- Focus and Scope
- Article types
- Peer Review Process
- Open Access Policy
- Editorial Policies
- Authorship
- Publication Frequency
- Conflict of Interest
- Plagiarism
- Language
Focus and Scope
Information and Computer Security is an international Open Access journal that publishes original research articles and review articles related to all areas of information and computer security. This journal covers education, policies, standards, simulations and control of internet security.
Article types
Articles
Open Submissions | Indexed | Peer Reviewed |
Peer Review Process
All manuscripts are subjected to a stringent double blind peer review process. This is to uphold the high quality of papers published in this journal and ensure that the reporting of research work is truthful and precise.
- All submitted manuscript are firstly handled by our managing editor, who will check the manuscript for plagiarism, in which rejection of the manuscript can take place at this stage by the managing editor if plagiarism occurs in the manuscript.
- After the plagiarism check is completed and results are deemed satisfactory, the managing editor will pass the manuscript to the Editor-in-Chief who will undertake the peer review process, or at times pass the task to one of the Associate Editors.
- A minimum of 2 reviewers will be selected from the pool of reviewers available according to their expertise and suitability to the subject matter of the manuscript. Reviewers will have to give their comments and recommendations (Accept, Revisions Required, Resubmit for Review or Reject) to the Editor-in-Chief or Associate Editor for them to make a final decision on the paper, and their comments will help the authors improve their papers.
- Upon recommendations by the reviewers, the Editor-in-Chief or the Associate Editor can make a final decision on the paper and inform the author on their decision, adding comments to the Authors to make improvements in their research or paper.
- If the decision is to Accept Submission (no amendments required by author), the manuscript will be sent to the Editing stage.
- If Editor-in-Chief suggests Revisions Required (minor revisions), authors are given a maximum of 2 weeks to revise and resubmit the article.
- If Editor-in-Chief suggests Resubmit for Review (major revisions), authors are given a maximum of 4 weeks to revise and resubmit the article for the second round of review.
- If the decision is to Reject Submission, the author will be notified and the rejected manuscript will be archived and the peer review process ends.
- An accepted paper will be sent for Copy Editing, Layout Editing and Proofreading before publication. Correspondence between the authors and editors will be required here in order to improve the language and/or look of the manuscript. After the Editing stage is completed, authors are required to check the PDF file of the final version before the article is published. EnPress Publisher registers DOI for the manuscript after publication, in which the article is immediately accessible to the public.
- Authors may appeal for a rejected submission. Appeal requests must be made in writing to contact@enpress-publisher.com with detailed reasons for the appeal and point by point responses to the reviewers’ remarks. Decisions on appeals are final and no further consideration will be made.
Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
Editorial Policies
A manuscript would not be accepted if it has been published or is under consideration for publication in any other journal. The author also needs to notify the journal if the data presented in this paper has been ever presented in conferences.
After acceptance, the Publisher will have the right to edit the work for the original edition and for any revision.
Authorship
Authorship of a scholarly paper should be limited to individuals who have contributed substantially to its intellectual content. Participation solely in the acquisition of funding or general supervision of the research group is not sufficient for authorship. All authors should hold the responsibility of fairly evaluating their respective roles and their co-authors’ roles in the project. This is to ensure that authorship is attributed according to a fixed standard in all publications for which they will be listed as authors.
In order to be listed as an author for a paper, one should have contributed sufficiently in the project. A co-author is expected to have contributed to some component of the work which led to the paper, or be involved in interpretation of its results. All authors should have a say in the final approval of the version to be published, in addition to reviewing the final manuscript prior to submission.
Individuals who do not meet the above requirements, but have provided a valuable contribution to the work, may be acknowledged for their contribution as appropriate to the publication.
Publication Frequency
The publication frequency of Information and Computer Security is quarterly.
Conflict of Interest
Conflicts of interest may exist when professional judgements concerning a primary interest has the possibility of being influenced by a secondary interest (e.g.: financial gains). It is to be noted that even perceptions of conflicts of interest are as important as the actual conflicts of interest.
Any agreements with study sponsors (for profit or non-profit), which interfere with the authors’ access to the study data, ability to analyse or interpret the data and publish manuscripts independently according to their own decision, should be avoided by authors at all costs.
A declaration of interests for all authors must be received before an article can be reviewed and accepted for publication.
Plagiarism
Authors are advised to perceive high standards in the aspect of publication ethics. Any plagiarism (fabrication or falsification of data) are strictly unacceptable practices in Information and Computer Security, including duplicate publication of the author’s work without proper citation.
Every manuscript submitted for publication is checked for plagiarism via CrossCheck (powered by iThenticate) after submission and before being sent to the editor for editorial review. Any detection of overlapping and similar texts in the manuscripts submitted will be investigated promptly and may lead to the manuscript being rejected.
Language
The language used in manuscripts submitted to Information and Computer Security is English. Authors whose first language is not English may want to have their manuscripts professionally edited before the final submission to ensure that the academic content of the paper is fully understood by its prospective readers.