Submissions

Login or Register to make a submission.

Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.
  • The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  • The submission file is in OpenOffice, Microsoft Word, or RTF document file format.
  • Where available, URLs for the references have been provided.
  • The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  • The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.

Author Guidelines

CYBERNOMICS in collaboration with SCHOLASTIC SEED Inc. publishes a new peer-reviewed open access e-journal in IT Infrastructure Management, Info Security, Cyber Risk Management, Cyber Security, Cyber Forensics, Security Operation Centre Design and Operations, Cloud Computing, Big Data , Internet of Things (IoT) including IoT Security, Blockchain, Bitcoin, Machine Learning, Artificial Intelligence, Smart Cities, Digital Transformation, E-Governance, Start-Up Incubation, Entrepreneurship Development, New Technology Evaluation for commercial viability and other relevant fields. It also covers many aspects in Information System Data Science and related areas.


The journal provides an international forum for the exchange of ideas, principles and processes concerning the application of diverse topics of cybernomics to organizations, institutions and the world at large.

CYBERNOMICS considers research submissions in several categories. Magazine takes into consideration professional plagiarism detection and prevention technology for it’s scholarly publication and research article in order to ensure the originality of written text before publication. The Cybernomics receives submissions only through its website www.cybernomics.in


The magazine has a scholarly publisher that plan to services of Crosscheck offered by CrossRef, USA and facilitated by iThenticate software. The magazine had implemented a Search Engine Optimization (SEO) and web analytics dedicatedly for it’s on-line portal to provide glimpse about the articles having highest citation.


CYBERNOMICS has also applied for DOI No. from International DOI Foundation (IDF) USA.
CYBERNOMICS is also concomitant of Publisher International Linking Association, Inc (PILA) a not-for-profit membership organization, USA.

Type of Articles


We are importune dissimilar types of article which mostly focused on research issues in the Cyber and IT related areas.


1. Experiential Research Papers (ERP) report on completed CYBER research that complies with rigorous scientific standards. ERP present original results of completed research studies with the aim of obtaining feedback from fellow researchers. [Limit 16 Pages]


2. Argument Based Credentials (ABC) are short papers that present the design and preliminary results of ongoing CYBER research studies with an endeavor of obtaining early feedback and further guidance from experts and peers. TBP will be evaluated using the same academic standards asregular research papers (except for completeness requirements). [Limit 12 Pages]


3. Case Study (CS) describes real-life experiences with CYBER that authors wish to share with fellow practitioners and CYBER researchers. They focus on problems and solutions in specific contexts. Their aim may be to help other practitioners facing similar problems or to solicit help and possible solutions from other practitioners (or CYBER researchers). [Limit 10 Pages]


4. Scrutiny Tip (ST) is a situation for which something is pragmatic or considered as a point of view. The purpose of VP is to share different views about the IT related products and what individual think about that. [Limit 8 Pages]


5. Research Reflection (RR) can refer to the opinion or arrangement of research ideas that effect from thinking, the act of producing thoughts on diverse interdisciplinary collaborative research areas or tools with which researcher can formulate it’s research paper, choose a method for undertaking a study, write up for findings and discuss the outcomes in a discussion section. In this head author can throw a light on various research tools which can be helpful in formulating a research paper. [Limit 5 Pages]

6. Scholar Research Inventiveness (SRI) is a research initiative by a grass-root researchers and technocrats. This head facilitate students/learners to pursue independent academic and imaginative effort and engage in research under the supervision of a faculty mentor with an intention to heighten student research as a means of collaborative learning, critical thinking and the establishment of knowledge. [Limit 12 Pages]


7. Exposition Portrait (EP) is an excerpt from a researcher’s own thesis or dissertation which had been previously published or submitted in the form of research project or its own doctoral work. The rationale is to raise the curtain on an application and thought used by researcher in a brief manner with
an intention to promote the future researchers to sequel their thoughts. [Limit 10 Pages] 

8. Questionnaire Configure (QC) a new philosophy called “Questionnaire Format” had been introduced, in which we are going to publish distinguish questionnaires that navigates the usefulness of it in building research and how to communicate with the respondents. The rationale behind introducing this
QC is to give a glimpse about the structure and the pedagogy. QF on the other hand provides a niche to grass-root researcher about their various thoughts related to preliminary research and facilitates them in linking with a respective research papers which the researcher had visualize or going to plan
in a coming future. This is a new inventiveness under the CYBER Academic Social Responsibility (CASR) and would be complementary/charitable in nature. [Limit 5 Pages]


9. Manuscript Assessment (MA) is a form of literary criticism in which a book is analyzed based on content, style, and merit. MA can be a primary source opinion piece, summary review or scholarly review. Books can be reviewed for printed periodicals, magazines and newspapers, as school work, or for book websites on the internet. A book review’s length may vary from a single paragraph to a substantial essay. Such a BR may evaluate the book on the basis of personal taste. Assessment may use the occasion of a book review for a display of learning or to promulgate their own ideas on the topic of a fiction or non-fiction work. [Limit 3 Pages]


10. Biographical Memo (BM) of the celebrity in an vicinity of Cyber We as per our culture acknowledge in every issue a great leader, Entrepreneur, Technocrats, Academician etc., who contribute a lot to a society in an area of IS and Cyber. [Limit 2 Pages]


11. Grand Venture Contribution to Society (GVCS) in Information System Perspectives deals with those enterprises contributing a lot to the society, and considering themselves a wizard in the field of Information System, we publish their profile, with the intention that their reaction/contribution would
be viewed and duly appreciated by the corporate and academics, all-around the globe. The purpose behind this is to broadcast the most visually powerful, immersive and engaging rich media applications on the Web. [Limit 2 Pages]


12. Award is something given to a person or a group of people to identify their fineness in a definite field especially in an area of CYBER, it is rather a certificate of excellence for their contribution in academia or in a corporate world. This start throws a light on an entity or a gamut of researcher who had been
honored for their extraordinary input. [Limit 2 Pages] 


13. Homage means great respect and tribute, or something done to honor a person. We in CYBERNOMICS pay homage to our ancestor’s and say prayers in admiration to their memory which includes academicians, technocrats and great thinkers. The special respect would be shown publicly by sharing
their achievements and contributions in writing which includes images, excerpts, testimonials, writeup, etc. [Limit 2 Pages]


14. Book Review (BR) is a literary criticism in which a book is analyzed based on content, style, and merit. BR can be a primary source opinion piece, summary review or scholarly review. Books can be reviewed for printed periodicals, magazines and newspapers, as school work, or for book websites on the internet. A book review’s length may vary from a single paragraph to a substantial essay. Such a BR may evaluate the book on the basis of personal taste. Reviewers may use the occasion of a book review for a display of learning or to promulgate their own ideas on the topic of a fiction or non-fiction work. [Limit 3 Pages]

Table of Contents

This is a Table of Content

Message from Editor's Desk

This is a message from Executive  editor's Desk. The editorial department of CYBERNOMICS is structured like trees, with editors in different formats and roles on every branch. At the very top it is then the modern corporate world is often called the “Executive Editor”. Perched on the tree’s highest branch, the Executive Editor is in charge of both business and content ad takes care day-to-day functioning from underneath to pinnacle. Here in Executive Editor of CYBERNOMICS are the individuals who oversee the editorial content of a monthly magazine “CYBERNOMICS” which is the 2019 initiative by a Scholastic Seed Inc. an “E-publishing Aggregator & Periodical Mentor” supported and backed by 11 year old KARAM Society, a research and academic management group in enriching contents. The Executive Editor is the newsroom leader and usually here coordinates the publishing of a CYBERNOMICS magazine at this juncture across all fronts. On the branches below the Executive Editor, meanwhile, are the Managing Editors, Associate Editors, Resident Handling Editors, Senior Editors, and Reviewers. Apart from this, there will also be an International Advice Giving Panel, Data Analytics Academic Board, National Advisory Board, Academic Reviewer Board and Handling Editors who serve the magazine by their academic input as and when required, in fact they are the backbone for strengthening an article by floating editorial excerpt and reviewers comment in each article which may be placed at the end of an article along with a similarity indexed checked during originality test by a plagiarism tool. The Editor-in-Chief collects submissions, and delegates each submission to an Editorial Board member (referred to as the handling editor hereafter). The handling editor assigns and sends a paper to at least three reviewers, makes a recommendation to the Executive Editor based on the review reports.

Experiential Research Papers

Experiential Research Papers (ERP) report on completed CYBER research that complies with
rigorous scientific standards. ERP present original results of completed research studies with the
aim of obtaining feedback from fellow researchers. [Limit 16 Pages]

Argument Based Credentials

Argument Based Credentials (ABC) are short papers that present the design and preliminary
results of ongoing CYBER research studies with an endeavor of obtaining early feedback and further
guidance from experts and peers. TBP will be evaluated using the same academic standards as
regular research papers (except for completeness requirements). [Limit 12 Pages]

Scrutiny Tip

Scrutiny Tip (ST) is a situation for which something is pragmatic or considered as a point of view.
The purpose of VP is to share different views about the IT related products and what individual think
about that. [Limit 8 Pages]

Case Study

Case Study (CS) describes real-life experiences with CYBER that authors wish to share with fellow
practitioners and CYBER researchers. They focus on problems and solutions in specific contexts.
Their aim may be to help other practitioners facing similar problems or to solicit help and possible
solutions from other practitioners (or CYBER researchers). [Limit 10 Pages]

Biographical Note of Luminary in an area of Cyber

Biographical Memo (BM) of the celebrity in an vicinity of Cyber We as per our culture acknowledge
in every issue a great leader, Entrepreneur, Technocrats, Academician etc., who contribute a lot to a
society in an area of IS and Cyber. [Limit 2 Pages]

Research Reflection

Research Reflection (RR) can refer to the opinion or arrangement of research ideas that effect
from thinking, the act of producing thoughts on diverse interdisciplinary collaborative research areas
or tools with which researcher can formulate it’s research paper, choose a method for undertaking
a study, write up for findings and discuss the outcomes in a discussion section. In this head author
can throw a light on various research tools which can be helpful in formulating a research paper.
[Limit 5 Pages]

Scholar Research Inventiveness

Scholar Research Inventiveness (SRI) is a research initiative by a grass-root researchers and
technocrats. This head facilitate students/learners to pursue independent academic and imaginative
effort and engage in research under the supervision of a faculty mentor with an intention to heighten
student research as a means of collaborative learning, critical thinking and the establishment of
knowledge. [Limit 12 Pages]

Exposition Portrait

Exposition Portrait (EP) is an excerpt from a researcher’s own thesis or dissertation which had
been previously published or submitted in the form of research project or its own doctoral work. The
rationale is to raise the curtain on an application and thought used by researcher in a brief manner with
an intention to promote the future researchers to sequel their thoughts. [Limit 10 Pages]

Questionnaire Configure

Questionnaire Configure (QC) a new philosophy called “Questionnaire Format” had been introduced,
in which we are going to publish distinguish questionnaires that navigates the usefulness of it in
building research and how to communicate with the respondents. The rationale behind introducing this
QC is to give a glimpse about the structure and the pedagogy. QF on the other hand provides a niche
to grass-root researcher about their various thoughts related to preliminary research and facilitates
them in linking with a respective research papers which the researcher had visualize or going to plan
in a coming future. This is a new inventiveness under the CYBER Academic Social Responsibility
(CASR) and would be complementary/charitable in nature. [Limit 5 Pages]

Manuscript Assessment

Manuscript Assessment (MA) is a form of literary criticism in which a book is analyzed based on
content, style, and merit. MA can be a primary source opinion piece, summary review or scholarly
review. Books can be reviewed for printed periodicals, magazines and newspapers, as school work,
or for book websites on the internet. A book review’s length may vary from a single paragraph to a
substantial essay. Such a BR may evaluate the book on the basis of personal taste. Assessment may
use the occasion of a book review for a display of learning or to promulgate their own ideas on the
topic of a fiction or non-fiction work. [Limit 3 Pages]

Grand Venture Contribution to Society

Grand Venture Contribution to Society (GVCS) in Information System Perspectives deals with
those enterprises contributing a lot to the society, and considering themselves a wizard in the field of
Information System, we publish their profile, with the intention that their reaction/contribution would
be viewed and duly appreciated by the corporate and academics, all-around the globe. The purpose
behind this is to broadcast the most visually powerful, immersive and engaging rich media applications
on the Web. [Limit 2 Pages]

AWARD

Award is something given to a person or a group of people to identify their fineness in a definite field
especially in an area of CYBER, it is rather a certificate of excellence for their contribution in academia
or in a corporate world. This start throws a light on an entity or a gamut of researcher who had been
honored for their extraordinary input. [Limit 2 Pages]

Homage

Homage means great respect and tribute, or something done to honor a person. We in CYBERNOMICS
pay homage to our ancestor’s and say prayers in admiration to their memory which includes
academicians, technocrats and great thinkers. The special respect would be shown publicly by sharing
their achievements and contributions in writing which includes images, excerpts, testimonials, writeup,
etc. [Limit 2 Pages]

Book Review

Book Review (BR) is a literary criticism in which a book is analyzed based on content, style, and
merit. BR can be a primary source opinion piece, summary review or scholarly review. Books can be
reviewed for printed periodicals, magazines and newspapers, as school work, or for book websites on
the internet. A book review’s length may vary from a single paragraph to a substantial essay. Such a
BR may evaluate the book on the basis of personal taste. Reviewers may use the occasion of a book
review for a display of learning or to promulgate their own ideas on the topic of a fiction or non-fiction
work. [Limit 3 Pages]

Column

This is a column for the columnist who can contribute their article.

Power Point Presentation

This a new category which throws a light on a snapshot of Power point presentation.

Cyber Courses

In the era of higher education in universe course is a unit of teaching that typically lasts one academic term, is led by one or more instructors (teachers or professors), and has a fixed roster of students. A course is usually an individual subject.a course officially is the collection of all courses (in the American sense, these are often called “modules”) over a year or semester, though the American usage is common. In the Philippines, a course can be an individual subject (usually referred to by faculty and school officials) or the entire programme (usually referred to by students and outsiders).Courses are time-limited in most universities worldwide, lasting anywhere between several weeks to several semesters.

Biographical Memo

Biographical Memo (BM) of the celebrity in an vicinity of Cyber We as per our culture acknowledge in every issue a great leader, Entrepreneur, Technocrats, Academician etc., who contribute a lot to a society in an area of IS and Cyber

Privacy Statement

A GDPR privacy policy is one that clearly and comprehensively outlines your interactions with user data, and includes all the necessary information as established by the GDPR. The GDPR is a law mandating stricter data protection and user rights from companies that handle the personal information of EU citizens. One of the leading themes throughout the text of the GDPR is the need for businesses to operate with greater transparency. The names and email addresses entered in this magazine cybernomics site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.