.net/publication/374791753_Application_Programming_Interface_API_Security_in_Cloud_Applications" title="">https://www.researchgate.net/publication/374791753_Application_Programming_Interface_API_Security_in_Cloud_Applications</a>]</p></div></main></div><div class="side-content"></div></div><div class="pub-bottom-component"><div class="inner"><div class="pub-bottom-section-component pub-bottom-license"><div role="none" class="top-row"><div class="left-title">License</div><div class="center-content"><div class="center-content-item"><a target="_blank" rel="license noopener noreferrer" class="license-link" href="https://creativecommons.org/licenses/by/4.0/"><img width="75" alt="" src="/static/license/cc-by.svg" class="license-image"/>Creative Commons Attribution 4.0 International License<!-- --> <!-- -->(CC-BY 4.0)</a></div></div><div class="right-icons" role="none"></div></div></div><div class="pub-bottom-section-component expanded"><div role="button" class="top-row" style="cursor:pointer"><div class="left-title">Comments</div><div class="center-content"><div class="center-content-item">0</div></div><div class="right-icons" role="none"><button type="button" aria-label="Search comments" class="bp3-button bp3-minimal"><span icon="search" class="bp3-icon bp3-icon-search"><svg fill="#2D2E2F" data-icon="search" width="14" height="14" viewBox="0 0 16 16"><path d="M15.55 13.43l-2.67-2.68a6.94 6.94 0 001.11-3.76c0-3.87-3.13-7-7-7s-7 3.13-7 7 3.13 7 7 7c1.39 0 2.68-.42 3.76-1.11l2.68 2.67a1.498 1.498 0 102.12-2.12zm-8.56-1.44c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5z" fill-rule="evenodd"></path></svg></span></button><button type="button" aria-label="Sort comments" aria-expanded="false" aria-controls="id-12" aria-haspopup="dialog" class="bp3-button bp3-minimal"><span icon="sort" class="bp3-icon bp3-icon-sort"><svg fill="#2D2E2F" data-icon="sort" width="14" height="14" viewBox="0 0 16 16"><path d="M5 12c-.28 0-.53.11-.71.29l-.29.3V9c0-.55-.45-1-1-1s-1 .45-1 1v3.59l-.29-.29A.965.965 0 001 12a1.003 1.003 0 00-.71 1.71l2 2c.18.18.43.29.71.29s.53-.11.71-.29l2-2A1.003 1.003 0 005 12zm3-9h7c.55 0 1-.45 1-1s-.45-1-1-1H8c-.55 0-1 .45-1 1s.45 1 1 1zm7 2H8c-.55 0-1 .45-1 1s.45 1 1 1h7c.55 0 1-.45 1-1s-.45-1-1-1zm0 8H8c-.55 0-1 .45-1 1s.45 1 1 1h7c.55 0 1-.45 1-1s-.45-1-1-1zm0-4H8c-.55 0-1 .45-1 1s.45 1 1 1h7c.55 0 1-.45 1-1s-.45-1-1-1z" fill-rule="evenodd"></path></svg></span></button><button type="button" aria-label="Filter comments" aria-expanded="false" aria-controls="id-13" aria-haspopup="dialog" class="bp3-button bp3-minimal"><span icon="filter" class="bp3-icon bp3-icon-filter"><svg fill="#2D2E2F" data-icon="filter" width="14" height="14" viewBox="0 0 16 16"><path d="M13.99.99h-12a1.003 1.003 0 00-.71 1.71l4.71 4.71V14a1.003 1.003 0 001.71.71l2-2c.18-.18.29-.43.29-.71V7.41L14.7 2.7a1.003 1.003 0 00-.71-1.71z" fill-rule="evenodd"></path></svg></span></button><button type="button" aria-label="Collapse this section" class="bp3-button bp3-minimal"><span icon="collapse-all" class="bp3-icon bp3-icon-collapse-all"><svg fill="#2D2E2F" data-icon="collapse-all" width="14" height="14" viewBox="0 0 16 16"><path d="M7.29 6.71c.18.18.43.29.71.29s.53-.11.71-.29l4-4a1.003 1.003 0 00-1.42-1.42L8 4.59l-3.29-3.3a1.003 1.003 0 00-1.42 1.42l4 4zm1.42 2.58C8.53 9.11 8.28 9 8 9s-.53.11-.71.29l-4 4a1.003 1.003 0 001.42 1.42L8 11.41l3.29 3.29c.18.19.43.3.71.3a1.003 1.003 0 00.71-1.71l-4-4z" fill-rule="evenodd"></path></svg></span></button></div></div><div class="section-content"><div class="pub-discussions-component"><style> .discussion-list .discussion-thread-component.preview:hover, .discussion-list .discussion-thread-component.expanded-preview { border-left: 3px solid #2D2E2F; padding-left: calc(1em - 2px); } </style><div class="discussion-list"><div class="thread-comment-component input"><div class="avatar-wrapper"><div class="avatar-component" style="width:18px;min-width:18px;height:18px;border-width:0;font-size:7px;background-color:#2D2E2F;z-index:initial;border-radius:50%"><div>?</div></div></div><a role="button" class="bp3-button bp3-small discussion-primary-button" href="/login?redirect=/pub/7drcnfbc/release/1" tabindex="0"><span class="bp3-button-text">Login to discuss</span></a></div><div class="empty-state bp3-non-ideal-state"><div class="bp3-non-ideal-state-visual"><span icon="comment" class="bp3-icon bp3-icon-comment"><svg data-icon="comment" width="60" height="60" viewBox="0 0 20 20"><desc>comment</desc><path d="M19 1H1c-.55 0-1 .45-1 1v12c0 .55.45 1 1 1h3v4a1.003 1.003 0 001.71.71l4.7-4.71H19c.55 0 1-.45 1-1V2c0-.55-.45-1-1-1zM4 10c-1.1 0-2-.9-2-2s.9-2 2-2 2 .9 2 2-.9 2-2 2zm6 0c-1.1 0-2-.9-2-2s.9-2 2-2 2 .9 2 2-.9 2-2 2zm6 0c-1.1 0-2-.9-2-2s.9-2 2-2 2 .9 2 2-.9 2-2 2z" fill-rule="evenodd"></path></svg></span></div><div class="bp3-heading">No comments here</div><div> Why not start the discussion?</div></div></div></div></div></div></div></div><div class="pub-link-controller-component"></div></div></div></div><div class="footer-component accent-background accent-color"><div class="container "><div class="row"><div class="col-12 "><div class="left"><a href="https://ijgis.pubpub.org/"><img src="https://assets.pubpub.org/s8och5nk/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-51715538507380.webp" class="footer-image" alt="Home"/></a></div><div class="right"><div class="footer-title"><a href="/">Home</a></div><ul class="separated"><li><a class="link" href="/rss.xml">RSS</a></li><li><a class="link" href="/legal">Legal</a></li></ul><ul class="social-list"><li><a href="https://thenewworld.foundation/" aria-label="Website"><span icon="globe" class="bp3-icon bp3-icon-globe"><svg data-icon="globe" width="16" height="16" viewBox="0 0 16 16"><path d="M4.45 7.83c-.26 0-.41.21-.41.46v1.75c0 .26.16.46.41.46h.29v1.77c0 .25.24.45.49.45s.49-.2.49-.45V11.2h-.01c.26 0 .44-.14.44-.4v-.3h.14c.26 0 .43-.2.43-.46v-.59s.01-.01 0-.01l-1.58-1.6h-.69zM8.51 3.9h.22c.06 0 .12-.01.12-.07 0-.06-.05-.07-.12-.07h-.22c-.06 0-.12.01-.12.07.01.06.06.07.12.07zm-2.33-.05c.07-.07.07-.19 0-.26l-.5-.5a.187.187 0 00-.26 0c-.07.07-.07.19 0 .26l.5.5c.07.07.19.07.26 0zm3.06.89c.07 0 .14-.06.14-.12v-.31c0-.07-.07-.12-.14-.12s-.14.06-.14.12v.31c0 .07.07.12.14.12zM8 0C3.58 0 0 3.58 0 8s3.58 8 8 8 8-3.58 8-8-3.58-8-8-8zm0 14c-3.31 0-6-2.69-6-6 0-.55.1-1.07.23-1.57h.11v.47c0 .2.18.37.39.37.03 0 .08-.01.11-.02l.78.77c.08.08.2.08.28 0 .08-.08.08-.2 0-.28l-.75-.78c0-.02.04-.04.04-.06v-.12c0-.16.09-.22.25-.36h.46c.09 0 .17-.01.24-.05h.02c.02-.01.03-.02.05-.03.01-.01.01-.01.02-.01l.02-.02 1.59-1.58c.18-.18.18-.46 0-.64s-.47-.15-.65.03l-.3.34h-.57v-.48c0-.01.05.05.05-.09h.64c.12 0 .22-.09.22-.21s-.1-.21-.22-.21H4.1c.18-.15.34-.31.54-.44l.01-.01c.21-.14.45-.25.68-.37.15-.07.29-.15.44-.21.17-.07.35-.11.53-.17.18-.05.35-.12.53-.16a6.05 6.05 0 013.47.35c.05.02.1.05.16.08.25.11.48.24.71.39.25.16.49.34.71.55H10.6s0-.03-.01-.03c-.04 0-.09 0-.13.03l-.51.51a.17.17 0 000 .23c.06.06.17.06.23 0l.42-.44.01-.02h.25c0 .14-.07.09-.07.12v.07c0 .22-.15.37-.36.37h-.38c-.19 0-.38.21-.38.4v.17h-.1c-.12 0-.2.06-.2.18v.25h-.23c-.17 0-.3.11-.3.28 0 .17.13.26.3.26.07 0 .14.03.19-.11l.04.01.49-.46h.17l.39.37c.03.03.08.02.12-.01.03-.03.03-.12 0-.15l-.32-.35h.23l.09.12c.18.18.48.17.66-.01l.09-.1h.4c.02 0 .08.05.08.05v.24l-.05-.01h-.36c-.11 0-.21.1-.21.21 0 .11.09.21.21.21h.41v.15c-.14.21-.24.42-.45.42h-.94v-.01l-.44-.44a.47.47 0 00-.66 0l-.42.43v.01H8.6c-.26 0-.49.21-.49.46v.92c0 .26.23.45.49.45h.9c.34.14.57.35.72.69v1.68c0 .26.17.44.42.44h.72c.26 0 .4-.18.4-.44V9l.89-.86.03-.02.02-.01h.03c.07-.08.15-.19.15-.31v-.91c0-.18-.16-.32-.31-.46H13c.01.28.21.42.46.42h.42c.08.37.12.76.12 1.15 0 3.31-2.69 6-6 6zm4.54-4.27c-.1 0-.21.08-.21.18v.57c0 .1.11.18.21.18.1 0 .21-.08.21-.18v-.57c0-.1-.11-.18-.21-.18zM8.37 3.19c0-.25-.2-.42-.46-.42h-.54c-.25 0-.42.18-.42.43 0 .03-.1.04.05.08v.47c0 .15.06.27.21.27s.21-.12.21-.27v-.14h.5c.24 0 .45-.16.45-.42z" fill-rule="evenodd"></path></svg></span></a></li><li><a href="https://linkedin.com/company/the-new-world-foundation/" aria-label="LinkedIn"><span class="bp3-icon" data-icon="linkedin" aria-label="" aria-hidden="true"><svg width="16px" height="16px" viewBox="0 0 24 24"><path d="M20.447 20.452h-3.554v-5.569c0-1.328-.027-3.037-1.852-3.037-1.853 0-2.136 1.445-2.136 2.939v5.667H9.351V9h3.414v1.561h.046c.477-.9 1.637-1.85 3.37-1.85 3.601 0 4.267 2.37 4.267 5.455v6.286zM5.337 7.433c-1.144 0-2.063-.926-2.063-2.065 0-1.138.92-2.063 2.063-2.063 1.14 0 2.064.925 2.064 2.063 0 1.139-.925 2.065-2.064 2.065zm1.782 13.019H3.555V9h3.564v11.452zM22.225 0H1.771C.792 0 0 .774 0 1.729v20.542C0 23.227.792 24 1.771 24h20.451C23.2 24 24 23.227 24 22.271V1.729C24 .774 23.2 0 22.222 0h.003z"></path></svg></span></a></li><li><a href="/cdn-cgi/l/email-protection#7c0c0e190f15181912083c08141912190b0b130e1018521a130912181d08151312" aria-label="Contact"><span icon="envelope" class="bp3-icon bp3-icon-envelope"><svg data-icon="envelope" width="16" height="16" viewBox="0 0 16 16"><path d="M0 3.06v9.88L4.94 8 0 3.06zM14.94 2H1.06L8 8.94 14.94 2zm-6.41 8.53c-.14.14-.32.22-.53.22s-.39-.08-.53-.22L6 9.06 1.06 14h13.88L10 9.06l-1.47 1.47zM11.06 8L16 12.94V3.06L11.06 8z" fill-rule="evenodd"></path></svg></span></a></li></ul></div></div></div></div><div class="built-on"><a href="https://www.pubpub.org">Published with<img class="logo" src="/static/logoWhite.svg" alt="PubPub logo"/></a></div></div></div></div><script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script crossorigin="anonymous" src="https://polyfill-fastly.io/v3/polyfill.min.js?features=default,fetch,HTMLCanvasElement.prototype.toBlob,Node.prototype.contains,Array.prototype.find,Array.from,Number.isNaN,Object.assign,Object.entries,Object.values,Promise,requestIdleCallback,String.prototype.includes,URL,URLSearchParams"></script><script id="initial-data" type="text/plain" data-json="{"communityData":{"id":"e90189c8-2fed-4518-8e60-66134cbcf032","subdomain":"ijgis","domain":null,"title":"Home","citeAs":"International Journal of Global Innovations and Solutions (IJGIS)","publishAs":"The New World Foundation","description":"International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication dedicated to showcasing groundbreaking research and innovative solutions addressing the world's most pressing challenges.","avatar":"https://assets.pubpub.org/arwsae7h/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-71715538461454.webp","favicon":"https://assets.pubpub.org/36ow6479/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-01715538431153.webp","accentColorLight":"#FFFFFF","accentColorDark":"#2D2E2F","hideCreatePubButton":false,"headerLogo":"https://assets.pubpub.org/ue8enmtx/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-41715538480850.webp","headerLinks":null,"headerColorType":"dark","useHeaderTextAccent":true,"hideHero":null,"hideHeaderLogo":true,"heroLogo":"https://assets.pubpub.org/ep2hgksk/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-61715538493266.webp","heroBackgroundImage":null,"heroBackgroundColor":null,"heroTextColor":null,"useHeaderGradient":null,"heroImage":null,"heroTitle":"International Journal of Global Innovations and Solutions (IJGIS)","heroText":"International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication dedicated to showcasing groundbreaking research and innovative solutions addressing the world's most pressing challenges. ","heroPrimaryButton":{"url":"https://ijgis.pubpub.org/publications","title":"Publications"},"heroSecondaryButton":{"url":"","title":""},"heroAlign":null,"navigation":[{"id":"f20c0731-d50a-4e07-bf1e-b6f90b39c1d5","type":"page"},{"id":"1b145631-f125-46a7-a987-9ab95efbafaf","type":"page"},{"id":"9c13cb3a-8069-44ef-9062-7f8b6a740fe8","type":"page"},{"id":"7cec28d6-c3e8-4108-824b-85d99b130421","type":"page"},{"id":"a873a6e0-1d12-48f6-8c66-8beb8a3997ae","type":"page"},{"id":"05015d0b-1ac2-4510-b51d-75672ab41666","type":"page"},{"id":"d691639a-c52e-4175-b649-98cfb5a65683","type":"page"},{"id":"9843be36-7895-4bf4-9ea1-a5b48be5c204","type":"page"},{"id":"4e71684d-a47b-4e48-9fcd-f46e562934c4","type":"page"}],"hideNav":false,"navLinks":null,"footerLinks":null,"footerLogoLink":"https://ijgis.pubpub.org/","footerTitle":null,"footerImage":"https://assets.pubpub.org/s8och5nk/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-51715538507380.webp","website":"https://thenewworld.foundation/","facebook":null,"twitter":null,"instagram":null,"mastodon":null,"linkedin":"company/the-new-world-foundation/","bluesky":null,"github":null,"email":"president@thenewworld.foundation","socialLinksLocation":null,"issn":null,"isFeatured":null,"viewHash":null,"editHash":null,"premiumLicenseFlag":false,"defaultPubCollections":["6ffe297d-8bca-4051-bc10-8cab3f31a894"],"analyticsSettings":null,"spamTagId":"193f9436-3d7e-4d46-98e3-13400996ab98","organizationId":null,"scopeSummaryId":"548c0b60-fc75-40a0-870e-fa9b79700330","createdAt":"2024-04-14T19:57:40.796Z","updatedAt":"2024-10-15T00:30:57.410Z","scopeSummary":{"id":"548c0b60-fc75-40a0-870e-fa9b79700330","collections":15,"pubs":243,"discussions":72,"reviews":142,"submissions":0,"createdAt":"2024-04-14T19:57:40.816Z","updatedAt":"2025-02-18T21:23:21.466Z"},"spamTag":{"id":"193f9436-3d7e-4d46-98e3-13400996ab98","status":"confirmed-not-spam","statusUpdatedAt":"2024-07-26T14:24:16.805Z","fields":{},"spamScore":0,"spamScoreComputedAt":"2024-10-15T00:30:57.421Z","spamScoreVersion":1,"createdAt":"2024-04-14T19:57:40.809Z","updatedAt":"2024-10-15T00:30:57.421Z"},"pages":[{"id":"05015d0b-1ac2-4510-b51d-75672ab41666","title":"Process","slug":"publishing-process","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"bwhfw3t7","layout":[{"id":"xqr2tw15","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"steps-to-publish-on-ijgis","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Steps to Publish on IJGIS","type":"text"}]},{"type":"ordered_list","attrs":{"id":"nt6lmz7r3kv","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nwlh91h86f2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ensure you have an ORCID","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Don't have an ORCID account? Create one to track your academic contributions.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"neuf9jlunvp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Create a PubPub.org Account","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Sign up for an account on","type":"text"},{"text":" PubPub.org","type":"text","marks":[{"type":"link","attrs":{"href":"https://pubpub.org","title":null,"target":null,"pubEdgeId":null}}]},{"text":".","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nspqsyun09j","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Link Your PubPub Account to IJGIS","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"For streamlined access and publication, link your PubPub account to IJGIS. Ask Saurav to do this with your email.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ns6yo616g7l","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"From your coauthor group ","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"njgdrinaaad","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Papers In IJGIS are coauthored at least by 2 experts. Ensure all coauthors have done the above steps.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxa7yrevpbp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Upload Your Draft","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Use the “Create Pub” option on PubPub to upload your draft manuscript. Add coauthors to the draft.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6vjecx3efb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Request Review","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Once your draft is complete, request a review for your publication on PubPub.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nr70o8ku026","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Find Reviewers","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nib44c3krc7","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nbmmtctvvai","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Post your topic in the ","type":"text"},{"text":"\"Publication\" channel","type":"text","marks":[{"type":"strong"}]},{"text":" of the IJGIS Discord server to find reviewers.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxqol5v4ppk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Once reviewers express interest, create a dedicated thread under the appropriate category to facilitate discussions and share relevant links.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxoq4m1nhs5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Engage in the Review Process","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"ns8ocdhjzcq","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nqam9y5n7bw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Monitor the review discussion on PubPub for your draft.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n4a4kl00tde","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Respond to reviewer questions, clarify doubts, and incorporate their feedback by revising your paper as needed.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nlz25ehy9mp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Achieve Reviewer Acceptance","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Aim to address all revision requests to achieve acceptance from all reviewers without further revisions.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nat8ag609wq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Publication","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Once all reviewers agree to accept your paper, the IJGIS admin will publish it in the appropriate monthly issue.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n9v8plcumo3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ncoa632ft2f","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"faq","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"FAQ","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-do-i-select-a-topic","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How do I select a topic?","type":"text"}]},{"type":"paragraph","attrs":{"id":"nb4edx3433w","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" IJGIS covers a variety of categories. Explore the IJGIS community's areas of interest and align them with your expertise to identify a suitable topic.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-do-i-find-co-authors","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How do I find co-authors?","type":"text"}]},{"type":"paragraph","attrs":{"id":"nm5ha3njcgi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" Post your topic in the IJGIS Discord ","type":"text"},{"text":"\"Publication\" channel","type":"text","marks":[{"type":"strong"}]},{"text":" and invite collaborators with similar interests. Clearly define each co-author's responsibilities to avoid delays or confusion.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-many-co-authors-are-ideal","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How many co-authors are ideal?","type":"text"}]},{"type":"paragraph","attrs":{"id":"n0et3g346fm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" IJGIS allows up to 5 co-authors. Choose co-authors based on the scope of your paper, the workload, and the collective expertise required to produce meaningful research.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-do-i-find-reviewers","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How do I find reviewers?","type":"text"}]},{"type":"paragraph","attrs":{"id":"npalb4xc2o3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" Share your finalized topic in the Discord ","type":"text"},{"text":"\"Publication\" channel","type":"text","marks":[{"type":"strong"}]},{"text":" and invite community members to review your work.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-many-reviewers-are-ideal","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How many reviewers are ideal?","type":"text"}]},{"type":"paragraph","attrs":{"id":"nzkbq23sn5c","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" While more reviewers bring diverse perspectives, collaboration with over five reviewers can complicate the process. Aim for 2–5 reviewers to balance quality feedback with efficiency.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n8eh79gzez2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q. How much time is assigned for review?","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nfdhlob7w2z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A: ","type":"text","marks":[{"type":"strong"}]},{"text":"Each reviewer receives seven days from their assignment to review the paper.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n9zt28jknju","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q. What reviewers don’t finish the review in seven days?","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nsf8gmwhrwz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" Reviewers unable to finish review in 7 days shall be replaced with other reviewers who are available, to ensure quality with speed.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-often-does-ijgis-publish","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How often does IJGIS publish?","type":"text"}]},{"type":"paragraph","attrs":{"id":"nkylr6j1jjo","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" IJGIS publishes research papers every month.","type":"text"}]},{"type":"heading","attrs":{"id":"q-how-does-ijgis-support-the-publishing-process","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Q: How does IJGIS support the publishing process?","type":"text"}]},{"type":"paragraph","attrs":{"id":"nd6arqn0adr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A:","type":"text","marks":[{"type":"strong"}]},{"text":" IJGIS provides access to cutting-edge publishing tools through PubPub, ensuring your work is widely referable. The vibrant IJGIS Discord community fosters research collaboration, offering opportunities to co-author, review, mentor, and engage with like-minded individuals.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-06-23T02:02:53.139Z"},{"id":"f20c0731-d50a-4e07-bf1e-b6f90b39c1d5","title":"Home","slug":"","description":"Empowering the digital world, one connection at a time","avatar":"https://assets.pubpub.org/7xna7zqp/ijgis-21719105363566.png","isPublic":true,"isNarrowWidth":false,"viewHash":"amnd0hux","layout":[{"id":"kruw36cv","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n63nep06pzo","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication (online ISSN: 2998-2251) dedicated to showcasing groundbreaking research and innovative solutions addressing the world's most pressing challenges. As the academic arm of the New World Foundation, IJGIS serves as a vital platform for scholars, practitioners, policymakers, and activists from diverse disciplines to share and disseminate their findings.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n8hz00dzu0i","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The journal's scope is broad yet focused, covering topics ranging from environmental sustainability, climate change solutions, and renewable energy technologies, to advancements in healthcare, digital security, and social equity. In addition to these areas, IJGIS welcomes submissions in the following domains and subdomains:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n7s3c8c3vqs","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npq9wyxvvl0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Artificial Intelligence (AI) and Machine Learning (ML):","type":"text","marks":[{"type":"strong"}]},{"text":" Topics include but are not limited to, natural language processing, computer vision, and AI ethics.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7h3wdle784","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cloud and Backend Engineering:","type":"text","marks":[{"type":"strong"}]},{"text":" Focus areas include cloud architecture, serverless computing, and infrastructure optimization.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nlsdi74dh7b","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cybersecurity:","type":"text","marks":[{"type":"strong"}]},{"text":" Topics such as threat detection, cryptographic solutions, and security frameworks are emphasized.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nzqyx24l3pm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Data Science and Engineering:","type":"text","marks":[{"type":"strong"}]},{"text":" Areas include big data analytics, data mining, and data visualization techniques.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nj3vr8rp7bk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"DevOps and Site Reliability Engineering (SRE):","type":"text","marks":[{"type":"strong"}]},{"text":" Submissions related to continuous integration/continuous deployment (CI/CD), automation, and infrastructure as code are encouraged.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n9r1s2z5ztj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Software Engineering:","type":"text","marks":[{"type":"strong"}]},{"text":" This includes software development methodologies, testing, and software quality assurance.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n3q007ozr1o","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Our mission is to foster a multidisciplinary dialogue that transcends geographical and academic boundaries, promoting research that combines theory with practical outcomes. IJGIS is committed to enhancing global research collaboration and knowledge exchange. Each issue features original research articles, comprehensive reviews, case studies, and commentaries that offer insights into innovative strategies and effective practices. The journal encourages submissions that demonstrate bold, ethical, and effective approaches to problem-solving, with the potential for global impact.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n5j8zddgnlp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The publisher of the IJGIS journal is ","type":"text"},{"text":"The New World Foundation","type":"text","marks":[{"type":"link","attrs":{"href":"https://thenewworld.foundation/","title":null,"target":"_blank","pubEdgeId":null}}]},{"text":", based out of Seattle, WA, USA. In line with the ethos of its publishing organization, IJGIS upholds the highest standards of research integrity and scientific excellence. All submitted manuscripts undergo a rigorous peer review process, ensuring the publication of only the most reliable and impactful research. By providing a platform for the exchange of ideas and solutions, IJGIS aims to inspire change and make a significant contribution to global development and sustainability.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n383m1o2h5q","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"We invite researchers, thought leaders, and innovators to contribute to our quest for knowledge and solutions that pave the way to a better future for all. Join us in our endeavor to understand and solve the intricate puzzles of our time through the lens of innovation and global collaboration.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n97lmi415eq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Please read our publishing ethics ","type":"text"},{"text":"here","type":"text","marks":[{"type":"link","attrs":{"href":"https://ijgis.pubpub.org/publishing-ethics","title":null,"target":"_blank","pubEdgeId":null}}]},{"text":" and Donation Acknowledgement Letter ","type":"text"},{"text":"here","type":"text","marks":[{"type":"link","attrs":{"href":"https://ijgis.pubpub.org/donation-acknowledgement-letter","title":null,"target":"_blank","pubEdgeId":null}}]},{"text":".","type":"text"}]}]},"align":"left"}},{"id":"jqm6hwp4","type":"collections-pages","content":{"items":[{"id":"3c58f1fc-ad9b-4ca3-ad6e-c9895e245edd","type":"collection"},{"id":"2d75e35f-7ff6-45a2-9006-a98a2696424d","type":"collection"},{"id":"8db336b3-82a0-4f59-a8fa-48f6519d9e88","type":"collection"},{"id":"ef752e32-e979-47fe-875c-d1d03d79e073","type":"collection"},{"id":"ca0cba26-0323-404f-be9b-b367112886b9","type":"collection"}],"title":"Recent Issues","justify":"space-between"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-04-14T19:57:40.822Z"},{"id":"7cec28d6-c3e8-4108-824b-85d99b130421","title":"Ethics","slug":"publishing-ethics","description":"","avatar":"https://assets.pubpub.org/j16xy60r/ijgis-51719105698605.png","isPublic":true,"isNarrowWidth":null,"viewHash":"a9ie3qlx","layout":[{"id":"q0vejzhm","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"author-and-peer-reviewer-ethics","rtl":null,"level":1,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Author and Peer Reviewer Ethics","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n1grb33mr0r","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"general-principles","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"General Principles","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nkv8g25h6l5","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ncoe5ey44wa","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Uphold the highest standards of research integrity and scientific excellence.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nota854milq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Promote a culture of honesty and transparency in conducting and reporting research.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n3tsh1asois","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Foster an environment where innovative and impactful research can flourish through adherence to ethical practices.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"neajh1rmziv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"for-authors","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"For Authors:","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"nalnypwj1st","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6pwgtfqiva","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Authorship Criteria","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nkamd42h3fu","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nyc8hwgxbhz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Contributors must have made a significant intellectual contribution to the research.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n41h3czexf9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Participants should have engaged in drafting, reviewing, or improving the content for intellectual integrity.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7mquqa29yi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Approval of the final manuscript by all listed authors is mandatory for submission for publication.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nz5kkvv86x2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Citing Sources","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n789odbe14z","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nk1k12bwv39","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Proper acknowledgment of external sources is crucial, including direct quotes, paraphrases, and summaries.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ntt9comx5ra","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Original data, research results, and visual elements must cite their sources to uphold academic honesty.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n5nvoouy1t3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Originality and Publication Ethics","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nzadiorq18x","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nhvi525vace","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Only submit original work that has not been published elsewhere or concurrently submitted to other publications.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndxgnzzh1y9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Avoid duplication of your own previously published work without proper citation and acknowledgment.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndhbdgqfkxy","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Engage in the evolutionary publishing process if applicable, ensuring substantial technical advancement and proper citation of previous versions.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n5zdlykuywu","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Research Integrity","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"ngh0gy9i0x8","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nefuwhx0e64","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Avoid fabrication, falsification, or manipulation of data and results.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nsck1ghnjmn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Accurately report research findings and ensure the submission adheres to all publication requirements.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nc5w9djhuj8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Plagiarism","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n2odocari7k","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nc75e49oc6e","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Strictly prohibit the use of another's ideas or words without appropriate acknowledgment.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6ehs0c0fxv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Utilize proper citation practices to avoid plagiarism and maintain the originality of the research.","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":"n8ayyrltwet","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"for-peer-reviewers","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"For Peer Reviewers:","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"npwv0wewqen","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nuyqm8xfmp4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Review Process","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nv4qrjhmt0r","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxauyuw20dz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Conduct a prompt, thorough, and impartial review of the manuscript.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ngzj3okxlvv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Provide constructive feedback, including reasonable suggestions for improvement and a professional tone.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"newsay1l1ou","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ethical Vigilance","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nuzfyjuccla","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndqekwtxtpq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Be vigilant for any potential ethical issues, including plagiarism, data manipulation, and conflict of interest.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nzm83mvp6kv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Alert the editor to any concerns regarding the ethics or integrity of the manuscript.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nm2ecs2luxh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Confidentiality","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n54sa5jnn1z","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"neb1irem9xw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Maintain the confidentiality of the review process and safeguard the unique contributions of the author's work.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nj6at89grwm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Avoid the use of information obtained during the peer review process for personal advantage.","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":"n211tfrgbcs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"n211tfrgbcs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"These guidelines ensure that both authors and reviewers contribute to the mission of IJGIS in promoting global research collaboration, innovation, and the dissemination of knowledge to address pressing global issues effectively.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-04-28T02:12:21.149Z"},{"id":"efe0bca7-1ed7-46d2-b69f-76e7a3ed60ce","title":"Publications","slug":"publications","description":"","avatar":"https://assets.pubpub.org/utlsx8lq/ijgis-51719105482476.png","isPublic":true,"isNarrowWidth":null,"viewHash":"dnd0xdcn","layout":[{"id":"bdsgdoot","type":"collections-pages","content":{"items":[{"id":"3c58f1fc-ad9b-4ca3-ad6e-c9895e245edd","type":"collection"},{"id":"2d75e35f-7ff6-45a2-9006-a98a2696424d","type":"collection"},{"id":"8db336b3-82a0-4f59-a8fa-48f6519d9e88","type":"collection"},{"id":"ef752e32-e979-47fe-875c-d1d03d79e073","type":"collection"},{"id":"ca0cba26-0323-404f-be9b-b367112886b9","type":"collection"},{"id":"3afb9f9d-9eeb-4288-9394-7716163989a3","type":"collection"},{"id":"cf66b349-57a8-46db-b34b-c8a70601b653","type":"collection"},{"id":"16d9d435-9cc3-41fd-b3ec-b23edb0a8f23","type":"collection"},{"id":"13a19d86-67a4-43cc-b390-79bfbd233d46","type":"collection"},{"id":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","type":"collection"},{"id":"1bf5de82-f888-4d36-ae74-614e7464fd67","type":"collection"},{"id":"f55d7aa5-2b86-4d7e-9096-72a3895f7cc5","type":"collection"}],"title":"Issues"}},{"id":"n9ed2rkw","type":"pubs","content":{"sort":"publish-date","title":"Papers","pubIds":[],"hideEdges":true,"hideByline":false,"collectionIds":["6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","13a19d86-67a4-43cc-b390-79bfbd233d46","16d9d435-9cc3-41fd-b3ec-b23edb0a8f23","cf66b349-57a8-46db-b34b-c8a70601b653","3afb9f9d-9eeb-4288-9394-7716163989a3","ca0cba26-0323-404f-be9b-b367112886b9","ef752e32-e979-47fe-875c-d1d03d79e073","8db336b3-82a0-4f59-a8fa-48f6519d9e88","2d75e35f-7ff6-45a2-9006-a98a2696424d","3c58f1fc-ad9b-4ca3-ad6e-c9895e245edd"],"pubPreviewType":"minimal"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-06-23T01:05:35.818Z"},{"id":"a873a6e0-1d12-48f6-8c66-8beb8a3997ae","title":"Open Access","slug":"open-access","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"r0r80967","layout":[{"id":"nr46u2z7","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nwdkph80fq5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Open access:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"ntqsgakknn0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"This is an open access journal which means that all content is freely available without charge to the user or his/her institution. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles, or use them for any other lawful purpose, without asking prior permission from the publisher or the author. This is in accordance with the BOAI definition of open access.","type":"text"}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"n9fz7dc6ges","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Licensing:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"ndp67giav2u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"License(s) permitted by the journal:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n4637bx9ct1","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"neh2ulsh408","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"njdtqwnlmsq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY-SA","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ngx55aicijp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY-ND","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n4pmszubw0s","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY-NC","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nmictssod56","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY-NC-SA","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nky2g1icz1y","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"CC BY-NC-ND","type":"text"}]}]}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nx16k14zqg4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Publishing and Copyright Policies:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n9tqswmqg3c","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"For all the licenses indicated above, authors retain the copyright and full publishing rights to their work without restrictions. This means authors have the freedom to publish, distribute, and modify their work as they see fit. By maintaining complete control over their intellectual property, authors can ensure the widest possible dissemination and impact of their research. Our journal supports and encourages this model to foster open and unrestricted access to scholarly work, promoting innovation and collaboration in the academic community. Authors are encouraged to review the specific terms of each license to fully understand their rights and freedoms.","type":"text"}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nid3l8oeucb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Zero APC","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nvkakkln1s3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"We are delighted to announce that our journal offers a unique opportunity for authors: there are no Article Processing Charges (APC) for publishing with us. We believe in promoting accessible and inclusive dissemination of research, ensuring that all authors can share their valuable contributions without financial barriers. Publish with us and join a community dedicated to advancing knowledge freely and equitably.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T19:56:17.767Z"},{"id":"d691639a-c52e-4175-b649-98cfb5a65683","title":"Plagiarism","slug":"plagiarism-policy","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"hohlytxy","layout":[{"id":"fgv8vpe5","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nfub1i35m2r","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Plagiarism Policy:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Our journal is committed to upholding the highest standards of academic integrity and takes a zero-tolerance approach to plagiarism. Plagiarism is the unethical practice of using someone else's work or ideas without proper attribution. To ensure the originality and credibility of the research we publish, we adhere to the following guidelines:","type":"text"}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Definition of Plagiarism:","type":"text","marks":[{"type":"strong"}]},{"text":" Plagiarism includes, but is not limited to, copying text, ideas, images, or data from another source without proper citation, presenting someone else's work as your own, or paraphrasing significant portions of text without acknowledgement.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Detection:","type":"text","marks":[{"type":"strong"}]},{"text":" All submitted manuscripts are subjected to plagiarism detection software as part of the initial review process. Editors and reviewers also manually check for any signs of plagiarism.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Author Responsibilities:","type":"text","marks":[{"type":"strong"}]},{"text":" Authors must ensure that their work is entirely original and properly cite all sources and influences. Any text, data, or ideas derived from other sources must be appropriately referenced.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Consequences of Plagiarism:","type":"text","marks":[{"type":"strong"}]},{"text":" If plagiarism is detected at any stage before publication, the manuscript will be rejected immediately. If plagiarism is discovered after publication, the journal will take appropriate actions, which may include issuing a retraction, publishing a notice of plagiarism, and informing the author's institution.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reporting Plagiarism:","type":"text","marks":[{"type":"strong"}]},{"text":" We encourage readers and reviewers to report any suspected plagiarism by providing detailed information to the editorial office. All reports will be investigated thoroughly and confidentially.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Education and Prevention:","type":"text","marks":[{"type":"strong"}]},{"text":" The journal provides resources and guidelines to help authors understand what constitutes plagiarism and how to avoid it. We believe that education is a key component in preventing plagiarism.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"By enforcing this plagiarism policy, our journal aims to maintain the integrity of the academic record and ensure that all published research is of the highest ethical standard.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T20:28:32.867Z"},{"id":"1b145631-f125-46a7-a987-9ab95efbafaf","title":"Aims and Scope","slug":"aims-and-scope","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"0wnhiyqy","layout":[{"id":"n21ljes0","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Aims & Scope","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nqgzswt5rib","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication (online ISSN: 2998-2251) dedicated to showcasing groundbreaking research and innovative solutions that address the world's most pressing challenges. As the academic arm of the New World Foundation, IJGIS provides a vital platform for scholars, practitioners, policymakers, and activists from diverse disciplines to share and disseminate their findings.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n1pxrgpysr1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Scope:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n3z8gd81qbj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IJGIS covers a broad range of topics, including but not limited to:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nudebd1vxoe","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n617vwu1qop","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Environmental Sustainability","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nlj71vaskrh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Climate Change Solutions","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nnchda74yb9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Renewable Energy Technologies","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nrb9r4tttzk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Advancements in Healthcare","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nije59h228l","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Digital Security","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nso556qwq4j","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Social Equity","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nx27z6svxmr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Our mission is to foster a multidisciplinary dialogue that transcends geographical and academic boundaries, promoting research that combines theory with practical outcomes. We are committed to enhancing global research collaboration and knowledge exchange.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nt9cad20es8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Content:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nyo679k5gsk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Each issue of IJGIS features a variety of content, including:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nuu91nl4ce0","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nrdrbsvvn5v","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Original Research Articles","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxpsz9svf6z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Comprehensive Reviews","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nt304bgo9ki","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Case Studies","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n5eq43o4u84","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Commentaries","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nx3e6vckl0i","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"These contributions offer insights into innovative strategies and effective practices, demonstrating bold, ethical, and impactful approaches to problem-solving with the potential for global influence.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nx21cjjk7ri","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Publication Standards:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nw704173gg7","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IJGIS upholds the highest standards of research integrity and scientific excellence. All submitted manuscripts undergo a rigorous peer review process to ensure the publication of reliable and impactful research. By providing a platform for the exchange of ideas and solutions, IJGIS aims to inspire change and make a significant contribution to global development and sustainability.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n3kc2cvwpju","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Invitation to Contributors:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nvtbzuigbss","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"We invite researchers, thought leaders, and innovators to contribute to our quest for knowledge and solutions that pave the way to a better future for all. Join us in our endeavor to understand and solve the intricate puzzles of our time through the lens of innovation and global collaboration.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T20:32:25.208Z"},{"id":"9c13cb3a-8069-44ef-9062-7f8b6a740fe8","title":"Editorial Board","slug":"editorial-board","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"mvxc0ka8","layout":[{"id":"m1jbhldt","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"editorial-board-members","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Editorial Board Members","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nvfv86o9aa2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"n6amnvm10he","url":"https://assets.pubpub.org/wril6fye/saurav_headshot-11720385087989.jpeg","href":null,"size":13,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nqhqvsvkt5n","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nu5a7kck6jt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Saurav Bhattacharya (Editor in Chief)","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"Saurav Bhattacharya is a distinguished researcher and author with extensive expertise in account registration systems, digital identity, and cybersecurity. With a background in computer science from IIT Kharagpur and a career at Microsoft, Saurav has been instrumental in advancing technology solutions that address global challenges. As the founder of an online security firm, SuperChargePlus, and president of the New World Foundation, he brings a wealth of knowledge and leadership to IJGIS.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n8iyhcc9lm8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"associate-editors","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Associate Editors","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nx9lt3oc3bd","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"n22efsx9nag","url":"https://assets.pubpub.org/9gik1bqi/image-11731984413570.png","href":null,"size":18,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nddlysymi30","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Arvind Toorpu","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n2yql08qod4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Arvind Toorpu is an experienced database professional with over 14+ years of expertise in managing, designing, and administering complex database systems. His academic foundation includes two master’s degrees: one in Information Technology and another in Management Information Technology, providing a balanced perspective on both technical and managerial aspects of data systems. As an AWS & Oracle Certified Professional (OCP), He is honed with skills across a wide range of database technologies, including Oracle, SQL Server, PostgreSQL, MySQL, AWS Redshift, and MongoDB. His professional experience spans high-performance database design, cloud migrations, performance tuning, and implementing scalable, secure database solutions in production and non-production environments. He currently leads a team of DBAs as an IT Manager, driving strategic initiatives for optimal database performance and seamless cloud integration. In addition to his industry expertise, He is an accomplished author and peer reviewer. He has written and reviewed multiple peer-reviewed scholarly articles for IJGIS and other journals, providing critical feedback to improve research quality. His published research papers focus on database optimization, cloud computing, and secure data management, and passionate about bridging academic insights with real-world applications. He has also contributed extensively to professional platforms, where he writes about the latest trends and innovations in database technologies. As an Associate Editor, Arvind aims to bring my diverse experience and passion for research to support IJGIS in maintaining its high editorial standards, promoting innovative research, and contributing to the journal’s vision of advancing knowledge in various fields of geospatial information systems.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nl3rtg8f7q0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"ni8rfeyh0a0","url":"https://assets.pubpub.org/gqmx4myp/image-41732506437113.png","href":null,"size":23,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ncqyd0f1wqo","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Shaik Abdul Kareem","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n7l82c327ey","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Shaik Abdul Kareem is an accomplished expert with over a decade of experience in cloud infrastructure, IoT, artificial intelligence, and cybersecurity. Recognized for his pioneering contributions to these fields, he has consistently demonstrated innovation and leadership in academia, industry, and professional organizations. Mr. Abdul Kareem holds three granted patents—two design patents from the United Kingdom and one utility patent from Germany—demonstrating his exceptional ability to create novel solutions to complex technological challenges. His research contributions are equally remarkable, with several technical and research papers published in international conferences and journals. His work has been presented at prestigious IEEE conferences, where he has actively participated as a primary author and speaker, further establishing his expertise in his domains of specialization. In addition to his research, Mr. Abdul Kareem has served as a peer reviewer for IEEE international conference papers and Society of Automotive Engineers (SAE) technical content, ensuring rigorous standards for high-impact publications. He has also played significant roles as a Technical Program Committee (TPC) member and session chair for various IEEE international conferences, where he has contributed to shaping the discourse on emerging technologies and facilitating collaboration among leading researchers and practitioners. Mr. Abdul Kareem’s contributions extend beyond academia into professional leadership and community development. He serves as the Treasurer for IEEE Atlanta Young Professionals (YP), where he has spearheaded initiatives to empower young engineers and professionals. His active involvement in IEEE educational activities and STEM outreach programs underscores his commitment to mentoring the next generation of innovators and fostering a culture of technological advancement. As a strong advocate for diversity and inclusion, Mr. Abdul Kareem is dedicated to empowering women in technology. Through his mentorship and guidance to university students, he has inspired and supported countless individuals, especially women, to pursue careers in science, technology, engineering, and mathematics (STEM). His efforts in creating opportunities and advocating for gender equality highlight his dedication to driving social and professional progress. Further reflecting his dedication to the technology community, Mr. Abdul Kareem has judged prestigious hackathons and university competitions, bringing his expertise to evaluate innovative solutions and guide aspiring professionals. His work has inspired and motivated participants to pursue excellence in their respective fields. Combining his technical expertise with strategic leadership, Mr. Abdul Kareem is at the forefront of integrating AI/ML, IoT, and cybersecurity into geospatial and cloud ecosystems. His ability to bridge academic rigor and industry application makes him a valuable contributor to advancing research and fostering impactful innovations. Through his roles in technical reviews, professional leadership, and mentorship, he continues to drive progress in technological fields, making him a standout leader in his profession.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nkdl8547pif","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"nuhp803xgug","url":"https://assets.pubpub.org/oju9jdqq/image-41732010388060.png","href":null,"size":15,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"n7aun3j0x2u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ameer Shohail","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"ngk7zy84vpl","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ameer Shohail L is a seasoned telecommunications specialist with over 17 years of experience in 5G and 4G core network design, focusing on signaling, policy, and charging architectures. His expertise spans 5G Standalone (SA) and Non-Standalone (NSA) technologies, network slicing, and edge computing, enabling transformative solutions for modern networks. Ameer is an IEEE Senior Member and an active contributor to the IEEE International Network Generations Roadmap (INGR) and Future Network Forum (FNWF), where he collaborates on forward-looking technologies such as 6G and quantum networks. With a strong passion for innovation and research, he aims to drive advancements in telecommunications and inspire impactful solutions for the global technology community. As an Associate Editor for IJGIS, Ameer is committed to fostering collaboration, sharing knowledge, and supporting transformative research in the field of telecommunications","type":"text"}]},{"type":"paragraph","attrs":{"id":"nt1m24bs7ie","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"njrwdr1hzbb","url":"https://assets.pubpub.org/649ujr1z/image-01731892761949.png","href":null,"size":18,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nhsh5wr8aij","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nilesh Jain","type":"text","marks":[{"type":"strong"}]},{"text":" ","type":"text"}]},{"type":"paragraph","attrs":{"id":"ngtun1d2jvr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nilesh Jain is an accomplished Engineering Lead at Oracle, with over 17 years of experience in software engineering, artificial intelligence, and cloud technology. He specializes in developing innovative solutions for energy efficiency and sustainability, with a strong focus on global impact. As an Associate Editor for The International Journal of Global Innovations and Solutions (IJGIS), Nilesh brings his extensive expertise in AI and data integration to advance the journal's mission of promoting transformative research. He is a Titan Award Gold Winner for sustainable energy innovation and has published several influential research papers, reflecting his commitment to technological advancement and environmental stewardship. Nilesh is also a mentor, speaker, and author, dedicated to empowering the next generation of engineers.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nq98z88n99s","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"section-editors","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Section Editors","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n5g23ef4fgx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"AI: ","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nbsjiw5oc1v","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"n50v8zu1vsm","url":"https://assets.pubpub.org/p7y5s2oy/image-21732330426084.png","href":null,"size":19,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nziyp8los5p","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Arun Pandiyan Perumal","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nl8ybnc6vqp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Arun Pandiyan Perumal is an accomplished Technology Infrastructure Specialist with over a decade of expertise in Cloud Computing, DevOps, and Site Reliability Engineering. His professional journey is marked by his expertise in architecting and managing secure, scalable, and high-performing cloud infrastructures. Arun has led teams in building globally distributed multi-cloud infrastructures, integrating advanced DevOps practices, and pioneering automation frameworks that enhance efficiency and reliability. Beyond his professional responsibilities, Arun has been deeply involved in the research and technical communities, sharing his knowledge and collaborating with experts on various research initiatives. His academic contributions include authoring and publishing research and review articles at IEEE and Springer conferences and peer-reviewed journals within his area of specialization. His roles include serving on the Technical Program Committees for renowned conferences like the IEEE Cloud Summit 2024 and IEEE CLOUD 2024, as well as performing technical book reviews and peer-reviewing research papers. As a Section Editor for the International Journal of Global Innovations and Solutions (IJGIS), Arun leverages his extensive expertise in technology infrastructure, cloud computing, DevOps, and AI to support IJGIS's mission of promoting innovation and driving technological progress on a global scale. ","type":"text"}]},{"type":"paragraph","attrs":{"id":"ntpjsn7w7o0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"niub2kuuyh9","url":"https://assets.pubpub.org/uvj606m8/image-61732330494083.png","href":null,"size":20,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nkj5qyr0wd4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Balaji Dhamodharan","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n6h73qbqwkz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Balaji Dhamodharan is a global leader and AI Expert recognized for advancing Artificial Intelligence, Machine Learning, and Digital Transformation across diverse industries. Honored with the prestigious AI100 Award and listed among the Top 40 Under 40 Data Scientists, Balaji combines visionary leadership with a strong focus on impactful research and cutting-edge technology adoption. As an AI researcher, Balaji has made significant contributions to topics like multilingual tokenization efficiency and fine-tuning Large Language Models (LLMs) for Indian languages, which are featured in top-tier journals. A member of the Forbes Technology Council, Senior Fellow at The Digital Economist, and an editorial advisor for multiple top-tier journals, Balaji seamlessly integrates academic rigor with industry expertise. His upcoming book, Data Science Using PySpark (2024), underscores his mission to democratize AI knowledge and foster innovation across sectors. Balaji’s expertise and influence extend to mentoring future AI leaders, speaking at premier global conferences, and championing AI for social good. With a mission to inspire innovation and excellence, he continues to shape the future of AI research, development, and ethical technological advancements worldwide.","type":"text"}]},{"type":"paragraph","attrs":{"id":"np3ybtd2qbr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nb41nh86680","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cybersecurity: ","type":"text","marks":[{"type":"strong"}]}]},{"type":"image","attrs":{"id":"nfv6li0omn9","url":"https://assets.pubpub.org/h27t9pk8/image-21732330564301.png","href":null,"size":20,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ngm4gkjm1am","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sanjay Poddar","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nhfdd4fdgv9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sanjay Poddar is an accomplished IT professional specializing in Networks, Network Security, account management, and technology solutions. With a strong academic foundation in Information Technology, he has driven innovation and delivered impactful results across industries, including News & Media, Telecom, and Cybersecurity. Sanjay excels in fostering client relationships, problem solving, providing technical solutions and consistently exceeding expectations. Sanjay's expertise spans a range of vendor technologies, reflecting his passion for the ever-evolving technology landscape. A forward-thinking leader with strong communication skills, he thrives in collaborative environments and remains committed to staying at the forefront of emerging tech and trends. Dedicated to excellence, Sanjay continues to make meaningful contributions to the IT and cybersecurity communities. Serving as a coordinator for the IEEE Computer Society's speaking series in Regions 5/6, Sanjay fosters knowledge sharing and professional growth within the tech community. He is also a mentor for NTISSA, guiding individuals in their cybersecurity careers, and serves as a committee member of the IEEE Recognition Committee, contributing to the acknowledgment of excellence in the field. As a Section Editor for the International Journal of Global Innovations and Solutions (IJGIS), Sanjay leverages his extensive expertise in technology infrastructure, Cloud, Network Security, and Cybersecurity to support IJGIS's mission of promoting innovation and driving technological progress on a global scale.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nf7qn1okkfh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"n4ndu2lv5t3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"np12wyzoqht","url":"https://assets.pubpub.org/tp7tuoew/image-01735246572744.png","href":null,"size":22,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nl66cfwg641","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Suryaprakash Nalluri","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nlbufb5hxdu","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Suryaprakash Nalluri is a seasoned leader in cybersecurity with over 18 years of industry experience. Currently serving as a Senior Vice President in the financial sector, he leads multiple Information Security teams, overseeing global security operations and driving key initiatives, including SDLC Shift Left practices and DevSecOps automation. His expertise lies in delivering end-to-end security solutions to address organizational challenges and enhance cybersecurity frameworks. With a Bachelor's degree in Computer Science and a Master's in Information Systems Security, Suryaprakash began his career as a developer before transitioning into the field of information security to pursue a more technical and impactful career. His unique blend of development, design, and security experience underpins his strong capabilities in Secure-SDLC practices, governance, and architecture. Outside of his professional endeavors, Suryaprakash enjoys cooking, reading, listening to music, and exploring technology, hobbies that offer both relaxation and inspiration.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nt04hzukwnb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ntl83cgcy2i","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cloud: ","type":"text","marks":[{"type":"strong"}]},{"text":"Hrushikesh Deshmukh","type":"text"}]},{"type":"image","attrs":{"id":"nai1jhjenr4","url":"https://assets.pubpub.org/qkod47dh/image-61732330697230.png","href":null,"size":27,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nv0j14wqzyi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ramasankar Molleti","type":"text","marks":[{"type":"strong"}]},{"text":" ","type":"text"}]},{"type":"paragraph","attrs":{"id":"ne48gdw57cu","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ramasankar Molleti is a seasoned technology leader with extensive experience in cloud architecture, system modernization, and strategic innovation. With a proven track record of delivering transformative solutions for large-scale, mission-critical systems, Ramasankar Molleti has consistently driven advancements in performance, scalability, and efficiency across various industries. Ramasankar Molleti is not only a seasoned technology leader but also an active contributor to the academic and professional communities through publications, peer reviews, and thought leadership. With a unique blend of practical experience and scholarly engagement, [Your Name] has demonstrated a commitment to advancing knowledge in cloud architecture, data systems, and technological innovation. Ramasankar Molleti expertise spans AWS, GCP, Azure, Kubernetes, and security architecture, enabling me to design scalable and secure solutions for complex challenges. Recognized with numerous Industry Awards, and as a member of the Forbes Technology Council and senior member of IEEE, I am passionate about mentoring emerging talent and advising startups to shape the future of cloud computing. I have also made significant research contributions with numerous publications in cloud computing, cybersecurity and fintech related technologies. With a deep understanding of complex systems and a passion for leveraging technology to drive impactful change, Ramasankar Molleti is well-positioned to contribute as an Section Editor for the International Journal of Global Innovations and Solutions (IJGIS).","type":"text"}]},{"type":"paragraph","attrs":{"id":"n7chfna1r7y","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"DevOps: ","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n61sv7lr0xp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"ndil7p99q95","url":"https://assets.pubpub.org/f98gr4ys/image-51731993793436.png","href":null,"size":18,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ncn58zea3nv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sri Bhargav Krishna Adusumilli","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n1n6gdi27av","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sri Bhargav Krishna Adusumilli is a visionary technologist renowned for his groundbreaking contributions to artificial intelligence, blockchain, and cloud computing. As an Enterprise Architect and co-founder of Mindquest Technology Solutions LLC, he has driven innovation for global giants like Walmart and American Express. A Senior IEEE Member and Forbes Technology Council contributor, Sri Bhargav has authored influential textbooks, secured AI patents, and earned numerous accolades. Passionate about mentorship, he has guided over 100+ individuals and judged prestigious competitions like the MIT $100K Challenge. As Section Editor for the IJGIS, he champions research excellence, advancing knowledge. His journey is one of resilience, leadership, and a commitment to leveraging technology for societal impact","type":"text"}]},{"type":"paragraph","attrs":{"id":"nu4mygozjfb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"naobv4w4h4q","url":"https://assets.pubpub.org/f72c0l26/image-41731892816938.png","href":null,"size":22,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nt9erqc1bci","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Mourya Chigurupati","type":"text","marks":[{"type":"strong"}]},{"text":" ","type":"text"}]},{"type":"paragraph","attrs":{"id":"n42qrmtq8xx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Mourya Chigurupati is a seasoned tech lead and cloud architecture professional with over a decade of experience managing cloud infrastructures in AWS and Azure. Mourya has published several influential papers in Site Reliability Engineering (SRE) and Artificial Intelligence (AI) and has actively contributed to the academic and professional community through peer-reviewing research and judging hackathons. As a Section Editor for the International Journal of Geospatial and Information Science (IJGIS), Mourya leverages a deep interest in DevOps, cloud technologies, SRE, and AI to support the journal's mission of advancing innovative and impactful research. Mourya’s passion for technology and collaboration underscores his commitment to driving progress in the fields of cloud computing and DevOps. ","type":"text"}]},{"type":"paragraph","attrs":{"id":"n3khrmne8av","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"ngikbqzpbzp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"SWE: ","type":"text","marks":[{"type":"strong"}]}]},{"type":"image","attrs":{"id":"nnd7c9ivyha","url":"https://assets.pubpub.org/h0errd0g/image-31732506346306.png","href":null,"size":22,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nrmizvfy8x5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Mahipal Reddy Podduturi","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nj9lv41hzsq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Mahipal Reddy Podduturi Highly experienced software architect with over 19 years of expertise in Java/J2EE and portal technologies, specializing in designing, developing, and deploying scalable, robust applications. Adept at working across diverse domains, including banking, healthcare, logistics, retail and transportation, with a strong emphasis on innovation and collaboration. Recently incorporated AI-driven solutions and IEEE-standard methodologies into large-scale projects to ensure cutting-edge performance and global compliance. Mahipal Reddy Podduturi a wide array of technical skills, including expertise in modern frameworks (Spring Boot, Angular, React, ORM), databases (No SQL, Oracle, PostgreSQL, DB2), and cloud technologies (AWS, Kubernetes, GCP, Azure, Openshift). This versatility ensures relevance across industries and technologies. Mahipal Reddy Podduturi is an IEEE Senior Member and an active contributor to the IEEE AI in Social Media Marketing: Using Machine Learning to Analyze Trends and Predict Consumer Sentiment and Machine Learning Algorithms for cloud -Based Educational Games where he collaborates on forward-looking technologies such as AI and Machine Learning Algorithms for could technologies. With a strong passion for innovation and research, he aims to drive advancements in could and AI impactful solutions for the global technology community. As a Section Editor for the International Journal of Global Innovations and Solutions (IJGIS), Mahipal Reddy Podduturi leverages his with a deep understanding of complex systems extensive expertise in technology, Cloud and Cybersecurity to support IJGIS's mission of promoting innovation and driving technological progress on a global scale.","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]}]},{"type":"heading","attrs":{"id":"advisory-board","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Advisory Board","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nm8djcbik13","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"image","attrs":{"id":"n4s7f7qt2dx","url":"https://assets.pubpub.org/wnangief/image-51732330608383.png","href":null,"size":22,"align":"left","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nablp4iefrx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Rajesh Kumar Malviya","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n2mw9gbpysw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Rajesh Kumar Malviya is a seasoned technology visionary with over 25 years of global experience in Artificial Intelligence, Cloud Computing, Data, and Integration. Currently an Enterprise Architect at NTT DATA Inc., Rajesh is adept at bridging the gap between business and technology. He has successfully led large-scale digital transformations for clients across diverse industries, including insurance, manufacturing, energy & utilities, and retail. A thought leader and published author, Rajesh has contributed to 20+ research papers and articles in renowned journals and IEEE conferences. He is an active member of the academic community, serving on editorial, review, and advisory boards for leading international journals. With a Master's in Data Science & Engineering from BITS Pilani and an MBA, Rajesh is committed to leveraging technology to drive innovation and solve complex business challenges. As an Advisory Board, Rajesh is a fervent advocate for the next generation of leaders, dedicated to mentoring and coaching young researchers. He is committed to driving positive change by promoting innovative research and contributing to the journal's vision of advancing knowledge in various fields.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T20:41:00.858Z"},{"id":"9843be36-7895-4bf4-9ea1-a5b48be5c204","title":"Peer Review","slug":"peer-review-policy","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"5s19ka9y","layout":[{"id":"p82xodf2","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"ijgis-journals-peer-review-policy","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IJGIS Journal's Peer Review Policy:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n6mjd6bjktv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Our journal employs an Open Peer Review policy to promote transparency and foster a collaborative scientific environment. This process involves the following key elements:","type":"text"}]},{"type":"ordered_list","attrs":{"id":"n7zpw6mgm1z","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ngdepskl8yo","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewer Identity Disclosure:","type":"text","marks":[{"type":"strong"}]},{"text":" Reviewers' identities are revealed to authors, and reviewers are encouraged to sign their reviews. This openness fosters constructive and respectful feedback.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nqixm0kd14a","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Transparent Communication:","type":"text","marks":[{"type":"strong"}]},{"text":" Reviewers' comments and author responses are shared among all reviewers and authors involved in the review process. This transparency ensures a thorough and collegial evaluation.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n0az3fm2ymc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Enhanced Feedback Quality:","type":"text","marks":[{"type":"strong"}]},{"text":" By knowing the reviewers' identities, authors can better understand the context of the feedback, which can lead to more productive revisions and discussions.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n866yt94n0x","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Quality and Integrity:","type":"text","marks":[{"type":"strong"}]},{"text":" While maintaining openness, we uphold rigorous standards for quality and integrity. Reviewers are selected based on their expertise, and all reviews are carefully moderated to ensure they meet our journal's standards for professionalism and scientific rigor.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nx8ik7x87bd","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewer decision: ","type":"text","marks":[{"type":"strong"}]},{"text":"The reviewer submits the review, along with their review decision- this is one of: Accepted/Needs Revisions/Rejected. Only after at least two reviewers have accepted the manuscript, and no reviewers have rejected it, can a paper go into publishing.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n8xoypxvuzi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Our Open Peer Review policy aims to enhance the trustworthiness, accountability, and collaborative spirit of the peer review process, ultimately advancing the quality and impact of scientific research.","type":"text"}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"ijgis-peer-review-process","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IJGIS Peer Review Process","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nwdi7nz9k0m","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"To ensure the publication of high-quality, original research that contributes significantly to the fields of global innovations and solutions, we employ a rigorous and transparent peer review process. This process emphasizes fairness, timeliness, and constructive feedback, with the goal of advancing scholarly dialogue and innovation.","type":"text"}]},{"type":"heading","attrs":{"id":"submission","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"1. Submission","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nupvmq4g2gq","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nnhaf8hy8ta","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Authors submit manuscripts","type":"text","marks":[{"type":"strong"}]},{"text":" through the IJGIS online pupub.org portal. Each submission must comply with the journal's guidelines, including formatting, citation style (IEEE), and ethical standards.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6yku5vf29c","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Editorial Screening","type":"text","marks":[{"type":"strong"}]},{"text":": Upon submission, the editorial team conducts an initial screening to verify that the manuscript adheres to the journal's aims and scope. Manuscripts may be returned to authors for minor formatting corrections before entering peer review.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"assignment-of-manuscript","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"2. Assignment of Manuscript","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nn6ol7nddxw","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n3xcw8virez","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Editor-in-Chief/Managing Editor Assignment","type":"text","marks":[{"type":"strong"}]},{"text":": The Editor-in-Chief or Managing Editor assigns a section editor based on the subject matter of the manuscript.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nrkx1ghiwyk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Selection of Reviewers","type":"text","marks":[{"type":"strong"}]},{"text":": The section editor invites ","type":"text"},{"text":"two to four","type":"text","marks":[{"type":"strong"}]},{"text":" reviewers who are experts in the relevant field. Reviewers may be selected from IJGIS's reviewer pool or through professional networks.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"peer-review-process","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"3. Peer Review Process","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nm9jxvmdo1w","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nl8i39ds35p","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Open Review","type":"text","marks":[{"type":"strong"}]},{"text":": IJGIS employs an open review process to ensure transparency and a collaborative research environment. ","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nizi75ui7i9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"AI-Assisted Review","type":"text","marks":[{"type":"strong"}]},{"text":": For preliminary checks, the manuscript may be reviewed using ","type":"text"},{"text":"AI tools like ChatGPT","type":"text","marks":[{"type":"strong"}]},{"text":" to assess language clarity, consistency, and adherence to structure. These AI reviews will supplement, ","type":"text"},{"text":"but not replace","type":"text","marks":[{"type":"strong"}]},{"text":", human peer reviews.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"review-timeline","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"4. Review Timeline","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"n3d843ntikj","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naocs9wxjde","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewers are expected to submit their ","type":"text"},{"text":"review within 1-2 weeks","type":"text","marks":[{"type":"strong"}]},{"text":". Reminders will be sent at the 2-week mark if a review is still pending.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nwci0aqk3ac","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The section editor monitors progress and may follow up directly with reviewers when delays occur.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"review-outcomes","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"5. Review Outcomes","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nbm8gjbrjrz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Once the reviews are received, the section editor consolidates feedback and decides the next course of action:","type":"text"}]},{"type":"ordered_list","attrs":{"id":"nxj9so5mpq9","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"noarxn0dg37","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Accept","type":"text","marks":[{"type":"strong"}]},{"text":": The manuscript is ready for publication with minimal or no changes.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1vt9l8t3gr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Need Revisions","type":"text","marks":[{"type":"strong"}]},{"text":": Changes are required. The revised manuscript undergoes another round of review by the original reviewers.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nby0ap5sny4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reject","type":"text","marks":[{"type":"strong"}]},{"text":": The manuscript is not suitable for publication in IJGIS.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"communication-with-authors","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"6. Communication with Authors","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"npbe86v8u6f","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nm2hjfhe9u6","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Decision Letter","type":"text","marks":[{"type":"strong"}]},{"text":": Authors receive a review decision detailing the reviewers’ comments and the editorial decision. ","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1t0iq3ylgc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Authors are encouraged to revise their manuscript according to feedback and resubmit within the given deadline.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"post-revision-review","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"7. Post-Revision Review","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nrbzu35jlx4","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nqtuytrrtpa","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Final Check","type":"text","marks":[{"type":"strong"}]},{"text":": If revisions are satisfactory, the section editor and the Editor-in-Chief give final approval.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nx2ld1qewkb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Additional Rounds","type":"text","marks":[{"type":"strong"}]},{"text":": If revisions do not meet the expectations of the reviewers, additional rounds of review may be initiated.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"ethics-and-conflict-of-interest","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"8. Ethics and Conflict of Interest","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nskbgttgq0o","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7ben2j4h8u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewer Declaration","type":"text","marks":[{"type":"strong"}]},{"text":": Reviewers are required to declare any potential conflicts of interest before accepting the assignment. This includes personal or professional relationships with the authors.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ncf9dd814rm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ethical Compliance","type":"text","marks":[{"type":"strong"}]},{"text":": IJGIS strictly adheres to COPE guidelines on publication ethics. Any ethical concerns raised during peer review (e.g., plagiarism, data fabrication) will be handled in coordination with the authors and relevant institutions.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"publication","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"9. Publication","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nbjg4ryhror","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nlyrjmwyn76","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Once the manuscript is accepted and all final checks are completed, it is moved into the ","type":"text"},{"text":"production phase","type":"text","marks":[{"type":"strong"}]},{"text":" where copyediting, formatting, and final proofreading take place.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nz5wz2q6bbm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The final version is published on the IJGIS platform with ","type":"text"},{"text":"open access","type":"text","marks":[{"type":"strong"}]},{"text":" model.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"additional-points","rtl":null,"level":3,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Additional Points","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nva1zfxsog8","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvzv9lwv3uj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewer Incentives","type":"text","marks":[{"type":"strong"}]},{"text":": Acknowledgment of reviewers in providing ","type":"text"},{"text":"certificates","type":"text","marks":[{"type":"strong"}]},{"text":" - IJGIS Peer Review Certificate of Completion.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"na3vh3gu8hg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"AI Integration","type":"text","marks":[{"type":"strong"}]},{"text":": As the journal grows, IJGIS aims to experiment further with AI tools for ","type":"text"},{"text":"automated reviewer matching","type":"text","marks":[{"type":"strong"}]},{"text":" and ","type":"text"},{"text":"pre-screening of submissions","type":"text","marks":[{"type":"strong"}]},{"text":" to expedite the process.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nwfmd5a96px","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The peer review process at IJGIS is designed to ensure the highest standards of scholarly rigor, constructive feedback, and transparency, while embracing innovative tools to improve the efficiency and effectiveness of the review process.","type":"text"}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nwifl331p7t","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"ijgis-peer-review-criteria","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IJGIS Peer Review Criteria","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nl1z87r1rv2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewers are asked to evaluate the manuscript based on the following:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"ncaqu1eigiz","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nc8sy2semda","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Originality","type":"text","marks":[{"type":"strong"}]},{"text":": Does the manuscript contribute new knowledge or present an innovative solution?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1sivajh0cg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Methodological Rigor","type":"text","marks":[{"type":"strong"}]},{"text":": Are the methods robust, well-described, and appropriate for the research question?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nyyrzdac2fc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Clarity and Organization","type":"text","marks":[{"type":"strong"}]},{"text":": Is the manuscript well-structured and clear?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nges66zlvsj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Theoretical Contribution","type":"text","marks":[{"type":"strong"}]},{"text":": Does the research build upon existing knowledge or introduce new theoretical insights?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ny4604hu93h","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Technical Soundness","type":"text","marks":[{"type":"strong"}]},{"text":": Is the technical execution sound, with appropriate data analysis and error-checking?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nf2krjbqg2z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Relevance and Significance","type":"text","marks":[{"type":"strong"}]},{"text":": Does the work align with the journal’s scope and hold significance for the broader community?","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nsiqxn7yde1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Subjective Expertise and Focus Areas: ","type":"text","marks":[{"type":"strong"}]},{"text":"Focus your review on the aspects of the manuscript that align most closely with your area of expertise. Provide specific insights or suggestions based on your knowledge.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nu9gjw1zvb4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Open-ended Feedback: ","type":"text","marks":[{"type":"strong"}]},{"text":"Use this to raise any other issues or thoughts you feel are important for improving the manuscript, even if not directly addressed by the criteria.","type":"text"}]}]}]},{"type":"bullet_list","attrs":{"id":"nwdd6ydiwu6","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nij6akcguzt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Potential Impact","type":"text","marks":[{"type":"strong"}]},{"text":": What is the broader potential impact of this research, both within and outside its primary field?","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n7ljt1wn7uc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewers are encouraged to provide ","type":"text"},{"text":"detailed, constructive feedback","type":"text","marks":[{"type":"strong"}]},{"text":" with suggestions for improving the manuscript.","type":"text"}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nv936bjjhr3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"detailed-guidance-on-ai-vs-human-role-in-peer-review","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Detailed Guidance on AI vs. Human role in Peer Review:","type":"text"}]},{"type":"table","attrs":{"id":"n5tmtdthnlj","size":null,"align":null,"hideLabel":false,"smallerFont":false,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nkwncc7tvvd","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Criteria","type":"text","marks":[{"type":"strong"}]}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n2gq7s1equ4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"AI Role","type":"text","marks":[{"type":"strong"}]}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nm40d83773x","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Human Role","type":"text","marks":[{"type":"strong"}]}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvsnz30lqky","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Reviewer’s Guidance","type":"text","marks":[{"type":"strong"}]}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6cnqa64t8o","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"1. Originality and Innovation","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n05snfm0m7s","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Plagiarism check: Detects overlaps with known texts or papers, ensuring no copied content.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nazz5llxewa","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Assess novelty: Determine if the research presents new ideas, approaches, or insights.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"njgxxabp2t8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Evaluate if the contribution addresses a unique problem or adds meaningful value to the literature. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Cross-check AI plagiarism reports for context—some overlaps (like common phrases) might not indicate plagiarism.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ni7s7ssp47d","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"2. Methodological Rigor","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"neeqgky8ka8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Flag missing sections: Identifies potential omissions in methods, like missing datasets or unclear variables.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n55obuk1dpn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Assess appropriateness: Determine if methods are suitable for the research question and performed correctly.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6osm4wgs2c","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Confirm the methodology aligns with best practices in the field. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Use AI's flagged sections as a checklist but apply your expertise to judge subtle flaws, like biases in sample selection.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n9xi82spv7b","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"3. Relevance to the Field","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npa7jscw21b","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Initial screening: Match keywords and scope to the journal’s focus.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nrjn3ak4xp5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Evaluate significance: Judge the importance and fit of the manuscript in the current discourse of the field.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nz4kho0sh0u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Think beyond keywords: Does this paper align with the themes of the journal? ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Consider its relevance to both academia and practical applications in the field.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1h791tbnbd","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"4. Clarity and Organization","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxcc6eoeqfv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Grammar and structure suggestions: Detects awkward phrasing, grammar issues, or unclear sections.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n22iearoxed","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"High-level feedback: Assess whether the structure logically supports the argument or research flow.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nneplh2wure","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Use AI’s grammar suggestions to refine the text but focus more on logic and readability. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Provide feedback on how to improve the flow between sections (e.g., introduction to conclusion).","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nipp0qbyhz5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"5. Theoretical and Practical Contributions","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"noam603zpjk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Summarize references and related works: Highlight key works cited and suggest additional references based on trends.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"neelodmilry","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Analyze contributions: Assess whether the work builds on existing theories or introduces practical solutions.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvfs30rpgfe","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Check if the paper advances knowledge or offers innovative solutions. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Compare the findings to the AI-suggested related works but ensure the authors present a unique perspective.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"najsika5u74","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"6. Subjective Expertise and Focus Areas","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naxvp8jnq4f","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"None","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nt3ftwpntln","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Provide insights from your expertise: Focus on areas of the manuscript most relevant to your knowledge and interests.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nreciaxhvg5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Focus on specialized areas: Are there specific issues with methods, theories, or interpretations that you spot? ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Your unique insights are valuable and not replicable by AI—trust your intuition.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npbduxy4b3w","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"7. Open-ended Feedback","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nb4w79mtifz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"None","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nomqql8q1ok","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Offer creative, intuitive suggestions: Go beyond the structured criteria to provide additional, thoughtful feedback.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nd5wspc6auf","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Identify hidden weaknesses or opportunities for improvement. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Encourage the authors where appropriate and suggest alternative perspectives or future directions.","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nbstc9do6nr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"8. Potential Impact","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ntvefyv2i6b","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Highlight trends and topics: Suggests emerging themes based on keyword patterns.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nyptgatji1m","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Evaluate real-world impact: Judge how the work can influence practice, policy, or further research.","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nusmzi9ymmi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"- Use AI trends as guidance, but trust your judgment in predicting the paper’s true potential. ","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"- Consider interdisciplinary applications that AI might not recognize.","type":"text"}]}]}]}]},{"type":"paragraph","attrs":{"id":"nbjt0i45ult","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T20:26:38.828Z"},{"id":"4e71684d-a47b-4e48-9fcd-f46e562934c4","title":"Repository","slug":"repository","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"cw85pmry","layout":[{"id":"tb1i8zhq","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"heading","attrs":{"id":"repository-policy-for-preprints-advance-manuscripts-and-versions-of-record","rtl":null,"level":4,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Repository Policy for Preprints, Advance Manuscripts, and Versions of Record","type":"text"}]},{"type":"paragraph","attrs":{"id":"nljo5rowv2r","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Introduction","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nf6sml242fj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"This repository policy outlines the guidelines for the submission and management of preprints, advance manuscripts, and versions of record within our repository. Our aim is to support the dissemination of research findings at various stages of the publication process while ensuring proper attribution and adherence to copyright and licensing requirements.","type":"text"}]},{"type":"paragraph","attrs":{"id":"njzoys3b62o","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Definitions","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nuk05dmx6vu","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n0ihihttscf","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Preprints","type":"text","marks":[{"type":"strong"}]},{"text":": Manuscripts that have not yet undergone peer review or formal publication in a journal.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nyumqntbykg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Advance Manuscripts","type":"text","marks":[{"type":"strong"}]},{"text":": Manuscripts that have been peer-reviewed and accepted for publication but have not yet undergone final editing, formatting, and publication.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naov51p1yfi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Versions of Record","type":"text","marks":[{"type":"strong"}]},{"text":": The final published version(s) of manuscripts, including all editing, formatting, and publication enhancements.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"niw3xl5xe55","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submission Guidelines","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"ndn9pjz3g9l","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ncos2mw3y5q","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Eligibility","type":"text","marks":[{"type":"strong"}]},{"text":": Submissions must be original research, reviews, or other scholarly works that contribute to the field of study.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nf8iusgmvgc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Authorship","type":"text","marks":[{"type":"strong"}]},{"text":": All authors must be accurately listed and have approved the submission.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ngue3k1n3tw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Licensing","type":"text","marks":[{"type":"strong"}]},{"text":": Submissions must comply with the licensing agreements of the respective publishers. Authors must have the right to deposit their work in the repository.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nwypyq953q1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"File Formats","type":"text","marks":[{"type":"strong"}]},{"text":": Accepted file formats are formatted text documents, along with any supplementary materials in their appropriate formats.","type":"text"}]}]}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nyx1uqvgkds","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Preprints","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"n9lyrrsr2vj","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"noay13iofj9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submission","type":"text","marks":[{"type":"strong"}]},{"text":": Authors are encouraged to submit preprints to facilitate early dissemination of research findings.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n5d6svc4yh9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Attribution","type":"text","marks":[{"type":"strong"}]},{"text":": Preprints must include a statement indicating that the manuscript has not been peer-reviewed and is a preliminary version.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nuqggu8clcz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Updates","type":"text","marks":[{"type":"strong"}]},{"text":": Authors may request updating of preprints with revised versions as the manuscript progresses through the publication process.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n4kqwzdq4tt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Withdrawal","type":"text","marks":[{"type":"strong"}]},{"text":": Preprints may be withdrawn by the authors, if necessary, with an explanation provided.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nfgf0itoz43","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Advance Manuscripts","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"nw5gi4fick1","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n8rx0ftzuav","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submission","type":"text","marks":[{"type":"strong"}]},{"text":": Advance manuscripts may be submitted once they have been accepted for publication but are awaiting final processing.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n16t0g0smb4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Attribution","type":"text","marks":[{"type":"strong"}]},{"text":": Advance manuscripts must include a statement indicating their status.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n260gvl4n5o","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Updates","type":"text","marks":[{"type":"strong"}]},{"text":": Authors may request updating of advance manuscripts with the version of record once available.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nxd9cvf68z6","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Versions of Record","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"n0gbdcjamzo","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naoo3nqej52","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submission","type":"text","marks":[{"type":"strong"}]},{"text":": Authors may submit versions of record following the final publication of their manuscripts.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nl7ehujfies","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Attribution","type":"text","marks":[{"type":"strong"}]},{"text":": Versions of record must include full citation details.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n2guco58xyp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Compliance","type":"text","marks":[{"type":"strong"}]},{"text":": Submissions must comply with the publisher’s policy on self-archiving and repository deposit.","type":"text"}]}]}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"n1rpauu5em3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Copyright and Licensing","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"nuq7rnellry","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nwfpe15q86s","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Retention of Rights","type":"text","marks":[{"type":"strong"}]},{"text":": Authors retain the rights to their preprints and advance manuscripts. Versions of record are subject to the publisher’s copyright policy.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n8lncbisccf","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Licensing","type":"text","marks":[{"type":"strong"}]},{"text":": Authors must select an appropriate open-access license for their submissions, such as Creative Commons licenses, in accordance with the publisher’s policies.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n1bymchmac3","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Review and Curation","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"nv2u0ju5hcx","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nx40zj7w4gv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Review Process","type":"text","marks":[{"type":"strong"}]},{"text":": All submissions will undergo a review process to ensure compliance with repository policies.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvmsia4g45v","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Curation","type":"text","marks":[{"type":"strong"}]},{"text":": Repository staff will curate submissions to enhance discoverability and accessibility.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nr19sf4mmys","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Accessibility","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":"n2hzv66zqhn","rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nz600n0twgp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Open Access","type":"text","marks":[{"type":"strong"}]},{"text":": The repository supports open access to all submitted materials to promote wide dissemination of research findings.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n8nt4ubvacm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Preservation","type":"text","marks":[{"type":"strong"}]},{"text":": The repository will ensure long-term preservation of submitted materials in the Internet Archive.","type":"text"}]}]}]},{"type":"horizontal_rule","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nb3vi2n6ygr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Contact and Support","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"ne21at59yp9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"For questions or support regarding submissions, authors may contact at editor@ijgis.org.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nei73qqvmsg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Policy Updates","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n6qh6rzdjqj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"This policy will be reviewed periodically and may be updated to reflect changes in best practices and publisher policies.","type":"text"}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-07-07T21:04:22.022Z"},{"id":"b7a831f6-575c-4e4d-9608-6193019bb65a","title":"In-Kind Donation Acknowledgement","slug":"donation-acknowledgement-letter","description":"","avatar":null,"isPublic":true,"isNarrowWidth":null,"viewHash":"e1akg8xr","layout":[{"id":"z848p2r5","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nfn0tdm4p5g","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The New World Foundation","type":"text","marks":[{"type":"strong"}]},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"2009 196th St SE","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"Bothell WA 98012","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"10/13/2024","type":"text"}]},{"type":"paragraph","attrs":{"id":"nkf0cxtn5cs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Dear Contributors,","type":"text"}]},{"type":"paragraph","attrs":{"id":"n7ek445z5q2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"On behalf of ","type":"text"},{"text":"The New World Foundation","type":"text","marks":[{"type":"strong"}]},{"text":", we sincerely thank you for your generous contribution of scholarly works. Your contributions include the following papers:","type":"text"}]},{"type":"paragraph","attrs":{"id":"n2zg6j8tsyn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"List of Papers:","type":"text","marks":[{"type":"strong"}]},{"text":" ","type":"text"},{"text":"https://ijgis.pubpub.org/publications","type":"text","marks":[{"type":"link","attrs":{"href":"https://ijgis.pubpub.org/publications","title":null,"target":"_blank","pubEdgeId":null}}]}]},{"type":"paragraph","attrs":{"id":"nlyqujplrrs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"These works reflect the exceptional expertise and efforts of all contributors. Your donations are crucial to advancing our mission of being a vital platform for scholars, practitioners, policymakers, and activists from diverse disciplines to share and disseminate their findings.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nsacwgkuuku","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Please note:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n40jpfuci0d","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n67bh6tkikx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"As required by the IRS, no goods or services were provided in exchange for these contributions.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ny481bzw6yc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Your donation will be accounted for in accordance with our nonprofit's reporting and in-kind contribution policies.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n4z8by7vyjn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"For your records:","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":"nyie2fvjsbm","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nsp3474ooj5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nonprofit EIN:","type":"text","marks":[{"type":"strong"}]},{"text":" 93-4074368","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nyamklmgrwb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Thank you for your continued support. We are honored to benefit from your expertise and look forward to making these valuable contributions available to the community.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n5ihlafzzhr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sincerely,","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"Saurav Bhattacharya","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"President","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"The New World Foundation","type":"text","marks":[{"type":"strong"}]}]}]},"align":"left"}}],"layoutAllowsDuplicatePubs":false,"createdAt":"2024-10-13T22:39:47.795Z"}],"collections":[{"id":"2d75e35f-7ff6-45a2-9006-a98a2696424d","title":"IJGIS December 2024","slug":"ijgis-december-2024","avatar":"https://assets.pubpub.org/med6mnjy/ijgis-21733698576955.png","isRestricted":true,"isPublic":true,"viewHash":"qz3ocyk9","editHash":"banm1dmk","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.2d75e35f","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"jf9ukn1n","type":"collection-header","content":{}},{"id":"yco53m9u","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"a5b07446-9746-43ab-b10b-3397ed065f9a","crossrefDepositRecordId":"5423d0d8-42f6-48f1-bdce-c7f07921f7cf","createdAt":"2024-12-08T22:55:38.728Z","updatedAt":"2024-12-08T22:56:56.922Z","members":[]},{"id":"cf66b349-57a8-46db-b34b-c8a70601b653","title":"IJGIS July 2024","slug":"ijgis-july-2024","avatar":"https://assets.pubpub.org/pnhwxm33/ijgis-71720991312622.png","isRestricted":true,"isPublic":true,"viewHash":"waa4k3r0","editHash":"d0pwxssn","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.cf66b349","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"jycifj9l","type":"collection-header","content":{}},{"id":"9y78ugyb","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"6dc79c61-7676-464a-bc57-7e67cab2d056","crossrefDepositRecordId":"5182bec2-acd9-4f34-82d2-145a4c398b6c","createdAt":"2024-06-30T00:22:56.048Z","updatedAt":"2024-08-22T01:52:10.660Z","members":[]},{"id":"b1472e45-1c96-4d43-a3e8-aba2506c45e1","title":"IJGIS Spring of 2025 Conference","slug":"ijgis-spring-of-2025-conference","avatar":null,"isRestricted":true,"isPublic":true,"viewHash":"r8mti0o5","editHash":"xgu9bfo5","metadata":{},"kind":"conference","doi":null,"readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"wbqgwzj5","type":"collection-header","content":{"hideDate":false,"hideByline":false,"hideContributors":false}},{"id":"4piigu3g","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"image","attrs":{"id":"nh6u09432kl","url":"https://assets.pubpub.org/vx0wzk30/icgis-01739135623406.png","href":null,"size":100,"align":"center","altText":"","caption":"","hideLabel":false,"suggestionId":null,"fullResolution":false,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}}]},"align":"left"}},{"id":"cqg0mx4z","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7yqmvsvht4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The ","type":"text"},{"text":"International Conference on Global Innovations and Solutions ","type":"text","marks":[{"type":"strong"}]},{"text":"(ICGIS) Spring 2025 held in collaboration with ","type":"text"},{"text":"Springer Nature ","type":"text","marks":[{"type":"strong"}]},{"text":"is a premier forum for researchers, academics, and industry professionals to present cutting-edge ideas and solutions addressing critical global challenges. This year's conference emphasizes innovation in interdisciplinary research and applications, showcasing transformative ideas across diverse domains.","type":"text"}]},{"type":"heading","attrs":{"id":"event-focus","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Event Focus:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n8isaah2ufi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Call for Papers (CFP):","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"no2smac8ejd","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The conference invites high-quality submissions to ","type":"text"},{"text":"Springer Nature","type":"text","marks":[{"type":"strong"}]},{"text":" on topics including (but not limited to):","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nnrbi0n2iks","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ne1jg5hodq0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sustainable urban development and smart cities","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nfn1r38bymp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Climate change adaptation and geospatial solutions","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndmbmlaht1q","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Artificial Intelligence in solving global-scale challenges","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ntx22ec8gr1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Advances in renewable energy technologies","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nv3gg3tnkwy","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Data-driven policymaking for global resilience","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n71ejv0mw3s","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Innovation in health, education, and societal development","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n0wglwysgrs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cybersecurity and digital trust in global systems","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"n7zrc4qkw2h","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Expert Talks:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nu4igjbr3ni","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Selected papers will be featured in presentations during the conference, offering authors a platform to share impactful ideas and foster discussions on transformative global solutions. They will be published in ","type":"text"},{"text":"Springer Nature","type":"text","marks":[{"type":"strong"}]},{"text":".","type":"text"}]},{"type":"paragraph","attrs":{"id":"n7xss68ihr5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Networking Opportunities:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nxvgkxha2u0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"ICGIS will connect thought leaders and innovators, providing a collaborative environment for interdisciplinary knowledge sharing.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n4ssbh770th","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"call-for-submissions","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Call for Submissions","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n2fat3alrge","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Theme: Shaping Tomorrow Through Innovation and Collaboration","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nt489qz3dnf","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The ICGIS Spring 2025 Conference invites researchers, academics, and industry professionals to submit high-quality, original work addressing critical global challenges and proposing transformative solutions. We welcome submissions across disciplines that align with the conference's goal of fostering innovation and delivering actionable insights. ","type":"text"}]},{"type":"paragraph","attrs":{"id":"n62c98dyo72","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Enter your abstract(s) here:","type":"text","marks":[{"type":"em"}]},{"text":" ","type":"text","marks":[{"type":"strong"}]},{"text":"https://sessionize.com/ijgis-spring-of-2025-conference","type":"text","marks":[{"type":"link","attrs":{"href":"https://sessionize.com/ijgis-spring-of-2025-conference","title":null,"target":null,"pubEdgeId":null}}]},{"text":" ","type":"text"}]},{"type":"paragraph","attrs":{"id":"nigbox2ut29","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"nc77ta7nyqk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Key Topics of Interest","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n0td5hr6i1r","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submissions are encouraged (but not limited) to the following topics:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"ny2c0ahmsus","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nmj8ed0lt7l","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sustainable Solutions: Urban development, renewable energy, and resource management","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n12ewbfb51x","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Artificial Intelligence & Machine Learning: Applications for global problem-solving","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nrg2dw34vgr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Climate Change: Geospatial solutions for mitigation and adaptation","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nnildfcjxt2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Healthcare Innovation: Technology for global health equity","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ngy2pph7uld","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Cybersecurity: Advancing digital trust and identity","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nchd0l48pny","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Data-Driven Policy: Insights into governance and societal resilience","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"niqjjrc42vi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"We encourage interdisciplinary submissions that address the intersection of these fields.","type":"text"}]}]}]},{"type":"heading","attrs":{"id":"submission-guidelines","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"marks":[{"type":"strong"}]},{"text":"Submission Guidelines","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n98nc7u3ad0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Accepted abstract entries will be followed up with invite to submit papers","type":"text","marks":[{"type":"em"}]},{"text":". All papers will go through ","type":"text"},{"text":"single-blind ","type":"text","marks":[{"type":"strong"}]},{"text":"peer review process. All papers must be formatted according to Springer’s conference proceedings guidelines. Detailed information about paper formatting and submission can be found here:","type":"text"}]},{"type":"paragraph","attrs":{"id":"ntxa3gjjfk5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"https://www.springer.com/gp/authors-editors/conference-proceedings/conference-proceedings-guidelines","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.springer.com/gp/authors-editors/conference-proceedings/conference-proceedings-guidelines","title":null,"target":"_blank","pubEdgeId":null}}]},{"text":" ","type":"text"}]},{"type":"paragraph","attrs":{"id":"nj019qvt9ea","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Submissions will undergo a rigorous peer-review process. Accepted papers will be published in the conference proceedings and made available to attendees.","type":"text"}]},{"type":"paragraph","attrs":{"id":"ni4ngcpcr9a","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"heading","attrs":{"id":"organizing-committee","rtl":null,"level":2,"fixedId":"","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Organizing Committee","type":"text"}]},{"type":"paragraph","attrs":{"id":"njrlcblhjfn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Program Chair","type":"text","marks":[{"type":"strong"}]},{"text":": Saurav Bhattacharya, ","type":"text"},{"text":"Editor-in-Chief, International Journal of Global Innovations and Solutions (IJGIS)","type":"text","marks":[{"type":"em"}]}]},{"type":"paragraph","attrs":{"id":"n5ebogca5nc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Program Committee","type":"text","marks":[{"type":"strong"}]},{"text":": ","type":"text"}]},{"type":"table","attrs":{"id":"nu94hbfln4c","size":null,"align":null,"hideLabel":false,"smallerFont":false,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n22sgqkpbeh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Balkrishna Patil","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndr6bhxumf5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"bm19875@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n0o3sj2ccwi","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE an ISACA Sacramento","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6fi061kg2u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Pravin Pandey","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"np2wb6ss3dg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"pravin797@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"np2yy3ejdth","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE New Jersey","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6rxinvr8xe","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Dipankar Saha","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nulbn0oe645","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"dipsaha.ias@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nczcxxzo4lu","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Twin Cities","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nntycickswr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Jitender Jain","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nd1onao5r5i","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"jitenderjain@ieee.org","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n2rgt2bi326","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Dallas","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nagi3rlo9k1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Karan Alang","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nampxvnpvlf","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"karan.alang@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nw7uq17c4ea","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Bay Area","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"no2z99uott0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nikhil Kassetty","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nw1cls710o8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"nikhil.kassetty.tech@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7ho2oul116","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Atlanta","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nt5rm0x07vc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Padma Naresh Vardhineedi","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npbquabsq5q","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"PadmanareshVardhineedi@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nl2b1mil8po","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sr Member","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nynrsox0pr4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sudeep Acharya","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n26ff8m27dq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"sudeep.acharya123@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nh6xu3crtja","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Sr Member, Philadelphia, PA","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"noo13o2xe0h","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Anuj Tyagi","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n0e0vlrwqfc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"anujtyagi.inbox@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ne59zywz9lh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Delaware","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nqn90ym3aii","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Srinivas Chippagiri","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n11nevo5ga4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"cvas22@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nfi52xnqltz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Seattle","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n98h40vkf8v","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Lakshman Jamili","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n29ngihbyjk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Lakshman.techmind@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n8lts603925","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE DALLAS","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ng52836zmoh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Aparna Krishna Bhat","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nw1y8vafmgm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"bhat_aparna1@yahoo.co.in","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7ex2pc4nap","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"EY USA, IEEE Atlanta","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvmhs8177ds","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Kusumakumari Vanteru","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7p9zgbr5gn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"kusuma95@yahoo.co.in","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nkszie60cda","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Bay Area","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nd2ht7iu8rw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sheshananda Reddy Kandula","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n89xpvci1dl","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"sheshananda4u@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndlogms2yz1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Sr Member","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nlbfl4svn4n","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Medha Gupta","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n7qqaiztemp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"medha.gupta.860@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n802tdj6zob","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Sr Member","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nw7yncjw0c1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Rahul Bagai","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6tjwunbv70","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"rahulbagai@ieee.org","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nxt06fho5m4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Sr Member, Seattle, WA","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n286d794lnr","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sandeep keshetti","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nogbmt9jbqt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sandeep.keshetti@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nkx4cxidsgc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Austin","type":"text"}]}]}]},{"type":"table_row","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n8upg5zvo8u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sathyanarayanan Sayiram","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":[368],"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1aw2e55ja1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"balajisai2005@gmail.com","type":"text"}]}]},{"type":"table_cell","attrs":{"colspan":1,"rowspan":1,"colwidth":null,"background":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1ixg0pkj10","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"IEEE Member","type":"text"}]}]}]}]},{"type":"paragraph","attrs":{"id":"nja2va40ygm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"type":"paragraph","attrs":{"id":"np2bnmfk4ti","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}}]},"align":"left"}},{"id":"1972ddm3","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"medium"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"36af3568-db37-4bb0-8726-801f9697e891","crossrefDepositRecordId":null,"createdAt":"2025-01-25T20:42:49.430Z","updatedAt":"2025-02-15T23:09:23.420Z","members":[]},{"id":"3c58f1fc-ad9b-4ca3-ad6e-c9895e245edd","title":"IJGIS January 2025","slug":"ijgis-january-2025","avatar":"https://assets.pubpub.org/8vhgjahi/ijgis-61735795174927.png","isRestricted":true,"isPublic":true,"viewHash":"lckyyx8p","editHash":"uzd7ofhb","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.3c58f1fc","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"ly4uo63d","type":"collection-header","content":{}},{"id":"z9pyzpym","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":true,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"55e59bf1-8c9b-404f-aa9d-aa5272b462dd","crossrefDepositRecordId":"b11bec4b-64d1-4efd-8673-de9313b53b30","createdAt":"2025-01-02T05:19:24.226Z","updatedAt":"2025-01-02T05:20:12.625Z","members":[]},{"id":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","title":"IJGIS April 2024","slug":"ijgis-april-2024","avatar":"https://assets.pubpub.org/mebnzll6/ijgis-31719106059925.png","isRestricted":false,"isPublic":true,"viewHash":"yrq1re9j","editHash":"bharfngz","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.6d5d7a1f","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"eaqut1ig","type":"collection-header","content":{}},{"id":"hhnf70md","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"2a210ecd-0ed6-423e-bf75-8d6aaf105812","crossrefDepositRecordId":"0b879e42-ab3d-486c-850b-c0ea9905cf1b","createdAt":"2024-04-15T03:53:36.589Z","updatedAt":"2024-06-23T01:27:51.642Z","members":[]},{"id":"ef752e32-e979-47fe-875c-d1d03d79e073","title":"IJGIS October 2024","slug":"ijgis-october-2024","avatar":"https://assets.pubpub.org/dmu5ow0x/ijgis-61722532206776-41730445705865.png","isRestricted":true,"isPublic":true,"viewHash":"1yieswxt","editHash":"dzonz9po","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.ef752e32","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"a74ryky9","type":"collection-header","content":{}},{"id":"yc6usxpv","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"d12c4431-a1f6-4717-8993-2b16fb9c4ef6","crossrefDepositRecordId":"b32bb4f6-c26d-45ae-b023-492085efa268","createdAt":"2024-10-01T23:45:04.583Z","updatedAt":"2024-11-01T07:22:35.212Z","members":[]},{"id":"3afb9f9d-9eeb-4288-9394-7716163989a3","title":"IJGIS August 2024","slug":"ijgis-august-2024","avatar":"https://assets.pubpub.org/5y90qe0e/ijgis-61722532206776.png","isRestricted":true,"isPublic":true,"viewHash":"9a0p1zto","editHash":"ewckye79","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.3afb9f9d","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"nft5wnh5","type":"collection-header","content":{}},{"id":"rnl9q1ma","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"64be7ee2-85ff-4557-830c-c44abeb0e199","crossrefDepositRecordId":"1d9c6ce6-f779-41f5-a8a9-c606580f0865","createdAt":"2024-08-01T17:09:57.271Z","updatedAt":"2024-08-01T17:11:07.510Z","members":[]},{"id":"13a19d86-67a4-43cc-b390-79bfbd233d46","title":"IJGIS May 2024","slug":"ijgis-may-2024","avatar":"https://assets.pubpub.org/0rf4l1vr/ijgis-21719106082884.png","isRestricted":true,"isPublic":true,"viewHash":"le85c2ql","editHash":"nu127igp","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.13a19d86","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"y0b8magc","type":"collection-header","content":{}},{"id":"tmvabe08","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"f91ecab4-1065-4631-8407-00f21bf10389","crossrefDepositRecordId":"960898ab-890b-4f00-a70e-4803cdf93254","createdAt":"2024-04-20T19:38:04.563Z","updatedAt":"2024-06-23T01:28:07.976Z","members":[]},{"id":"1bf5de82-f888-4d36-ae74-614e7464fd67","title":"IJGIS Fall of 2024 Conference","slug":"ijgis-fall-2024-conference","avatar":"https://assets.pubpub.org/7d0d216i/ijgis-71728422457108.png","isRestricted":true,"isPublic":true,"viewHash":"rdle77nd","editHash":"y95nrtsf","metadata":{},"kind":"conference","doi":"10.21428/e90189c8.1bf5de82","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"hh5sb9sn","type":"collection-header","content":{}},{"id":"c3u047sz","type":"banner","content":{"text":"IJGIS FALL 2024 Virtual Tech Conference","align":"center","buttonUrl":"","buttonText":"","buttonType":"none","showButton":false,"backgroundSize":"full","backgroundColor":"#3275d8","backgroundImage":"https://assets.pubpub.org/0zjh8ogc/DALL·E 2024-09-08 11.20.18 - A futuristic virtual tech conference poster with a cyberpunk theme. The central text should read 'IJGIS FALL 2024 Virtual Tech Conference'. The theme -31725819672825.webp","backgroundHeight":"tall","defaultCollectionIds":[]}},{"id":"rv5gmgpf","type":"html","content":{"html":"<h1>Talk Recordings</h1>\n\n<a href=\"https://drive.google.com/file/d/1H9vnaywuu9cR9Rot8zO6Jl9ngho3VifO/view?usp=sharing\">Keynote speech (Saurav Bhattacharya)</a>\n<br/>\n\n<a href=\"https://drive.google.com/file/d/1lUr9FFMm78abRGYzB9wDzf5iCBII8Smc/view?usp=sharing\">Building Resilient Systems Through Observability (Sumit Dahiya)</a>\n<br/>\n\n<a href=\"https://drive.google.com/file/d/19z7kDr8XimGRBL1Dywhh-GkucWxl50VP/view?usp=sharing\">AI in Finance optimization: A review of current technologies and future potential (Piyush Ranjan)</a>\n<br/>\n\n<a href=\"https://drive.google.com/file/d/14Ifyb5OeXhHDEJrpODjXpyNbgJWPvZPy/view?usp=sharing\">Integrating blockchain with telematics for transparent data sharing in supply chain (Prateek Shrivastava)</a>\n<br/>\n\n<a href=\"https://drive.google.com/file/d/1a5V1xf3j4yMFgr30wImAcDrz2iNQB2H0/view?usp=sharing\">Data Security & Privacy in Healthcare (Suryaprakash Nalluri)</a>\n<br />\n\n<a href=\"https://drive.google.com/file/d/1APINU4QPs-C7jrZpFup0P64hAQLi4zPW/view?usp=sharing\">LLM Orchestration Frameworks for Enterprise AI Applications (Rajesh Malviya)</a>\n<br />\n\n<a href=\"https://drive.google.com/file/d/1S7Vf1F-f_dLbHDx9jfKxT3zS4G9yLXiI/view?usp=sharing\">Ethics & Responsible AI in Healthcare (Fardin Quazi)</a>\n<br/>\n\n<a href=\"https://drive.google.com/file/d/1tiut4yYb-Kul18DKJo0LBrKJuxS0XRSN/view?usp=sharing\">Final words (Saurav Bhattacharya)</a>\n<br />"}},{"id":"6e3p2qwf","type":"pubs","content":{"sort":"publish-date","title":"Presented papers","collectionIds":["1bf5de82-f888-4d36-ae74-614e7464fd67"],"pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"6eec81b3-f429-4ffc-ae50-6b0c849b9775","crossrefDepositRecordId":"409bf463-f83b-46b4-a62f-ee1414d5647b","createdAt":"2024-09-04T19:45:27.799Z","updatedAt":"2024-10-08T23:43:29.720Z","members":[]},{"id":"8db336b3-82a0-4f59-a8fa-48f6519d9e88","title":"IJGIS November 2024","slug":"ijgis-november-2024-2","avatar":"https://assets.pubpub.org/snappefy/ijgis-61722532206776-71730445636648.png","isRestricted":true,"isPublic":true,"viewHash":"rrtlmqc4","editHash":"8mpj05gy","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.8db336b3","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"csokmjq6","type":"collection-header","content":{}},{"id":"hlmkan5p","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"medium"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"c98d76ba-830d-42fc-af01-841b393cb996","crossrefDepositRecordId":"1a86e977-8a2f-4518-b69b-b959fb1c9739","createdAt":"2024-11-01T07:20:03.101Z","updatedAt":"2024-11-01T07:20:39.021Z","members":[]},{"id":"f55d7aa5-2b86-4d7e-9096-72a3895f7cc5","title":"IJGIS Summer of 2024 Conference","slug":"ijgis-summer-2024-conference","avatar":"https://assets.pubpub.org/lbv3ff5c/ijgis-71728422461000.png","isRestricted":true,"isPublic":true,"viewHash":"ojmh11ti","editHash":"imoliiuv","metadata":{},"kind":"conference","doi":"10.21428/e90189c8.f55d7aa5","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"4vz1oh9q","type":"collection-header","content":{}},{"id":"bqlsitpu","type":"banner","content":{"text":"","align":"center","buttonUrl":"","buttonText":"","buttonType":"none","showButton":false,"backgroundSize":"standard","backgroundColor":"#ffffff","backgroundImage":"https://assets.pubpub.org/yr86wm20/ijgisummer2024_2-51717294217467.png","backgroundHeight":"tall","defaultCollectionIds":[]}},{"id":"dtgvuqbz","type":"html","content":{"html":"<a target=\"_blank\" href=\"https://drive.google.com/file/d/1WGbIzO2opdfYV1SSJM6fYDH_6iv7RsPH/view?usp=sharing\">\nAyisha Tabbassum - The Impact of AI on Future Employment Patterns\n</a>\n<br />\n<a target=\"_blank\" href=\"https://drive.google.com/file/d/16AOU86vhB2pEuU3tmG36jcbljgyaU0Wb/view?usp=sharing\">\nRaj Mehta - Edge Computing: Use Cases in Manufacturing and IoT\n</a>\n<br />\n<a target=\"_blank\" href=\"https://drive.google.com/file/d/1eydqitCiP1kZUrlHOYZa55Q-068kEOZv/view?usp=sharing\">\nBharath Bhushan - Data Security and Storage Administration with Dynamic Encryption Key Management\n</a>\n<br />\n<a target=\"_blank\" href=\"https://drive.google.com/file/d/1HPfvkbcKK03LoNYvwozRLClLbxLouWJl/view?usp=sharing\">\nDileep Pandiya - AI and Organizational Transformation: Navigating the Future\n</a>\n<br />\n<a target=\"_blank\" href=\"https://drive.google.com/file/d/1_LccLG57cpAdMSLKbKvNvuZkfew1cJp0/view?usp=sharing\">\nPiyush Ranjan - Compliance and Regulatory Challenges in Cloud Computing: A Sector-Wise Analysis\n</a>\n<br />\n<a target=\"_blank\" href=\"https://drive.google.com/file/d/1gS6_bWaJazzQqR6APWB44g7Kx1NTxVC4/view?usp=sharing\">\nGaurav Deshmukh - Low Code No Code Automation: The Hard Parts\n</a>"}},{"id":"d20lgsyi","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"medium"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"a4ee5fa2-79bc-4d0f-8caf-11229e11a7d0","crossrefDepositRecordId":"6646084d-1967-4575-a612-a2eebf5252c6","createdAt":"2024-05-17T06:49:37.322Z","updatedAt":"2024-10-08T21:21:04.164Z","members":[]},{"id":"16d9d435-9cc3-41fd-b3ec-b23edb0a8f23","title":"IJGIS June 2024","slug":"ijgis-june-2024","avatar":"https://assets.pubpub.org/j0jpintr/ijgis-61719106073963.png","isRestricted":true,"isPublic":true,"viewHash":"stxwnbp0","editHash":"qczgoudw","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.16d9d435","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"fidh43f6","type":"collection-header","content":{}},{"id":"xjqfda8d","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"59bb1e66-b85e-4199-a246-a762dba0da59","crossrefDepositRecordId":"be5fd4de-4a98-4119-8653-952c1f87bcc7","createdAt":"2024-05-26T12:17:49.870Z","updatedAt":"2024-07-02T04:54:29.980Z","members":[]},{"id":"ca0cba26-0323-404f-be9b-b367112886b9","title":"IJGIS September 2024","slug":"ijgis-september-2024","avatar":"https://assets.pubpub.org/8mhsb4kl/ijgis-61728422426805.png","isRestricted":true,"isPublic":true,"viewHash":"hmn040kg","editHash":"dzyt8qax","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.ca0cba26","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"sij6ez4l","type":"collection-header","content":{}},{"id":"23khcf6x","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"5de7e781-7016-4084-8700-a2c899d49ef3","crossrefDepositRecordId":"84d1db0d-4718-4b9a-8022-1b5279b9f9b8","createdAt":"2024-09-06T02:54:38.695Z","updatedAt":"2024-10-08T21:20:30.591Z","members":[]},{"id":"633a72ee-a898-4cb5-9a23-bdcb2bae6c9e","title":"Online Registration Systems","slug":"online-registration-systems","avatar":null,"isRestricted":true,"isPublic":true,"viewHash":"frmisvo8","editHash":"ow6pediz","metadata":{},"kind":"book","doi":null,"readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"4x62q8ji","type":"collection-header","content":{}},{"id":"4ka9cd8b","type":"pubs","content":{"sort":"collection-rank","title":"Table of Contents","pubPreviewType":"medium"}},{"id":"iteu10af","type":"text","content":{"text":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Preface","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Introduction to Online Registration Systems","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Target Audience","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"How to Use This Book","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Part I: Fundamentals of Online Registration Systems","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":1,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Overview of Online Registration Systems","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Definition and Scope","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Evolution and Current Trends","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Key Components and Architecture","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Software Engineering Principles for Registration Systems","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Design Patterns and Best Practices","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"System Modularity and Scalability","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Code Quality and Maintenance","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"User Interface and User Experience","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Designing Intuitive Interfaces","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Accessibility and Inclusivity in Design","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Frontend Technologies Overview","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Part II: Security and Compliance","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"4. ","type":"text"},{"text":"Cybersecurity Fundamentals","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Threat Models in Registration Systems","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Data Protection and Encryption Techniques","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Authentication and Authorization Mechanisms","type":"text"}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":5,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Compliance and Privacy","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Understanding GDPR, HIPAA, and Other Regulations","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Implementing Compliance in Registration Systems","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Privacy by Design","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Part III: Advanced System Design","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"6. ","type":"text"},{"text":"Database Design and Data Engineering","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Choosing the Right Database: SQL vs. NoSQL","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Data Integrity and Transaction Management","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Big Data Analytics and Insights","type":"text"}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":7,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Integrating AI and Machine Learning","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Enhancing User Experience with AI","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Fraud Detection using Machine Learning","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Predictive Analytics in User Registration","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"DevOps for Online Systems","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Continuous Integration and Continuous Deployment (CI/CD)","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Infrastructure as Code (IaC)","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Monitoring and Logging","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Part IV: Cloud Infrastructure and Scalability","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"9. ","type":"text"},{"text":"Deploying to the Cloud","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Cloud Service Models: IaaS, PaaS, SaaS","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Choosing a Cloud Provider: AWS, Azure, Google Cloud","type":"text"}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"· Security Considerations in the Cloud","type":"text"}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":10,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Scaling and Performance Optimization","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Load Balancing Techniques","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Auto-scaling and Resource Management","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Performance Benchmarks and Optimization Strategies","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Part V: Emerging Trends and Future Outlook","type":"text","marks":[{"type":"strong"}]}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":11,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Innovations in Registration Technologies","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Blockchain for Enhanced Security and Transparency","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The Role of IoT in User Registration","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Emerging UI/UX Trends","type":"text"}]}]}]}]}]},{"type":"ordered_list","attrs":{"id":null,"rtl":null,"order":12,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The Future of Online Registration Systems","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Predictions and Upcoming Challenges","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The Role of Quantum Computing in Cybersecurity","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sustainable Practices in System Design","type":"text"}]}]}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Appendix","type":"text","marks":[{"type":"strong"}]}]},{"type":"bullet_list","attrs":{"id":null,"rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"A. Resources and Further Reading","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"B. Glossary of Terms","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"C. Index","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":null,"rtl":null,"class":"MsoNormal","textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":" ","type":"text"}]}]},"align":"left"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"03e83904-dec6-4a18-bfb0-3ef7db6e18f8","crossrefDepositRecordId":null,"createdAt":"2024-04-27T01:35:35.744Z","updatedAt":"2024-04-27T01:44:07.733Z","members":[]}]},"loginData":{"id":null},"locationData":{"hostname":"ijgis.pubpub.org","path":"/pub/7drcnfbc/release/1","params":{"pubSlug":"7drcnfbc","releaseNumber":"1"},"query":{},"queryString":"?","isDashboard":false,"isBasePubPub":false,"isProd":true,"isDuqDuq":false,"isQubQub":false,"appCommit":"4e39976b74a7204cb5703f2b5e5b2cf7f2ce3233"},"scopeData":{"elements":{"activeTargetType":"pub","activeTargetName":"Pub","activeTarget":{"id":"406d2328-bd81-49b1-88ff-bfea8e141c38","slug":"7drcnfbc","title":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","htmlTitle":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","description":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","htmlDescription":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","avatar":null,"customPublishedAt":null,"doi":"10.21428/e90189c8.406d2328","labels":null,"downloads":null,"metadata":null,"viewHash":"a9cj21zk","editHash":"7nb2m6c2","reviewHash":"pwxe4fuv","commentHash":"o94f49sy","draftId":"9877da8c-cb2c-4e03-abbf-2f267a782aaa","communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","crossrefDepositRecordId":"b288671a-2cdd-4323-bb2d-8881c7a7d2cd","scopeSummaryId":"cdc4e1a0-7608-4ce2-8a57-680d457171ea","createdAt":"2024-04-27T17:33:14.856Z","updatedAt":"2024-05-30T03:13:54.216Z","collectionPubs":[{"id":"b7f939be-ab7d-4911-8038-a06150318be9","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","pubRank":"q","collection":{"kind":"issue","isPublic":true}}],"releases":[{"id":"bbbf4944-7b5d-4b90-842f-4e0400cbae02","historyKey":214}],"submission":null},"activePub":{"id":"406d2328-bd81-49b1-88ff-bfea8e141c38","slug":"7drcnfbc","title":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","htmlTitle":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","description":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","htmlDescription":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","avatar":null,"customPublishedAt":null,"doi":"10.21428/e90189c8.406d2328","labels":null,"downloads":null,"metadata":null,"viewHash":"a9cj21zk","editHash":"7nb2m6c2","reviewHash":"pwxe4fuv","commentHash":"o94f49sy","draftId":"9877da8c-cb2c-4e03-abbf-2f267a782aaa","communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","crossrefDepositRecordId":"b288671a-2cdd-4323-bb2d-8881c7a7d2cd","scopeSummaryId":"cdc4e1a0-7608-4ce2-8a57-680d457171ea","createdAt":"2024-04-27T17:33:14.856Z","updatedAt":"2024-05-30T03:13:54.216Z","collectionPubs":[{"id":"b7f939be-ab7d-4911-8038-a06150318be9","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","pubRank":"q","collection":{"kind":"issue","isPublic":true}}],"releases":[{"id":"bbbf4944-7b5d-4b90-842f-4e0400cbae02","historyKey":214}],"submission":null},"activeCollection":null,"activeIds":{"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032"},"inactiveCollections":[{"id":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","title":"IJGIS April 2024","slug":"ijgis-april-2024","avatar":"https://assets.pubpub.org/mebnzll6/ijgis-31719106059925.png","isRestricted":false,"isPublic":true,"viewHash":"yrq1re9j","editHash":"bharfngz","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.6d5d7a1f","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"eaqut1ig","type":"collection-header","content":{}},{"id":"hhnf70md","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"2a210ecd-0ed6-423e-bf75-8d6aaf105812","crossrefDepositRecordId":"0b879e42-ab3d-486c-850b-c0ea9905cf1b","createdAt":"2024-04-15T03:53:36.589Z","updatedAt":"2024-06-23T01:27:51.642Z"}],"activeCommunity":{"id":"e90189c8-2fed-4518-8e60-66134cbcf032","subdomain":"ijgis","domain":null,"title":"Home","citeAs":"International Journal of Global Innovations and Solutions (IJGIS)","publishAs":"The New World Foundation","description":"International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication dedicated to showcasing groundbreaking research and innovative solutions addressing the world's most pressing challenges.","avatar":"https://assets.pubpub.org/arwsae7h/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-71715538461454.webp","favicon":"https://assets.pubpub.org/36ow6479/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-01715538431153.webp","accentColorLight":"#FFFFFF","accentColorDark":"#2D2E2F","hideCreatePubButton":false,"headerLogo":"https://assets.pubpub.org/ue8enmtx/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-41715538480850.webp","headerLinks":null,"headerColorType":"dark","useHeaderTextAccent":true,"hideHero":null,"hideHeaderLogo":true,"heroLogo":"https://assets.pubpub.org/ep2hgksk/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-61715538493266.webp","heroBackgroundImage":null,"heroBackgroundColor":null,"heroTextColor":null,"useHeaderGradient":null,"heroImage":null,"heroTitle":"International Journal of Global Innovations and Solutions (IJGIS)","heroText":"International Journal of Global Innovations and Solutions (IJGIS) is a premier, peer-reviewed publication dedicated to showcasing groundbreaking research and innovative solutions addressing the world's most pressing challenges. ","heroPrimaryButton":{"url":"https://ijgis.pubpub.org/publications","title":"Publications"},"heroSecondaryButton":{"url":"","title":""},"heroAlign":null,"navigation":[{"id":"f20c0731-d50a-4e07-bf1e-b6f90b39c1d5","type":"page"},{"id":"1b145631-f125-46a7-a987-9ab95efbafaf","type":"page"},{"id":"9c13cb3a-8069-44ef-9062-7f8b6a740fe8","type":"page"},{"id":"7cec28d6-c3e8-4108-824b-85d99b130421","type":"page"},{"id":"a873a6e0-1d12-48f6-8c66-8beb8a3997ae","type":"page"},{"id":"05015d0b-1ac2-4510-b51d-75672ab41666","type":"page"},{"id":"d691639a-c52e-4175-b649-98cfb5a65683","type":"page"},{"id":"9843be36-7895-4bf4-9ea1-a5b48be5c204","type":"page"},{"id":"4e71684d-a47b-4e48-9fcd-f46e562934c4","type":"page"}],"hideNav":false,"navLinks":null,"footerLinks":null,"footerLogoLink":"https://ijgis.pubpub.org/","footerTitle":null,"footerImage":"https://assets.pubpub.org/s8och5nk/DALL·E 2024-05-12 11.26.22 - Logo design for 'International Journal of Global Innovations and Solutions (IJGIS)' without any text. The logo should include symbols representing glo-51715538507380.webp","website":"https://thenewworld.foundation/","facebook":null,"twitter":null,"instagram":null,"mastodon":null,"linkedin":"company/the-new-world-foundation/","bluesky":null,"github":null,"email":"president@thenewworld.foundation","socialLinksLocation":null,"issn":null,"isFeatured":null,"viewHash":null,"editHash":null,"premiumLicenseFlag":false,"defaultPubCollections":["6ffe297d-8bca-4051-bc10-8cab3f31a894"],"analyticsSettings":null,"spamTagId":"193f9436-3d7e-4d46-98e3-13400996ab98","organizationId":null,"scopeSummaryId":"548c0b60-fc75-40a0-870e-fa9b79700330","createdAt":"2024-04-14T19:57:40.796Z","updatedAt":"2024-10-15T00:30:57.410Z"}},"memberData":[],"activePermissions":{"activePermission":null,"canView":false,"canEdit":false,"canManage":false,"canAdmin":false,"canAdminCommunity":false,"canManageCommunity":false,"canViewCommunity":false,"canEditCommunity":false,"isSuperAdmin":false,"canCreateReviews":false,"canCreateDiscussions":true,"canViewDraft":false,"canEditDraft":false},"activeCounts":{"reviews":0,"submissions":0},"scope":{"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","communityId":"e90189c8-2fed-4518-8e60-66134cbcf032"},"facets":{"CitationStyle":{"props":{"citationStyle":{"sources":[{"scope":{"kind":"root"},"value":"apa","facetBindingId":null}],"value":"apa"},"inlineCitationStyle":{"sources":[{"scope":{"kind":"root"},"value":"count","facetBindingId":null}],"value":"count"}},"value":{"citationStyle":"apa","inlineCitationStyle":"count"},"stack":[]},"License":{"props":{"kind":{"sources":[{"scope":{"kind":"root"},"value":"cc-by","facetBindingId":null}],"value":"cc-by"},"copyrightSelection":{"sources":[{"scope":{"kind":"root"},"value":{"choice":"infer-from-scope","year":null},"facetBindingId":null}],"value":{"choice":"infer-from-scope","year":null}}},"value":{"kind":"cc-by","copyrightSelection":{"choice":"infer-from-scope","year":null}},"stack":[]},"NodeLabels":{"props":{"image":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Image"},"facetBindingId":null}],"value":{"enabled":false,"text":"Image"}},"video":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Video"},"facetBindingId":null}],"value":{"enabled":false,"text":"Video"}},"audio":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Audio"},"facetBindingId":null}],"value":{"enabled":false,"text":"Audio"}},"table":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Table"},"facetBindingId":null}],"value":{"enabled":false,"text":"Table"}},"math":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Equation"},"facetBindingId":null}],"value":{"enabled":false,"text":"Equation"}},"iframe":{"sources":[{"scope":{"kind":"root"},"value":{"enabled":false,"text":"Iframe"},"facetBindingId":null}],"value":{"enabled":false,"text":"Iframe"}}},"value":{"image":{"enabled":false,"text":"Image"},"video":{"enabled":false,"text":"Video"},"audio":{"enabled":false,"text":"Audio"},"table":{"enabled":false,"text":"Table"},"math":{"enabled":false,"text":"Equation"},"iframe":{"enabled":false,"text":"Iframe"}},"stack":[]},"PubEdgeDisplay":{"props":{"defaultsToCarousel":{"sources":[{"scope":{"kind":"root"},"value":true,"facetBindingId":null}],"value":true},"descriptionIsVisible":{"sources":[{"scope":{"kind":"root"},"value":true,"facetBindingId":null}],"value":true}},"value":{"defaultsToCarousel":true,"descriptionIsVisible":true},"stack":[]},"PubHeaderTheme":{"props":{"backgroundImage":{"sources":[{"scope":{"kind":"root"},"value":null,"facetBindingId":null}],"value":null},"backgroundColor":{"sources":[{"scope":{"kind":"root"},"value":"community","facetBindingId":null}],"value":"community"},"textStyle":{"sources":[{"scope":{"kind":"root"},"value":"light","facetBindingId":null}],"value":"light"}},"value":{"backgroundImage":null,"backgroundColor":"community","textStyle":"light"},"stack":[]}}},"featureFlags":{"releaseDiscussionsDialog":false,"activityDigestSubscribeToggle":true,"notifications":true,"submissions":true,"surveySummer22":false,"reviews":false,"comments":false,"htmlPubHeaderValues":false,"minimal-header":false,"minimal-footer":false,"customScripts":false,"collapsible-header":false,"two-column-footer":false,"suggestedEdits":false,"collapsible-header-bpc":false,"customAnalyticsProvider":false,"newAnalytics":true,"bodyContributors":false,"noCookieBanner":false},"initialNotificationsData":{"hasNotifications":false,"hasUnreadNotifications":false},"dismissedUserDismissables":{}}"></script><script id="view-data" type="text/plain" data-json="{"pubData":{"subscription":null,"id":"406d2328-bd81-49b1-88ff-bfea8e141c38","slug":"7drcnfbc","title":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","htmlTitle":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity","description":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","htmlDescription":"Keywords: API Security, Authentication Mechanisms, Cybersecurity, Zero Trust Architecture, Continuous Authentication","avatar":null,"customPublishedAt":null,"doi":"10.21428/e90189c8.406d2328","labels":null,"downloads":null,"metadata":null,"viewHash":null,"editHash":null,"reviewHash":null,"commentHash":null,"draftId":"9877da8c-cb2c-4e03-abbf-2f267a782aaa","communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","crossrefDepositRecordId":"b288671a-2cdd-4323-bb2d-8881c7a7d2cd","scopeSummaryId":"cdc4e1a0-7608-4ce2-8a57-680d457171ea","createdAt":"2024-04-27T17:33:14.856Z","updatedAt":"2024-05-30T03:13:54.216Z","members":[{"id":"60621ee8-ce00-4950-a10d-c334459da29f","permissions":"manage","isOwner":true,"subscribedToActivityDigest":false,"userId":"f91fe921-4c56-40d0-a840-105059c94461","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":null,"communityId":null,"organizationId":null,"createdAt":"2024-04-27T17:33:14.896Z","updatedAt":"2024-04-27T17:33:14.896Z"},{"id":"c72ec313-2b27-464e-b548-a3f6cd1f28e1","permissions":"manage","isOwner":null,"subscribedToActivityDigest":false,"userId":"536fce14-1fe7-4569-abac-f8e453873b62","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":null,"communityId":null,"organizationId":null,"createdAt":"2024-04-27T18:58:11.534Z","updatedAt":"2024-04-27T18:58:25.890Z"},{"id":"3e920e6c-bb00-4232-832d-fc2a15f7d103","permissions":"manage","isOwner":null,"subscribedToActivityDigest":false,"userId":"d0d3b7c7-cc3a-4d93-ba5c-e498d67d4d07","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":null,"communityId":null,"organizationId":null,"createdAt":"2024-04-27T18:58:35.190Z","updatedAt":"2024-04-27T18:58:37.471Z"}],"draft":null,"submission":null,"crossrefDepositRecord":{"id":"b288671a-2cdd-4323-bb2d-8881c7a7d2cd","depositJson":{"dois":{"pub":"10.21428/e90189c8.406d2328","community":"10.21428/e90189c8","collection":"10.21428/e90189c8.6d5d7a1f"},"deposit":{"doi_batch":{"body":{"journal":{"journal_issue":{"titles":{"title":"IJGIS April 2024"},"doi_data":{"doi":"10.21428/e90189c8.6d5d7a1f","resource":{"#text":"https://ijgis.pubpub.org/ijgis-april-2024"},"timestamp":1717038832934},"publication_date":{"day":"15","year":"2024","month":"04","@media_type":"online"}},"journal_article":{"titles":{"title":"Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity"},"doi_data":{"doi":"10.21428/e90189c8.406d2328","resource":{"#text":"https://ijgis.pubpub.org/pub/7drcnfbc"},"timestamp":1717038832934},"@xmlns:rel":"http://www.crossref.org/relations.xsd","contributors":{"person_name":[{"ORCID":"https://orcid.org/0009-0001-0465-3389","surname":"Gupta","@sequence":"first","given_name":"Ashish","affiliation":"Capital One, Department of Software Engineering","@contributor_role":"author"},{"ORCID":"https://orcid.org/0009-0008-0027-7663","surname":"Panda","@sequence":"additional","given_name":"Meenakshi","affiliation":"Capital One, Department of Software Engineering","@contributor_role":"author"},{"ORCID":"https://orcid.org/0009-0003-0393-4634","surname":"Gupta","@sequence":"additional","given_name":"Anoop","affiliation":"Capital One, Department of Software Engineering","@contributor_role":"author"},{"ORCID":"https://orcid.org/0009-0003-9695-6380","surname":"Bhattacharya","@sequence":"additional","given_name":"Saurav","@contributor_role":"reader"},{"ORCID":"https://orcid.org/0009-0001-0652-7116","surname":"Najana","@sequence":"additional","given_name":"Madhavi","@contributor_role":"reader"}]},"publication_date":{"day":"27","year":"2024","month":"04","@media_type":"online"},"@publication_type":"full_text"},"journal_metadata":{"doi_data":{"doi":"10.21428/e90189c8","resource":{"#text":"https://ijgis.pubpub.org"},"timestamp":1717038832934},"@language":"en","full_title":"International Journal of Global Innovations and Solutions (IJGIS)"}}},"head":{"depositor":{"email_address":"crossref@pubpub.org","depositor_name":"PubPub"},"timestamp":1717038832934,"registrant":"PubPub","doi_batch_id":"1717038832934_e90189c8"},"@xmlns":"http://www.crossref.org/schema/4.4.1","@version":"4.4.1","@xmlns:xsi":"http://www.w3.org/2001/XMLSchema-instance","@xsi:schemaLocation":"http://www.crossref.org/schema/4.4.1 http://www.crossref.org/schema/deposit/crossref4.4.1.xsd"}},"timestamp":1717038832934},"createdAt":"2024-04-27T21:39:16.660Z","updatedAt":"2024-05-30T03:13:54.218Z"},"scopeSummary":{"id":"cdc4e1a0-7608-4ce2-8a57-680d457171ea","collections":0,"pubs":0,"discussions":0,"reviews":1,"submissions":0,"createdAt":"2024-04-27T17:33:14.864Z","updatedAt":"2024-04-27T18:53:18.931Z"},"outboundEdges":[],"inboundEdges":[],"discussions":[],"releases":[{"id":"bbbf4944-7b5d-4b90-842f-4e0400cbae02","noteContent":null,"noteText":null,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","userId":"7d12b660-7544-48bd-a0ff-80f53cf46a81","docId":"922e7b04-be4f-4703-b099-6ad86aca1e6e","historyKey":214,"historyKeyMissing":false,"createdAt":"2024-04-27T21:38:31.966Z","updatedAt":"2024-04-27T21:38:31.966Z"}],"collectionPubs":[{"id":"b7f939be-ab7d-4911-8038-a06150318be9","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","collectionId":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","contextHint":null,"rank":"x","pubRank":"q","createdAt":"2024-04-27T19:55:34.527Z","updatedAt":"2024-04-27T19:55:34.527Z","collection":{"id":"6d5d7a1f-0ec8-45fc-817c-ae0f408498a4","title":"IJGIS April 2024","slug":"ijgis-april-2024","avatar":"https://assets.pubpub.org/mebnzll6/ijgis-31719106059925.png","isRestricted":false,"isPublic":true,"viewHash":"yrq1re9j","editHash":"bharfngz","metadata":{},"kind":"issue","doi":"10.21428/e90189c8.6d5d7a1f","readNextPreviewSize":"choose-best","layout":{"blocks":[{"id":"eaqut1ig","type":"collection-header","content":{}},{"id":"hhnf70md","type":"pubs","content":{"sort":"collection-rank","pubPreviewType":"small"}}],"isNarrow":false},"layoutAllowsDuplicatePubs":false,"pageId":null,"communityId":"e90189c8-2fed-4518-8e60-66134cbcf032","scopeSummaryId":"2a210ecd-0ed6-423e-bf75-8d6aaf105812","crossrefDepositRecordId":"0b879e42-ab3d-486c-850b-c0ea9905cf1b","createdAt":"2024-04-15T03:53:36.589Z","updatedAt":"2024-06-23T01:27:51.642Z","page":null,"members":[],"attributions":[]}}],"attributions":[{"id":"126b5102-89f7-4ef2-bc1e-a103a128cc6f","name":null,"avatar":null,"title":null,"order":0.9375,"isAuthor":false,"roles":["Peer Review"],"affiliation":null,"orcid":null,"userId":"7d12b660-7544-48bd-a0ff-80f53cf46a81","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","createdAt":"2024-04-27T19:43:05.190Z","updatedAt":"2024-04-27T19:43:10.449Z","user":{"id":"7d12b660-7544-48bd-a0ff-80f53cf46a81","firstName":"Saurav","lastName":"Bhattacharya","fullName":"Saurav Bhattacharya","avatar":"https://assets.pubpub.org/fmjc6l2s/unknown-11713144136253.jpg","slug":"saurav-bhattacharya","initials":"SB","title":"Technical Lead at Microsoft","orcid":"0009-0003-9695-6380"}},{"id":"a42eb3c4-579c-410a-978f-a13f145241ee","name":null,"avatar":null,"title":null,"order":0.5,"isAuthor":true,"roles":["Writing – Original Draft Preparation"],"affiliation":"Capital One, Department of Software Engineering","orcid":null,"userId":"f91fe921-4c56-40d0-a840-105059c94461","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","createdAt":"2024-04-27T17:33:14.896Z","updatedAt":"2024-04-27T18:39:56.891Z","user":{"id":"f91fe921-4c56-40d0-a840-105059c94461","firstName":"Ashish","lastName":"Gupta","fullName":"Ashish Gupta","avatar":"https://assets.pubpub.org/x98yrqps/unknown-51714238783658.jpg","slug":"ashish-gupta","initials":"AG","title":"Senior Director, Software Engineering @Capital One","orcid":"0009-0001-0465-3389"}},{"id":"cde50ce7-f1b1-4ed1-826e-13a1af882942","name":null,"avatar":null,"title":null,"order":0.984375,"isAuthor":false,"roles":["Peer Review"],"affiliation":null,"orcid":null,"userId":"f82761c1-62f6-4e9c-b545-b34d41f6c3a1","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","createdAt":"2024-04-27T21:38:51.469Z","updatedAt":"2024-04-27T21:38:59.359Z","user":{"id":"f82761c1-62f6-4e9c-b545-b34d41f6c3a1","firstName":"Madhavi","lastName":"Najana","fullName":"Madhavi Najana","avatar":null,"slug":"madhavi-najana","initials":"MN","title":"Software Engineering Manager","orcid":"0009-0001-0652-7116"}},{"id":"dc909f4a-967c-4376-82c1-288c04a2ff50","name":null,"avatar":null,"title":null,"order":0.75,"isAuthor":true,"roles":["Writing – Original Draft Preparation"],"affiliation":"Capital One, Department of Software Engineering","orcid":null,"userId":"536fce14-1fe7-4569-abac-f8e453873b62","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","createdAt":"2024-04-27T18:39:34.784Z","updatedAt":"2024-05-30T03:07:37.033Z","user":{"id":"536fce14-1fe7-4569-abac-f8e453873b62","firstName":"Meenakshi","lastName":"Panda","fullName":"Meenakshi Panda","avatar":null,"slug":"meenakshi-panda","initials":"MP","title":"Director, Software Engineering","orcid":"0009-0008-0027-7663"}},{"id":"92d14d39-6a1c-4b69-b42b-fa91764121f4","name":null,"avatar":null,"title":null,"order":0.875,"isAuthor":true,"roles":["Writing – Original Draft Preparation"],"affiliation":"Capital One, Department of Software Engineering","orcid":null,"userId":"d0d3b7c7-cc3a-4d93-ba5c-e498d67d4d07","pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","createdAt":"2024-04-27T18:40:19.484Z","updatedAt":"2024-05-30T03:07:42.123Z","user":{"id":"d0d3b7c7-cc3a-4d93-ba5c-e498d67d4d07","firstName":"Anoop","lastName":"Gupta","fullName":"Anoop Gupta","avatar":"https://assets.pubpub.org/pkk8zj55/unknown-71729969455800.jpg","slug":"anoop-gupta","initials":"AG","title":"Director, Software Engineering","orcid":"0009-0003-0393-4634"}}],"exports":[{"id":"cb8e5aa8-8840-4087-a87a-bef99c83d22d","format":"json","url":"https://assets.pubpub.org/57qgjkl8/406d2328-bd81-49b1-88ff-bfea8e141c38.json","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"e57949d0-7d31-4301-b6c4-ea2a5a1ec7e5","createdAt":"2024-04-27T21:38:33.013Z","updatedAt":"2024-04-27T21:38:57.734Z"},{"id":"2c197854-9b5d-4d09-87a2-bd4732b1d468","format":"tex","url":"https://assets.pubpub.org/wcyrqci9/406d2328-bd81-49b1-88ff-bfea8e141c38.tex","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"e4ad2c76-7522-4e63-b644-dfd6a9cdee20","createdAt":"2024-04-27T21:38:33.032Z","updatedAt":"2024-04-27T21:38:59.602Z"},{"id":"8ef9fb7f-e9c5-476b-86bf-84262ffd497c","format":"pdf","url":"https://s3.amazonaws.com/assets.pubpub.org/0uiac73n1q8bgj1vroxxwegxvtb17pio.pdf","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"c4913da8-d03d-4ae2-abdc-a066a09f9c68","createdAt":"2024-04-27T21:38:32.898Z","updatedAt":"2024-04-27T21:39:14.472Z"},{"id":"baa9371b-9dfb-492c-8c11-3e337a6a38a0","format":"docx","url":"https://assets.pubpub.org/hb771in0/406d2328-bd81-49b1-88ff-bfea8e141c38.docx","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"df76a6cf-b242-436a-814c-80ca733f8144","createdAt":"2024-04-27T21:38:32.888Z","updatedAt":"2024-04-27T21:38:54.954Z"},{"id":"49708e79-4356-41e0-95f0-51f9245373df","format":"html","url":"https://assets.pubpub.org/eiwpdeoj/406d2328-bd81-49b1-88ff-bfea8e141c38.html","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"a50b4f40-d1d1-49f6-8138-a0c550d31f20","createdAt":"2024-04-27T21:38:32.863Z","updatedAt":"2024-04-27T21:38:55.057Z"},{"id":"84f068a1-c36a-4dd9-8e19-631db6187d26","format":"epub","url":"https://assets.pubpub.org/wbxtaalz/406d2328-bd81-49b1-88ff-bfea8e141c38.epub","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"70b7dfde-a74b-43fd-94d8-180221443e0c","createdAt":"2024-04-27T21:38:32.880Z","updatedAt":"2024-04-27T21:38:55.385Z"},{"id":"3713d244-0cd3-4cf0-b684-e0d9d48c3b56","format":"markdown","url":"https://assets.pubpub.org/9unuxrbo/406d2328-bd81-49b1-88ff-bfea8e141c38.md","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"85f8b1ed-12b2-4f24-9309-564d47a24f17","createdAt":"2024-04-27T21:38:32.916Z","updatedAt":"2024-04-27T21:38:55.522Z"},{"id":"5c559385-0ad1-461e-ae03-646eb4edcdd8","format":"odt","url":"https://assets.pubpub.org/diol0alz/406d2328-bd81-49b1-88ff-bfea8e141c38.odt","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"dab2998b-2ed4-4048-93f2-d36a75138cba","createdAt":"2024-04-27T21:38:32.846Z","updatedAt":"2024-04-27T21:38:56.336Z"},{"id":"a28a84d3-777e-48ac-9586-e155d746f731","format":"plain","url":"https://assets.pubpub.org/m4gb7pvo/406d2328-bd81-49b1-88ff-bfea8e141c38.txt","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"1ab801b8-dcb8-4333-9a29-da74d642e356","createdAt":"2024-04-27T21:38:32.884Z","updatedAt":"2024-04-27T21:38:57.021Z"},{"id":"4c334557-b11d-42a1-8180-c708c8eaed50","format":"jats","url":"https://assets.pubpub.org/0lmcoznb/406d2328-bd81-49b1-88ff-bfea8e141c38.xml","historyKey":214,"pubId":"406d2328-bd81-49b1-88ff-bfea8e141c38","workerTaskId":"20cb56f9-20b2-4bdc-a811-57549976347c","createdAt":"2024-04-27T21:38:32.876Z","updatedAt":"2024-04-27T21:38:57.599Z"}],"reviews":[],"isRelease":true,"releaseNumber":1,"initialStructuredCitations":{},"citationData":{"pub":{"default":"<div class=\"csl-bib-body\"> <div data-csl-entry-id=\"temp_id_7014349780308771\" class=\"csl-entry\">Gupta, A., Panda, M., &#38; Gupta, A. (2024). Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity. <i>International Journal of Global Innovations and Solutions (IJGIS)</i>. https://doi.org/10.21428/e90189c8.406d2328</div></div>","apa":"<div class=\"csl-bib-body\"> <div data-csl-entry-id=\"temp_id_7014349780308771\" class=\"csl-entry\">Gupta, A., Panda, M., &#38; Gupta, A. (2024). Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity. <i>International Journal of Global Innovations and Solutions (IJGIS)</i>. https://doi.org/10.21428/e90189c8.406d2328</div></div>","harvard":"<div class=\"csl-bib-body\"> <div data-csl-entry-id=\"temp_id_7014349780308771\" class=\"csl-entry\">Gupta, Ashish, Panda, M. and Gupta, Anoop (2024) 'Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity', <i>International Journal of Global Innovations and Solutions (IJGIS)</i> [Preprint]. doi:10.21428/e90189c8.406d2328.</div></div>","vancouver":"<div class=\"csl-bib-body\"> <div data-csl-entry-id=\"temp_id_7014349780308771\" class=\"csl-entry\"> <div class=\"csl-left-margin\">1. </div><div class=\"csl-right-inline\">Gupta A, Panda M, Gupta A. Advancing API Security: A Comprehensive Evaluation of Authentication Mechanisms and Their Implications for Cybersecurity. International Journal of Global Innovations and Solutions (IJGIS) [Internet]. 2024 Apr 27; Available from: https://ijgis.pubpub.org/pub/7drcnfbc</div> </div></div>","bibtex":"@article{Gupta2024Advancing,\n\tauthor = {Gupta, Ashish and Panda, Meenakshi and Gupta, Anoop},\n\tjournal = {International Journal of Global Innovations and Solutions (IJGIS)},\n\tyear = {2024},\n\tmonth = {apr 27},\n\tnote = {https://ijgis.pubpub.org/pub/7drcnfbc},\n\tpublisher = {The New World Foundation},\n\ttitle = {Advancing {API} {Security}: A {Comprehensive} {Evaluation} of {Authentication} {Mechanisms} and {Their} {Implications} for {Cybersecurity}},\n}\n\n"}},"siblingEdges":[],"initialDoc":{"type":"doc","attrs":{"meta":{},"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nz05lvj5i0r","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Abstract","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"},{"type":"hard_break","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null}},{"text":"The rapid adoption of Application Programming Interfaces (APIs) across digital platforms has significantly enhanced interconnectivity and functionality, driving the digital transformation of businesses. However, this expansion has also introduced substantial cybersecurity risks, primarily due to inadequate authentication mechanisms. This paper comprehensively reviews current API authentication methods, evaluates their security effectiveness, and discusses innovative trends such as Zero Trust Architecture and Continuous Authentication. We aim to provide insights into the strengths and weaknesses of each approach and recommend strategies for fortifying API ecosystems against evolving cybersecurity threats.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n4em5t49tdy","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"1. ","type":"text"},{"text":"Introduction","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nweylaysqxn","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The proliferation of Application Programming Interfaces (APIs) has been a cornerstone of modern digital infrastructure, catalyzing business innovation and operational efficiency. However, the increasing reliance on APIs has exposed organizations to heightened cybersecurity risks, necessitating robust mechanisms for authentication. This paper explores various authentication strategies, their integration within API ecosystems, and their role in mitigating potential security breaches.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nrxhdbmqivw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"2. ","type":"text"},{"text":"Importance of APIs in Digital Transformation","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nn0zipvw5ex","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"APIs have become integral to enterprises' digital transformation strategies, facilitating seamless interactions between distributed systems and supporting rapid scalability and innovation. The shift towards API-first approaches has allowed businesses to extend their reach and adapt to the dynamic demands of the digital market. Nevertheless, this dependency on APIs has made them a focal point for cyber-attacks, underscoring the need for effective security measures.","type":"text"}]},{"type":"paragraph","attrs":{"id":"nn5mounmvkc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"3. ","type":"text"},{"text":"Cybersecurity Concerns with APIs","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nbln4pfbm1z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Recent developments in the digital landscape have seen APIs emerge as significant threat vectors. While beneficial for development and integration, the standardization of API protocols and architectures has also simplified the process for potential attackers. Common vulnerabilities include Broken User Authentication, Insufficient Logging and Monitoring, and insecure data transmission, which have been exploited in numerous recent breaches. This section examines these vulnerabilities and the implications for businesses lacking robust authentication protocols.","type":"text"}]},{"type":"paragraph","attrs":{"id":"n3dist85ve4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"4. ","type":"text"},{"text":"Review of API Authentication Mechanisms","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n990p71d4ji","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"This section delves into various authentication mechanisms, providing a critical assessment of each in terms of security efficacy and implementation complexity:","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n38s76ab9xk","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nmjowim5x8h","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Basic Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": Basic Authentication transmits credentials in an encoded format over HTTP headers, which is inherently insecure unless combined with SSL/TLS. The simplicity of this method makes it prone to various attacks, such as Man-in-the-Middle (MITM). Recent research suggests enhancing Basic Authentication with dynamic credentials and short-lived sessions to mitigate some of these risks. However, industry trends are moving towards more secure alternatives due to this method's inherent limitations.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvof09caxad","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Bearer Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": Bearer tokens, particularly those used in OAuth 2.0 frameworks, are a standard method for securing APIs. They provide a layer of security that does not require continuous transmission of credentials. Recent advancements include JSON Web Encryption (JWE) for token encryption, which enhances the confidentiality and integrity of bearer tokens against exposure attacks. Research has focused on token lifecycle management, emphasizing the importance of secure token storage and renewal strategies to prevent unauthorized access.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naw7uothmql","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"API Key Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": While convenient, API Key Authentication does not inherently distinguish between user types, making it less suitable for transactions requiring high granularity of access control. Recent studies have proposed the integration of API keys with more robust access control mechanisms, such as attribute-based access control (ABAC) or role-based access control (RBAC), to provide finer-grained security policies. Additionally, advancements in crucial management practices, such as automatic key rotations and the use of environmental variables for secure key storage, are being recommended to enhance security.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n9l8xtd3qzc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Mutual TLS (mTLS)","type":"text","marks":[{"type":"strong"}]},{"text":": Mutual TLS remains one of the most secure authentication methods available. It involves certificate-based mutual authentication to ensure that both client and server can trust each other. The overhead associated with managing certificates is a recognized challenge, prompting research into automated certificate management solutions and the integration of blockchain technology for decentralized certificate validation. This research aims to reduce the complexity and improve the scalability of mTLS implementations.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"naps6zb8nn4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"OAuth and JWT","type":"text","marks":[{"type":"strong"}]},{"text":": OAuth 2.0 and JSON Web Tokens (JWT) represent sophisticated authentication frameworks capable of supporting various applications. The recent focus has been on improving the security of these frameworks against attacks such as Cross-Site Request Forgery (CSRF) and token hijacking. Enhancements include Proof Key for Code Exchange (PKCE) for OAuth and the introduction of more secure algorithms for JWT signing. Additionally, research is exploring the use of machine learning to detect abnormal token usage patterns, providing an additional layer of security by identifying potential breaches early.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npbvkmiae3u","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Zero Trust Architecture","type":"text","marks":[{"type":"strong"}]},{"text":": Zero Trust Architecture (ZTA) advocates for a 'never trust, always verify' approach, a significant shift from traditional network security paradigms. The latest research in this area includes the development of context-aware security policies, which use real-time data about the user's environment and behavior to make access decisions. This approach addresses dynamic and increasingly sophisticated cyber threats more effectively. Implementations of ZTA often incorporate micro-segmentation and least privilege strategies to minimize the attack surface and reduce internal movement possibilities for attackers. ZTA requires robust IAM to ensure secure API interactions, where access decisions are made dynamically based on identity verification and context. APIs must ensure secure interactions and provide additional security against credential compromise through multi-factor authentication (Ahmadi, 2024).","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n3ajivls2wq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Continuous Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": Building on the principles of Zero Trust, Continuous Authentication frequently reassesses the user's credentials throughout a session. This approach helps prevent unauthorized access from stolen or compromised credentials (Ahmadi, 2024). Innovations in this area include the use of behavioral biometrics, such as keystroke dynamics and mouse movements, which provide continuous user verification without interrupting the user experience. This research is particularly relevant in addressing insider threats and reducing the impact of credential theft.","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"nrf17vfr50z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"5. ","type":"text"},{"text":"Emerging Trends in API Security","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"n1d5x2dsi9p","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"This section discusses the evolution of API security frameworks and technologies, focusing on the innovations and trends that are setting new standards for securing API ecosystems against contemporary cyber threats.","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n506jmkxi0b","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nsbxjs2b3gz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Zero Trust Architecture (ZTA)","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"na75cxiz3qz","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nyzwtndf6h9","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Concept and Implementation","type":"text","marks":[{"type":"strong"}]},{"text":": Zero Trust is a security model that operates on the principle of \"never trust, always verify.\" Unlike traditional security models that enforce perimeters, ZTA treats all users and devices as potential threats and requires continuous verification of their legitimacy before granting access to resources. Integrating ZTA with AI and machine learning can enhance anomaly detection and adaptive authentication methods for APIs(Ahmadi, 2024).","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"no3cltv0rmx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Recent Developments: There is a growing trend towards integrating ZTA with microsegmentation and identity-aware proxies, further refining access control and ensuring that it is strictly necessary and based on the current context.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nh5f6g7cxge","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Benefits and Challenges","type":"text","marks":[{"type":"strong"}]},{"text":": While ZTA significantly enhances security by reducing the attack surface, its implementation can be complex and resource-intensive. Organizations are exploring simplifying these deployments through automated policy management and machine learning-based context analysis.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n6lopcdjwzw","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Artificial Intelligence and Machine Learning in Security","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n74lmw6ljwi","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n1ndmsvod4t","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Automated Threat Detection and Response","type":"text","marks":[{"type":"strong"}]},{"text":": AI and ML are increasingly being used to enhance threat detection capabilities in API security. These technologies can analyze vast amounts of network data in real-time to identify unusual patterns that may indicate a security breach, thereby improving the efficiency of threat detection and response, potentially reducing the impact of API breaches as described by Qazi (2023)","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nhao27wp3zx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Predictive Capabilities","type":"text","marks":[{"type":"strong"}]},{"text":": Advanced algorithms can predict potential attack vectors and automatically adjust security measures to counteract possible threats preemptively.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"n28t1dld9hz","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Challenges","type":"text","marks":[{"type":"strong"}]},{"text":": The main challenges are the potential for false positives and the need to train AI models to adapt to new threats continuously.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ndcsfamfw4d","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Enhanced Authentication Mechanisms","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nm39fnrnfio","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"npqw2ugbuqx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Biometric Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": Biometrics (facial recognition, fingerprints, behavioral patterns) are becoming more prevalent in API authentication to ensure that legitimate users are making access requests.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nizz7o5aobc","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Multi-factor Authentication (MFA)","type":"text","marks":[{"type":"strong"}]},{"text":": Multi-factor Authentication (MFA) is becoming more sophisticated. It incorporates physical devices (like mobile phones) and contextual information such as location, device health, and user behavior to adjust authentication requirements dynamically.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nvvhnackad4","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Tokenless Authentication","type":"text","marks":[{"type":"strong"}]},{"text":": Emerging technologies are exploring ways to authenticate users without traditional tokens or cookies, using cryptographically secure, stateless methods that enhance security and user experience.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nv8yxneq0yy","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Blockchain for Decentralized Security","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"nvw8tm29z8r","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nx57zu2n2bq","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Application in API Security","type":"text","marks":[{"type":"strong"}]},{"text":": Blockchain technology is being considered for its potential to decentralize security controls, creating a distributed ledger of transactions that can help prevent fraud and enhance the transparency of access logs.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"noba1vj4jk1","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Smart Contracts for Access Control","type":"text","marks":[{"type":"strong"}]},{"text":": Smart contracts on blockchain platforms can automate enforcing security policies and conditions, reducing the potential for human error and ensuring consistent application of security rules.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"ne9djxzj7yb","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Regulatory and Compliance Evolution","type":"text","marks":[{"type":"strong"}]},{"text":":","type":"text"}]},{"type":"bullet_list","attrs":{"id":"n1svtt307zv","rtl":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nn15h7t0zd6","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Global Data Protection Regulations","type":"text","marks":[{"type":"strong"}]},{"text":": As the regulatory landscape evolves with frameworks like GDPR, CCPA, and others, API security increasingly focuses on preventing access and ensuring that data handling and processing meet stringent compliance requirements.","type":"text"}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nkewqod7q0j","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Compliance as Code","type":"text","marks":[{"type":"strong"}]},{"text":": There is a trend towards embedding compliance requirements directly into the code that manages API interactions, ensuring that all transactions automatically adhere to legal and regulatory standards.","type":"text"}]}]}]}]},{"type":"list_item","attrs":{"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"type":"paragraph","attrs":{"id":"nym38cktkq6","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Computable Compound Identity Measure (CCIM)","type":"text","marks":[{"type":"strong"}]},{"text":": The Computable Compound Identity Measure (CCIM) generalizes the traditional user ID by incorporating extensive attributes and contextual data. This approach integrates authentication and authorization into a seamless process that dynamically adapts to the changing operational context and security needs. The CCIM scheme merges authentication, authorization, and access control into a single framework, eliminating the operational and security gaps between these functions and allowing for a more unified and secure approach to access management (Choudhary, 2023).","type":"text"}]}]}]},{"type":"paragraph","attrs":{"id":"npuiectsha8","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"6. ","type":"text"},{"text":"Conclusion:","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nkq0li0qivg","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"The review highlights the critical role of advanced authentication mechanisms in safeguarding APIs from emerging cyber threats. As digital ecosystems evolve, so must the strategies employed to protect them. This paper recommends ongoing research and development into innovative authentication technologies and practices that can adapt to the increasingly sophisticated landscape of cybersecurity.","type":"text"}]},{"type":"paragraph","attrs":{"id":"neyswqj94t0","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"7. ","type":"text"},{"text":"References","type":"text","marks":[{"type":"strong"}]}]},{"type":"paragraph","attrs":{"id":"nbk3t92eg4e","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Ahmadi, S. (2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports, 26(2), 215–228. [","type":"text"},{"text":"https://doi.org/10.9734/jerr/2024/v26i21083","type":"text","marks":[{"type":"link","attrs":{"href":"https://doi.org/10.9734/jerr/2024/v26i21083","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nnkvcuz1ana","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Itodo, C., & Ozer, M. (2024). Multivocal literature review on zero-trust security implementation. ","type":"text"},{"text":"Computers & Security","type":"text","marks":[{"type":"em"}]},{"text":", ","type":"text"},{"text":"141","type":"text","marks":[{"type":"em"}]},{"text":", 103827. [","type":"text"},{"text":"https://doi.org/10.1016/j.cose.2024.103827","type":"text","marks":[{"type":"link","attrs":{"href":"https://doi.org/10.1016/j.cose.2024.103827","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nw6bqeddbzx","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Choudhary, A. (2023). Enhancing cybersecurity using a new dynamic approach to authentication and authorization. Issues in Information Systems. 24. 22–32. 10.48009/2_iis_2023_103. [","type":"text"},{"text":"https://www.researchgate.net/publication/374740535_Enhancing_cybersecurity_using_a_new_dynamic_approach_to_authentication_and_authorization","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/374740535_Enhancing_cybersecurity_using_a_new_dynamic_approach_to_authentication_and_authorization","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nl5tt3kmdjs","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Kubovy, Jan & Huber, Christian & Jäger, Markus & Küng, Josef. (2016). A Secure Token-Based Communication for Authentication and Authorization Servers. 237-250. 10.1007/978-3-319-48057-2_17.[","type":"text"},{"text":"https://www.researchgate.net/publication/309365153_A_Secure_Token-Based_Communication_for_Authentication_and_Authorization_Servers","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/309365153_A_Secure_Token-Based_Communication_for_Authentication_and_Authorization_Servers","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"ne2msxmk6gk","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Sirisha, Avvari & Kumari, G.. (2010). API access control in cloud using the Role Based Access Control Model. Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, TISC-2010. 10.1109/TISC.2010.5714624. [","type":"text"},{"text":"https://www.researchgate.net/publication/251989694_API_access_control_in_cloud_using_the_Role_Based_Access_Control_Model","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/251989694_API_access_control_in_cloud_using_the_Role_Based_Access_Control_Model","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nr8cor8q8wt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Pernpruner, Marco & Carbone, Roberto & Sciarretta, Giada & Ranise, Silvio. (2023). An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols. IEEE Transactions on Dependable and Secure Computing. PP. 1-16. 10.1109/TDSC.2023.3296210. [","type":"text"},{"text":"https://www.researchgate.net/publication/372431959_An_Automated_Multi-Layered_Methodology_to_Assist_the_Secure_and_Risk-Aware_Design_of_Multi-Factor_Authentication_Protocols","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/372431959_An_Automated_Multi-Layered_Methodology_to_Assist_the_Secure_and_Risk-Aware_Design_of_Multi-Factor_Authentication_Protocols","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nv024tlzd8y","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"D. S. V. Madala, M. P. Jhanwar and A. Chattopadhyay, \"Certificate Transparency Using Blockchain,\" 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore, 2018, pp. 71–80, doi: 10.1109/ICDMW.2018.00018. keywords: {Public key;Servers;Browsers;Blockchain;Protocols;Google;Computed tomography;Blockchain;PKI;Certificate Transparency;Hyperledger}, [","type":"text"},{"text":"https://ieeexplore.ieee.org/document/8637448","type":"text","marks":[{"type":"link","attrs":{"href":"https://ieeexplore.ieee.org/document/8637448","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nqay8ae0qhh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Auth0. (n.d.). Authorization Code Flow with PKCE. from ","type":"text"},{"text":"[https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce","type":"text","marks":[{"type":"link","attrs":{"href":"https://auth0.com/docs/get-started/authentication-and-authorization-flow/authorization-code-flow-with-pkce","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nbjqqxhkprp","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Alharbi, Sattam J & Moulahi, Tarek. (2023). API Security Testing: The Challenges of Security Testing for Restful APIs. International Journal of Innovative Research in Science Engineering and Technology. 8. 1485-1499. 10.5281/zenodo.7988410. [","type":"text"},{"text":"https://www.researchgate.net/publication/371174422_API_Security_Testing_The_Challenges_of_Security_Testing_for_Restful_APIs","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/371174422_API_Security_Testing_The_Challenges_of_Security_Testing_for_Restful_APIs","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nv4no5wl2n2","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Dick Hardt (2012). “OAuth2 Authorization Framework” IETF RFC 6749 [","type":"text"},{"text":"https://datatracker.ietf.org/doc/html/rfc6749","type":"text","marks":[{"type":"link","attrs":{"href":"https://datatracker.ietf.org/doc/html/rfc6749","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"n86lhfguaoh","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Michael B. Jones, Dick Hardt (2012). “OAuth2 Authorization Framework: Bearer Token Usage” IETF RFC 6750 [","type":"text"},{"text":"https://datatracker.ietf.org/doc/html/rfc6750","type":"text","marks":[{"type":"link","attrs":{"href":"https://datatracker.ietf.org/doc/html/rfc6750","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"n2rjk4mvs68","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Michael B. Jones, Brian Campbell, Chuck Mortimore (2015). “JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants” IETF RFC 7523 [","type":"text"},{"text":"https://datatracker.ietf.org/doc/html/rfc7523","type":"text","marks":[{"type":"link","attrs":{"href":"https://datatracker.ietf.org/doc/html/rfc7523","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nr53xcm3ocj","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Brian Campbell, John Bradley, Nat Sakimura, Torsten Lodderstedt (2020). “OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens” IETF RFC 8705 [","type":"text"},{"text":"https://datatracker.ietf.org/doc/html/rfc8705","type":"text","marks":[{"type":"link","attrs":{"href":"https://datatracker.ietf.org/doc/html/rfc8705","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"n0xdvdmqi2p","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"OpenID Foundation (2007). “OpenID Specifications” [","type":"text"},{"text":"https://openid.net/developers/specs/","type":"text","marks":[{"type":"link","attrs":{"href":"https://openid.net/developers/specs/","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"ncztrrstdmt","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nat Sakimura, John Bradley, Michael B. Jones, Edmund Jay (2023). “OpenID Connect Discovery” OpenID Foundation (OIDF) [","type":"text"},{"text":"https://openid.net/specs/openid-connect-discovery-1_0.html","type":"text","marks":[{"type":"link","attrs":{"href":"https://openid.net/specs/openid-connect-discovery-1_0.html","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nne246unxsv","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Nat Sakimura, John Bradley, Michael B. Jones (2023). “OpenID Connect Dynamic Client Registration” OpenID Foundation (OIDF) [","type":"text"},{"text":"https://openid.net/specs/openid-connect-registration-1_0.html","type":"text","marks":[{"type":"link","attrs":{"href":"https://openid.net/specs/openid-connect-registration-1_0.html","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"n925xvkeb2y","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Breno de Medeiros, Naveen Agarwal, Nat Sakimura, John Bradley, Michael B. Jones (2022). “OpenID Connect Session Management” OpenID Foundation (OIDF) [","type":"text"},{"text":"https://openid.net/specs/openid-connect-session-1_0.html","type":"text","marks":[{"type":"link","attrs":{"href":"https://openid.net/specs/openid-connect-session-1_0.html","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"ncifq3grs0z","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Carl McGuinness (2020). “The Path to Continuous Authentication: Solving the best of breed problem” Okta [","type":"text"},{"text":"https://www.okta.com/blog/2020/06/the-path-to-continuous-authentication-solving-the-best-of-breed-problem/","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.okta.com/blog/2020/06/the-path-to-continuous-authentication-solving-the-best-of-breed-problem/","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"nmm2dnx5au5","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Vittorio Bertocci, Brian Campbell (2023). “OAuth2.0 Step Up Authentication Challenge Protocol” IETF RFC 9450 [","type":"text"},{"text":"https://datatracker.ietf.org/doc/rfc9470/","type":"text","marks":[{"type":"link","attrs":{"href":"https://datatracker.ietf.org/doc/rfc9470/","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]},{"type":"paragraph","attrs":{"id":"n5wx8u6wubm","rtl":null,"class":null,"textAlign":null,"suggestionId":null,"suggestionKind":null,"suggestionUserId":null,"suggestionTimestamp":null,"suggestionDiscussionId":null,"suggestionOriginalAttrs":null},"content":[{"text":"Farhan Qazi (2023). “Application Programming Interface (API) Security in Cloud Applications“ Research Gate [","type":"text"},{"text":"https://www.researchgate.net/publication/374791753_Application_Programming_Interface_API_Security_in_Cloud_Applications","type":"text","marks":[{"type":"link","attrs":{"href":"https://www.researchgate.net/publication/374791753_Application_Programming_Interface_API_Security_in_Cloud_Applications","title":"","target":null,"pubEdgeId":null}}]},{"text":"]","type":"text"}]}]},"initialDocKey":214,"historyData":{"latestKey":214,"currentKey":214,"timestamps":{}},"isAVisitingCommenter":false,"isReviewingPub":false,"nextCollectionPub":null}}"></script><script id="chunk-name" type="text/plain" data-json=""Pub""></script><script src="/dist/vendor.0257e546351f036bbd7d.bundle.js"></script><script src="/dist/main.632c4b134011c7c4e409.js"></script><script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'9141ece8ff77f936',t:'MTczOTkyMjY5Mi4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body></html>