We use cookies to enhance your experience on our website. By continuing to use our website, you are agreeing to our use of cookies. You can change your cookie settings at any time. Find out more Skip to Main Content

Author Guidelines

Manuscript Preparation Instructions

Charges, Licences, and Self-Archiving

Journal Policies

Manuscript Preparation Instructions


Pre-submission language editing

Online search engine optimization (SEO)

Manuscript format and structure


Figures and illustrations

Permission to reproduce figures and extracts

Third-party content in Open Access papers

Supplementary data

Advance Access


Please read these instructions carefully and follow them closely to ensure that the review and publication of your paper is as efficient and quick as possible. The Editors reserve the right to return manuscripts that are not in accordance with these instructions.

All material to be considered for publication in Journal of Cybersecurity should be submitted to the journals online submission system. All authors must upload their manuscript and figure source files. For authors using Word, this means the .doc or .docx and figure files. The source files will be used for typesetting purposes and must be uploaded with every version of your paper, i.e. original version and all revisions. The source files must correspond exactly to the complete manuscript, otherwise delays in publication will occur.

To contact the editorial office, please email cybersecurity.editorialoffice@oup.com


Language editing, if your first language is not English, to ensure that the academic content of your paper is fully understood by journal editors and reviewers is optional. Language editing does not guarantee that your manuscript will be accepted for publication. For further information on this service, please click here. Several specialist language editing companies offer similar services and you can also use any of these. Authors are liable for all costs associated with such services.


You can improve the online accessibility of your paper by writing optimized copy that is highly indexable across all search engines. A large number of readers find articles online by using search engines such as Google. Most searching is done using keywords or key phrases. Including key phrases that people searching are likely to use should make your article more discoverable. By taking some simple steps to optimize your article for search engines it will help your work to be discovered and read. This may in turn lead to the work being cited in others' work and will further raise the visibility of your article. Future measures, which assess the value of journals and of individual articles based on the number of times they are downloaded, are currently being developed and tested (see http://www.uksg.org/usagefactors/ and http://www.cranfieldlibrary.cranfield.ac.uk/pirus2/tiki-index.php).


Papers can be up to 15,000 words. Please prepare your typescript text using a word-processing package (save in .doc, .docx or .pdf format) and in one-column format.

Please also include the files for any other supplementary material to be submitted with your manuscript (this material is published online only). It is recommended that authors spell-check all files before submission.

The first page of the manuscript must give: title of paper, contributor names, and the full address (including email) of the author designated to receive proofs/correspondence, and total word count. An abstract of no more than 350 words should be included with all submissions. The name of the author(s) should appear at the beginning immediately under the title, with an asterisked footnote giving the present position of the author(s) and an address (including email) for contact by readers, together with any desired acknowledgements.

Headings should be to journal style. Compound words should be hyphenated.

All references must be cited in the text and should be denoted using numbers in square brackets before the punctuation, e.g. [1], [3–5]. References should be ordered consecutively in the order they appear in the text, and a full reference list provided at the end of the manuscript. Footnotes are allowed, but references must be placed in this separate section at the end of the manuscript.

Authors are responsible for checking the accuracy of all references.

Title page

The title should be short, specific and informative. The first name, initial(s), and surname of each author should be followed by his or her department, institution, city with postcode, and country. The telephone number and email address of the corresponding author should also be provided. It is editorial policy to list only one author for correspondence. Any changes of address may be given next to the Affiliations or Acknowledgements. A footnote stating 'The authors wish it to be known that, in their opinion, the first x authors should be regarded as joint First Authors' is permitted if requested. Any deletions or additions to the author list after acceptance of the paper must be submitted in writing, signed by all authors, to the appropriate editorial office.

It is important that authors ensure the following: (i) all names have the correct spelling and are in the correct order (first name, then family name); (ii) initials are correct. Occasionally, the distinction between surnames and forenames can be ambiguous, and this is to ensure that the authors’ full surnames and forenames are tagged correctly, for accurate indexing online.


The second page of the manuscript should contain the Abstract, which must not exceed 350 words. The Abstract should be comprehensible to readers before they have read the paper, and reference citations must be avoided. It is essential that the Abstract clearly states the manuscript’s importance to Journal of Cybersecurity.

Specialized section

Authors should ensure that their articles can be read at both interdisciplinary and disciplinary levels. Papers may require, for completely rigorous communication, a technical mathematical, statistical, or other specialized section. Authors are expected to include an introductory summary of the content of the section describing its significance, thereby allowing non-experts to skip details as necessary. This section must not exceed 200 words.


Non-standard abbreviations should be defined at the first occurrence and introduced only where multiple uses is made. Authors should not use abbreviations in headings.


Acknowledgements and details of non-financial support must be included at the end of the text before references and not in footnotes. Personal acknowledgements should precede those of institutions or agencies. Please note that acknowledgement of funding bodies and declarations regarding conflicts of interest should be given in separate Funding and Conflicts of interest sections, respectively.


Details of all funding sources for the work in question should be given in a separate section entitled 'Funding'. This should appear after the 'Acknowledgements' section. The following rules should be followed:

  • The sentence should begin: ‘This work was supported by …’
  • The full official funding agency name should be given, i.e. ‘the National Cancer Institute at the National Institutes of Health’ or simply 'National Institutes of Health' not ‘NCI' (one of the 27 sub institutions) or 'NCI at NIH’ (full RIN-approved list of UK funding agencies)
  • Grant numbers should be complete and accurate and provided in brackets as follows: ‘[grant number ABX CDXXXXXX]’
  • Multiple grant numbers should be separated by a comma as follows: ‘[grant numbers ABX CDXXXXXX, EFX GHXXXXXX]’
  • Agencies should be separated by a semi-colon (plus ‘and’ before the last funding agency)
  • Where individuals need to be specified for certain sources of funding the following text should be added after the relevant agency or grant number 'to [author initials]'.

An example is given here: ‘This work was supported by the National Institutes of Health [P50 CA098252 and CA118790 to R.B.S.R.] and the Alcohol & Education Research Council [HFY GR667789].

Crossref Funding Data Registry

In order to meet your funding requirements authors are required to name their funding sources, or state if there are none, during the submission process. For further information on this process or to find out more about the CHORUS initiative please click here.


If you use EndNote and Reference Manager to facilitate referencing citations (not required for submission), this journal's style (Oxford SciMed) is available for use. If an automatic referencing system has been used in the preparation of the paper, the references must not be left embedded in the final text file submitted.

Full references should be provided in accordance with the style of Journal of Cybersecurity. This journal follows our standard Oxford SciMed style. By following the mini style checklist you can review any style points not covered in the Instruction to Authors guide.


All tables should be on separate pages and accompanied by a title and footnotes where necessary. The tables should be numbered consecutively using numerals. Units in which results are expressed should be given in parentheses at the top of each column and not repeated in each line of the table. Ditto signs are not used. Avoid overcrowding the tables and the excessive use of words. The format of tables should be in keeping with that normally used by the journal


Please be aware that the requirements for online submission and for reproduction in the journal are different: (i) for online submission and peer review, please upload your figures either embedded in the word processing file or separately as low-resolution images (.jpg, .tif, .gif or. eps); (ii) for reproduction in the journal, you will be required after acceptance to supply high-resolution .tif files. Minimum resolutions are 300 d.p.i. for colour or tone images, and 600 d.p.i. for line drawings. We advise that you create your high-resolution images first as these can be easily converted into low-resolution images for online submission.

Figures will not be relettered by the publisher. The journal reserves the right to reduce the size of illustrative material. Any photomicrographs, electron micrographs or radiographs must be of high quality. Wherever possible, photographs should fit within the print area or within a column width.

For useful information on preparing your figures for publication, go to http://cpc.cadmus.com/da.


In order to reproduce any third party material, including tables, figures, or images, in an article authors must obtain permission from the copyright holder and be compliant with any requirements the copyright holder may have pertaining to this reuse. When seeking to reproduce any kind of third party material authors should request the following: • non-exclusive rights to reproduce the material in the specified article and journal; • electronic rights, preferably for use in any form or medium; • the right to use the material for the life of the work; and • world-wide English-language rights. Further guidelines on clearing permissions can be found at http://www.oxfordjournals.org/access_purchase/permissions_guidelines.doc.


If you will be publishing your paper under an Open Access licence but it contains material for which you do not have Open Access re-use permissions, please state this clearly by supplying the following credit line alongside the material:

Title of content

Author, Original publication, year of original publication, by permission of [rights holder]

This image/content is not covered by the terms of the Creative Commons licence of this publication. For permission to reuse, please contact the rights holder.


Supporting material that is not essential for inclusion in the full text of the manuscript, but would nevertheless benefit the reader, is made available online by the publisher, and linked to the online manuscript. The material should not be essential to understanding the conclusions of the paper, but should contain data that is additional or complementary and directly relevant to the article content. Such information might include more detailed methods, extended data sets/data analysis, or additional figures.

All material to be considered as supplementary data must be submitted at the same time as the main manuscript for peer review. It cannot be altered or replaced after the paper has been accepted for publication, and will not be edited. Please indicate clearly all material intended as supplementary data upon submission and name the files e.g. 'Supplementary Figure 1', 'Supplementary Data', etc. Also ensure that the supplementary data is referred to in the main manuscript where necessary, for example as '(see Supplementary data)' or '(see Supplementary Figure 1)'.


Advance Access articles are published online soon after they have been accepted for publication, in advance of their appearance in an online issue. Appearance in Advance Access constitutes official publication, and the Advance Access version can be cited by a unique DOI (Digital Object Identifier). When an article appears in an issue, it is removed from the Advance Access page.

Articles posted for Advance Access have been copyedited and typeset and any corrections included. This is before they are paginated for inclusion in a specific issue of the journal. Once an article appears in an issue, both versions of the paper continue to be accessible and citable.

Charges, Licenses, and Self-Archiving

Open Access charges

All content published in Journal of Cybersecurity is made freely available online to all under an Open Access model.

After a manuscript is accepted for publication, the corresponding author will be required to accept a mandatory license to publish agreement. Authors can use the Creative Common Attribution license (CC-BY), Creative Commons Attribution Non-Commercial (CC-BY-NC) and Creative Commons Attribution No-Derivatives (CC-BY-ND) for their articles.

Under Journal of Cybersecurity's fully open access model publication costs are covered by article publication charges (rather than subscription fees) charged to authors on acceptance of their paper (750 GBP / 1050 USD / 950 EUR).The journal recognises, however, that authors in some fields may not have access to funding through their research grants, libraries, institutions, or companies.For the benefit of these authors we are able to offer waivers which can be applied for and are considered on a case-by-case basis. Funds for such waivers are limited, however, as the journal would not be sustainable in the long term without income from publication charges to cover its costs. The Editors-in-Chief request that contributors to Journal of Cybersecurity support the journal’s open access model by paying the publication charges if they are able to do so.Note that the decision to accept a paper will not be influenced by the author's ability to pay the article publication charge.Waivers are also available for authors in developing countries.

Any contributor wishing to submit a waiver request is required to send an email to nikul.patel@oup.com; endorsed by a senior financial administrator or head of department, after his or her manuscript has been accepted for publication.

The email should detail the following:

-Corresponding author’s institution name and address/home address if no institution

-Manuscript number

-Manuscript title

-Reason for waiver application

-Email of supporting applicant

-Statement from supporting applicant

-Name and title of supporting applicant

Please click here for more information about the Creative Commons licences.


For information about this journal's policy, please visit ourAuthor Self-Archiving policy page.

Journal Policies

Scope of the Journal

Publication ethics

Peer review process

Material disclaimer


The Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary cyber domain. JCS is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity.JCS provides a hub around which the interdisciplinary cybersecurity community can form. JCS is committed to providing quality empirical research, as well as scholarship, that is grounded in real-world implications and solutions.

JCS solicits articles adhering to the following, broadly constructed and interpreted, aspects of cybersecurity: anthropological and cultural studies; computer science and security; security and crime science; cryptography and associated topics; security economics; human factors and psychology; legal aspects; political and policy perspectives; and strategic and war studies; and privacy. Authors should ensure that their articles can be read at both interdisciplinary and disciplinary levels. For example, a paper may require, for completely rigorous communication, a technical mathematical, statistical, or other specialized section. Authors are expected to include an introductory summary of the content of the section describing its significance, thereby allowing non-experts to skip details as necessary.


Authors should observe high standards with respect to publication ethics as set out by the Commission on Publication Ethics (COPE). Falsification or fabrication of data, plagiarism, including duplicate publication of the authors’ own work without proper citation, and misappropriation of the work are all unacceptable practices. Any cases of ethical misconduct are treated very seriously and will be dealt with in accordance with the COPE guidelines.


All authors should have been involved in the writing of the manuscript at draft and any revision stages, and have read and approved the final version. Anyone who made major contributions to the writing of the manuscript should be listed as an author (e.g. “ghost writing” is prohibited by the Journal). Any other individuals who made less substantive contributions to the study or the writing of the manuscript should be listed in the acknowledgement section. Any change in authorship (including author order) after the initial manuscript submission must be approved in writing by all authors.

Authorship and 'Umbrella' groups

Many large collaborative studies are organized under a group name which represents all the participants. All articles must have at least one named individual as author. Authors who wish to acknowledge the umbrella group from which the data originate should first list the author(s) of the article and follow this with 'on behalf of the GROUP NAME'. If necessary the names of the participants may be listed in the Acknowledgements section.


By submitting your manuscript to the journal it is understood that this it is an original manuscript and is unpublished work and is not under consideration elsewhere. Plagiarism, including duplicate publication of the author’s own work, in whole or in part without proper citation is not tolerated by the journal. Manuscripts submitted to the journal may be checked for originality using anti-plagiarism software.

Conflicts of interest

At the point of submission, each author should reveal any financial interests or connections, direct or indirect, or other situations that might raise the question of bias in the work reported or the conclusions, implications, or opinions stated – including pertinent commercial or other sources of funding for the individual author(s) or for the associated department(s) or organization(s), personal relationships, or direct academic competition. When considering whether you should declare a conflicting interest or connection please consider the conflict of interest test: Is there any arrangement that would embarrass you or any of your co-authors if it was to emerge after publication and you had not declared it?


All submissions to the journal are initially reviewed by the Editors-in-Chief. At this stage manuscripts may be rejected without peer review if it is felt that they are not of high enough priority or not relevant to the journal. This fast rejection process means that authors are given a quick decision and do not need to wait for the review process.

Manuscripts that are not instantly rejected are sent out for peer review, usually to two independent reviewers. Based on the feedback from these reviewers and the Area Editors’ judgment a decision is given on the manuscript.

If a paper is not acceptable in its present form, we will pass on suggestions for revisions to the author.


The opinions expressed in Journal of Cybersecurity are those of the authors and contributors, and do not necessarily reflect those of the Editors-in-Chief, the Area Editors, Advisory Board Members or Oxford University Press or the organization to which the authors are affiliated.

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Subscribe Now