Corrections & Crossmark Policies


Version of Record and Journal of Information Security and Cybercrime Research (JISCR) Corrections Policy:

In an effort to better serve our researchers, librarians, and others in the academic community, JISCR believes clarity in the publishing record is a critical component of information distribution. Recognizing a published article as a finalized “Version of Record” establishes the expectation that it can be relied upon as accurate, complete, and citable. JISCR defines this Version of Record as the article paginated in a volume and issue or the initial article publication for open access journals (Open Access journals do not publish any additional versions such as paginated issue/volume versions).

Corrections prior to the Version of Record

Because articles can be read and cited as soon as they are published (including OnlineFirst publication), any changes thereafter could potentially impact those who read and cited the earlier version. JISCR provides authors with an opportunity to review article proofs prior to publication with the express goal of ensuring accuracy of the content. Publishing an erratum or corrigendum increases the likelihood readers will find out about the change and also explains the specifics of the change.

When an article is published OnlineFirst but not yet published in an issue, limited corrections may be made at the discretion of the journal.

Version of Record

When an article is published in an issue (or an Open Access article is first published), it is considered the Version of Record. JISCR is committed to preserving the integrity and transparency of the Version of Record. If a significant error is discovered, JISCR may publish an erratum or corrigendum notice to alert all readers.

JISCR takes issues of copyright infringement, plagiarism and other breaches of best practice in publication very seriously. In the rare cases where a breach of publication ethics or copyright infringement are discovered, JISCR reserves the right to take appropriate action to correct the academic record, including but not limited to: publishing an erratum or corrigendum; publishing an expression of concern linked to the article; retracting the article and publishing an accompanying retraction notice; or removing an article for legal reasons and replacing the removed article with a notice.

JISCR’s Crossmark Policy

Building upon our commitment of a reliable Version of Record and our Corrections policy, as outlined above, JISCR also participates in the Crossmark program. This program allows readers to quickly and easily access the status of a piece of published content, including updates, corrections, and retractions, as well as provide valuable article metadata.

On JISCR you will now see the Crossmark button, as shown below, both on HTML and PDF versions of our articles. Clicking on the button makes a pop-up box appear that shows the reader the current status of the article (for example, up-to-date, updates available, or retracted), as well as also displaying any additional information or metadata JISCR has supplied to Crossmark.

Learn more about Crossmark, a multi-publisher initiative from Crossref, at

JISCR content

The JISCR content that will have the CrossMark icon is restricted to current and future journal content and limited to specific publication types (see below) and only on content hosted by official JISCR websites. Articles in Press will not have the CrossMark icon for the present.

Publication Types

Article Type

Short Description

Original Research articles

Full-length research report of an original study, carried out prospectively or retrospectively, by an individual scientist or the collaboration of a group of scientists, reporting innovative findings that further the knowledge about a topic important to the cybersecurity and digital forensics.

Review articles

This type of publication consists of work based on summarizing and synthesizing knowledge in a specific area carried out by other scientists who already have an understanding of the topic; however, the authors of a review article would normally have worked and published primary literature in the area they are writing about. A review article should include a critical assessment of the works cited, explanations of conflicts in the literature, and analysis of the field.

Letter to the editor

Letters may discuss previously published material or commentaries in the The Journal of Information Security and Cybercrimes Research (JISCR) or any issue of interest to the The Journal of Information Security and Cybercrimes Research (JISCR). Letters commenting on the published material are shared with the original authors to give them an opportunity to respond.

Book Reviews

Review of a book or other publication of interest to the scientific community in the fields of information security and cybercrimes research. These articles provide a description of the book being reviewed, the strengths and weaknesses of the book, and the intended audience.

Conference Proceedings

Conference Proceedings are a compilation of research papers presented at a scientific meeting, symposium, or conference and are produced from the manuscripts received from authors.

Case Study

Investigative case studies and reports describe how practitioners are dealing with emerging challenges in the field. Also, case studies establish meaningful forum between practitioners and researchers with useful solutions in various fields of cybersecurity and digital forensics. It includes all kinds of practical applications, which covers principles, projects, missions, techniques, tools, methods, processes etc.

Technical Notes

This type of publication describes technical aspects of a field or a report on a procedure or method, or work based on validation of methodologies or techniques.

Legal analysis and updates

Accurate comments by legal experts on recent cases related to information security applications and cybercrimes and cybersecurity, digital evidence and multimedia related legal developments, privacy issues, and legislative restrictions.