Identification and Treatment of Academic Misconduct

This journal and authors must obey the Chinese laws and decrees. In order to protect the right of readers and authors and to maintain the quality and reputation of this journal,Journal of Computer Security and Data Forensicswill examine and screen each manuscript strictly during the process of publication. This journal adhere closely to academic publishing specification. The manuscript will be rejected and punished seriously if it is identified as academic misconduct. The specific examining process and treatment methods are as follows:

1. This journal adopts academic misconduct detection system of CNKI for automatic detection, and the China Literature Journals Full-text Database is used as the comparative database, which test academic misconduct behaviors such as plagiarism, copying, forging, juggling the data, nominal or multiple submissions, and ghostwriting etc.

2. The range of detection: All papers that have been received by editorial committee of this journal and the papers that are accused with plagiarism by readers orstakeholders. Thecrosscheckis used to detect the duplication rate of the manuscript. The manuscript will be rejected if the duplication rate is up to or exceeds30%, or the duplication rate is up to or exceeds10% involvingmainresearch findings

3. The criteria of the manuscript identified as academic misconduct are including the following but not limited to:

1) The manuscript content copies intact or basically from literatures or others’ accomplishments.

2) The content of the paper that changes the type of others’ achievement or does not change the type but changes the specific findings of others’ achievements which are protected by copyright and use it as their own independent complete works;

3) The manuscript content uses others’ protected opinions to construct the total, core or main ideas, use others’ protective academic achievements as part of manuscript’s main body or substantial sections;

4) The manuscript content fabricates or tampers the research achievements, experimental data or documents information;

5) The manuscript content cites others’ protected ideas, strategies, information, data and so on, but no comments or original sources are listed;

6) A manuscript casting two or more journals.

4. The treatment methods of identified academic misconduct papers:

1) The editorial department treats the paper eventually identified as academic misconduct prudently, and informs authors timely, allowing authors to explain and defend this issue before making a treatment decision;

2) If the paper is already received but has not been officially published, we will notify the author that the paper will be directly treated as rejected paper in the manuscript-handling process and the employment qualification will be canceled. In addition, the author is given criticism guidance and warning;

3) If the paper has been officially published, the author will be informed literately that the accepted qualification will be canceled and the remuneration should be paid back. Additionally, we will reserve the right to recourse claims if the matter causes any loss to reputation or others to our journal.

4) If the circumstances are serious, the authors’ name and their departments will be publicly notified on the journal at some specific date and paper withdrawal will be also notified. In addition, the details will be notified to the authors’ work unit and other science and technology journals in this area;

5) For authors who are accused of serious plagiarism or cast their paper in multiple journals as the first author, our publication will not accept their papers for the period of subsequent three years;

5. The treatment of the dissent of authors:

If authors disagree with the identification and treatment results of our journal, they submit an application of recheck to the editorial department literally (inadmissible overdue). The editorial department will invite experts to re-review those papers and then make the final decisions. Authors will be informed within90 working days.

The above provision will be come into effect from the date of release and the editorial department ofJournal of Computer Security and Data Forensicsis responsible for the interpretation.