Submissions

Login or Register to make a submission.

Author Guidelines

Editorial Screening and Peer Review

All submissions undergo an initial editorial screening to ensure they meet the journal’s scope, scientific standards, ethical requirements, and formatting guidelines.
Manuscripts that do not meet these expectations may be desk-rejected before peer review.

Submissions that pass screening proceed to double-blind peer review, where at least two expert reviewers evaluate the scholarly quality, rigor, originality, clarity, and contribution of the work.

──────────────────────────────────────────

Manuscript Types Accepted

The journal accepts the following categories of scholarly work:

  • Original Research Articles – Full studies presenting new findings supported by methodology, data analysis, and interpretation.

  • Review Articles – Broad and analytical literature reviews that synthesize current knowledge and propose future research directions.

  • Case Studies – Real-world analyses of incidents, implementations, or organizational practices relevant to IT, cybersecurity, or AI.

  • Short Communications / Technical Notes – Concise reports describing focused results, prototypes, algorithms, or preliminary findings.

Word counts are flexible but must be appropriate for the depth and scope of the manuscript.

──────────────────────────────────────────

Scientific and Academic Standards

All manuscripts must:

  • Demonstrate clarity, rigor, originality, and scholarly contribution.

  • Include accurate and reproducible methodology when applicable.

  • Cite recent, credible, and relevant literature (preferably 2020–present).

  • Use clear academic writing and proper technical explanation.

  • Meet ethical, confidentiality, and data integrity requirements.

  • Follow IEEE citation style.

  • Have a similarity score below 15% (excluding references).

The editorial team may return or reject manuscripts that do not meet these minimum standards.

──────────────────────────────────────────

Information Consistency Requirement

The information entered into the submission system must match the manuscript exactly, including:

  • Title

  • Abstract

  • Keywords

  • Author names and affiliations

  • References

Submissions with mismatched information will be returned for correction.

──────────────────────────────────────────

Manuscript Structure

Research and review articles should follow the general IMRAD structure:

  1. Title

  2. Abstract (150–300 words)

  3. Keywords (3–6)

  4. Introduction

  5. Methods / Methodology

  6. Results

  7. Discussion

  8. Conclusion and Future Work

  9. Acknowledgments (optional)

  10. References (IEEE style)

Case studies and short communications may adjust structure as appropriate, while maintaining academic rigor and clarity.

──────────────────────────────────────────

Formatting Requirements

  • Main manuscript must be submitted as a single-column Word document (DOCX).

  • Use Times New Roman, 12-point font, 1.15 spacing.

  • Remove all author-identifying information from the manuscript for double-blind review.

  • Ensure figures, tables, and supplementary materials are high quality, clearly labeled, and captioned.

  • Equations must be typed, not inserted as images.

A manuscript template may be provided for authors to ensure consistency.

──────────────────────────────────────────

Supplementary Materials and Data

Authors are encouraged to upload any supplementary materials that support the evaluation of their work, including:

  • Data sets

  • Source code or pseudocode

  • Figures or tables

  • Appendices

  • Technical documentation

  • Permissions for copyrighted materials

  • Conflict of interest or ethics approvals

All supplemental files must be clearly labeled. This material may be published with the final article if appropriate.

──────────────────────────────────────────

Ethical and Legal Requirements

Authors must affirm that:

  • The submission is original and not under review elsewhere.

  • All authors approve the submission and authorship order.

  • Necessary permissions have been obtained for any third-party content.

  • Human or sensitive data follow institutional or national ethical guidelines.

  • Conflicts of interest (if any) are fully disclosed.

The editorial office may request supporting documentation at any stage.

──────────────────────────────────────────

Submission Preparation Checklist

Before submitting, authors must confirm that:

  1. The manuscript meets all requirements in the Author Guidelines.

  2. The study design and argument are clearly structured and articulated.

  3. All identifying information has been removed from the manuscript.

  4. All references are complete, accurate, and in IEEE style.

  5. All figures and tables are numbered and labeled.

  6. The manuscript is submitted as a single-column Word document.

  7. The information entered in the system matches the manuscript exactly.

  8. All permissions for external materials have been obtained.

  9. The similarity index is below 15%.

Articles

Articles published in this section include original research, comprehensive reviews, case studies, and short technical communications that contribute meaningful and academically rigorous findings to the fields of Information Technology, Cybersecurity, Digital Forensics, and Artificial Intelligence. Submissions must present clear research objectives, sound methodology, well-supported analysis, and conclusions grounded in evidence. All articles undergo an initial editorial screening followed by a double-blind peer-review process to ensure scientific quality, ethical integrity, and relevance to the journal’s scope. Manuscripts must adhere to the journal’s Author Guidelines, formatting requirements, and ethical standards before being considered for review.

Privacy Statement

At the Journal of Information Technology, Cybersecurity, and Artificial Intelligence (JITCAI), we respect your privacy and are committed to protecting the personal information you share. This Privacy Statement explains how we collect, use, and safeguard your data when you visit our website or interact with our services.

1. Information We Collect

We collect the following types of information:

  • Personal Information: When you register, submit a manuscript, or interact with the website, we may collect personal details such as your name, email address, institutional affiliation, and contact information.

  • Technical Information: We may automatically collect information about your device, browsing actions, and usage patterns, including your IP address, browser type, and operating system, through cookies and similar tracking technologies.

2. How We Use Your Information

We use the information we collect for the following purposes:

  • To Manage Submissions and Peer Review: Personal information facilitates the manuscript submission and peer review process, including contacting authors, reviewers, and editors.

  • To Improve Our Services: Technical data helps us monitor website performance, improve user experience, and ensure the website's security.

  • To Communicate with You: We may use your contact information to send journal updates, notifications about submissions, and important announcements related to the journal.

3. Data Sharing

We do not sell, trade, or share your personal information with third parties except under the following circumstances:

  • Editorial Process: Information may be shared with editorial board members, reviewers, or technical staff to process submissions or address technical issues.

  • Legal Requirements: We may disclose personal information if required by law or in response to a valid request by public authorities.

4. Cookies and Tracking Technologies

We use cookies and similar technologies to enhance your browsing experience on our website. Cookies are small text files placed on your device to track your interaction with the site. You can turn off cookies in your browser settings, but doing so may limit the functionality of some parts of our website.

5. Data Security

We take appropriate technical and organizational measures to protect your personal information from unauthorized access, alteration, or destruction. However, no electronic storage or transmission method is 100% secure, and we cannot guarantee absolute security.

6. Your Rights

You have the right to:

  • Access: Request a copy of the personal information we hold about you.
  • Correction: Request corrections to any inaccurate or incomplete personal information.
  • Deletion: Request the deletion of your personal information, where applicable.
  • Withdraw Consent: You can withdraw your consent to receive communications from us anytime by contacting us.

7. Third-Party Links

Our website may contain links to external sites that are not responsible for third-party websites' privacy practices, and we encourage you to review their privacy policies.

8. Changes to This Privacy Statement

We may update this Privacy Statement from time to time. Any changes will be posted on this page with the updated date.