Archiving Policy

Nesir: Journal of Literary Studies adopts a comprehensive archiving policy to ensure the long-term accessibility and digital preservation of all published content. This policy aims to guarantee the sustainable storage and availability of research articles, research notes, book reviews, document editions, and other academic materials.

Open Access and Retention Principles

In line with open access publishing principles, Nesir commits to keeping all academic content permanently accessible. Accordingly, all published manuscripts:

  • Are stored indefinitely and made openly accessible on the journal’s website (https://nesirdergisi.com).
  • Are protected long-term via the LOCKSS (Lots of Copies Keep Stuff Safe) and CLOCKSS (Controlled LOCKSS) systems.
  • Are automatically preserved through the PKP Preservation Network (PN).
  • Are assigned a DOI (Digital Object Identifier) for permanent identification.
  • May be hosted by university libraries, national archive platforms, and academic open repositories.

Digital Archiving

Technical Implementation

Nesir uses OJS (Open Journal Systems) software to preserve digital content through the following systems and tools:

Additional Backup Measures

  • Daily database backups
  • Weekly full system backups
  • Backup systems hosted on alternative servers

Print Archiving

Nesir is a digital-only journal. However, to ensure long-term preservation:

  • Selected issues or special dossiers may be physically archived in partner university libraries.
  • The journal management may keep printed copies in special archive collections.

Access and Use Conditions

All content is published under the Creative Commons Attribution 4.0 International License (CC BY 4.0).

  • Authors may share their content on personal websites, institutional open repositories, and academic sharing networks (e.g., Academia.edu, ResearchGate).
  • Readers may access, share, and reuse the content without any fee.
  • Commercial use requires additional permission.

Measures Against Disaster Scenarios

  • Weekly full backups are performed to prevent data loss on the main server.
  • Firewalls, SSL certificates, and encrypted connection protocols are used against cyberattacks.
  • Distributed backups are maintained via LOCKSS, CLOCKSS, and PKP PN systems.
  • Alternative storage locations are available for recovery operations.