TEMPLATE |
Plagiarism Policy
Journal of Information Technology and Cyber Security (JITCS) follows publication ethics based on the Committee on Publication Ethics (COPE). Every author must ensure that the articles submitted to us are their own work and do not violate publication ethics, including plagiarism, fabrication, falsification, double publication, and other publication ethics violations. Any author citing the work of others must include proper source citations according to COPE's publication ethics and our citation policy. Articles submitted by authors will undergo plagiarism and similarity checks using similarity checking software such as Turnitin. We only tolerate similarity, including artificial intelligence (AI), of less than 20%. This checking will also be conducted at each stage of revision by the authors until the article is published to ensure that from the initial submission to publication, there are no issues with publication ethics violations such as plagiarism.