Submissions

Login or Register to make a submission.

Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.
  • The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  • The submission file is in OpenOffice, Microsoft Word, or RTF document file format.
  • Where available, URLs for the references have been provided.
  • The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  • The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.

Author Guidelines

Journal Language

Papers will be accepted only in English.

Author Guidelines

Page numbers of submissions are limited (see publishing fees below)
If you in doubt about how to cite publications in your paper have a look at the IEEE Citation Reference.

What should you submit?

Submitted contributions undergo a double-blind review. In order to make this possible, please:

Submit an anonymized file without the authors' names.
Once your paper is accepted please upload a final DOC, DOCX, or RTF version with the authors' names in it. Please do not forget to add the authors at the beginning and in the CV section at the end of the paper.

Here is the Template you can use to write your manuscript

Article Processing Charges (APC): Free

Latest two weeks after submission authors will be informed about acceptance for review or rejection. Our average review time is 6 weeks.

This journal has no submission charges

Disclaimer

Responsibility for the contents rests upon the authors and not upon the IIASY, its committees/boards, or its members.

Articles

Section default policy

Privacy Statement

Introduction

Your privacy is important to International Journal of Cyber and IT Service Management (IJCITSM).  This privacy statement provides information about the personal information that IJCITSM collects, and the ways in which IJCITSM uses that personal information.

 Personal information collection

International Journal of Cyber and IT Service Management (IJCITSM) may collect and use personal information that is necessary for the processing and publication of manuscripts submitted to us. This information may include names, affiliation and contact details; including postal address, emails, phone numbers and fax numbers.

 Using personal information

Any personal information received by International Journal of Cyber and IT Service Management (IJCITSM) will only be used to: process and publish your manuscript. 

 administer this website;

  • personalize the website for you;
  • enable your access to and use of the website services;
  • process your manuscript;
  • publish your manuscript;
  • send to you communication about your manuscript;
  • send to you statements.

Where International Journal of Cyber and IT Service Management (IJCITSM) discloses your personal information to its agents or sub-contractors for these purposes, the agent or sub-contractor in question will be obligated to use that personal information in accordance with the terms of this privacy statement. 

In addition to the disclosures reasonably necessary for the purposes identified elsewhere above, International Journal of Cyber and IT Service Management (IJCITSM) may disclose your personal information to the extent that it is required to do so by law, in connection with any legal proceedings or prospective legal proceedings, and in order to establish, exercise or defend its legal rights.

 Securing your data

International Journal of Cyber and IT Service Management (IJCITSM) will take reasonable technical and organisational precautions to prevent the loss, misuse or alteration of your personal information. 

Cross-border data transfers

Information that International Journal of Cyber and IT Service Management (IJCITSM) collects may be stored and processed in and transferred between any of the countries in which IJCITSM operates to enable the use of the information in accordance with this privacy policy.

 In addition, personal information that you submit for publication on the website will be published on the internet and may be available around the world.

 You agree to such cross-border transfers of personal information.

 Updating this statement

International Journal of Cyber and IT Service Management (IJCITSM) may update this privacy policy by posting a new version on this website.  

 You should check this page occasionally to ensure you are familiar with any changes.  

 Other websites

This website contains links to other websites.  

International Journal of Cyber and IT Service Management (IJCITSM) is not responsible for the privacy policies or practices of any third party.

Contact International Journal of Cyber and IT Service Management (IJCITSM)

If you have any questions about this privacy policy or International Journal of Cyber and IT Service Management (IJCITSM) treatment of your personal information, please send an email to admin.ijcitsm@iiast-journal.org