Submissions

Login or Register to make a submission.

Author Guidelines

Authors are invited to make a submission to this journal. All submissions will be assessed by an editor to determine whether they meet the aims and scope of this journal. Those considered to be a good fit will be sent for peer review before determining whether they will be accepted or rejected.

Before making a submission, authors are responsible for obtaining permission to publish any material included with the submission, such as photos, documents and datasets. All authors identified on the submission must consent to be identified as an author. Where appropriate, research should be approved by an appropriate ethics committee in accordance with the legal requirements of the study's country.

An editor may desk reject a submission if it does not meet minimum standards of quality. Before submitting, please ensure that the study design and research argument are structured and articulated properly. The title should be concise and the abstract should be able to stand on its own. This will increase the likelihood of reviewers agreeing to review the paper. When you're satisfied that your submission meets this standard, please follow the checklist below to prepare your submission.

Submission Preparation Checklist

All submissions must meet the following requirements.

  • This submission meets the requirements outlined in the Author Guidelines.
  • This submission has not been previously published, nor is it before another journal for consideration.
  • All references have been checked for accuracy and completeness.
  • All tables and figures have been numbered and labeled.
  • Permission has been obtained to publish all photos, datasets and other material provided with this submission.

Articles

Section default policy

Privacy Statement

At the Journal of Information Technology, Cybersecurity, and Artificial Intelligence (JITCAI), we respect your privacy and are committed to protecting the personal information you share. This Privacy Statement explains how we collect, use, and safeguard your data when you visit our website or interact with our services.

1. Information We Collect

We collect the following types of information:

  • Personal Information: When you register, submit a manuscript, or interact with the website, we may collect personal details such as your name, email address, institutional affiliation, and contact information.

  • Technical Information: We may automatically collect information about your device, browsing actions, and usage patterns, including your IP address, browser type, and operating system, through cookies and similar tracking technologies.

2. How We Use Your Information

We use the information we collect for the following purposes:

  • To Manage Submissions and Peer Review: Personal information facilitates the manuscript submission and peer review process, including contacting authors, reviewers, and editors.

  • To Improve Our Services: Technical data helps us monitor website performance, improve user experience, and ensure the website's security.

  • To Communicate with You: We may use your contact information to send journal updates, notifications about submissions, and important announcements related to the journal.

3. Data Sharing

We do not sell, trade, or share your personal information with third parties except under the following circumstances:

  • Editorial Process: Information may be shared with editorial board members, reviewers, or technical staff to process submissions or address technical issues.

  • Legal Requirements: We may disclose personal information if required by law or in response to a valid request by public authorities.

4. Cookies and Tracking Technologies

We use cookies and similar technologies to enhance your browsing experience on our website. Cookies are small text files placed on your device to track your interaction with the site. You can turn off cookies in your browser settings, but doing so may limit the functionality of some parts of our website.

5. Data Security

We take appropriate technical and organizational measures to protect your personal information from unauthorized access, alteration, or destruction. However, no electronic storage or transmission method is 100% secure, and we cannot guarantee absolute security.

6. Your Rights

You have the right to:

  • Access: Request a copy of the personal information we hold about you.
  • Correction: Request corrections to any inaccurate or incomplete personal information.
  • Deletion: Request the deletion of your personal information, where applicable.
  • Withdraw Consent: You can withdraw your consent to receive communications from us anytime by contacting us.

7. Third-Party Links

Our website may contain links to external sites that are not responsible for third-party websites' privacy practices, and we encourage you to review their privacy policies.

8. Changes to This Privacy Statement

We may update this Privacy Statement from time to time. Any changes will be posted on this page with the updated date.