TEMPLATE |
Submission Preparation Checklist
As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.- The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The submission file is in Microsoft Word document file format.
- Where available, URLs for the references have been provided.
- The text is single-spaced; uses a 10-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
- The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.
Copyright Notice
Copyright Notice based on COPE (Committee on Publication Ethics) for JITCS: Journal of Information Technology and Cyber Security
-
Ownership and Copyright: 1.1. JITCS: Journal of Information Technology and Cyber Security respects the intellectual property rights of authors. The copyright for individual articles published in JITCS is retained by the respective authors, unless otherwise specified. 1.2. The articles published in JITCS are licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0), which permits others to remix, adapt, and build upon the work for non-commercial purposes, provided appropriate attribution is given to the original source and any modifications or adaptations are shared under the same license. 1.3. JITCS serves as the initial publisher of the articles, providing them with the first publication platform.
-
Permissions and Usage 2.1. Readers are granted the right to read, download, copy, and print the published articles for personal and non-commercial use, as permitted under the CC BY-NC-ND 4.0 license. 2.2. Any use of the published content beyond personal and non-commercial purposes, including reproduction, distribution, or adaptation, requires prior written permission from the respective authors. 2.3. Requests for permissions to reproduce, distribute, or adapt content from JITCS should be directed to the journal's editorial office, and requests for permissions to use the authors' work should be directed to the respective authors.
-
Attribution and Citation 3.1. Proper attribution and citation of the published work should be provided when using or referring to content from JITCS. This includes clearly indicating the authors, the title of the article, the journal name (JITCS), the volume/issue number, the publication year, and the article's DOI (Digital Object Identifier) when available. 3.2. When adapting or modifying the published content, proper attribution to the original source should be given, and the adapted or modified content should be shared under the same CC BY-NC-ND 4.0 license.
-
Plagiarism and Copyright Infringement 4.1. JITCS considers plagiarism and copyright infringement as serious ethical violations. Authors are responsible for ensuring that their submitted work is original and does not infringe upon the copyright or intellectual property rights of others. 4.2. Any allegations of plagiarism or copyright infringement will be investigated promptly and thoroughly. If proven, appropriate actions, including rejection of the manuscript, retraction of the published article, or other corrective measures, will be taken.
-
Open Access Licensing 5.1. JITCS supports open access publishing and encourages authors to consider publishing their work under the CC BY-NC-ND 4.0 license to promote the dissemination and use of knowledge in the field of information technology and cyber security. 5.2. The specific terms and conditions of the CC BY-NC-ND 4.0 license will be clearly indicated on the published articles.
-
Policy Review This Copyright Notice will be periodically reviewed and updated to ensure its continued relevance and compliance with copyright laws, ethical standards, and open access principles in scholarly publishing. Any updates or revisions to the notice will be communicated to the relevant stakeholders.
By adhering to this Copyright Notice, JITCS aims to protect the rights of authors, promote proper attribution and citation practices, and facilitate the responsible and legal use of the published content in accordance with the CC BY-NC-ND 4.0 license.
Privacy Statement
Journal of Information Technology and Cyber Security (JITCS) values the privacy of its users and is committed to protecting the personal data we collect. This Privacy Statement outlines how we collect, use, store, and safeguard your personal information. This statement applies to all users accessing or using the services provided by JITCS.
Information Collection We may collect personal information from you when you register as a user, submit manuscripts, or engage in any interactions with us. The information we collect may include your name, email address, institutional affiliation, and other relevant details necessary for your participation in JITCS-related activities.
Use of Information The personal information we collect is used for the following purposes: a. Managing the manuscript submission and review process, including communication with authors and reviewers. b. Sending notifications, updates, or information related to JITCS, its publications, and relevant activities. c. Analyzing and improving the functionality and performance of our website and services. d. Ensuring the security and integrity of our databases and information systems.
Information Storage We will retain your personal information for as long as necessary to fulfill the purposes outlined in this Privacy Statement. We implement appropriate security measures to protect your information from unauthorized access, disclosure, alteration, or destruction.
Information Sharing We do not sell, rent, or lease your personal information to third parties without your consent, except when required by law or as necessary to facilitate the operation of our services. In some cases, we may share your information with trusted third-party service providers who assist us in delivering our services while ensuring the confidentiality and security of your data.
Your Rights You have certain rights regarding your personal information. You have the right to access, correct, update, or delete your personal data held by JITCS. If you wish to exercise any of these rights or have any inquiries or concerns regarding your personal information, please contact us using the provided contact information.
Changes to the Privacy Statement We reserve the right to update or modify this Privacy Statement periodically to reflect changes in our practices or legal requirements. Any significant changes will be communicated through appropriate channels. We encourage you to review this Privacy Statement regularly to stay informed about how we protect your privacy.
By using the services provided by JITCS, you acknowledge and agree to the practices described in this Privacy Statement. We are committed to ensuring the privacy and security of your personal information and will take all reasonable measures to protect it.