Archiving Policy

The International Journal of Cyber Threats and Protection is committed to the long-term preservation and accessibility of its published content. Our archiving policy ensures that all research articles are securely stored and remain accessible to readers, researchers, and institutions worldwide. This policy outlines the steps taken to ensure that published content is archived and available for future access, while also adhering to best practices in digital preservation.

1. Long-Term Archiving

The International Journal of Cyber Threats and Protection ensures that all published articles are archived for long-term accessibility. We employ digital preservation services to guarantee that our content remains available, even as technologies evolve. The journal adheres to the following methods for archiving:

  • Digital Preservation Services: The journal deposits its content with trusted third-party archiving platforms, such as CLOCKSS (Controlled LOCKSS) and Portico, which are globally recognized services for the long-term preservation of digital scholarly content.

  • Institutional Repositories: Authors are encouraged to deposit their published articles in their institution’s repository, ensuring wider dissemination and long-term accessibility.

  • Public Access: All articles published in International Journal of Cyber Threats and Protection are freely available online through the journal’s open-access platform. These articles remain accessible for free indefinitely, subject to any legal or ethical guidelines that may apply.

2. Archiving of Published Content

  • Full Text Archiving: Once an article is published, the full text, including abstract, references, and any supplementary materials (e.g., datasets, figures, tables), is stored in the journal’s digital archive. The content is preserved in formats that are widely accessible and suitable for long-term storage, such as PDF and XML.

  • Metadata Preservation: In addition to the full-text articles, the journal also preserves the associated metadata, including author information, keywords, abstract, references, and publication date. This metadata is stored in formats compatible with digital preservation standards and aids in the discoverability of articles.

  • Indexing and Searchability: Articles are indexed and made searchable in global bibliographic databases, which ensures that content remains discoverable by researchers worldwide.

3. DOI (Digital Object Identifier)

Every article published in the International Journal of Cyber Threats and Protection is assigned a DOI (Digital Object Identifier) upon publication. The DOI is an internationally recognized identifier that provides a persistent link to the article, even if the article is moved to different platforms or repositories. This guarantees that the content can be easily found and cited by future readers and researchers.

4. Archive Accessibility

  • Open Access Model: As a fully open-access journal, the International Journal of Cyber Threats and Protection ensures that all articles are freely accessible to anyone, anywhere, without any paywall or subscription requirements. Archived content remains accessible through the journal’s website and partner platforms.

  • No Embargo Period: All articles are available immediately upon publication without any embargo period, allowing for the quickest dissemination of research findings. Archived content is accessible at all times.

  • Downloadable Formats: Published articles are available for download in widely used formats such as PDF, which can be saved, printed, or shared for future reference.

5. Backup Systems

The journal employs robust backup systems to ensure the integrity and security of its digital archives. All published content is regularly backed up to prevent data loss, and the backups are stored in secure locations. This ensures that articles remain available even in the event of technical failures or disasters.

6. Legal Compliance and Copyright

The International Journal of Cyber Threats and Protection adheres to all relevant copyright laws and legal frameworks regarding digital archiving. Authors retain the copyright to their work under the journal’s open-access model, and the journal provides appropriate licensing that ensures compliance with archiving standards.

7. Archiving of Supplemental Materials

In addition to the main article content, any supplemental materials such as datasets, figures, tables, or code are archived in a way that makes them available to readers. Authors are encouraged to upload supplementary materials to recognized repositories or the journal’s platform to ensure that the research is complete and reproducible.

8. Review and Updates

The archiving policy is periodically reviewed and updated to ensure compliance with best practices in digital preservation. The Editorial Board continually monitors changes in the field of digital archiving and updates the journal’s practices to reflect the latest advancements and standards.

9. Withdrawal and Retraction

If a paper is retracted or withdrawn from the journal, a notice of retraction or withdrawal will be clearly displayed in the article’s metadata, and the article will be removed from the active publication listings. However, the article will still remain part of the archive for transparency, with a clear explanation provided regarding the reason for retraction or withdrawal.

10. Commitment to Accessibility and Preservation

The International Journal of Cyber Threats and Protection is committed to the preservation of scholarly work in the field of cybersecurity and digital protection. We ensure that all research published in the journal remains accessible, discoverable, and preserved for future generations of researchers, scholars, and professionals.

Through this comprehensive archiving policy, the journal guarantees that its content will remain a valuable resource for the global research community.