•  
  •  
 

Instructions for Authors

Download the Author Instructions

Thank you for submitting your paper to the International Journal of Cybersecurity Intelligence and Cybercrime (the “Journal”). Your paper will receive the full attention of the journal’s editors and will be reviewed according to the following guidelines. Submissions that do not conform to the guidelines will be returned to the author.

General Submission Rules

  • You must be the author, or the authorized agent of the author(s) and copyright holder (if different from the author(s));
  • the author(s) must have approved the work for publication;
  • the author(s) must accept full responsibility for the content of the Article;
  • the Article must be the Author(s) original work and must not contain any libelous or unlawful statements or infringe on the rights or privacy of others or contain material or instructions that might cause harm or injury
  • the Article must not have been previously published, is not pending review elsewhere, and will not be submitted for review elsewhere pending the completion of the editorial decision process at the Journal.

By submitting the Article, you represent and warrant that the above are true.

Each article submitted will undergo the Journal's editorial decision process. The International Journal of Cybersecurity Intelligence and Cybercrime is not under any obligation to publish the Article. The Journal will send notices to the email address associated with your account.

Preparing Your Paper for Submission

  • Structure
    • The submission should be compiled in the following order: title page, abstract; keywords; main text introduction, materials and methods, results, discussion; acknowledgments; declaration of interest statement; references; appendices (as appropriate); table(s) with caption(s) (on individual pages); figures; figure captions (as a list). Any personally identifying information should be placed on the title page only. Do not include author(s)’s name in headers or footers. Use running titles on each page.
  • Word Limits
    • Academic papers: 6,000-9,000 words in length, including footnotes.
    • Policy papers: 3,000-5,000 words in length, including footnotes though not including references.
    • Case studies: 3,000-5,000 words in length, including footnotes.
    • Book reviews: 1,000-1,500 words in length, including footnotes though not including references.
  • Style Guidelines
    • Use American spelling consistently throughout the manuscript, except quotations that use alternative spelling styles.
    • Use double quotation marks, except when “a quotation is ‘within’ a quotation”.
    • Treat quotes longer than four lines as indented block quotes.
  • Formatting
    • Papers should be submitted as a Microsoft Word document (.docx) or as a Rich Text Format (.rtf) file.
  • Abstract
    • Limit the abstract to 250 words. [NOTE: Virtual Commons cannot accept video uploads because of the large size of video files. Authors wishing to submit a video abstract must provide a URL from which the video can be streamed and/or downloaded.]
  • Keywords
    • Limit the keywords to no more than six (6) terms. Prefer nomenclature common to the discipline or the topic.
  • Figures & Tables
    • Figures must be included in the manuscript, and not submitted as a separate file.
    • Figures should be high quality (1200 dpi for line art, 600 dpi for grayscale and 300 dpi for color). Figures should be saved as JPEG or PNG files.
    • Tables should present new information rather than duplicating what is in the text. Readers should be able to interpret the table without reference to the text. Please supply editable files.
  • Equations
    • Complex equations using mathematical symbols must be in an editable format. LaTeX format is preferred.
  • Units
    • Please use the International System of Units (i.e. meter, kilogram, second, ampere, kelvin, etc.)
  • References
    • Papers must be submitted using the APA citation format, including in-text citations and reference lists.
  • Supplemental Material
    • Supplemental materials may be submitted, if pertinent to content clarification. Supplemental materials can include videos, datasets, filesets, sound files, or anything that supports (and is pertinent to) the submitted paper.

Additional Information Required for Submissions

The following information will be requested during the online submission process.

Please be prepared to upload the following:

  • Title Page – Containing the paper’s title, names of all authors, the corresponding author, and bios for all authors.
  • Manuscript – Formatted as a Microsoft Word document (.docx) or a Rich Text Format (.rtf) file.

Please be prepared to enter the following:

  • Author Details – provide all authors’ full names (last or family name, first name); affiliations; postal addresses, telephone numbers; and primary email addresses. If applicable, include ORCIDs and social media handles (Facebook, Twitter, or LinkedIn). Please indicate the corresponding author.
    • Author affiliations are the affiliations where the research was conducted. If any of the names co-authors change affiliation during the peer review process, the new affiliation can be given as a footnote. Changes to affiliation cannot be made after the paper is accepted for publication.
  • Funding Details – Provide the details required by your funding and grant-awarding bodies as follows:
    • For single agency grants
      • This work was supported by the [Funding Agency] under Grant [number xxxx].
    • For multiple agency grants
      • This work was supported by the [Funding Agency #1] under Grant [number xxxx]; [Funding Agency #2] under Grant [number xxxx]; and [Funding Agency #3] under Grant [number xxxx].
  • Disclosure Statement
    • A disclosure statement is required to acknowledge any financial interest or benefit arising from the research. If a conflict of interest is discovered and not disclosed, the paper will be returned to the submitter and not accepted for publication.
  • Biographical Note
    • Provide a brief (less than 200 words) biographical note for each author.

Using Third-Party Material in your Paper

When reusing third-party material in your paper, you must obtain all necessary permissions and cite the original source appropriately. You may use short extracts of text and other types of material on a limited basis for the purpose of criticism or review, in which case it is not necessary to receive formal permission. Other than the cases mentioned above, you must obtain written permission from the copyright owner before using any material in your paper for which you do not hold the copyright.

Submitting your Paper

  • Submission Process
    • Submissions must be made using the online site. The submission process requires completion of the online form and uploading the manuscript and all additional files. The manuscript and title page should be uploaded during the initial submission stage. Supplemental material should be uploaded as additional files.

Copyright and Attribution

Copyright Policy

As a condition of publication in the International Journal of Cybersecurity Intelligence and Cybercrime, all authors agree to the following terms of licensing/copyright ownership:

  1. First publication rights to original work accepted for publication is granted to the Journal, but copyright for all Articles published in the Journal are retained by the author(s) or authorized agents.
  2. The Author(s) agree to grant to the Journal and its publisher a non-exclusive license to publish, print, copy, transmit, display, distribute, archive, index, revise, and create new works derived from the Article (including the right to grant sub-licenses to third parties to do all of the foregoing), for the duration of the Article’s copyright, in all languages, throughout the world, in all media and formats.
  3. Should the Article in the present or an altered form subsequently be published within another journal, anthology or other publication, the author(s) or authorized agents agree to cite the International Journal of Cybersecurity Intelligence & Cybercrime as the source of original publication.

Attribution

Reproduction, posting, transmission or other distribution or use of the article or any material therein, in any medium as permitted by written agreement of the International Journal of Cybersecurity Intelligence and Cybercrime, requires credit to the Journal as follows: “This Article originally appeared in International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) Vol. [#], Iss. [#], [year], pp. 00-00” and notify the Journal of such publication.

Additional Information

  • Publication Charges
    • There are no submission fees or page charges for this journal.
  • Queries

Types of Articles Accepted

Academic Papers / Empirical Studies

IJCIC invites submissions of original academic research papers on cybercrime, cyberattack, cyberterrorism, cybersecurity, digital forensic investigation, and other relevant topics across multiple disciplines. International and global perspectives on pertinent cybercrime and cybersecurity issues will also be considered. Academic research papers should be data driven, empirical research that uses either a quantitative, qualitative, or mixed methods approach. Academic papers should be between 6,000 to 9,000 words in length, including footnotes though not including reference. Papers must be submitted using the APA citation format, including in-text citations and reference lists.

Case Studies and Policy Papers

With the rise of experiential learning, cases studies remain a fundamental teaching tool in every subject area. Cases are a critical component to any social science or computer science curriculum. Authors published in IJCIC will enjoy wide dissemination of their work to a truly global audience, making a significant impact in the cybercrime and cybersecurity arena worldwide.

Cases from all cybercrime and computer science or cybersecurity disciplines will be considered. Cases must be factual, and releases must be available where necessary. IJCIC also invites submissions of articles relating to cases of cybercrime, cyberattack, cyberterrorism, cybersecurity, and digital forensic investigation, among other similar topics. Conceptual papers, original research, critical incidents and industry/technical notes, as well as the applied implications of others research in terms of case studies, are welcome for submission.

Book Reviews

Book reviews focus on recently-written works and offer brief descriptions of the text’s central points, in addition to evaluations of the strengths and weaknesses of the work. Books that highlight cybercrime patterns and trends, cybercrime prevention methods, and advanced cybersecurity methods and analytic techniques, among other related topics, are welcome for submission. Book reviews should be between 1,000 to 1,500 words in length, including footnotes, but excluding references. Authors must clearly acknowledge any work upon which they are building, both published and unpublished.