Journal of Computer & Information Technology

Plagiarism Policy

 Journal of Computer and Information Technology

To maintain originality and avoid plagiarism by the research scholar. To avoid condition of double plagiarism, self-plagiarism or least publication units. To acknowledge the sources with full authenticity. Copyright form submitted should contain the signed consent of each author in the manuscript.

All papers submitted are initially screened and checked through the Advanced Plagiarism Detection Software (CrossCheck by iThenticate)

 Ethical Responsibilities

To maintain originality and avoid plagiarism by the research scholar. To avoid submission of self-plagiarism, double plagiarism or least publication units. To acknowledge the sources with full authenticity. Copyright form submitted should contain the signed consent of each author in the manuscript.

It is absolutely essential that author(s) obtain permission to reproduce any published material, figures, schemes, tables or any extract of a text which does not fall into the public domain, or for which they do not hold the copyright.

Permission is required for:

Your own works published by other publishers and for which you did not retain copyright. Substantial extracts from any others work or series of work. Use of tables, Graphs, Charts, Schemes and artworks if they are unaltered or slightly modified. Photographs for which you do not hold copyright.

Permission is not required for:

Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either “Data from… “Or “Adapted from….”. Reasonably short quotes are considered fair us and therefore do not require permission. Graphs, Charts, Schemes and Artworks that are completely redrawn and significantly changed beyond recognition do not require permission.


Ansari Education And Research Society
Facebook Google Plus Twitter