Paper Submission

Submission Preparation

To ensure compliance with submission guidelines, authors must verify their submission:

  • Is in Microsoft Word format, using the provided template (Model.docx).
  • Adheres to the Author's Guidelines.
  • Has not been previously published and is not being considered by any other journal.



We appreciate your interest in publishing a paper with the International Conference on Cybersecurity and Cybercrime (IC3). We are thrilled to receive your submission and value your dedication to the progress of research in cybersecurity and cybercrime. We look forward to reviewing your paper.



Upon submission of a paper to the Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3), the authors agree to transfer the copyright to the journal. Consequently, this prevents them from republishing or reproducing the work independently. The acquisition of this copyright provides the publisher with the ability to:

  • Manage the paper and make it available to the academic community.
  • Index the paper in international databases for broader dissemination.
  • Undertake necessary actions against instances of copyright infringement or plagiarism.


Post-submission, however, authors maintain specific rights, including:

  • Recognition as the author of the paper.
  • The privilege to present the paper at meetings or conferences and distribute physical copies of the paper on a non-profit basis.
  • The liberty to upload the paper to personal or institutional websites or repositories.


Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.