Skip to main content

Is jstor.org a Scam? Security Check Results - Ithaka Harbors, Inc. Reviews

jstor.org favicon

Is jstor.org Safe? Security Analysis for Ithaka Harbors, Inc.

Check if jstor.org is a scam or legitimate. Free security scan and reviews.

EducationUnited Stateslarge
JavaScriptReact (implied by mfe modules and remoteEntry.js)Google Tag ManagerOneTrust Cookie ConsentFastly CDN
Analyzed 9/7/2025Completed 4:43:44 AM
68
Security Score
MEDIUM RISK

AI Summary

JSTOR, operated by Ithaka Harbors, Inc., is a leading digital library providing access to academic journals, books, and primary sources. It serves a global audience of researchers, students, and educational institutions, positioning itself as a critical resource in the education and media sectors. The website demonstrates a mature digital infrastructure with modern technologies such as React-based micro frontends, Fastly CDN hosting, and integration of Google Tag Manager and OneTrust for privacy compliance. Security posture is strong with HTTPS enforcement and security headers, though explicit security policies and incident response contacts are not publicly detailed. Privacy compliance is well addressed with clear privacy and cookie policies and GDPR adherence. Overall, JSTOR presents a professional, trustworthy, and high-quality digital platform for academic content.

Detected Technologies

JavaScriptReact (implied by mfe modules and remoteEntry.js)Google Tag ManagerOneTrust Cookie ConsentFastly CDN

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

JSTOR's market position as a premier academic content provider is reinforced by its comprehensive digital library offerings and institutional subscription model. The parent company, Ithaka Harbors, supports JSTOR's operations, ensuring alignment with educational and non-profit sectors. The platform's use of advanced web technologies and privacy tools indicates a commitment to user experience and regulatory compliance. The absence of direct contact details in the analyzed content suggests a focus on institutional rather than individual customer engagement. JSTOR's ecosystem includes partnerships with educational institutions and integration with other Ithaka services.

Security Posture Analysis

Comprehensive Security Assessment

The website employs strong security measures including HTTPS, modern security headers, and cookie consent mechanisms. No vulnerabilities or exposed sensitive data were detected in the analyzed content. However, the lack of a publicly accessible security policy or vulnerability disclosure program limits transparency. Incident response readiness is not clearly communicated, which could be improved to enhance trust and preparedness. Overall, JSTOR maintains a solid security foundation appropriate for its business model and audience.

Strategic Recommendations

Priority Actions for Security Improvement

1

Publish a dedicated security policy page outlining security practices and compliance.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Ithaka Harbors, Inc.

Description:

JSTOR is a digital library of academic journals, books, and primary sources.

Key Services:
Access to academic journalsBooksPrimary sourcesResearch tools
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
JavaScriptReact (implied by mfe modules and remoteEntry.js)Google Tag ManagerOneTrust Cookie ConsentFastly CDN
Platforms:
Web
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Cookie consent banner
  • No exposed sensitive data in HTML
  • Use of security headers

Analytics & Tracking

Services:
Google AnalyticsGoogle Tag Manager
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Marketing Tools:
OneTrust Cookie Consent
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is professionally designed and well maintained.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

30/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

65/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

Third-party services without privacy policy

HIGH

Detected services: Google Analytics, Facebook, Twitter, LinkedIn, YouTube

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

80/100
Score

Complex SPF record

LOW

Too many include statements can cause lookup limits

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 mx exists:%{i}.spf.hc5909-85.iphmx.com include:_spf.act-on.net include:u1397501.wl.sendgrid.net include:mail.zendesk.com include:_spf.ultipro.com include:aspmx.pardot.com include:akz210.mta.exacttarget.com ~all
DNS Lookups:8/10
Policy:~all
DKIM Selectors Found
Selector:k2(1416-bit rsa)
Selector:selector1(1416-bit rsa)
Selector:s1(1440-bit rsa)
DMARC Details
Policy:quarantine
Aggregate Reports:ITI_Win_DMARC@jstor.org
Forensic Reports:ITI_Win_DMARC@jstor.org

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

82/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Enabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

80/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

Domain Registration Details

Domain Age
29 years(mature)
Expiry Risk
low(162 days)
Protection Level
basicDNSSEC OFF

DNS Records

A Records:151.101.64.152, 151.101.0.152, 151.101.192.152, 151.101.128.152
Name Servers:
aa1ns03.ithaka.orgWHOIS only
usmiaa1ns03.ithaka.orgDNS only
usnjpr2ns01.ithaka.org
usnjpr2ns02.ithaka.org
usnjpr2ns04.ithaka.org
usnyny1ns05.ithaka.org
MX Records:
10: mx2.hc5909-85.iphmx.com
100: smtp2.ithaka.org
10: mx1.hc5909-85.iphmx.com
100: smtp1.ithaka.org
SOA:Serial: 2025072102, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:333ms

SPF Analysis

SPF Record:
v=spf1 mx exists:%{i}.spf.hc5909-85.iphmx.com include:_spf.act-on.net include:u1397501.wl.sendgrid.net include:mail.zendesk.com include:_spf.ultipro.com include:aspmx.pardot.com include:akz210.mta.exacttarget.com ~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

JSTOR's technical infrastructure is modern and modular, leveraging micro frontends and React-based components for scalability and maintainability. Hosting via Fastly CDN ensures fast content delivery globally. The site is optimized for mobile devices and accessibility, with comprehensive CSS variables and responsive design. Integration with Google Tag Manager and OneTrust indicates mature analytics and privacy management. No technical debt or performance bottlenecks were evident in the provided content. Continued monitoring of third-party scripts and dependencies is recommended to maintain security and performance.
Analyze Another Website