Authorship and Contributorship Policy

Authorship and Contributorship Policy for Journal of Information Technology and Cyber Security (JITCS)

Purpose:

Journal of Information Technology and Cyber Security (JITCS) follows the guidelines set by the Committee on Publication Ethics (COPE) regarding authorship and contributorship. This policy aims to ensure proper recognition and attribution of individuals who have made substantial contributions to the published articles in JITCS. Additionally, JITCS encourages the use of the Contributor Roles Taxonomy (CRediT) author statement to provide transparency in acknowledging the contributions of each author.

Policy:

  1. Definition of Authorship: a. Authorship should be based on substantial contributions to the conception, design, data collection, analysis, interpretation, or drafting of the article. b. All authors should have participated sufficiently in the work to take public responsibility for its content. c. The order of authorship should be determined based on the relative contributions of each individual, with the primary author responsible for the integrity of the work.

  2. CRediT Author Statement: a. JITCS encourages the use of the CRediT author statement to transparently acknowledge the contributions of each author. b. The CRediT author statement includes standardized roles such as Conceptualization, Methodology, Data Curation, Writing – Original Draft, Writing – Review & Editing, and others, allowing authors to specify their contributions.

  3. Changes in Authorship: a. Requests for changes in authorship, such as additions, deletions, or rearrangements of authors, after the article has been submitted or published, should be accompanied by a written explanation and agreement from all affected parties. b. Changes in authorship will be considered only in exceptional circumstances and with the approval of the editorial office.

Example of Authorship and Contributorship Statement with CRediT Author Statement in a Full-text PDF Article:

Authorship and Contributorship:

This article is protected by copyright, with the authors as the copyright holders. JITCS: Journal of Information Technology and Cyber Security acts as the first publisher of this article.

The authors of this article have met the criteria for authorship as defined by the JITCS Authorship and Contributorship Policy. They have made substantial contributions to the conception, design, data collection, analysis, interpretation, and drafting of the article.

The order of authorship reflects the relative contributions of each individual, with the primary author taking responsibility for the integrity of the work.

CRediT Author Statement:

The authors of this article contributed to the following roles as per the CRediT taxonomy:

  • [Author 1]: Conceptualization, Methodology, Writing – Original Draft
  • [Author 2]: Data Curation, Methodology, Writing – Review & Editing
  • [Author 3]: Conceptualization, Writing – Review & Editing

Please note that any changes in authorship after the article has been submitted or published require a written explanation and agreement from all affected parties, and will be considered only in exceptional circumstances with the approval of the JITCS editorial office.

Note: It is important for authors to adhere to the principles of authorship and contributorship, use the CRediT author statement, and consult the JITCS Authorship and Contributorship Policy for further guidance.