Submissions

Online Submissions

Already have a Username/Password for Cybersecurity and Innovative Technology Journal?
Go to Login

Need a Username/Password?
Go to Registration

Registration and login are required to submit items online and to check the status of current submissions.

 

Author Guidelines

For Research Article

Title

Clear.

Abstract

Consists of the aims, the method, the main results, and the conclusion. It could be added the background and the implications.

Introduction

Consists of the research gap and the aims, it is be suggested to describe the previous studies to get the research gap.

Method

Using the appropriate method, it is be suggested to describe the participant, the instrument, the data collection, and the data analysis.

Results and Discussion

Consists of the results and the discussion, it is be suggested to strength the discussion using the relevant previous studies. It could be used the Table and/or the Figure.

Conclusion

Consist of the interpretation based on the results and the discussion to address the research question or the aims.

Suggestions (if any)

Consist of the recommendation to the future studies or the others based on the results and the discussion part.

Acknowledgment (if any)

Usually an acknowledgment to institution which funded the research or the participants who participated in the research.

References

Using the APA style

Or you can use this article template

For Review Article

Title

Clear.

Abstract

Consists of the aims, discussion, and the conclusion. It could be added the background and the implications.

Introduction

Consists of the background and rational of the study

Discussion

Discussion about the study, it is be suggested to strength the discussion using the relevant previous studies. 

Conclusion

Consist of the interpretation based on the discussion to address the aims.

Suggestions (if any)

Consist of the recommendation to the future studies or the others based on the discussion part.

Acknowledgment (if any)

Usually an acknowledgment to institution which funded the study.

References

Using the APA style

Or you can use this article template

 

Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.

  1. The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  2. The submission file is in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.
  3. Where available, URLs for the references have been provided.
  4. The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  5. The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines, which is found in About the Journal.
  6. If submitting to a peer-reviewed section of the journal, the instructions in Ensuring a Blind Review have been followed.
 

Copyright Notice

Copyright Notice

Creative Commons License

Cybersecurity and Innovative Technology Journal is licensed under a Creative Commons Attribution 4.0 International License

Authors who publish with Cybersecurity and Innovative Technology Journal agree to the term of journal retains copyright that the copyright is transferred to Cybersecurity and Innovative Technology Journal

 

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.