Plagiarism Policy

The International Journal of Cyber Threats and Protection adheres to strict plagiarism policies to uphold the integrity of research and maintain high standards in academic publishing. Plagiarism undermines the credibility of scientific research and is considered a serious ethical violation. Our plagiarism policy ensures that all submitted manuscripts are thoroughly checked for originality and that authors are held accountable for their work.

1. Definition of Plagiarism

Plagiarism is the act of using someone else's work, ideas, or words without proper attribution. This includes, but is not limited to:

  • Copying or paraphrasing sections of another person’s work without acknowledgment.
  • Reusing figures, tables, or data from other sources without proper citation.
  • Submitting work that has been previously published without disclosure, including self-plagiarism.
  • Presenting someone else’s research or findings as one’s own.

2. Plagiarism Detection Tools

The International Journal of Cyber Threats and Protection employs plagiarism detection software to screen all submitted manuscripts for originality. Manuscripts are checked against databases, published research, and other scholarly works to identify potential instances of plagiarism.

3. Procedures for Handling Plagiarism

  • Pre-Review Stage: During the initial submission process, manuscripts are assessed for plagiarism using specialized software. If significant plagiarism is detected (i.e., more than 20% of the manuscript matches existing sources), the manuscript will be rejected at this stage, and the author will be notified. In such cases, no review process will be initiated.

  • Post-Review Stage: If plagiarism is discovered after the manuscript has entered the peer review process, the Editorial Board will investigate the issue thoroughly. The author will be asked to provide explanations or correct the instances of plagiarism. If the plagiarism is deemed substantial or intentional, the manuscript will be rejected, and the author may be banned from submitting to the journal in the future.

  • Retraction of Published Papers: If plagiarism is detected in a manuscript that has already been published, the paper will be retracted from the journal. The retraction will be publicly acknowledged on the journal’s website and in the published issue, and a statement explaining the reason for the retraction will be included.

4. Consequences of Plagiarism

  • Immediate Rejection: If plagiarism is detected during the submission or review process, the manuscript will be rejected, and the author will be informed of the reason for rejection.

  • Ban from Future Submissions: Authors found to have engaged in plagiarism may be prohibited from submitting future manuscripts to the journal. Repeat offenders may face permanent bans from publishing with the International Journal of Cyber Threats and Protection.

  • Institutional Notification: In cases of severe or deliberate plagiarism, the journal may report the incident to the author’s institution or affiliated organization to ensure further investigation and uphold academic integrity.

5. Self-Plagiarism

Self-plagiarism, which occurs when an author reuses their own previously published work without proper citation or disclosure, is also considered a form of plagiarism. Authors are required to disclose any prior publications or substantial overlap with their previous works when submitting a manuscript. If significant self-plagiarism is detected, the manuscript will be rejected.

6. Prevention and Education

To prevent plagiarism, authors are encouraged to:

  • Properly cite all sources and provide clear attribution for all ideas, text, figures, and data derived from other works.
  • Ensure that all co-authors are properly credited for their contributions.
  • Use quotation marks for direct quotations and paraphrase in a way that acknowledges the original source.
  • Familiarize themselves with best practices for citation and plagiarism avoidance before submitting their manuscripts.

7. Ethical Guidelines for Authors

Authors must adhere to the following principles:

  • Proper Citation: Always credit the original source of any idea, figure, or data used in your work.
  • Transparency: Clearly state if your work has been published or is under review elsewhere. This includes submitting the manuscript to other journals concurrently.
  • Original Work: Ensure that all the work submitted is your own and has not been copied from other sources without proper acknowledgment.

8. Commitment to Integrity

The International Journal of Cyber Threats and Protection is dedicated to maintaining the highest standards of academic integrity and ensuring that the research it publishes is original and contributes to the scientific community. We strive to foster a scholarly environment where ethical practices are paramount, and we encourage authors to always act with honesty and transparency in their work.