Editorial Policies

Editorial Policies

Focus and Scope

International Journal of Cyber and Service Management (IJCITSM) is an international peer-reviewed journal that publishes high-quality and refereed papers which report original research and innovative applications in all areas of Computer Science, Informatics, Electronics Engineering, and Communication Network and Information Technologies. Papers for publication in the journal are selected through rigorous peer review to ensure originality, timeliness, relevance, and readability. The journal also seeks written surveys and review articles from experts in the field to promote an insightful understanding of state-of-the-art technology trends.

Topics of interest include but are not limited to:

1. Machine Learning : Techniques and applications of machine learning for various analytical and system development needs.
2. Cybersecurity : Protection of data and systems from evolving cyber threats.
3. Artificial Intelligence : Innovations and implementations of artificial intelligence across various technology sectors.
4. AI in Industry Forecasting : The use of AI in predicting industry trends and demands.
5. Big Data Analytics : Advanced analytical techniques for processing and understanding large-scale data.
6. Cybersecurity and Privacy : Focus on cybersecurity, data protection, and user privacy in the digital age.
7. Blockchain Technology : Implementation and innovation of blockchain technology across various industries.
8. Cloud and Edge Computing : Architecture, security, and efficiency of cloud and edge computing.
9. Quantum Computing : Research and applications of quantum computing for enhanced computational performance.
10. IoT and Smart Systems : Development and integration of the Internet of Things in smart systems for various applications.
11. Management and Digital Transformation: Innovative strategies for business sustainability, leadership, and decision making in dynamic environments.

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Peer Review Process

International Journal of Cyber and IT Service Management (IJCITSM) utilizes Double-blind Review Process for each submitted paper. Please see Editorial and Publishing Cycle for detail on our Peer-Review Policy.

No

International Journal of Cyber and IT Service Management (IJCITSM) Journal document

1.

Articles that are accepted for processing are articles that comply with the specified journal writing framework, which can be found here for more details

2.

Articles that are accepted for processing are articles that have met the journal checklists, for more details, see here

3.

The article review process is divided into 2 stages, review by editor and review by reviewer

4.

The review process by the Editor will involve checking the article writing where the only approved articles are written in accordance with the template

5.

After the article review process by the editor then the article will be processed again to be scanned (plagiarism scan) where the articles that pass the review stage of the Editor are only articles with scanned results

6.

Journals that have passed the review stage by the Editor will be reviewed by 2 reviewers

7.

Articles will be reviewed by a reviewer for a maximum of 14 days of work

8.

Reviewer's assessment process is fully based on the reviewer's assessment

9.

The revision process from reviewers is no later than 7 days after the review results are sent

10.

Submissions of revisions that exceed the specified limit will be automatically rejected

11.

Articles must be original with a plagiarism rate of <30%

 

Publication Frequency

The International Journal of Cyber and IT Service Management (IJCITSM) issues will be published twice a year, every April and October. The submission of a draft of the paper work is welcome anytime, and will be published in the upcoming issue. Every issue there will be 10 papers. Notification of acceptance takes at least 8 (eight) weeks from the paper submission date.

 

Open Access Statement

The International Journal of Cyber and IT Service Management (IJCITSM) is a fully open-access journal, ensuring that all published articles are freely accessible online to all users immediately upon publication. IJCITSM complies with the I4OC (Initiative for Open Citations) standard and is licensed under a Creative Commons Attribution License (CC BY 4.0).

You are free to:

  • Share — Copy and redistribute the material in any medium or format.
  • Adapt — Remix, transform, and build upon the material for any purpose, including commercial use.

Under the following terms:

  • Attribution — Proper credit must be given, along with a link to the license, and any modifications must be indicated. Attribution should be made in a reasonable manner that does not imply endorsement by the licensor.
  • No additional restrictions — No legal or technological measures may be applied that restrict others from using the material beyond what the license permits.

Notices:

  • The license does not apply to elements in the public domain or where usage is permitted by applicable exceptions or limitations.
  • No warranties are provided. The license may not grant all necessary permissions for specific uses. Additional rights, such as those related to publicity, privacy, or moral rights, may apply and should be considered before use.

Archiving

This journal utilizes the LOCKSS and CLOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.

Publication Ethics

This statement clarifies ethical behavior of all parties involved in the act of publishing an article in International Journal of Cyber and IT Service Management (IJCITSM), including the authors, the editors, the peer-reviewers and the publisher International Institute for Advanced Science & Technology (IIAST) .

This statement is based on COPE’s Best Practice Guidelines for Journal Editors.

Ethical Guideline for Journal Publication

The publication of an article in a peer-reviewed International Journal of Cyber and IT Service Management (IJCITSM),  is an essential building block in the development of a coherent and respected network of knowledge. It is a direct reflection of the quality of the work of the authors and the institutions that support them. Peer-reviewed articles support and embody the scientific method. It is therefore important to agree upon standards of expected ethical behavior for all parties involved in the act of publishing: the authors, the journal editors, the peer reviewers, the publisher and the society.  


Publisher and Editor

International Institute for Advanced Science & Technology (IIAST)
as publisher of this Journal takes its duties of guardianship over all stages of publishing extremely seriously and we recognize our ethical and other responsibilities. We are committed to ensuring that advertising, reprint or other commercial revenue has no impact or influence on editorial decisions. In addition, ADI and Editorial Board of International Journal of Cyber and IT Service Management (IJCITSM) will assist in communications with other journals and/or publishers where this is useful and necessary.

Publication decisions

The editor in chief of International Journal of Cyber and IT Service Management (IJCITSM) is responsible for deciding which of the articles submitted to the journal should be published. The decision is based on the recommendation of the journal editorial board members and reviewers. The journal abides by legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editor confers with the editorial team and reviewers in making this decision.

Fair Play

An editor at any time evaluate manuscripts for their intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.

Confidentiality

The editor, reviewers, and editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, editorial team, and the publisher, as appropriate.

Disclosure and conflicts of interest

Unpublished materials disclosed in a submitted manuscript must not be used by any of the editorial board members and reviewers in their own research.

Complaints Policy: 

We aim to respond to and resolve all complaints quickly and constructively. The procedures to investigate and resolve complaints followed by International Journal of Cyber and IT Service Management (IJCITSM) aims to be fair and balanced for those making complaints and for those being complained about. The complaint can be made by writing an email. All complaints will be acknowledged within five working days.

Duties of Reviewers

1. Contribution to Editorial Decisions

The journal uses Double-blind review process. The reviewers advise the editor-in-chief in making the editorial decision. The editor-in-chief communicates with authors, as required, and helps them in improving quality of their research paper.

2. Promptness

The journal editors are committed to provide timely review to the authors. If a reviewer does not submit his/her report in a timely manner, the paper is immediately sent to another qualified reviewer.

3. Confidentiality

Manuscript content is treated with at most confidentiality. The journal uses Double Blind process. Except for the editor-in-chief, the editors and reviewers cannot discuss paper with any other person, including the authors.

4. Standards of Objectivity

The editors and reviewers are required to evaluate papers based on the content. The review comment must be respectful of authors. The reviewers are required to justify their decision and recommendation.

5. Acknowledgement of Sources

Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.

6. Disclosure and Conflict of Interest

Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.

 

Duties of Authors

1. Reporting standards

Authors should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work wherever possible. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable.

2. Data Access and Retention

Authors may be asked to provide the raw data in connection with a paper for editorial review. They should be prepared to provide such data within reasonable time.

3. Originality and Plagiarism

The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted. Papers found with such problems are automatically rejected and authors are so advised.

4. Multiple, Redundant or Concurrent Publication

When a paper is submitted for possible publication, the submitting author makes a written statement that the paper has not been published not it is currently under publication with any other journal. Simultaneous submission is considered unethical and is therefore unacceptable.

5. Acknowledgment of Sources

Proper acknowledgment of the work of others is required. Authors must cite publications that have led to the authors’ current research.

6. Authorship of the Paper

Authorship should be limited to those who have made a significant contribution to the research reported in the manuscript. The corresponding author has a responsibility to keep co-authors posted with the review process. If accepted, all authors are required to give a signed statement that the research work is their original research work.

7. Hazards and Human or Animal Subjects

If the work involves chemicals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript.

8. Disclosure and Conflicts of Interest

All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.

9. Fundamental errors in published works

When an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.

 

Author Fees

The International Journal of Cyber ​​and IT Service Management (IJCITSM).

Article Submission: 
The author does not required to pay article submission fees as part of the submission process of articles in International Journal of Cyber ​​and IT Service Management (IJCITSM)

Article processing charges (APCs) / Article Publication: 0.00 (USD)
To support the open-access dissemination of research findings and manage various costs associated with handling and editing submitted manuscripts, journal management, and publication, authors or their institutions are required to pay a publication fee for each accepted article.

Fees charged include:
1. Standard first twelve (12) pages of the manuscript. For each additional page, an additional fee of 30 USD per page will be charged.
2. DOI registration for each paper. 
3. Checking the similarity of articles by Turnitin; the final result will be sent to the author (on request). 
4. Layout Editing according to journal templates and standards.

Waiver Policy

Discounts or reductions in part of the author's fees can be decided by the editor if there is a shortage of funds, the length of the manuscript submitted is excessive, or the author gave other reasonable reasons. The author must clearly state that he or she requested a waiver in the comments to the Editor box during the submission process. Waivers will most likely be denied if not requested at this stage. The waiver will not affect the review results.

 

Indexing 

International Journal of Cyber and IT Service Management (IJCITSM) Indexed in:

   
   
             

Screening for Plagiarism

Manuscripts submitted to this journal will be filtered for plagiarism using ithenticate applications with a similar level of maximum 30% when published.

The submitted manuscript would be check for plagiarism using by:

 

 

Self-Archiving of Papers Published Open Access

Authors publishing open access are encouraged to deposit the final published PDF in their institutional repository or any suitable subject repository on publication. Authors should provide a link from the deposited version to the URL of the published article on the journal's website; in all cases, the requirement to link to the journal’s website is designed to protect the integrity and authenticity of the scientific record, with the online published version on the journal’s website clearly identified as the definitive version of record.