Academic Integrity Policy
Academic Integrity and Publication Ethics Policy
Publishing ethics
The Institute of Special Communications and Information Protection of the National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" as the publisher of the scientific collection " Information Technology and Security " follows the principles developed by the Committee on Publication Ethics ( COPE ), in particular the Guidelines on Good Publication Practice .
The collection of publication ethics issues is also guided by the general principles contained in the document Principles of Transparency and Best Practice in Scholarly Publishing, developed in cooperation with COPE , DOAJ , OASPA , and WAME .
The collection is guided in its activities by the Code of Honor of the National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" .
The publisher of the scientific collection " Information Technology and Security " expects editors, authors, and reviewers to adhere to high standards of editorial ethics. We encourage our editors, authors, and reviewers to cooperate in accordance with the Code of Conduct adopted by COPE .
When publishing the collection, we comply with relevant laws and regulations on the protection of intellectual property rights and copyrights.
Ethical obligations of authors
Authors must adhere to high standards of editorial ethics, maintain proper communication with the editor(s), publisher, and their co-authors. Authors must refrain from distorting research results that could discredit the collection, undermine trust in the professionalism of scientific authorship, and ultimately all scientific activity.
We consider it unacceptable:
(1) Plagiarism (and self-plagiarism) in whole or in part without proper citation. All citations must be correct. The author must have written permission from the copyright holder to reproduce any figures and tables – except in cases that fall within the concept of fair use. The author must guarantee that his work is original and belongs to him, that no part of it has been previously published (in part or in full) and that no other agreement has been concluded for the publication of the work or part of it. The manuscript must not be under consideration elsewhere.
Manuscripts submitted to the scientific collection " Information Technology and Security " are checked using the StrikePlagiarism application to detect and prevent plagiarism.
(2) Falsification or fabrication of data. There should be no fabrication or manipulation of data (including images) to support conclusions. Fabrication, falsification, or selective presentation of data with the intent to mislead is unethical, as is the illegal borrowing of someone else’s data or research results. If the author uses secondary data (data sets collected by someone else), he or she must obtain permission to use the copyright before reproducing the data (except in cases that fit within the concept of fair use).
(3) Appropriation of another's work. All authors of the article should be included and all acknowledgments should be relevant. The author(s) should acknowledge the work of other scholars that was used in the study and cite publications that influenced the direction and progress of the study.
(4) Intentional omission of information about financial support , which would be considered a conflict of interest. The author should openly disclose any conflict of interest – for example, if the publications were for the benefit of a company or are services in which the author(s) has a personal interest.
The manuscript must be approved by all co-authors and the responsible management bodies of the institute or organization where the work was carried out.
In addition to being responsible for the parts of the work that the corresponding author has performed himself/herself, he/she must be able to identify the specific contributions of his/her co-authors. In addition, authors must be confident in the integrity of their co-authors' contributions.
Adding or removing authors during the revision stage of the article may be justified by good reason. The revised manuscript should be accompanied by a letter explaining the role of the addition and/or removal of the author(s). Such a request may require additional documentation.
To ensure objectivity and transparency in research, as well as adherence to the principles of ethical and professional conduct, authors must provide information about funding sources, possible conflicts of interest (financial or non-financial), and informed consent if people participated in the research.
If authors discover serious errors in their work, they should notify the editor-in-chief as soon as possible so that the work can be corrected, withdrawn, or a retraction or misprint notice can be issued.
Complaints of unethical behavior will be discussed first with the responsible author. If the dispute continues, the case will be transferred to the institution where the authors work for consideration in accordance with the established procedure.
Ethical obligations of editors
The editorial board of the scientific collection " Information Technology and Security " must constantly work to improve the level of the publication.
Editorial board members are required to maintain the confidentiality of all received materials and their content until they are accepted for publication. Editors should not provide anyone other than authors and reviewers with information about manuscripts, including whether they have been received and are under review, their content and status in the review process, reviewer criticism, and the final decision regarding the manuscripts.
In addition, no member of the editorial board may use information, evidence, or interpretations from an unpublished manuscript for their own research, except with the written consent of the authors.
The editorial board should terminate cooperation with reviewers who submit reports that are of low quality, incorrect or disrespectful, or do not meet the agreed deadline.
Editors should not publish or distribute reviewers' comments without their permission and the permission of the authors. The policy of the scientific collection provides for double-blind peer review. Therefore, reviewer comments are provided to the authors unsigned. The reviewer's identity may not be disclosed to the author or any other person without the written permission of the reviewer.
Confidentiality may be lifted in the event of dishonesty or fraud, but editors must notify authors and/or reviewers.
Editors should make every effort to prepare manuscripts for publication in a timely manner, using all available resources. If editors intend to publish a manuscript, they should try to complete the manuscript within the time allotted, and any planned delays should be agreed with the authors. If the journal does not intend to proceed with the manuscript, editors should try to reject the manuscript as soon as possible so that the authors can submit it to another journal.
Editors who make final decisions on manuscripts should recuse themselves from editorial decisions if they have a conflict of interest or a relationship that could lead to a conflict related to those manuscripts. Editorial board members should not use information obtained while working on manuscripts for personal gain.
Complaints of unethical behavior will be discussed first with the editor. If the dispute continues, the matter will be referred to the editor's institution for proper review.
Ethical obligations of reviewers
Manuscripts submitted to the editorial office are subject to mandatory review. The editorial board of the scientific collection " Information Technology and Security " insists on the reviewers' adherence to high standards of publishing ethics.
Reviewers should agree to review only those works in which they are experts and which they are able to process within the established deadline.
Reviewers are expected to respond promptly to review requests and provide reviews within the established deadlines. Reviewer comments should be constructive, honest, and polite.
Reviewers should keep manuscripts, related materials, and information in them strictly confidential. Reviewers should not publicly discuss authors' work or disclose their ideas before the manuscript is published. Reviewers should not retain manuscripts for personal use. After submission of reviews, they should destroy paper and delete electronic copies of manuscripts.
Reviewers should inform the editors of any conflict of interest that may affect their opinion of the manuscript. In such cases, reviewers should voluntarily withdraw from reviewing. Reviewers should not use information about the work they are reviewing for their own benefit before it is published.
Reviewers should report to the editorial board any violations of editorial ethics they discover by the author(s). These may include: plagiarism, self-plagiarism, unscrupulous manipulation of images/photographs/drawings, biased reference list, duplication of publication, reuse of data from a previous publication without proper references, unoriginality of the publication, implicit conflicts of interest or funding, etc.
Complaints of unethical behavior will be discussed first with the reviewer. If the dispute continues, the case will be referred to the reviewer's institution for proper review.
Handling complaints about illegal behavior
The Editorial Board of the scientific collection " Information Technology and Security " takes all potential cases of misconduct seriously. If an editor has concerns that a proposed article describes something that could be considered improper in terms of research, publication, or professional conduct, this is discussed confidentially with the Editorial Board.
If the issue cannot be resolved through discussion with the author and the editor still has doubts, the case may be reported to the appropriate authorities. If during the review process the editor receives a warning about possible violations (e.g., data fabrication), he should immediately notify the editor-in-chief.
Readers who suspect something illegal in a published article are encouraged to report it to the editor-in-chief.