{"id":44,"date":"2025-09-02T18:28:39","date_gmt":"2025-09-02T18:28:39","guid":{"rendered":"https:\/\/academicsociety.org\/xe\/?page_id=44"},"modified":"2025-11-01T18:14:37","modified_gmt":"2025-11-01T18:14:37","slug":"editorial-policies","status":"publish","type":"page","link":"https:\/\/academicsociety.org\/aicyberjournal\/editorial-policies\/","title":{"rendered":"Editorial Policies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"44\" class=\"elementor elementor-44\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d22c168 e-flex e-con-boxed e-con e-parent\" data-id=\"d22c168\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5415ab3 elementor-widget elementor-widget-heading\" data-id=\"5415ab3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Editorial Policies<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4888d98 e-flex e-con-boxed e-con e-parent\" data-id=\"4888d98\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-426de5a e-con-full e-flex e-con e-child\" data-id=\"426de5a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51bc96b e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"51bc96b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-654544e elementor-widget elementor-widget-heading\" data-id=\"654544e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Journal Information<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-581a7ed e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"581a7ed\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aad62db hfe-nav-menu__breakpoint-none hfe-nav-menu__align-left hfe-submenu-icon-arrow hfe-link-redirect-child elementor-widget elementor-widget-navigation-menu\" data-id=\"aad62db\" data-element_type=\"widget\" data-settings=\"{&quot;padding_horizontal_menu_item&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;padding_vertical_menu_item&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;padding_horizontal_menu_item_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_horizontal_menu_item_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_vertical_menu_item_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_vertical_menu_item_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;menu_space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;menu_space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;menu_space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;dropdown_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;dropdown_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;dropdown_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;padding_horizontal_dropdown_item&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_horizontal_dropdown_item_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_horizontal_dropdown_item_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_vertical_dropdown_item&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:15,&quot;sizes&quot;:[]},&quot;padding_vertical_dropdown_item_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;padding_vertical_dropdown_item_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;distance_from_menu&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;distance_from_menu_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;distance_from_menu_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_size&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_size_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_size_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;toggle_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"navigation-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"hfe-nav-menu hfe-layout-vertical hfe-nav-menu-layout vertical\" data-layout=\"vertical\">\n\t\t\t\t<div role=\"button\" class=\"hfe-nav-menu__toggle elementor-clickable\" tabindex=\"0\" aria-label=\"Menu Toggle\">\n\t\t\t\t\t<span class=\"screen-reader-text\">Menu<\/span>\n\t\t\t\t\t<div class=\"hfe-nav-menu-icon\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<nav class=\"hfe-nav-menu__layout-vertical hfe-nav-menu__submenu-arrow\" data-toggle-icon=\"\" data-close-icon=\"\" data-full-width=\"\">\n\t\t\t\t\t<ul id=\"menu-1-aad62db\" class=\"hfe-nav-menu\"><li id=\"menu-item-281\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/\" class = \"hfe-menu-item\">Home<\/a><\/li>\n<li id=\"menu-item-282\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/about-the-journal\/\" class = \"hfe-menu-item\">About the Journal\u00a0<\/a><\/li>\n<li id=\"menu-item-283\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/aims-and-scope\/\" class = \"hfe-menu-item\">Aims and Scope<\/a><\/li>\n<li id=\"menu-item-284\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/archives\/\" class = \"hfe-menu-item\">Archives<\/a><\/li>\n<li id=\"menu-item-285\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/article-processing-charge\/\" class = \"hfe-menu-item\">Article Processing Charge<\/a><\/li>\n<li id=\"menu-item-286\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/author-instructions\/\" class = \"hfe-menu-item\">Author Instructions<\/a><\/li>\n<li id=\"menu-item-287\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/editorial-board\/\" class = \"hfe-menu-item\">Editorial Board<\/a><\/li>\n<li id=\"menu-item-288\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/editorial-policies\/\" class = \"hfe-menu-item\">Editorial Policies<\/a><\/li>\n<li id=\"menu-item-289\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/editorial-process\/\" class = \"hfe-menu-item\">Editorial Process<\/a><\/li>\n<li id=\"menu-item-290\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/for-reviewers\/\" class = \"hfe-menu-item\">For Reviewers<\/a><\/li>\n<li id=\"menu-item-291\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/guest-editor-guidelines\/\" class = \"hfe-menu-item\">Guest Editor Guidelines<\/a><\/li>\n<li id=\"menu-item-292\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/indexing-archiving\/\" class = \"hfe-menu-item\">Indexing &amp; Archiving<\/a><\/li>\n<li id=\"menu-item-293\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/online-submission\/\" class = \"hfe-menu-item\">Online Submission<\/a><\/li>\n<li id=\"menu-item-294\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/open-access-policy\/\" class = \"hfe-menu-item\">Open Access Policy<\/a><\/li>\n<li id=\"menu-item-295\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/plagiarism-policy\/\" class = \"hfe-menu-item\">Plagiarism Policy<\/a><\/li>\n<li id=\"menu-item-296\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/publication-ethics\/\" class = \"hfe-menu-item\">Publication Ethics<\/a><\/li>\n<li id=\"menu-item-297\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/reviewer-acknowledgment\/\" class = \"hfe-menu-item\">Reviewer Acknowledgment<\/a><\/li>\n<li id=\"menu-item-298\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/reviewer-guidelines\/\" class = \"hfe-menu-item\">Reviewer Guidelines<\/a><\/li>\n<li id=\"menu-item-299\" class=\"menu-item menu-item-type-post_type menu-item-object-page parent hfe-creative-menu\"><a href=\"https:\/\/academicsociety.org\/aicyberjournal\/to-be-a-reviewer\/\" class = \"hfe-menu-item\">To Be a Reviewer<\/a><\/li>\n<\/ul> \n\t\t\t\t<\/nav>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f1ff89 e-con-full toc e-flex e-con e-child\" data-id=\"5f1ff89\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3b261a5 e-con-full e-flex e-con e-child\" data-id=\"3b261a5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5d4418 elementor-widget elementor-widget-heading\" data-id=\"a5d4418\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c86d46a e-con-full e-flex e-con e-child\" data-id=\"c86d46a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55102a7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"55102a7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#EditorialPolicies\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Editorial Policies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#OpenAccessPolicy\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Open Access Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#CopyrightPolicy\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Copyright Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#CCBYLicense\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">CC BY License<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#EditorialFreedom\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Editorial Freedom<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PeerReviewPolicy\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Peer Review Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#PeerReviewers\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Peer Reviewers<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#Authorship\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Authorship<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ai\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Relevance to Cyber Forum-type Journals<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ConflictsofInterest\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Conflicts of Interest<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ebgee\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Editors, Board Members, Guest Editors, and Editorial Staff<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ResearchEthics\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Research Ethics<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#res\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Registration of Experimental Studies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#Confidentiality\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Confidentiality<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#dmap\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data and Materials Availability Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#CitationPolicy\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Citation Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#rcfp\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">References and Citation Formatting Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#MisconductPolicy\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Misconduct Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ccrp\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-double-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34zm192-34l-136-136c-9.4-9.4-24.6-9.4-33.9 0l-22.6 22.6c-9.4 9.4-9.4 24.6 0 33.9l96.4 96.4-96.4 96.4c-9.4 9.4-9.4 24.6 0 33.9l22.6 22.6c9.4 9.4 24.6 9.4 33.9 0l136-136c9.4-9.2 9.4-24.4 0-33.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Crossmark, Corrections, and Retractions Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b54b34 e-con-full e-flex e-con e-child\" data-id=\"3b54b34\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2749769 e-con-full scroll-section e-flex e-con e-child\" data-id=\"2749769\" data-element_type=\"container\" id=\"EditorialPolicies\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a5e9ae elementor-widget elementor-widget-heading\" data-id=\"6a5e9ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Editorial Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2e0abf e-con-full e-flex e-con e-child\" data-id=\"b2e0abf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da1ce00 elementor-widget elementor-widget-text-editor\" data-id=\"da1ce00\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em><span lang=\"EN-US\">AI &amp; Cyber Forum: An International Journal<\/span><\/em><span lang=\"EN-US\"> adheres to the highest standards of publication ethics and best practices in scholarly publishing. The journal fully endorses and follows the principles and guidelines of the <strong>Committee on Publication Ethics (COPE)<\/strong>, as well as other internationally recognized frameworks that promote integrity, transparency, and accountability in research dissemination.<\/span><\/p><p><span lang=\"EN-US\">The editorial team is committed to maintaining a fair, unbiased, and rigorous peer-review process to ensure the publication of high-quality research in artificial intelligence, cybersecurity, and related interdisciplinary domains.<\/span><\/p><p><span lang=\"EN-US\">All editorial policies are periodically reviewed and updated to align with global standards in academic publishing and to reflect emerging ethical and technological developments in AI and cyber research.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c917d34 e-con-full scroll-section e-flex e-con e-child\" data-id=\"c917d34\" data-element_type=\"container\" id=\"OpenAccessPolicy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcf92d5 elementor-widget elementor-widget-heading\" data-id=\"bcf92d5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Open Access Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e079ab2 elementor-widget elementor-widget-text-editor\" data-id=\"e079ab2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em><span lang=\"EN-US\">AI &amp; Cyber Forum: An International Journal<\/span><\/em><span lang=\"EN-US\"> operates under a <strong>fully open access publishing model<\/strong>, ensuring that all published articles are freely and permanently accessible online to readers worldwide. The journal does not impose any subscription or access charges.<\/span><\/p><p><span lang=\"EN-US\">All users are granted the right to <strong>read, download, copy, distribute, print, search, and link<\/strong> to the full text of articles, or to use them for any other lawful and non-commercial purpose, without seeking prior permission from the publisher or the authors.<\/span><\/p><p><span lang=\"EN-US\">This open access policy reflects the journal\u2019s commitment to the <strong>principles of open knowledge dissemination<\/strong>, promoting global visibility, accessibility, and the equitable sharing of advancements in artificial intelligence, cybersecurity, and related fields.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5896260 e-con-full scroll-section e-flex e-con e-child\" data-id=\"5896260\" data-element_type=\"container\" id=\"CopyrightPolicy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d52124d elementor-widget elementor-widget-heading\" data-id=\"d52124d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Copyright Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb08946 elementor-widget elementor-widget-text-editor\" data-id=\"bb08946\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">In <em>AI &amp; Cyber Forum: An International Journal<\/em>, authors retain <strong>copyright and full publishing rights<\/strong> to their work. By submitting a manuscript, authors agree to make their original research freely available for use, distribution, and reproduction in any medium, provided that <strong>proper credit is given to the authors and the original source<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">A <strong>copyright statement<\/strong> will be displayed on all published articles in HTML, PDF, and XML formats. Authors grant the journal the <strong>right of first publication<\/strong> by signing a <em>License to Publish<\/em> agreement prior to the formal publication of their manuscript.<\/span><\/p><p><span lang=\"EN-US\">Authors must ensure that their submission is <strong>original<\/strong>, has <strong>not been previously published<\/strong>, and is <strong>not under review<\/strong> by any other journal at the time of submission.<\/span><\/p><p><span lang=\"EN-US\">If a manuscript includes <strong>copyrighted materials<\/strong> (such as figures, tables, or images) from external sources, it is the author\u2019s responsibility to <strong>obtain necessary permissions<\/strong> and provide <strong>appropriate acknowledgments<\/strong> within the article.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-964193f e-con-full scroll-section e-flex e-con e-child\" data-id=\"964193f\" data-element_type=\"container\" id=\"CCBYLicense\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cf8a06 elementor-widget elementor-widget-heading\" data-id=\"1cf8a06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CC BY License<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fa775c elementor-widget elementor-widget-text-editor\" data-id=\"6fa775c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">All articles published in <em>AI &amp; Cyber Forum: An International Journal<\/em> are licensed under the terms of the <strong>Creative Commons Attribution (CC BY 4.0) License<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">This license supports the principles of <strong>open access<\/strong> and encourages the <strong>broad dissemination and reuse<\/strong> of scholarly work to advance knowledge and innovation.<\/span><\/p><p><span lang=\"EN-US\">Under this license, users are free to:<\/span><\/p><p><strong><span lang=\"EN-US\">Share<\/span><\/strong><span lang=\"EN-US\"> \u2013 copy and redistribute the material in any medium or format.<\/span><\/p><p><strong><span lang=\"EN-US\">Adapt<\/span><\/strong><span lang=\"EN-US\"> \u2013 remix, transform, and build upon the material for any purpose, including commercial use.<\/span><\/p><h4><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">Conditions of Use:<\/span><\/strong><\/h4><p><strong><span lang=\"EN-US\">Attribution<\/span><\/strong><span lang=\"EN-US\"> \u2013 Proper credit must be given to the original authors and source. A link to the license must be included, and any modifications made must be clearly indicated.<\/span><\/p><p><strong><span lang=\"EN-US\">No Additional Restrictions<\/span><\/strong><span lang=\"EN-US\"> \u2013 Users may not apply legal terms or technological measures that restrict others from exercising the rights granted under this license.<\/span><\/p><p><span lang=\"EN-US\">This licensing policy ensures that the research published in <em>AI &amp; Cyber Forum: An International Journal<\/em> remains freely accessible and reusable while maintaining full recognition of the authors\u2019 contributions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1069491 e-con-full scroll-section e-flex e-con e-child\" data-id=\"1069491\" data-element_type=\"container\" id=\"EditorialFreedom\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a52fe2 elementor-widget elementor-widget-heading\" data-id=\"6a52fe2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Editorial Freedom<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-031dafa elementor-widget elementor-widget-text-editor\" data-id=\"031dafa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em>AI &amp; Cyber Forum: An International Journal<\/em> upholds the principle of <strong>editorial independence<\/strong> to ensure the integrity and credibility of its scholarly publications. The <strong>Editor-in-Chief<\/strong> and <strong>Editorial Board Members<\/strong> maintain full authority over the journal\u2019s editorial content and publication timelines.<\/p><p>All editorial decisions \u2014 including manuscript review, selection, revision, and acceptance \u2014 are made <strong>solely on the basis of academic merit<\/strong>, originality, and the relevance of the work to the fields of artificial intelligence, cybersecurity, and related interdisciplinary areas.<\/p><p>The publisher does <strong>not interfere<\/strong> in editorial decisions, and <strong>commercial or institutional considerations<\/strong> do not influence the peer-review or publication process. This commitment ensures <strong>fairness, transparency, and integrity<\/strong> throughout the editorial workflow and publication process.<\/p><h3><strong>Key Editorial Policies &amp; Reference Links<\/strong><\/h3><table><thead><tr><td width=\"88\"><p><strong>Policy Area<\/strong><\/p><\/td><td width=\"156\"><p><strong>Description \/ Reference<\/strong><\/p><\/td><td width=\"308\"><p><strong>Official Link<\/strong><\/p><\/td><\/tr><\/thead><tbody><tr><td width=\"88\"><p><strong>Publication Ethics<\/strong><\/p><\/td><td width=\"156\"><p>Committee on Publication Ethics (COPE)<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/\">https:\/\/publicationethics.org\/<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Plagiarism Policy<\/strong><\/p><\/td><td width=\"156\"><p>IEEE\u2019s strict zero-tolerance policy on plagiarism<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/www.ieee.org\/publications\/rights\/plagiarism\/id-plagiarism.html\">https:\/\/www.ieee.org\/publications\/rights\/plagiarism\/id-plagiarism.html<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Authorship &amp; Contributions<\/strong><\/p><\/td><td width=\"156\"><p>COPE guidance on authorship and contributorship<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/authorship\">https:\/\/publicationethics.org\/authorship<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Conflict of Interest<\/strong><\/p><\/td><td width=\"156\"><p>COPE guidance on managing conflicts of interest<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/conflicts-of-interest\">https:\/\/publicationethics.org\/conflicts-of-interest<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Peer Review Policy<\/strong><\/p><\/td><td width=\"156\"><p>COPE Ethical Guidelines for Peer Reviewers<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/peerreview\">https:\/\/publicationethics.org\/peerreview<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Copyright &amp; Licensing (CC BY 4.0)<\/strong><\/p><\/td><td width=\"156\"><p>Creative Commons Attribution License<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">https:\/\/creativecommons.org\/licenses\/by\/4.0\/<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Open Access Policy<\/strong><\/p><\/td><td width=\"156\"><p>DOAJ Open Access Principles<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/doaj.org\/apply\/guide\/\">https:\/\/doaj.org\/apply\/guide\/<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Archiving &amp; Preservation<\/strong><\/p><\/td><td width=\"156\"><p>Portico digital preservation<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/www.portico.org\/\">https:\/\/www.portico.org\/<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>CLOCKSS<\/strong><\/p><\/td><td width=\"156\"><p>Controlled Lots of Copies Keep Stuff Safe<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/wame.org\/editorial-independence\">https:\/\/wame.org\/editorial-independence<\/a><\/p><\/td><\/tr><tr><td width=\"88\"><p><strong>Retraction &amp; Corrections<\/strong><\/p><\/td><td width=\"156\"><p>COPE Retraction Guidelines<\/p><\/td><td width=\"308\"><p>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/retraction-guidelines\">https:\/\/publicationethics.org\/retraction-guidelines<\/a><\/p><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8ce635 e-con-full scroll-section e-flex e-con e-child\" data-id=\"a8ce635\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10660e0 elementor-widget elementor-widget-heading\" data-id=\"10660e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Peer Review Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a513e0b elementor-widget elementor-widget-text-editor\" data-id=\"a513e0b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Peer Review Model<\/h3><p><em><span lang=\"EN-US\">AI &amp; Cyber Forum: An International Journal<\/span><\/em><span lang=\"EN-US\"> follows a <strong>single-blind peer review model<\/strong>, in which reviewers remain anonymous to authors, while authors\u2019 identities are visible to reviewers.<\/span><\/p><p><span lang=\"EN-US\">All submitted manuscripts (except invited Editorials or Special Reports) undergo a <strong>rigorous double-stage review process<\/strong> designed to ensure <strong>originality, technical accuracy, ethical integrity, and scientific contribution<\/strong> in the fields of <strong>Artificial Intelligence, Cybersecurity, Data Analytics, and Computational Systems<\/strong>.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41b2c8c e-con-full scroll-section e-flex e-con e-child\" data-id=\"41b2c8c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45fd410 elementor-widget elementor-widget-heading\" data-id=\"45fd410\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Peer Review Process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2353cc0 elementor-widget elementor-widget-text-editor\" data-id=\"2353cc0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4><strong>1. Initial Screening<\/strong><\/h4><p>Upon submission, each manuscript undergoes an <strong>initial technical and ethical assessment<\/strong> by the Managing Editor.<br \/>During this stage:<\/p><p>The submission is screened for <strong>plagiarism<\/strong> and <strong>AI-generated content misuse<\/strong> using standard similarity-checking tools.<\/p><p>The manuscript is evaluated for <strong>scope relevance<\/strong>, <strong>clarity<\/strong>, and <strong>adherence to formatting guidelines<\/strong>.<\/p><p>Submissions passing the screening are forwarded to an appropriate <strong>Academic Editor<\/strong> for further consideration.<\/p><p>(<em>Authors may access the Initial Check Form \u2014 available on the journal website \u2014 for transparency regarding screening criteria.<\/em>)<\/p><h4><strong>2. Editorial Evaluation<\/strong><\/h4><p>The <strong>Editor-in-Chief<\/strong> or a designated <strong>Section Editor\/Editorial Board Member<\/strong> assesses the manuscript\u2019s overall suitability for peer review.<br \/>Manuscripts that are out of scope, poorly structured, or lacking sufficient technical depth in AI or Cybersecurity may be <strong>declined at this stage<\/strong> with an editorial note.<\/p><h4><strong>3. External Peer Review<\/strong><\/h4><p>Manuscripts deemed suitable are sent to at least <strong>two independent domain experts<\/strong> for formal evaluation.<br \/>Each reviewer is selected based on expertise relevant to the paper\u2019s subject \u2014 e.g., <strong>machine learning<\/strong>, <strong>network security<\/strong>, <strong>cyber defense frameworks<\/strong>, <strong>deep learning applications<\/strong>, or <strong>AI ethics<\/strong>.<\/p><p>Reviewers assess the following:<\/p><p><strong>Novelty and significance<\/strong> of contribution to AI or Cybersecurity research<\/p><p><strong>Technical soundness<\/strong> of models, methods, and algorithms<\/p><p><strong>Data integrity<\/strong>, reproducibility, and result interpretation<\/p><p><strong>Relevance<\/strong> to academic and practical advancements in AI and Cyber systems<\/p><p><strong>Organization, readability, and clarity<\/strong> of presentation<\/p><p>Reviewers are expected to submit detailed, <strong>constructive feedback<\/strong> and an <strong>overall recommendation<\/strong> (Accept, Minor Revision, Major Revision, or Reject) within <strong>14 days<\/strong> of accepting the review invitation.<\/p><h4><strong>4. Decision Process<\/strong><\/h4><p>The assigned <strong>Academic Editor<\/strong> evaluates the reviewers\u2019 comments and recommendations to reach a <strong>final decision<\/strong>.<br \/>If the reports are inconsistent or inconclusive, the Editor may invite an <strong>additional expert reviewer<\/strong> to ensure fairness and balance.<br \/>All editorial decisions are made based on <strong>scientific merit<\/strong>, <strong>ethical compliance<\/strong>, and <strong>relevance to the journal\u2019s focus areas<\/strong>.<\/p><h3><strong>Editorial Board and Guest Editor Submissions<\/strong><\/h3><p>To maintain transparency, any manuscript submitted by an <strong>Editorial Board Member<\/strong> or <strong>Guest Editor<\/strong> is handled <strong>independently<\/strong> by another qualified editor with no conflict of interest.<br \/>Such submissions follow the same rigorous review process as any other manuscript.<\/p><h3><strong>Special Issue Manuscripts<\/strong><\/h3><p>Manuscripts submitted to <strong>Special Issues<\/strong> undergo the <strong>same peer review standards<\/strong> as regular papers.<br \/>The <strong>Editor-in-Chief<\/strong> provides oversight and ensures that <strong>Guest Editors<\/strong> adhere to the journal\u2019s ethical and review guidelines, maintaining consistency, impartiality, and academic excellence.<\/p><h3><strong>Reviewer Ethics and Confidentiality<\/strong><\/h3><p>All reviewers must follow the <strong>COPE Ethical Guidelines for Peer Reviewers<\/strong>.<br \/>They are required to:<\/p><p>Maintain strict <strong>confidentiality<\/strong> of all materials reviewed<\/p><p>Disclose any <strong>conflict of interest<\/strong> immediately<\/p><p>Evaluate submissions objectively without bias<\/p><p>Provide comments that are respectful, evidence-based, and constructive<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6980482 e-con-full scroll-section e-flex e-con e-child\" data-id=\"6980482\" data-element_type=\"container\" id=\"PeerReviewPolicy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8452b7 elementor-widget elementor-widget-heading\" data-id=\"f8452b7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Peer Reviewers Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4238521 elementor-widget elementor-widget-text-editor\" data-id=\"4238521\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Selection of Reviewers<\/h3><p><span lang=\"EN-US\">To ensure a fair and technically rigorous evaluation, <em>AI &amp; Cyber Forum: An International Journal<\/em> carefully selects peer reviewers based on their <strong>expertise, independence, and academic credibility<\/strong>. Reviewers are chosen according to the following criteria:<\/span><\/p><ul><li><span lang=\"EN-US\">They are <strong>independent<\/strong> of the authors and their affiliated institutions.<\/span><\/li><li>They possess <strong>subject-matter expertise<\/strong> in Artificial Intelligence, Cybersecurity, Data Science, or closely related fields relevant to the manuscript.<\/li><li>They have <strong>recent publications<\/strong> or demonstrated research contributions in the same or a similar domain.<\/li><li>They are capable of providing a <strong>balanced, unbiased, and timely evaluation<\/strong> of the work.<\/li><li>They adhere to the <strong>ethical and confidentiality standards<\/strong> set forth by the journal and COPE.<\/li><\/ul><h3>Author-Suggested Reviewers<\/h3><p><span lang=\"EN-US\">Authors are encouraged to <strong>recommend qualified reviewers<\/strong> with relevant expertise when submitting their manuscript. However, the <strong>final selection of reviewers<\/strong> rests solely with the journal\u2019s editorial team to maintain impartiality and integrity.<\/span><\/p><p><span lang=\"EN-US\">Suggested reviewers should meet the following conditions:<\/span><\/p><ul><li><span lang=\"EN-US\">Have a <strong>recent publication record<\/strong> in the relevant research area.<\/span><\/li><li><strong><span lang=\"EN-US\">Not have co-authored<\/span><\/strong><span lang=\"EN-US\"> or submitted a paper with any of the authors in the past three years.<\/span><\/li><li><strong><span lang=\"EN-US\">Not share current or recent institutional affiliation<\/span><\/strong><span lang=\"EN-US\"> with any author.<\/span><\/li><li><strong><span lang=\"EN-US\">Not have ongoing research collaborations<\/span><\/strong><span lang=\"EN-US\"> or personal relationships with any author.<\/span><\/li><li><strong><span lang=\"EN-US\">Not possess any financial or professional conflict of interest<\/span><\/strong><span lang=\"EN-US\"> related to the submitted work.<\/span><\/li><\/ul><p><span lang=\"EN-US\">Authors must provide the following details for each suggested reviewer:<\/span><\/p><p><span lang=\"EN-US\"><strong>Full name, institutional affiliation, official email address, area of expertise, and ORCID ID (if available).<\/strong><\/span><\/p><h3>Reviewer Responsibilities<\/h3><p><span lang=\"EN-US\">Reviewers play a critical role in maintaining the <strong>quality and credibility<\/strong> of research published in <em>AI &amp; Cyber Forum: An International Journal<\/em>. All reviewers are expected to:<\/span><\/p><ul><li><strong><span lang=\"EN-US\">Declare any potential conflict of interest<\/span><\/strong><span lang=\"EN-US\"> before accepting a review assignment.<\/span><\/li><li><strong><span lang=\"EN-US\">Maintain confidentiality<\/span><\/strong><span lang=\"EN-US\"> of the review process and refrain from sharing or discussing manuscript content.<\/span><\/li><li><strong><span lang=\"EN-US\">Destroy or delete<\/span><\/strong><span lang=\"EN-US\"> manuscript copies upon completion of the review.<\/span><\/li><li><strong><span lang=\"EN-US\">Provide objective, evidence-based, and constructive feedback<\/span><\/strong><span lang=\"EN-US\">, free from bias related to nationality, gender, religion, institutional affiliation, or personal beliefs.<\/span><\/li><li><strong><span lang=\"EN-US\">Report suspected academic misconduct<\/span><\/strong><span lang=\"EN-US\">, such as plagiarism, duplicate publication, or fabricated data, to the editorial office immediately.<\/span><\/li><li><strong><span lang=\"EN-US\">Avoid coercive citation practices<\/span><\/strong><span lang=\"EN-US\">, such as suggesting unnecessary references to their own work.<\/span><\/li><li><strong><span lang=\"EN-US\">Submit review reports on time<\/span><\/strong><span lang=\"EN-US\">, or request an extension promptly if additional time is required.<\/span><\/li><\/ul><h3>Roles of Participants in the Peer Review Process<\/h3><h4>Managing Editor<\/h4><p><span lang=\"EN-US\">Conducts initial <strong>screening for plagiarism<\/strong> (using tools such as <a href=\"https:\/\/www.ithenticate.com\/\" target=\"_new\">iThenticate<\/a>), <strong>scope relevance<\/strong>, and <strong>format compliance<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">Identifies and assigns appropriate reviewers.<\/span><\/p><p><span lang=\"EN-US\">Coordinates communication between authors, reviewers, and editors throughout the process.<\/span><\/p><h4>Academic Editor<\/h4><p><span lang=\"EN-US\">Oversees the <strong>peer review process<\/strong> from start to decision.<\/span><\/p><p><span lang=\"EN-US\">Evaluates reviewer reports and recommendations to make a <strong>final decision<\/strong> (Accept, Minor Revision, Major Revision, or Reject).<\/span><\/p><p><span lang=\"EN-US\">Ensures adherence to ethical and quality standards.<\/span><\/p><p><span lang=\"EN-US\">Typically serves as the <strong>Editor-in-Chief<\/strong> or a <strong>designated Editorial Board Member<\/strong>, though Guest Editors or subject experts may also perform this role for special issues.<\/span><\/p><p><span lang=\"EN-US\">The <strong>Academic Editor\u2019s name<\/strong> is published alongside the article upon acceptance, ensuring transparency and accountability.<\/span><\/p><h3>Peer Review Guidelines<\/h3><p><span lang=\"EN-US\">The journal follows the <strong>COPE Ethical Guidelines for Peer Reviewers<\/strong> and adheres to best practices in AI and cybersecurity research publishing.<br \/>These principles promote <strong>transparency, fairness, and academic integrity<\/strong>, helping ensure that every manuscript published in <em>AI &amp; Cyber Forum: An International Journal<\/em> meets the highest scientific standards.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bf9211 e-con-full scroll-section e-flex e-con e-child\" data-id=\"3bf9211\" data-element_type=\"container\" id=\"Authorship\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a344460 elementor-widget elementor-widget-heading\" data-id=\"a344460\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Authorship<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6650704 elementor-widget elementor-widget-text-editor\" data-id=\"6650704\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Authorship Criteria<\/strong><\/h3><p><em>AI &amp; Cyber Forum: An International Journal<\/em> follows the <strong>authorship principles recommended by the Committee on Publication Ethics (COPE)<\/strong> (<a href=\"https:\/\/publicationethics.org\/\">https:\/\/publicationethics.org\/<\/a>) and other internationally recognized best practices in scholarly publishing.<\/p><p>To qualify as an author, each contributor must meet <strong>all<\/strong> of the following conditions:<\/p><p><strong>Substantial Contribution<\/strong> \u2013 Made significant intellectual contributions to the conception, design, development, experimentation, data collection, or analysis of the research work; <strong>and<\/strong><\/p><p><strong>Manuscript Preparation<\/strong> \u2013 Participated in drafting or critically revising the manuscript for important intellectual content; <strong>and<\/strong><\/p><p><strong>Approval<\/strong> \u2013 Reviewed and approved the final version of the manuscript prior to submission; <strong>and<\/strong><\/p><p><strong>Accountability<\/strong> \u2013 Agreed to be accountable for the accuracy, integrity, and ethical standards of the entire work.<\/p><p>Individuals who do not meet all four criteria should be acknowledged appropriately but not listed as authors.<\/p><h3><strong>Corresponding Author<\/strong><\/h3><p>For manuscripts with multiple authors, one author must be designated as the <strong>Corresponding Author<\/strong>.<br \/>The Corresponding Author is responsible for:<\/p><p>Managing all communication with the journal during submission, review, and publication.<\/p><p>Ensuring that all authors meet the authorship criteria and have approved the final manuscript.<\/p><p>Submitting all required <strong>conflict of interest<\/strong>, <strong>funding<\/strong>, and <strong>ethical compliance<\/strong> statements.<\/p><p>Responding to editorial or post-publication queries regarding data, methodology, or interpretation.<\/p><p>The Corresponding Author acts as the <strong>primary guarantor<\/strong> of the integrity of the published work.<\/p><h3><strong>Equal \/ Dual Authorship<\/strong><\/h3><p>The journal recognizes <strong>equal (dual) first authorship<\/strong> or <strong>dual corresponding authorship<\/strong> where two contributors have made equivalent intellectual and practical contributions.<br \/>Such contributions must be <strong>clearly indicated<\/strong> in the <em>Author Contributions<\/em> section of the manuscript.<\/p><h3><strong>Group Authorship<\/strong><\/h3><p>For large collaborative research projects or consortium-based studies, <strong>group authorship<\/strong> is permitted.<br \/>The group should collectively decide which members meet the authorship criteria.<br \/>Group names may appear in the author list, but <strong>individual contributors must be identified<\/strong>, and all must be accountable for the work\u2019s integrity and validity.<\/p><h3><strong>Authorship Disputes<\/strong><\/h3><p>Determining authorship order and contributions is the <strong>collective responsibility of the authors<\/strong> prior to submission.<br \/>Editors will <strong>not adjudicate authorship disputes<\/strong>.<br \/>In the event of disagreements, the issue must be resolved by the authors\u2019 affiliated institutions, following <strong>COPE guidance<\/strong> on authorship issues:<br \/>\ud83d\udd17 <a href=\"https:\/\/publicationethics.org\/guidance\/flowchart\/how-spot-authorship-problems\">How to Spot Authorship Problems<\/a><\/p><h3><strong>Authorship Changes<\/strong><\/h3><p>Requests for any change in authorship \u2014 including addition, removal, or rearrangement of author names \u2014 are only accepted <strong>before manuscript acceptance<\/strong>.<br \/>Such requests must include:<\/p><p>A <strong>formal written statement<\/strong> explaining the reason for the change.<\/p><p><strong>Signed consent<\/strong> from all existing authors and from the author(s) being added or removed.<\/p><p>No changes will be allowed after acceptance or publication, except in exceptional cases approved by the Editor-in-Chief.<\/p><h3><strong>Author Contributions (CRediT Taxonomy)<\/strong><\/h3><p>The journal mandates the use of the <strong>CRediT (Contributor Roles Taxonomy)<\/strong> (<a href=\"https:\/\/credit.niso.org\/\">https:\/\/credit.niso.org\/<\/a>) to specify each author\u2019s contribution.<br \/>The <em>Author Contributions<\/em> statement must appear in the <em>Declarations<\/em> section of the manuscript, using standard categories such as:<\/p><ul><li>Conceptualization<\/li><li>Methodology<\/li><li>Software<\/li><li>Validation<\/li><li>Formal Analysis<\/li><li>Investigation<\/li><li>Writing \u2013 Original Draft<\/li><li>Writing \u2013 Review &amp; Editing<\/li><li>Supervision<\/li><li>Funding Acquisition<\/li><\/ul><p>This ensures transparency and accountability in collaborative AI and Cybersecurity research.<\/p><h3>\u00a0<strong>ORCID Identification<\/strong><\/h3><p>All authors are <strong>strongly encouraged<\/strong> to provide their <strong>ORCID iD<\/strong> (<a href=\"https:\/\/orcid.org\/\">https:\/\/orcid.org\/<\/a>) during submission.<br \/>ORCID ensures accurate author identification, helps connect research outputs across systems, and prevents confusion between similar author names.<\/p><h3>\u00a0<strong>Acknowledgments<\/strong><\/h3><p>Individuals who contributed to the research but do not meet authorship criteria \u2014 such as those providing <strong>technical assistance<\/strong>, <strong>language editing<\/strong>, <strong>administrative support<\/strong>, or <strong>data access<\/strong> \u2014 should be appropriately acknowledged in the manuscript.<br \/>Authors must obtain consent from those being acknowledged.<\/p><h3>\u00a0<strong>Use of AI and AI-Assisted Technologies<\/strong><\/h3><p>AI tools or technologies <strong>cannot<\/strong> be listed as authors.<\/p><p>Authors may use <strong>AI-assisted tools<\/strong> (e.g., for grammar correction, language improvement, or formatting) <strong>only<\/strong> for readability enhancement \u2014 <strong>not<\/strong> for generating data, analysis, or novel scientific insights.<\/p><p>Authors must clearly disclose any AI tool usage (e.g., ChatGPT, Copilot, Gemini, etc.) in the <em>Acknowledgment or Methodology<\/em> section.<br \/>Failure to disclose AI tool use, or misrepresentation of AI-generated content as original human work, will be treated as <strong>scientific misconduct<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1965048 e-con-full scroll-section e-flex e-con e-child\" data-id=\"1965048\" data-element_type=\"container\" id=\"ai\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c57dc9c elementor-widget elementor-widget-heading\" data-id=\"c57dc9c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Relevance to Cyber Forum-type Journals<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee845b0 elementor-widget elementor-widget-text-editor\" data-id=\"ee845b0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>AI and Data Science Context:<\/strong> Since the journal covers <em>Artificial Intelligence, Machine Learning, and Computational Technologies<\/em>, an explicit <strong>AI Use Policy<\/strong> is crucial for maintaining ethical standards.<\/p><p><strong>Prevention of AI Misuse:<\/strong> It prevents authors from using generative AI to fabricate research results, code, or datasets.<\/p><p><strong>Maintains Research Integrity:<\/strong> Ensures that AI is used only for language improvement\u2014not for creating scientific content\u2014thus upholding originality and accountability.<\/p><p><strong>Aligns with COPE and International Guidelines:<\/strong> Follows best practices recommended by COPE, IEEE, Elsevier, Springer, and other major publishers.<\/p><h3><strong>Recommended Section Title<\/strong><\/h3><p>For your <strong>Cyber Forum Journal<\/strong>, use the following formatted section heading:<\/p><h4><strong>AI and AI-Assisted Technologies Policy<\/strong><\/h4><p>This section clearly defines:<\/p><p>Permitted use of AI tools (e.g., grammar checking, readability enhancement)<\/p><p>Prohibited use (e.g., data generation, analysis, or research design)<\/p><p>Mandatory disclosure example for transparency<\/p><p>Accountability statement confirming that human authors bear full responsibility.<\/p><h3><strong>Suggested Add-on Line for Cyber Forum Context<\/strong><\/h3><p>You can include this short addition at the end for a domain-specific touch:<\/p><p>Given the journal\u2019s focus on Artificial Intelligence and related technologies, authors are particularly encouraged to ensure transparency in the use of any AI tools during manuscript preparation. The journal reserves the right to request additional clarification on AI use during peer review.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f690d1b e-con-full scroll-section e-flex e-con e-child\" data-id=\"f690d1b\" data-element_type=\"container\" id=\"ConflictsofInterest\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcb2d9a elementor-widget elementor-widget-heading\" data-id=\"dcb2d9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conflicts of Interest<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b0e5c elementor-widget elementor-widget-text-editor\" data-id=\"d4b0e5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Definition<\/strong><\/h3><p>A <em>conflict of interest (COI)<\/em> arises when an individual\u2019s professional judgment or objectivity regarding a manuscript may be influenced by secondary interests\u2014whether personal, financial, institutional, or academic. Such conflicts may be <strong>real, potential, or perceived<\/strong>.<\/p><p><strong>Examples include:<\/strong><\/p><p><strong>Financial interests:<\/strong> employment, consultancy, stock ownership, patents, paid expert testimony, or honoraria.<\/p><p><strong>Academic or professional relationships:<\/strong> collaborations, institutional affiliations, editorial roles, or direct competition.<\/p><p><strong>Personal factors:<\/strong> close friendships, family ties, rivalries, or strong ideological or political beliefs.<\/p><p>The journal emphasizes <strong>transparency and impartiality<\/strong> to preserve the integrity of the peer review and publication process.<\/p><h3><strong>Authors<\/strong><\/h3><p>Authors must provide a <strong>Conflict of Interest Statement<\/strong> at the end of their manuscript.<\/p><p>If no conflicts exist, the following statement should be included:<\/p><p>The authors declare that they have no conflicts of interest related to this work.<\/p><p>The <strong>corresponding author<\/strong> bears responsibility for collecting and reporting COI disclosures for all co-authors.<\/p><h3><strong>Reviewers<\/strong><\/h3><p>Reviewers must disclose any potential conflicts (such as recent collaborations, institutional connections, or financial interests) <strong>when invited<\/strong> to review a manuscript.<\/p><p>If a conflict exists, reviewers should <strong>decline the review invitation<\/strong> or notify the editorial office so the editors can determine whether the review may proceed impartially.<\/p><h3><strong>Editors, Editorial Board Members, and Staff<\/strong><\/h3><p>Editors, guest editors, and editorial staff are required to declare any conflicts related to manuscripts they handle.<\/p><p>In cases of conflict:<\/p><p>The editor must <strong>recuse themselves<\/strong> from the review and decision process.<\/p><p>Manuscripts submitted by <strong>editorial board members or guest editors<\/strong> will be handled independently by another qualified editor to ensure fairness and transparency.<\/p><h3><strong>Funding Disclosure<\/strong><\/h3><p>Authors must clearly acknowledge <strong>all funding sources<\/strong> that supported the work, including the names of funding agencies and grant numbers, in the \u201cFunding\u201d section of the manuscript.<\/p><p>They must also specify the <strong>role of the sponsor<\/strong> (if any) in:<\/p><ul><li>Study design,<\/li><li>Data collection and analysis,<\/li><li>Manuscript preparation, or<\/li><li>The decision to publish.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a3c78d e-con-full scroll-section e-flex e-con e-child\" data-id=\"0a3c78d\" data-element_type=\"container\" id=\"ebgee\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d9b7e elementor-widget elementor-widget-heading\" data-id=\"48d9b7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Editors, Board Members, Guest Editors, and Editorial Staff<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5a69d0 elementor-widget elementor-widget-text-editor\" data-id=\"a5a69d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">All editors, board members, guest editors, and editorial staff are required to <strong>disclose any potential conflicts of interest<\/strong> related to the manuscripts they handle.<br \/>A <strong>Conflict of Interest Disclosure Form<\/strong> (\ud83d\udd17 <em>download link to be provided<\/em>) must be completed before handling submissions.<\/span><\/p><p><span lang=\"EN-US\">If an editor\u2019s <strong>personal, financial, institutional, or academic interests<\/strong> could compromise\u2014or be perceived to compromise\u2014their impartiality, they must promptly notify the editorial office and <strong>recuse themselves<\/strong> from the editorial process for that manuscript.<br \/>In such cases, the <strong>Editor-in-Chief<\/strong> will reassign the submission to another qualified and independent editor.<\/span><\/p><p><span lang=\"EN-US\">To maintain <strong>transparency and integrity<\/strong>, manuscripts submitted by <strong>editorial board members or guest editors<\/strong> are handled independently by other editors. The submitting editor is <strong>not involved<\/strong> in the peer review, evaluation, or final decision-making process.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d1ccfb e-con-full scroll-section e-flex e-con e-child\" data-id=\"7d1ccfb\" data-element_type=\"container\" id=\"ResearchEthics\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d580000 elementor-widget elementor-widget-heading\" data-id=\"d580000\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Research Ethics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e86b9 elementor-widget elementor-widget-text-editor\" data-id=\"29e86b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em><span lang=\"EN-US\">AI &amp; Cyber Forum: An International Journal<\/span><\/em><span lang=\"EN-US\"> is dedicated to upholding the <strong>highest standards of research integrity, transparency, and ethical conduct<\/strong> in artificial intelligence, cybersecurity, and applied engineering sciences.<br \/>All authors must ensure that their research adheres to <strong>institutional, national, and international ethical guidelines<\/strong> relevant to their field.<\/span><\/p><h4>Human Participants and Data<\/h4><p><span lang=\"EN-US\">Research involving human participants, online user studies, behavioral experiments, or data collected from human subjects (e.g., surveys, biometric data, or social media datasets) must comply with recognized ethical standards such as the <strong>OECD Guidelines for Human Research<\/strong> and applicable national regulations.<\/span><\/p><p><strong><span lang=\"EN-US\">Informed consent<\/span><\/strong><span lang=\"EN-US\"> must be obtained from all participants.<\/span><\/p><p><span lang=\"EN-US\">A <strong>statement confirming ethical approval and consent<\/strong> should appear in the manuscript.<\/span><\/p><p><span lang=\"EN-US\">When using <strong>privacy-sensitive data<\/strong> (such as facial images, recordings, or identifiable digital traces), authors must obtain explicit consent for publication and anonymize the data wherever possible.<\/span><\/p><p><span lang=\"EN-US\">\ud83d\udc49 <strong>Reference:<\/strong> OECD \u2013 Good Practice for Human Research<\/span><\/p><h4>Use of Animals in Research<\/h4><p><span lang=\"EN-US\">If the research includes <strong>bioengineering or biomedical device testing involving animals<\/strong>, authors must follow internationally recognized standards such as the <strong>ARRIVE Guidelines<\/strong> and provide evidence of approval from a certified <strong>Animal Ethics Committee<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">\ud83d\udc49 <strong>Reference:<\/strong> <a href=\"https:\/\/arriveguidelines.org\/\" target=\"_blank\" rel=\"noopener\">ARRIVE Guidelines for Animal Research<\/a><\/span><\/p><h4>Data Integrity and Safety Standards<\/h4><p><span lang=\"EN-US\">Authors must present all data, algorithms, experiments, and simulations <strong>honestly, accurately, and transparently<\/strong>, ensuring reproducibility and accountability.<br \/>Research involving <strong>hazardous materials, high-risk systems, or sensitive AI\/cyber technologies<\/strong> must comply with established safety codes and ethical frameworks.<\/span><\/p><p><span lang=\"EN-US\">Ethical compliance includes:<\/span><\/p><p><span lang=\"EN-US\">Avoidance of data manipulation, falsification, or selective reporting.<\/span><\/p><p><span lang=\"EN-US\">Responsible handling of dual-use technologies (e.g., cybersecurity tools, AI surveillance systems).<\/span><\/p><p><span lang=\"EN-US\">Protection of privacy, data security, and human rights in all research stages.<\/span><\/p><p><span lang=\"EN-US\">\ud83d\udc49 <strong>References:<\/strong><\/span><\/p><p><span lang=\"EN-US\"><a href=\"https:\/\/publicationethics.org\/\" target=\"_blank\" rel=\"noopener\">COPE \u2013 Committee on Publication Ethics<\/a><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1759583 e-con-full scroll-section e-flex e-con e-child\" data-id=\"1759583\" data-element_type=\"container\" id=\"res\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b29ddf0 elementor-widget elementor-widget-heading\" data-id=\"b29ddf0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Registration of Experimental Studies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5957eb8 elementor-widget elementor-widget-text-editor\" data-id=\"5957eb8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Definition of Experimental Studies<\/strong><\/h4><p><em>AI &amp; Cyber Forum: An International Journal<\/em> emphasizes <strong>transparency, accountability, and reproducibility<\/strong> in all engineering and computational research.<br \/>An <em>experimental study<\/em> is defined as any structured investigation that prospectively evaluates a <strong>system, model, process, device, material, software, or prototype<\/strong> for its performance, safety, reliability, or effectiveness \u2014 with or without control or comparison groups.<\/p><p>Examples of engineering-related experimental work include:<\/p><ul><li>Development and testing of <strong>prototypes, sensors, or materials<\/strong>.<\/li><li><strong>Simulation and modeling<\/strong> of structural, mechanical, or electrical systems.<\/li><li>Evaluation of <strong>software, algorithms, or AI\/ML models<\/strong>.<\/li><li><strong>Cybersecurity frameworks or protocols<\/strong> tested for robustness and vulnerability.<\/li><li><strong>Process design or optimization<\/strong> for engineering and computing applications.<\/li><li><strong>User studies or field trials<\/strong> assessing usability, human-computer interaction, ergonomics, or technology adoption.<\/li><li>Authors must ensure that experimental studies conform to recognized principles of <strong>research integrity, safety, and ethical engineering conduct<\/strong>, in line with:<\/li><\/ul><p><a href=\"https:\/\/publicationethics.org\/\" target=\"_blank\" rel=\"noopener\">COPE \u2013 Committee on Publication Ethics<\/a><\/p><p><a href=\"https:\/\/www.oecd.org\/en\/topics\/science-technology-and-innovation.html\" target=\"_blank\" rel=\"noopener\">OECD Research Integrity Guidelines<\/a><\/p><p>Where applicable, authors should provide <strong>details of ethical approval, study registration, and compliance<\/strong> with relevant standards when reporting experimental research.<\/p><h3>\u00a0<strong>Engineering Research Ethics and Compliance Policies<\/strong><\/h3><p><em>AI &amp; Cyber Forum: An International Journal<\/em> is committed to maintaining the <strong>highest standards of research integrity and publication ethics<\/strong> in all submitted manuscripts. Authors must adhere to internationally recognized ethical and professional norms governing <strong>AI, cybersecurity, and engineering sciences<\/strong>.<\/p><h4><strong>1. Experimental Studies and Prototypes<\/strong><\/h4><p>All experimental work, simulations, and prototype testing must follow accepted <strong>engineering standards, protocols, and best practices<\/strong>.<br \/>Authors should:<\/p><ul><li>Clearly describe the <strong>objectives, methodologies, and safety precautions<\/strong> of their work.<\/li><li>Ensure that <strong>field trials or industrial experiments<\/strong> comply with institutional, governmental, or industrial regulations.<\/li><\/ul><h4><strong>2. Ethical Approval for Human Participation<\/strong><\/h4><p>Research involving <strong>human participants<\/strong> (e.g., usability testing, surveys, behavioral or ergonomic studies) requires approval from an <strong>institutional ethics committee<\/strong>.<\/p><p><strong>Informed consent<\/strong> must be obtained from participants.<\/p><p>A statement confirming ethical approval and consent must appear in the manuscript.<\/p><h4><strong>3. Safety and Environmental Compliance<\/strong><\/h4><p>Authors must guarantee that research activities <strong>do not endanger health, safety, or the environment<\/strong>.<br \/>Experiments involving <strong>electrical systems, hazardous materials, or AI-driven autonomous systems<\/strong> must comply with applicable standards such as <strong>ISO<\/strong>, <strong>IEEE<\/strong>, or <strong>national engineering safety codes<\/strong>.<br \/>Where relevant, <strong>environmental and sustainability impacts<\/strong> should be assessed and reported.<\/p><h4><strong>4. Data Transparency and Availability<\/strong><\/h4><p>To ensure reproducibility and open science, authors are encouraged to <strong>deposit data, code, and simulation files<\/strong> in recognized repositories such as <strong>GitHub<\/strong>, <strong>Zenodo<\/strong>, or <strong>Figshare<\/strong>.<br \/>A <strong>Data Availability Statement<\/strong> must be included, specifying where supporting data can be accessed.<\/p><h4><strong>5. Conflict of Interest<\/strong><\/h4><p>All authors must disclose any potential conflicts of interest \u2014 financial, professional, or personal \u2014 that could influence the reported research.<br \/>If no conflicts exist, include the statement:<\/p><p>The authors declare no conflict of interest.<\/p><h4><strong>6. Intellectual Property and Patents<\/strong><\/h4><p>If the study involves <strong>patented technologies, proprietary datasets, or pending intellectual property rights<\/strong>, these must be explicitly disclosed.<br \/>Any <strong>restrictions on data or method sharing<\/strong> should be clearly stated for transparency.<\/p><h4><strong>7. Replication and Verification<\/strong><\/h4><p>All research must include sufficient <strong>methodological details<\/strong> to enable <strong>independent replication or verification<\/strong> of results.<br \/>Authors should also acknowledge any <strong>limitations or uncertainties<\/strong> in their study findings.<\/p><h4><strong>8. Compliance with Publication Ethics<\/strong><\/h4><p>The journal adheres strictly to the <strong>Committee on Publication Ethics (COPE)<\/strong> guidelines.<\/p><p><strong>Plagiarism, fabrication, falsification, or image manipulation<\/strong> are strictly prohibited.<\/p><p><strong>Duplicate or simultaneous submissions<\/strong> are not accepted.<\/p><p>All manuscripts undergo plagiarism screening using <strong>iThenticate<\/strong> to ensure originality and integrity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3867d73 e-con-full scroll-section e-flex e-con e-child\" data-id=\"3867d73\" data-element_type=\"container\" id=\"Confidentiality\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-190218c elementor-widget elementor-widget-heading\" data-id=\"190218c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Confidentiality<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-476545b elementor-widget elementor-widget-text-editor\" data-id=\"476545b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber Forum Journal<\/strong> upholds the highest standards of confidentiality and integrity throughout the editorial and peer review process. All parties involved \u2014 including authors, reviewers, editors, and editorial staff \u2014 are required to maintain strict confidentiality regarding submitted manuscripts and related communications.<\/p><h3><strong>1. General Confidentiality<\/strong><\/h3><p>All manuscripts submitted to <em>Cyber Forum Journal<\/em> are considered confidential documents. Information about a submitted manuscript, including its content, status, reviewer comments, or editorial decisions, will not be disclosed to anyone other than the corresponding author, reviewers, potential reviewers, editorial board members, or the publisher, as appropriate.<\/p><p>Unauthorized sharing, reproduction, or distribution of any part of a manuscript before publication is strictly prohibited. All correspondence exchanged during the editorial process is confidential and must not be shared outside the peer review system.<\/p><h3><strong>2. Reviewer Confidentiality<\/strong><\/h3><p>Reviewers play a critical role in maintaining the integrity of the peer review process. They are required to:<\/p><ul><li>Treat all manuscripts as confidential intellectual property.<\/li><li>Refrain from discussing the manuscript or its contents with anyone outside the review process.<\/li><li>Not use any data, figures, algorithms, or concepts from the manuscript for personal, academic, or professional gain.<\/li><li>Delete or securely destroy all copies of the manuscript and related files after completing the review.<\/li><li>If a reviewer needs to consult a colleague for expert advice, <strong>prior permission must be obtained from the editorial office<\/strong> to ensure compliance with confidentiality protocols.<\/li><\/ul><h3><strong>3. Reviewer Anonymity<\/strong><\/h3><p><em>Cyber Forum Journal<\/em> follows a <strong>single-blind peer review system<\/strong>, where the reviewers remain anonymous to the authors. Reviewers must not disclose their identity to the authors or communicate with them directly regarding the manuscript.<\/p><p>Any attempt to reveal reviewer identities or contact authors without the editorial office\u2019s consent is considered a violation of the journal\u2019s confidentiality policy.<\/p><h3><strong>4. Editorial Confidentiality<\/strong><\/h3><p>Editors, guest editors, and editorial staff are bound by the same confidentiality standards as reviewers. They must not:<\/p><ul><li>Disclose information about a manuscript to anyone not directly involved in the editorial process.<\/li><li>Use unpublished materials or ideas obtained through peer review for personal research or professional advantage.<\/li><li>Discuss author or reviewer identities outside the editorial board.<\/li><li>Exceptions are made only in cases involving <strong>suspected research misconduct, plagiarism, or data fabrication<\/strong>, where information may be shared with relevant authorities in accordance with COPE guidelines. In such cases, both authors and reviewers will be informed before any disclosure occurs.<\/li><\/ul><h3><strong>5. Record Retention and Data Security<\/strong><\/h3><p>To ensure transparency and accountability, <em>Cyber Forum Journal<\/em> maintains secure records of all manuscripts, reviews, and editorial communications.<\/p><p>For <strong>accepted and published manuscripts<\/strong>, records are retained permanently in the journal\u2019s archive.<\/p><p>For <strong>rejected manuscripts<\/strong>, related files and correspondence are deleted from the editorial system after a specified retention period unless required for legal or ethical reasons.<\/p><p>Access to all editorial records is restricted to authorized editorial staff and system administrators only.<\/p><p>The journal complies with international data protection and privacy standards to safeguard the confidentiality of both authors and reviewers.<\/p><h3><strong>6. Exceptions<\/strong><\/h3><p>Confidentiality may be lifted only when required by law or to investigate <strong>academic misconduct, plagiarism, or ethical violations<\/strong>. Any disclosure under such circumstances will follow established ethical protocols and involve notification of the concerned parties.<\/p><h3><strong>7. Compliance<\/strong><\/h3><p>This confidentiality policy aligns with the standards set by the following organizations and ethical frameworks:<\/p><p><strong>COPE(Committee on Publication Ethics)<\/strong><\/p><p><strong>OECD Principles for Responsible Research Conduct<\/strong><\/p><p><em>Cyber Forum Journal<\/em> expects all contributors to adhere strictly to this policy to uphold the trust, transparency, and integrity of scholarly publishing<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d763f09 e-con-full scroll-section e-flex e-con e-child\" data-id=\"d763f09\" data-element_type=\"container\" id=\"dmap\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2eb1e64 elementor-widget elementor-widget-heading\" data-id=\"2eb1e64\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data and Materials Availability Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5601baf elementor-widget elementor-widget-text-editor\" data-id=\"5601baf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cyber Forum Journal<\/strong> is committed to promoting transparency, reproducibility, and long-term accessibility of research outputs in engineering, computing, and applied sciences. Authors are expected to ensure that all relevant data, codes, models, and materials supporting their published findings are made available in accordance with this policy.<\/p><h3><strong>1. Mandatory Data Availability Statement<\/strong><\/h3><p>All submitted manuscripts <strong>must include a Data and Materials Availability Statement<\/strong> at the end of the paper.<br \/>This statement should clearly specify:<\/p><p>Where the data, codes, or materials are stored;<\/p><p>Whether they are publicly available or restricted; and<\/p><p>How interested researchers can access them.<\/p><p><strong>Manuscripts without a Data and Materials Availability Statement will not be accepted for publication.<\/strong><\/p><h3><strong>2. Public Repositories<\/strong><\/h3><p>Authors are strongly encouraged to deposit research data, simulation files, models, or source code in <strong>trusted, publicly accessible repositories<\/strong> that assign a <strong>persistent identifier (DOI or accession number)<\/strong>.<\/p><p>Recommended repositories include (but are not limited to):<\/p><p><a href=\"https:\/\/zenodo.org\" target=\"_blank\" rel=\"noopener\">Zenodo<\/a><\/p><p><a href=\"https:\/\/github.com\" target=\"_blank\" rel=\"noopener\">GitHub<\/a><\/p><p><a href=\"https:\/\/figshare.com\" target=\"_blank\" rel=\"noopener\">Figshare<\/a><\/p><p><a href=\"https:\/\/datadryad.org\" target=\"_blank\" rel=\"noopener\">Dryad<\/a><\/p><p><a href=\"https:\/\/www.designsafe-ci.org\" target=\"_blank\" rel=\"noopener\">DesignSafe-CI<\/a><\/p><p>Repository links and dataset identifiers must be cited within the manuscript to allow verification and reuse.<\/p><h3><strong>3. Restricted or Controlled Access<\/strong><\/h3><p>If certain datasets, codes, or materials <strong>cannot be shared publicly<\/strong> due to confidentiality, security, intellectual property, or funding restrictions, authors must:<\/p><p>Clearly explain the reason for restricted access in the Data Availability Statement;<\/p><p>Indicate the conditions under which access may be granted; and<\/p><p>Provide a contact email for the corresponding author to handle legitimate access requests.<\/p><p>Example:<\/p><p>The dataset generated and analyzed during this study is not publicly available due to institutional confidentiality agreements but can be made available upon reasonable request to the corresponding author<\/p><h3><strong>4. Use of Third-Party Data<\/strong><\/h3><p>When a study uses <strong>third-party or licensed datasets<\/strong>, authors must:<\/p><p>Properly cite and acknowledge the data source;<\/p><p>Confirm that data usage complies with the license terms; and<\/p><p>Provide information on how others can obtain the data if permitted.<\/p><p>Failure to acknowledge third-party data sources may be considered a breach of publication ethics.<\/p><h3><strong>5. Studies with No New Data<\/strong><\/h3><p>If no new data, models, or materials were generated in the course of research (for example, in theoretical or review-based papers), authors should clearly state:<\/p><p>No new data were generated or analyzed in this study<\/p><p>This ensures transparency and consistency across all publications.<\/p><h3><strong>6. Editorial Oversight and Verification<\/strong><\/h3><p>The <strong>editorial office<\/strong> reserves the right to request access to the underlying data, codes, or supporting documentation <strong>at any stage of the peer review or publication process<\/strong>.<\/p><p>Authors must provide such materials promptly upon request.<br \/>Failure to comply may result in the <strong>rejection or retraction<\/strong> of the manuscript in accordance with the journal\u2019s ethics and integrity policies.<\/p><h3><strong>7. Commitment to Open Science<\/strong><\/h3><p>This policy aligns with the principles of:<\/p><p><strong>FAIR Data Guidelines<\/strong> (Findable, Accessible, Interoperable, Reusable)<\/p><p><strong>COPE (Committee on Publication Ethics)<\/strong><\/p><p>By following this policy, <em>Cyber Forum Journal<\/em> aims to enhance the credibility, transparency, and impact of published research in the global scientific community.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93fe84a e-con-full scroll-section e-flex e-con e-child\" data-id=\"93fe84a\" data-element_type=\"container\" id=\"CitationPolicy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fa9129 elementor-widget elementor-widget-heading\" data-id=\"4fa9129\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Citation Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b76adc elementor-widget elementor-widget-text-editor\" data-id=\"0b76adc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">Proper citation of existing scholarly work is essential to maintain academic integrity, transparency, and fairness in scientific publishing. Authors are responsible for accurately acknowledging the work of others and ensuring that all claims, data, and ideas derived from external sources are properly referenced.<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">1. General Citation Requirements<\/span><\/strong><\/h3><p><span lang=\"EN-US\">Authors must adhere to the highest standards of citation ethics when preparing their manuscripts:<\/span><\/p><p><strong><span lang=\"EN-US\">Accuracy and Relevance:<\/span><\/strong><span lang=\"EN-US\"> All citations must be factually correct, relevant, and directly support the statements made in the manuscript.<\/span><\/p><p><strong><span lang=\"EN-US\">Use of Primary Sources:<\/span><\/strong><span lang=\"EN-US\"> Authors should prioritize <strong>original research articles<\/strong> rather than citing only review papers that summarize earlier findings.<\/span><\/p><p><strong><span lang=\"EN-US\">Balanced References:<\/span><\/strong><span lang=\"EN-US\"> Authors should ensure a <strong>diverse range of citations<\/strong>, avoiding over-reliance on sources from a single author, institution, or geographic region.<\/span><\/p><p><strong><span lang=\"EN-US\">Appropriate Citation Density:<\/span><\/strong><span lang=\"EN-US\"> Excessive referencing for a single point or unnecessary citations should be avoided.<\/span><\/p><p><strong><span lang=\"EN-US\">Consistency in Formatting:<\/span><\/strong><span lang=\"EN-US\"> Citations must conform to the journal\u2019s reference style (as outlined in the Author Guidelines).<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">2. Citation Manipulation<\/span><\/strong><\/h3><p><span lang=\"EN-US\">The <strong>Cyber Forum Journal<\/strong> strictly adheres to the <a href=\"https:\/\/publicationethics.org\/guidance\/discussion-document\/citation-manipulation\" target=\"_new\">COPE Citation Manipulation Guidelines<\/a>.<br \/>Citation manipulation refers to unethical citation practices intended to artificially inflate citation counts or impact metrics without adding scholarly value.<\/span><\/p><p><strong><span lang=\"EN-US\">Examples of citation manipulation include:<\/span><\/strong><\/p><p><strong><span lang=\"EN-US\">Excessive self-citation:<\/span><\/strong><span lang=\"EN-US\"> Overuse of an author\u2019s own publications solely to increase citation metrics.<\/span><\/p><p><strong><span lang=\"EN-US\">Excessive journal citation:<\/span><\/strong><span lang=\"EN-US\"> Referencing multiple articles from the same journal merely to boost the journal\u2019s citation count.<\/span><\/p><p><strong><span lang=\"EN-US\">Honorary or coercive citations:<\/span><\/strong><span lang=\"EN-US\"> Adding citations to editors, reviewers, or prominent researchers without legitimate academic justification.<\/span><\/p><p><strong><span lang=\"EN-US\">Citation stacking:<\/span><\/strong><span lang=\"EN-US\"> Mutual citation agreements between authors or journals to artificially enhance impact measures.<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">3. Journal Policy on Citation Ethics<\/span><\/strong><\/h3><p><span lang=\"EN-US\">To uphold citation integrity, the journal enforces the following measures:<\/span><\/p><p><span lang=\"EN-US\">Manuscripts engaging in <strong>citation manipulation<\/strong> will be <strong>immediately rejected<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">The journal reserves the right to <strong>report unethical citation practices<\/strong> to the authors\u2019 affiliated institutions or funding bodies.<\/span><\/p><p><span lang=\"EN-US\">Any attempts by <strong>reviewers or editors<\/strong> to enforce coercive citations must be reported by authors to the <strong>publisher<\/strong> or <strong>Editor-in-Chief<\/strong>.<\/span><\/p><p><span lang=\"EN-US\">Editors or reviewers found to be engaging in citation manipulation will face disciplinary action and may be <strong>removed from their editorial roles<\/strong> following an internal ethics investigation.<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">4. Legitimate Self-Citation<\/span><\/strong><\/h3><p><span lang=\"EN-US\">The journal recognizes that <strong>reasonable self-citation<\/strong> is often necessary to ensure continuity in ongoing research. However, all self-citations must:<\/span><\/p><p><span lang=\"EN-US\">Be <strong>relevant to the submitted work<\/strong>;<\/span><\/p><p><strong><span lang=\"EN-US\">Support or clarify<\/span><\/strong><span lang=\"EN-US\"> the research context; and<\/span><\/p><p><strong><span lang=\"EN-US\">Not exceed<\/span><\/strong><span lang=\"EN-US\"> a proportion considered appropriate within the discipline.<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">5. Ethical Reference Practices<\/span><\/strong><\/h3><p><span lang=\"EN-US\">Authors are encouraged to:<\/span><\/p><p><span lang=\"EN-US\">Use citation management tools responsibly (e.g., Mendeley, Zotero, EndNote).<\/span><\/p><p><span lang=\"EN-US\">Verify all references before submission.<\/span><\/p><p><span lang=\"EN-US\">Ensure that cited works are <strong>accessible and verifiable<\/strong> through DOI, URL, or database links.<\/span><\/p><p><span lang=\"EN-US\">Review the full COPE discussion paper on <a href=\"https:\/\/publicationethics.org\/guidance\/discussion-document\/citation-manipulation\" target=\"_new\">Citation Manipulation<\/a> for detailed guidance.<\/span><\/p><h3><strong><span lang=\"EN-US\" style=\"font-family: SimSun;\">Commitment to Responsible Referencing<\/span><\/strong><\/h3><p><span lang=\"EN-US\">The <strong>Cyber Forum Journal<\/strong> promotes fair, transparent, and responsible citation practices that respect intellectual property and enhance the credibility of scientific communication.<br \/>Authors, reviewers, and editors are expected to uphold these standards at all stages of the publication process.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce17928 e-con-full scroll-section e-flex e-con e-child\" data-id=\"ce17928\" data-element_type=\"container\" id=\"rcfp\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a407c74 elementor-widget elementor-widget-heading\" data-id=\"a407c74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References and Citation Formatting Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df1fa1e elementor-widget elementor-widget-text-editor\" data-id=\"df1fa1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The journal upholds strict standards for citation ethics, reference accuracy, and formatting to maintain scholarly integrity and international publishing quality. Authors must ensure that all references are accurate, verifiable, and properly formatted according to the journal\u2019s style.<\/p><h3><strong>1. General Guidelines<\/strong><\/h3><p>References must be <strong>accurate, complete, and directly relevant<\/strong> to the manuscript content.<\/p><p>All cited works must appear in the reference list, and all references listed must be cited within the text.<\/p><p>Authors are responsible for verifying the <strong>authorship, title, publication year, and DOI\/URL<\/strong> of each cited work.<\/p><p>References should reflect <strong>diversity in sources<\/strong>, avoiding over-reliance on publications from one author, institution, or region.<\/p><h3><strong>2. Citation Style<\/strong><\/h3><p>The journal follows the <strong>IEEE citation style<\/strong> for all engineering, technology, and applied science articles. Authors must follow these formatting rules:<\/p><p><strong>In-text citations:<\/strong> References should be cited using <strong>numbers in square brackets<\/strong>, e.g., [3].<\/p><p><strong>Order:<\/strong> References should be listed <strong>in the order they appear in the text<\/strong> (not alphabetically).<\/p><p><strong>Format:<\/strong> Each reference must include the <strong>author(s), title, publication name, volume, issue, page range, year<\/strong>, and <strong>DOI or URL<\/strong> (if available).<\/p><h3><strong>3. Examples of IEEE Reference Style<\/strong><\/h3><p><strong>Journal Article:<\/strong><br \/>[1] A. Smith and B. Jones, \u201cA study on renewable energy optimization,\u201d <em>IEEE Transactions on Sustainable Energy<\/em>, vol. 12, no. 3, pp. 456\u2013467, 2021.<\/p><p><strong>Conference Paper:<\/strong><br \/>[2] R. Kumar and L. Chen, \u201cMachine learning for smart grid applications,\u201d in <em>Proceedings of the IEEE International Conference on Energy Systems<\/em>, Singapore, 2020, pp. 112\u2013118.<\/p><p><strong>Book:<\/strong><br \/>[3] M. Johnson, <em>Introduction to Structural Engineering<\/em>, 2nd ed. New York: Springer, 2019.<\/p><p><strong>Website\/Online Source:<\/strong><br \/>[4] IEEE, \u201cIEEE DataPort: Open data for research,\u201d 2023. [Online]. Available: <a href=\"https:\/\/ieee-dataport.org\">https:\/\/ieee-dataport.org<\/a><\/p><h3><strong>4. Use of Reference Management Software<\/strong><\/h3><p>Authors are encouraged to use <strong>reference management tools<\/strong> such as <em>EndNote, Zotero, Mendeley,<\/em> or <em>RefWorks<\/em> to ensure proper formatting and consistency in citations and references.<\/p><h3><strong>5. Citation Integrity<\/strong><\/h3><p>All references must be <strong>genuine and verifiable<\/strong>; fabricated or incorrect citations are unethical.<\/p><p>Improper or inaccurate citations may result in <strong>manuscript revision or rejection<\/strong>.<\/p><p>Citation manipulation (e.g., excessive self-citation, journal citation inflation) violates the <strong>COPE Citation Manipulation Guidelines<\/strong> and will result in immediate action.<\/p><h2><strong>Plagiarism Policy<\/strong><\/h2><p>The journal strictly prohibits plagiarism in all forms. Plagiarism includes copying or reusing text, data, images, or ideas from other sources <strong>without proper attribution<\/strong>.<br \/>This includes <strong>self-plagiarism<\/strong>, where authors reuse substantial portions of their previously published work without acknowledgment.<\/p><h3><strong>1. Definition<\/strong><\/h3><p>Plagiarism includes, but is not limited to:<\/p><p>Copying text, figures, or tables from previously published works without proper citation.<\/p><p>Paraphrasing content without crediting the original source.<\/p><p>Reusing portions of the author\u2019s own prior work without clear attribution (self-plagiarism).<\/p><p>Submitting others\u2019 research or data as one\u2019s own.<\/p><h3><strong>2. Detection and Screening<\/strong><\/h3><p>All submitted manuscripts are checked using <strong>iThenticate plagiarism detection software<\/strong> before publication.<br \/>iThenticate compares submissions against millions of published papers and billions of web pages.<\/p><p>If plagiarism is detected:<\/p><p>The manuscript may be <strong>rejected, corrected, or retracted<\/strong>, depending on the severity.<\/p><p>In serious cases, the <strong>authors\u2019 institutions or funding bodies<\/strong> may be notified.<\/p><p>Editors and reviewers are encouraged to report suspected plagiarism at any stage of peer review or post-publication.<\/p><h3><strong>3. Ethical Oversight<\/strong><\/h3><p>The journal follows <strong>COPE\u2019s Plagiarism Guidelines<\/strong> and associated <strong>flowcharts<\/strong> for handling cases of suspected plagiarism or redundant publication.<\/p><h2><strong>Duplicate Publication Policy<\/strong><\/h2><p>The journal publishes <strong>only original content<\/strong>. Manuscripts must not be previously published, nor simultaneously submitted elsewhere in any language. Authors must disclose related or overlapping materials under review in other venues.<\/p><h3><strong>1. Acceptable Exceptions<\/strong><\/h3><p>The following do <strong>not<\/strong> constitute duplicate publication:<\/p><p><strong>Preprints<\/strong> posted on public or institutional servers (see <em>Preprint Policy<\/em>).<\/p><p><strong>Theses or dissertations<\/strong> published by academic institutions.<\/p><p><strong>Conference abstracts or posters<\/strong>, provided they are cited and disclosed in the cover letter.<\/p><p><strong>Datasets<\/strong> deposited in public repositories prior to submission.<\/p><p><strong>Summary of clinical or experimental results<\/strong> registered in public databases.<\/p><p><strong>Translations<\/strong>, if authorized by the original publisher and clearly labeled as republished under a <em>Creative Commons (CC BY)<\/em> license.<\/p><h3><strong>2. Author Responsibilities<\/strong><\/h3><p>If previously published material is reused, authors must:<\/p><p>Clearly <strong>cite prior publications<\/strong>;<\/p><p>Explain <strong>how the new submission differs<\/strong> from earlier work; and<\/p><p>Obtain necessary <strong>permissions<\/strong> from copyright holders when reusing figures, tables, or text.<\/p><h3><strong>3. Editorial Actions<\/strong><\/h3><p>If a published article is later found to be redundant or duplicated:<\/p><p>The editor will follow <strong>COPE flowcharts<\/strong>;<\/p><p>A <strong>retraction<\/strong> or <strong>correction notice<\/strong> may be issued; and<\/p><p>Authors may be <strong>blacklisted<\/strong> for future submissions in cases of deliberate misconduct.<\/p><h2><strong>Commitment to Ethical Publishing<\/strong><\/h2><p>The journal maintains a zero-tolerance policy for ethical breaches. All manuscripts must comply with international standards on:<\/p><ol><li><strong>Authorship Criteria<\/strong><\/li><li><strong>Plagiarism and Originality<\/strong><\/li><li><strong>Duplicate Publication<\/strong><\/li><li><strong>Conflict of Interest<\/strong><\/li><li><strong>Peer Review Ethics<\/strong><\/li><li><strong>Data and Code Availability<\/strong><\/li><li><strong>Research Ethics and Human\/Animal Welfare<\/strong><\/li><li><strong>Corrections, Retractions, and Withdrawals<\/strong><\/li><li><strong>Open Access and Copyright Policies<\/strong><\/li><li><strong>Preprint and Archiving Policy<\/strong><\/li><li><strong>Adherence to COPE Guidelines<\/strong><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a582a8 e-con-full scroll-section e-flex e-con e-child\" data-id=\"7a582a8\" data-element_type=\"container\" id=\"MisconductPolicy\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28d4fa9 elementor-widget elementor-widget-heading\" data-id=\"28d4fa9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Misconduct Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67c7ef8 elementor-widget elementor-widget-text-editor\" data-id=\"67c7ef8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">The journal maintains a <strong>zero-tolerance approach<\/strong> to all forms of research and publication misconduct. Any suspected case is handled individually and in accordance with the ethical standards and best practices set forth by the <strong>Committee on Publication Ethics (COPE)<\/strong> (<a href=\"https:\/\/publicationethics.org\" target=\"_new\">https:\/\/publicationethics.org<\/a>), the <strong>World Association of Medical Editors (WAME)<\/strong>, and the <strong>International Committee of Medical Journal Editors (ICMJE)<\/strong>.<\/span><\/p><h3>1. Definition of Misconduct<\/h3><p><span lang=\"EN-US\">Misconduct is defined as any action that undermines the integrity of the research record or the publication process. This includes, but is not limited to, the following:<\/span><\/p><p><strong><span lang=\"EN-US\">Falsification of Data:<\/span><\/strong><span lang=\"EN-US\"> Fabricating, manipulating, or selectively reporting data and findings, omitting conflicting evidence, or distorting results.<\/span><\/p><p><strong><span lang=\"EN-US\">Plagiarism:<\/span><\/strong><span lang=\"EN-US\"> Using another person\u2019s ideas, words, or findings without appropriate credit or citation, representing them as original work.<\/span><\/p><p><strong><span lang=\"EN-US\">Improprieties of Authorship:<\/span><\/strong><span lang=\"EN-US\"> Misrepresenting contributions, omitting rightful contributors, or adding individuals who made no significant input.<\/span><\/p><p><strong><span lang=\"EN-US\">Misappropriation of Ideas:<\/span><\/strong><span lang=\"EN-US\"> Using confidential information obtained through peer review, grant evaluation, or collaboration without consent.<\/span><\/p><p><strong><span lang=\"EN-US\">Violation of Accepted Research Practices:<\/span><\/strong><span lang=\"EN-US\"> Manipulating experiments, biasing data analysis, or reporting misleading conclusions.<\/span><\/p><p><strong><span lang=\"EN-US\">Regulatory Non-compliance:<\/span><\/strong><span lang=\"EN-US\"> Failing to follow institutional, legal, or ethical standards relating to research funding, safety, or intellectual property.<\/span><\/p><p><strong><span lang=\"EN-US\">Inappropriate Conduct in Misconduct Cases:<\/span><\/strong><span lang=\"EN-US\"> Making false allegations, concealing evidence, or retaliating against whistle-blowers.<\/span><\/p><p><strong><span lang=\"EN-US\">Duplicate Publication:<\/span><\/strong><span lang=\"EN-US\"> Submitting or publishing the same research in multiple journals without appropriate disclosure or permission.<\/span><\/p><p><strong><span lang=\"EN-US\">Lack of Declaration:<\/span><\/strong><span lang=\"EN-US\"> Failing to disclose conflicts of interest, funding sources, or relevant affiliations.<\/span><\/p><h3>2. Reference and Citation Misconduct<\/h3><p><span lang=\"EN-US\">The journal also emphasizes ethical citation practices. The following behaviors constitute citation-related misconduct:<\/span><\/p><p><strong><span lang=\"EN-US\">Citation Manipulation:<\/span><\/strong><span lang=\"EN-US\"> Adding irrelevant or excessive citations to artificially increase citation counts of specific authors, journals, or institutions.<\/span><\/p><p><strong><span lang=\"EN-US\">Self-Citation Abuse:<\/span><\/strong><span lang=\"EN-US\"> Overusing self-citations without legitimate academic justification.<\/span><\/p><p><strong><span lang=\"EN-US\">Omission of Relevant Work:<\/span><\/strong><span lang=\"EN-US\"> Intentionally ignoring significant prior research that is relevant to the submitted study.<\/span><\/p><p><strong><span lang=\"EN-US\">Inaccurate Citations:<\/span><\/strong><span lang=\"EN-US\"> Misrepresenting or incorrectly citing sources.<\/span><\/p><p><strong><span lang=\"EN-US\">Ghost References:<\/span><\/strong><span lang=\"EN-US\"> Citing non-existent or fabricated references.<\/span><\/p><p><strong><span lang=\"EN-US\">Improper Formatting:<\/span><\/strong><span lang=\"EN-US\"> Using inconsistent or incorrect citation styles that compromise the clarity of scholarly communication.<\/span><\/p><h3>3. Handling Allegations of Misconduct<\/h3><p><span lang=\"EN-US\">To preserve the journal\u2019s integrity, all submissions undergo rigorous ethical screening and review procedures:<\/span><\/p><p><strong><span lang=\"EN-US\">Plagiarism Screening:<\/span><\/strong><span lang=\"EN-US\"> All manuscripts are checked using <strong>iThenticate<\/strong> or equivalent plagiarism detection software to verify originality.<\/span><\/p><p><strong><span lang=\"EN-US\">Reviewer and Reader Reports:<\/span><\/strong><span lang=\"EN-US\"> Reviewers and readers are encouraged to report any suspected misconduct or unethical citation behavior.<\/span><\/p><p><strong><span lang=\"EN-US\">Investigation Process:<\/span><\/strong><span lang=\"EN-US\"> The editorial board follows <strong>COPE flowcharts<\/strong> to ensure fair, transparent, and confidential handling of all allegations.<\/span><\/p><p><strong><span lang=\"EN-US\">Sanctions:<\/span><\/strong><span lang=\"EN-US\"> Depending on the severity of the offense, actions may include manuscript rejection, article retraction, notification of the author\u2019s institution, or reporting to relevant authorities.<\/span><\/p><h3>4. Journal Commitment<\/h3><p><span lang=\"EN-US\">The journal is committed to maintaining the highest ethical standards in publishing. Upholding honesty, transparency, and accountability in research dissemination is essential to fostering trust in the global scientific community.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a06de7 e-con-full scroll-section e-flex e-con e-child\" data-id=\"0a06de7\" data-element_type=\"container\" id=\"ccrp\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3474e2d elementor-widget elementor-widget-heading\" data-id=\"3474e2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Crossmark, Corrections, and Retractions Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4984e6 elementor-widget elementor-widget-text-editor\" data-id=\"e4984e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"EN-US\">The journal is dedicated to maintaining the <strong>integrity, accuracy, and transparency<\/strong> of the scholarly record in the field of engineering. All editorial actions related to corrections, retractions, and post-publication updates are conducted in accordance with the ethical principles outlined by the <strong>Committee on Publication Ethics (COPE)<\/strong> (<a href=\"https:\/\/publicationethics.org\" target=\"_new\">https:\/\/publicationethics.org<\/a>) and the <strong>International Committee of Medical Journal Editors (ICMJE)<\/strong> (<a href=\"https:\/\/www.icmje.org\" target=\"_new\">https:\/\/www.icmje.org<\/a>).<\/span><\/p><h3>1. Crossmark<\/h3><p><span lang=\"EN-US\">The journal participates in the <strong>Crossmark initiative<\/strong> by <strong>Crossref<\/strong>.<br \/>Crossmark provides a reliable way for readers to verify whether a published article represents the most current and authoritative version.<br \/>By clicking the <strong>Crossmark logo<\/strong> displayed on an article, readers can:<\/span><\/p><p><span lang=\"EN-US\">Confirm the document\u2019s publication status.<\/span><\/p><p><span lang=\"EN-US\">Access details of any updates, corrections, or retractions.<\/span><\/p><p><span lang=\"EN-US\">Obtain additional information related to the article\u2019s publication history.<\/span><\/p><h3>2. Corrections<\/h3><p><span lang=\"EN-US\">The journal recognizes that errors can occur during the research and publication process. When errors are identified, they will be corrected promptly and transparently, following these principles:<\/span><\/p><p><span lang=\"EN-US\">Correction notices will be issued as soon as the error is verified.<\/span><\/p><p><span lang=\"EN-US\">Each notice will clearly specify the nature of the correction and include a link to the original article.<\/span><\/p><p><span lang=\"EN-US\">The <strong>original version<\/strong> of the article will remain accessible online, accompanied by a correction note for transparency.<\/span><\/p><p><span lang=\"EN-US\">For <strong>early online versions<\/strong>, corrections may be integrated directly with a complete audit trail of edits and dates.<\/span><\/p><p><span lang=\"EN-US\">For <strong>articles already published in an issue<\/strong>, a formal correction notice will be released and permanently linked to the original publication.<\/span><\/p><h3>3. Retractions<\/h3><p><span lang=\"EN-US\">Retraction is a serious measure reserved for cases where the integrity of a publication has been compromised. The purpose of retraction is not punitive but to maintain the trustworthiness of the scholarly record.<\/span><\/p><p><span lang=\"EN-US\">An article may be retracted under the following circumstances:<\/span><\/p><p><span lang=\"EN-US\">The results are found to be unreliable due to <strong>fabrication, falsification, or major errors<\/strong> in data, simulations, or models.<\/span><\/p><p><strong><span lang=\"EN-US\">Plagiarism<\/span><\/strong><span lang=\"EN-US\"> is identified in any part of the article.<\/span><\/p><p><strong><span lang=\"EN-US\">Redundant or duplicate publication<\/span><\/strong><span lang=\"EN-US\"> occurs without proper disclosure.<\/span><\/p><p><span lang=\"EN-US\">Data, designs, or materials were used without appropriate <strong>authorization or permissions<\/strong>.<\/span><\/p><p><strong><span lang=\"EN-US\">Copyright or legal issues<\/span><\/strong><span lang=\"EN-US\"> are identified post-publication.<\/span><\/p><p><span lang=\"EN-US\">The <strong>peer review process<\/strong> was compromised.<\/span><\/p><p><strong><span lang=\"EN-US\">Conflicts of interest<\/span><\/strong><span lang=\"EN-US\"> were not disclosed, influencing the interpretation or reporting of findings.<\/span><\/p><p><strong><span lang=\"EN-US\">Retraction Process:<\/span><\/strong><\/p><p><span lang=\"EN-US\">A <strong>retraction notice<\/strong> will be published, linked to the original article.<\/span><\/p><p><span lang=\"EN-US\">The title of the notice will clearly indicate the article\u2019s retracted status.<\/span><\/p><p><span lang=\"EN-US\">The notice will specify the <strong>reason for retraction<\/strong>, <strong>the party responsible<\/strong>, and the <strong>date<\/strong> of the decision.<\/span><\/p><p><span lang=\"EN-US\">The original article will remain available online for the sake of scholarly transparency but will be <strong>clearly marked as \u201cRetracted.\u201d<\/strong><\/span><\/p><h3>4. Preprint Policy<\/h3><p><span lang=\"EN-US\">The journal supports <strong>open science practices<\/strong> and allows authors to share their manuscripts on recognized preprint servers such as <strong>arXiv<\/strong>, <strong>Engineering Archive<\/strong>, or <strong>institutional repositories<\/strong>. Authors may deposit their work at the following stages:<\/span><\/p><p><strong><span lang=\"EN-US\">Original Version:<\/span><\/strong><span lang=\"EN-US\"> Before peer review (submitted manuscript).<\/span><\/p><p><strong><span lang=\"EN-US\">Accepted Manuscript:<\/span><\/strong><span lang=\"EN-US\"> After peer review but before copyediting.<\/span><\/p><p><strong><span lang=\"EN-US\">Published Version of Record:<\/span><\/strong><span lang=\"EN-US\"> The final version after journal publication.<\/span><\/p><p><span lang=\"EN-US\">Authors must disclose the existence of preprints during submission and provide DOIs or direct links. Once the article is published, authors should update preprint records with the final DOI and citation details.<\/span><\/p><p><span lang=\"EN-US\">For detailed preprint guidelines, authors may refer to <strong>Sherpa Romeo<\/strong> (<a href=\"https:\/\/v2.sherpa.ac.uk\/romeo\/\" target=\"_new\">https:\/\/v2.sherpa.ac.uk\/romeo\/<\/a>).<\/span><\/p><h3>5. Archiving and Digital Preservation<\/h3><p><span lang=\"EN-US\">To guarantee long-term access and preservation of engineering research, all published articles are archived in <strong>trusted digital repositories<\/strong> such as <strong>Portico<\/strong> and <strong>CLOCKSS<\/strong>.<br \/>Additionally, articles are indexed in major <strong>engineering and scientific databases<\/strong>.<br \/>Authors are also encouraged to deposit their published versions in <strong>institutional repositories<\/strong> to fulfill funder and institutional requirements.<\/span><\/p><h3>6. Appeals and Complaints<\/h3><p><strong><span lang=\"EN-US\">Appeals:<\/span><\/strong><span lang=\"EN-US\"><br \/>Authors who disagree with an editorial decision may submit an appeal to the <strong>editorial office<\/strong>. Appeals must include clear justification, such as overlooked data, factual clarifications, or procedural concerns. The editor may seek <strong>independent peer review<\/strong> before making a final decision.<br \/>The <strong>editor\u2019s post-appeal decision is final.<\/strong><\/span><\/p><p><strong><span lang=\"EN-US\">Complaints:<\/span><\/strong><span lang=\"EN-US\"><br \/>Complaints regarding editorial handling, publication ethics, or conflicts of interest can be submitted directly to the <strong>editorial office<\/strong>. Ethical complaints are addressed in line with <strong>COPE<\/strong> procedures.<br \/>If a complaint involves an editor or editorial board member, the issue will be escalated to the <strong>publisher<\/strong> for impartial investigation.<\/span><\/p><h3>7. Post-Publication Discussion<\/h3><p><span lang=\"EN-US\">The journal encourages ongoing scholarly dialogue and constructive discussion even after publication. Researchers, readers, and reviewers may:<\/span><\/p><p><span lang=\"EN-US\">Report potential errors, ethical issues, or data inconsistencies.<\/span><\/p><p><span lang=\"EN-US\">Submit <strong>Comments<\/strong>, <strong>Letters to the Editor<\/strong>, or <strong>Technical Notes<\/strong> that constructively engage with published work.<\/span><\/p><p><span lang=\"EN-US\">Participate in transparent, evidence-based discussions that contribute to the advancement of engineering knowledge.<\/span><\/p><h3>8. Ethical Standards and Guidelines<\/h3><p><span lang=\"EN-US\">This journal aligns with international standards and follows the ethical guidelines of:<\/span><\/p><p><strong><span lang=\"EN-US\">COPE (Committee on Publication Ethics)<\/span><\/strong><\/p><p><strong><span lang=\"EN-US\">WAME (World Association of Medical Editors)<\/span><\/strong><\/p><p><strong><span lang=\"EN-US\">ICMJE (International Committee of Medical Journal Editors)<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Editorial Policies Journal Information Menu Home About the Journal\u00a0 Aims and Scope Archives Article Processing Charge Author Instructions Editorial Board Editorial Policies Editorial Process For Reviewers Guest Editor Guidelines Indexing &amp; Archiving Online Submission Open Access Policy Plagiarism Policy Publication Ethics Reviewer Acknowledgment Reviewer Guidelines To Be a Reviewer Contents Editorial Policies Open Access Policy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":45,"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":541,"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/pages\/44\/revisions\/541"}],"wp:attachment":[{"href":"https:\/\/academicsociety.org\/aicyberjournal\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}