Paper Submission
Submission Preparation
To ensure compliance with submission guidelines, authors must verify their submission:
- Model.docx). Is in Microsoft Word format, using the provided template (
- Author's Guidelines. Adheres to the
- Has not been previously published and is not being considered by any other journal.
Submission
We appreciate your interest in publishing a paper with the International Conference on Cybersecurity and Cybercrime (IC3). We are thrilled to receive your submission and value your dedication to the progress of research in cybersecurity and cybercrime. We look forward to reviewing your paper.
Copyright
Upon submission of a paper to the Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3), the authors agree to transfer the copyright to the journal. Consequently, this prevents them from republishing or reproducing the work independently. The acquisition of this copyright provides the publisher with the ability to:
- Manage the paper and make it available to the academic community.
- Index the paper in international databases for broader dissemination.
- Undertake necessary actions against instances of copyright infringement or plagiarism.
Post-submission, however, authors maintain specific rights, including:
- Recognition as the author of the paper.
- The privilege to present the paper at meetings or conferences and distribute physical copies of the paper on a non-profit basis.
- The liberty to upload the paper to personal or institutional websites or repositories.
Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.