Editorial Policies

Editorial Policies

Focus and Scope

International Journal of Cyber and IT Service Management (IJCITSM) accepts articles in any technology related subjects and any research methodology that meet the standards established for publication in the journal. The primary, but not exclusive, audiences are academicians, graduate students, practitioners, and others interested in information system research.

The primary criterion for publication in International Journal of Cyber and IT Service Management (IJCITSM) is the significance of the contribution an article makes to the literature in technology area, the significance of the contribution and on the rigor of analysis and presentation of the paper. The acceptance decision is made based upon an independent review process that provides critically constructive and prompt evaluations of submitted manuscripts. International Journal of Cyber and IT Service Management (IJCITSM) invites manuscripts in the areas :

  • 3G/4G Network Evolution
  • Ad-Hoc, Mobile, Wireless Networks and Mobile Computing
  • Advanced Numerical Algorithms
  • Algorithms and Bioinformatics
  • Architectures and Computation Models, Compiler, Hardware and OS Issues
  • Artifial Intelligence& Pattern/Image Recognition
  • Authentication/Authorization Issues
  • CDMA/GSM Communication Protocol
  • Complex Systems: Modeling and Simulation
  • Computational Intelligence, Granular Computing and Soft Computing
  • Computational Science Aspects of Data Mining, Information Retrieval and Text Mining
  • Computer Architecture and Real Time Systems
  • Cryptography and Foundation of Computer Security
  • Data Base Management Systems (DBMS) & Information Retrieval
  • Data Visualization and Virtual Reality
  • Database and Data Mining
  • Dependable, Reliable and Autonomic Computing
  • Digital Signal Processing
  • Distributed and Parallel Systems & Algorithms
  • DSP/Image Processing/Pattern Recognition/Multimedia
  • e-Business Applications
  • Embedded System and Software
  • Foundations of High-performance Computing
  • Game and Software Engineering
  • Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
  • Grid and Scalable Computing
  • Hardware/Software Co-design and VLSI Support
  • Hybrid Computational Methods
  • IDS/Firewall, Anti-Spam mail, Anti-virus issues
  • Intelligent Information & Database Systems
  • IT policy and Business Management
  • Mobile Agent Computing
  • Mobile and Ubiquitous Computing
  • Mobile Computing for e-Commerce
  • Modeling and Simulation
  • Multimedia Systems and Services
  • Networking and Communications
  • New Algorithmic Approaches to Computational Kernels and Applications
  • Parallel and Distributed Systems
  • PKI (Public Key Infrastructures)
  • Possibility Theory, Bayes Network and Hidden Markov Models
  • Problem Solving Environments
  • Quality of Services and Communication Protocol
  • Scientific and Engineering Computing
  • Security and Information Assurance
  • Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Software Engineering
  • Theory of Parallel Processing and Distributed Computing
  • Web and Grid-based Computing and Simulation
  • Web and Internet Computing
  • Wireless Security System
  • Any other topics relevant to latest trends in Computer Science and Information Technologies
 

Section Policies

Articles

Checked Open Submissions Checked Indexed Checked Peer Reviewed
 

Peer Review Process

International Journal of Cyber and IT Service Management (IJCITSM) utilizes Single-blind Review Process for each submitted paper. Please see Editorial and Publishing Cycle for detail on our Peer-Review Policy.

No

International Journal of Cyber and IT Service Management (IJCITSM) Journal document

1.

Articles that are accepted for processing are articles that comply with the specified journal writing framework, which can be found here for more details

2.

Articles that are accepted for processing are articles that have met the journal checklists, for more details, see here

3.

The article review process is divided into 2 stages, review by editor and review by reviewer

4.

The review process by the Editor will involve checking the article writing where the only approved articles are written in accordance with the template

5.

After the article review process by the editor then the article will be processed again to be scanned (plagiarism scan) where the articles that pass the review stage of the Editor are only articles with scanned results

6.

Journals that have passed the review stage by the Editor will be reviewed by 2 reviewers

7.

Articles will be reviewed by a reviewer for a maximum of 14 days of work

8.

Reviewer's assessment process is fully based on the reviewer's assessment

9.

The revision process from reviewers is no later than 7 days after the review results are sent

10.

Submissions of revisions that exceed the specified limit will be automatically rejected

11.

Articles must be original with a plagiarism rate of <30%

 

Publication Frequency

The International Journal of Cyber and IT Service Management (IJCITSM) issues will be published twice a year, every April and October. The submission of a draft of the paper work is welcome anytime, and will be published in the upcoming issue. Every issue there will be 10 papers. Notification of acceptance takes at least 8 (eight) weeks from the paper submission date.

 

Open Access Statement

International Journal of Cyber and IT Service Management (IJCITSM) provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

International Journal of Cyber and IT Service Management (IJCITSM) are distributed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. is open access journal which means that all content is freely available without charge to users or institution. Users are allowed to read, download, copy, distribute, print, search, or link to full text articles in this journal without asking prior permission from the publisher or author. This is in accordance with Budapest Open Access Initiative.

Archiving

This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.

 

Publication Ethics

This statement clarifies ethical behavior of all parties involved in the act of publishing an article in International Journal of Cyber and IT Service Management (IJCITSM), including the authors, the editors, the peer-reviewers and the publisher International Institute for Advanced Science & Technology (IIAST) .

This statement is based on COPE’s Best Practice Guidelines for Journal Editors.

Ethical Guideline for Journal Publication

The publication of an article in a peer-reviewed International Journal of Cyber and IT Service Management (IJCITSM),  is an essential building block in the development of a coherent and respected network of knowledge. It is a direct reflection of the quality of the work of the authors and the institutions that support them. Peer-reviewed articles support and embody the scientific method. It is therefore important to agree upon standards of expected ethical behavior for all parties involved in the act of publishing: the authors, the journal editors, the peer reviewers, the publisher and the society.  

International Institute for Advanced Science & Technology (IIAST) as publisher of this Journal takes its duties of guardianship over all stages of publishing extremely seriously and we recognize our ethical and other responsibilities. We are committed to ensuring that advertising, reprint or other commercial revenue has no impact or influence on editorial decisions. In addition, ADI and Editorial Board of International Journal of Cyber and IT Service Management (IJCITSM) will assist in communications with other journals and/or publishers where this is useful and necessary.

Publication decisions

The editor in chief of International Journal of Cyber and IT Service Management (IJCITSM) is responsible for deciding which of the articles submitted to the journal should be published. The decision is based on the recommendation of the journal's editorial board members and reviewers. The journal abides by legal requirements as shall then be in force regarding libel, copyright infringement and plagiarism. The editor confers with the editorial team and reviewers in making this decision.

Non-Discrimination

The editors and reviewers evaluate manuscripts for intellectual content without regard to race, gender, sexual orientation, religious belief, ethnic origin, citizenship, or political philosophy of the authors.

Confidentiality

The editor, reviewers, and editorial staff must not disclose any information about a submitted manuscript to anyone other than the corresponding author, reviewers, potential reviewers, editorial team, and the publisher, as appropriate.

Disclosure and conflicts of interest

Unpublished materials disclosed in a submitted manuscript must not be used by any of the editorial board members and reviewers in their own research.

 

Duties of Reviewers

1. Contribution to Editorial Decisions

The journal uses Single-blind review process. The reviewers advise the editor-in-chief in making the editorial decision. The editor-in-chief communicates with authors, as required, and helps them in improving quality of their research paper.

2. Promptness

The journal editors are committed to provide timely review to the authors. If a reviewer does not submit his/her report in a timely manner, the paper is immediately sent to another qualified reviewer.

3. Confidentiality

Manuscript content is treated with at most confidentiality. The journal uses single blind process. Except for the editor-in-chief, the editors and reviewers cannot discuss paper with any other person, including the authors.

4. Standards of Objectivity

The editors and reviewers are required to evaluate papers based on the content. The review comment must be respectful of authors. The reviewers are required to justify their decision and recommendation.

5. Acknowledgement of Sources

Reviewers should identify relevant published work that has not been cited by the authors. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. A reviewer should also call to the editor's attention any substantial similarity or overlap between the manuscript under consideration and any other published paper of which they have personal knowledge.

6. Disclosure and Conflict of Interest

Privileged information or ideas obtained through peer review must be kept confidential and not used for personal advantage. Reviewers should not consider manuscripts in which they have conflicts of interest resulting from competitive, collaborative, or other relationships or connections with any of the authors, companies, or institutions connected to the papers.

 

Duties of Authors

1. Reporting standards

Authors should present an accurate account of the work performed as well as an objective discussion of its significance. Underlying data should be represented accurately in the paper. A paper should contain sufficient detail and references to permit others to replicate the work wherever possible. Fraudulent or knowingly inaccurate statements constitute unethical behavior and are unacceptable.

2. Data Access and Retention

Authors may be asked to provide the raw data in connection with a paper for editorial review. They should be prepared to provide such data within reasonable time.

3. Originality and Plagiarism

The authors should ensure that they have written entirely original works, and if the authors have used the work and/or words of others that this has been appropriately cited or quoted. Papers found with such problems are automatically rejected and authors are so advised.

4. Multiple, Redundant or Concurrent Publication

When a paper is submitted for possible publication, the submitting author makes a written statement that the paper has not been published not it is currently under publication with any other journal. Simultaneous submission is considered unethical and is therefore unacceptable.

5. Acknowledgment of Sources

Proper acknowledgment of the work of others is required. Authors must cite publications that have led to the authors’ current research.

6. Authorship of the Paper

Authorship should be limited to those who have made a significant contribution to the research reported in the manuscript. The corresponding author has a responsibility to keep co-authors posted with the review process. If accepted, all authors are required to give a signed statement that the research work is their original research work.

7. Hazards and Human or Animal Subjects

If the work involves chemicals, procedures or equipment that have any unusual hazards inherent in their use, the author must clearly identify these in the manuscript.

8. Disclosure and Conflicts of Interest

All authors should disclose in their manuscript any financial or other substantive conflict of interest that might be construed to influence the results or interpretation of their manuscript. All sources of financial support for the project should be disclosed.

9. Fundamental errors in published works

When an author discovers a significant error or inaccuracy in his/her own published work, it is the author’s obligation to promptly notify the journal editor or publisher and cooperate with the editor to retract or correct the paper.

 

Author Fees

The International Journal of Cyber ​​and IT Service Management (IJCITSM) charges authors.

Article Submission: 0 (IDR)
Authors must pay an Article Submission Fee as part of the submission process to contribute to the review fee.

Article processing fee / Article Publishing: 500,000 (IDR)
To support the costs of open access dissemination of research results, manage various costs associated with handling and editing submitted manuscripts. In general, management journals and publications, authors, or authors' institutions must pay a publication fee for each accepted article.

Cost includes:

- The default first page of the manuscript is twelve (12). A fee of 100,000 IDR per page will be charged for each additional page.

- DOI registration for each manuscript.

- Check the similarity of articles using Turnitin; the final result will be sent to the author (on request).

- Layout Editing according to templates and journal standards.

 

Waiver Policy

Discounts or reductions in part of the author's fees can be decided by the editor if there is a shortage of funds, the length of the manuscript submitted is excessive, or the author gave other reasonable reasons. The author must clearly state that he or she requested a waiver in the comments to the Editor box during the submission process. Waivers will most likely be denied if not requested at this stage. The waiver will not affect the review results.

 

Indexing 

International Journal of Cyber and IT Service Management (IJCITSM) Indexed in:

             

Screening for Plagiarism

Manuscripts submitted to this journal will be filtered for plagiarism using ithenticate applications with a similar level of maximum 30% when published.

The submitted manuscript would be check for plagiarism using by:

 

 

 

Self-Archiving of Papers Published Open Access

Authors publishing open access are encouraged to deposit the final published PDF in their institutional repository or any suitable subject repository on publication. Authors should provide a link from the deposited version to the URL of the published article on the journal's website; in all cases, the requirement to link to the journal’s website is designed to protect the integrity and authenticity of the scientific record, with the online published version on the journal’s website clearly identified as the definitive version of record.