International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN)
The International Journal of Cyber Threat Intelligence and Secure Networking (IJCTISN) is committed to upholding the highest standards of academic integrity and ethical publishing. Plagiarism in any form is considered a serious breach of publication ethics and is strictly prohibited.
This policy outlines the journal’s approach to identifying, handling, and preventing plagiarism in submitted and published manuscripts, in accordance with best practices and the guidelines of the Committee on Publication Ethics (COPE).
1. Definition of Plagiarism
Plagiarism includes, but is not limited to:
-
Direct copying of text, ideas, data, figures, or tables from another source without proper citation
-
Paraphrasing substantial portions of another work without appropriate acknowledgment
-
Self-plagiarism, including reuse of significant parts of an author’s previously published work without disclosure
-
Redundant or duplicate publication
-
Unauthorized use of unpublished data or confidential information
2. Similarity Checking
-
All manuscripts submitted to IJCTISN are screened using plagiarism detection software.
-
Similarity reports are carefully reviewed by the editorial team to distinguish acceptable overlap (e.g., references, methodology descriptions) from unethical copying.
-
A high similarity score does not automatically result in rejection; editorial judgment is applied in all cases.
3. Acceptable Similarity
-
Minor similarity due to commonly used terminology, references, or standard methodologies may be acceptable.
-
Manuscripts with significant unattributed overlap or improper citation practices will be rejected or returned for correction.
4. Handling Plagiarism Before Publication
If plagiarism is detected prior to publication:
-
The manuscript may be rejected outright in cases of serious plagiarism.
-
Authors may be asked to revise the manuscript to address minor or unintentional overlap.
-
In severe cases, the authors’ institutions or funding bodies may be notified.
5. Handling Plagiarism After Publication
If plagiarism is discovered after publication:
-
The journal will conduct a thorough investigation following COPE procedures.
-
Depending on the severity, actions may include publication of a correction, expression of concern, or retraction of the article.
-
Retracted articles will be clearly marked and linked to the original publication.
6. Author Responsibilities
Authors submitting to IJCTISN must:
-
Ensure that their work is original and properly cited
-
Clearly disclose any prior publication or reuse of content
-
Obtain permission for reuse of copyrighted material
-
Cooperate fully with any investigation related to plagiarism or ethical concerns
7. Responsibilities of Editors and Reviewers
-
Editors and reviewers are responsible for identifying potential plagiarism and reporting concerns to the editorial office.
-
All plagiarism allegations are handled confidentially, fairly, and transparently.
8. Ethical Commitment
IJCTISN is dedicated to preserving the integrity of the scholarly record and promoting ethical research and publication practices in the fields of cyber threat intelligence and secure networking.
Conclusion
By submitting a manuscript to the International Journal of Cyber Threat Intelligence and Secure Networking, authors acknowledge that they have read, understood, and agreed to comply with this Plagiarism Policy.