Submissions
Submission Preparation Checklist
As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.- The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The submission file is in OpenOffice, Microsoft Word, or RTF document file format.
- Where available, URLs for the references have been provided.
- The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
- The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.
Table of Contents
This is a Table of Content
Message from Editor's Desk
This is a message from Executive editor's Desk. The editorial department of CYBERNOMICS is structured like trees, with editors in different formats and roles on every branch. At the very top it is then the modern corporate world is often called the “Executive Editor”. Perched on the tree’s highest branch, the Executive Editor is in charge of both business and content ad takes care day-to-day functioning from underneath to pinnacle. Here in Executive Editor of CYBERNOMICS are the individuals who oversee the editorial content of a monthly magazine “CYBERNOMICS” which is the 2019 initiative by a Scholastic Seed Inc. an “E-publishing Aggregator & Periodical Mentor” supported and backed by 11 year old KARAM Society, a research and academic management group in enriching contents. The Executive Editor is the newsroom leader and usually here coordinates the publishing of a CYBERNOMICS magazine at this juncture across all fronts. On the branches below the Executive Editor, meanwhile, are the Managing Editors, Associate Editors, Resident Handling Editors, Senior Editors, and Reviewers. Apart from this, there will also be an International Advice Giving Panel, Data Analytics Academic Board, National Advisory Board, Academic Reviewer Board and Handling Editors who serve the magazine by their academic input as and when required, in fact they are the backbone for strengthening an article by floating editorial excerpt and reviewers comment in each article which may be placed at the end of an article along with a similarity indexed checked during originality test by a plagiarism tool. The Editor-in-Chief collects submissions, and delegates each submission to an Editorial Board member (referred to as the handling editor hereafter). The handling editor assigns and sends a paper to at least three reviewers, makes a recommendation to the Executive Editor based on the review reports.
Experiential Research Papers
Experiential Research Papers (ERP) report on completed CYBER research that complies with
rigorous scientific standards. ERP present original results of completed research studies with the
aim of obtaining feedback from fellow researchers. [Limit 16 Pages]
Argument Based Credentials
Argument Based Credentials (ABC) are short papers that present the design and preliminary
results of ongoing CYBER research studies with an endeavor of obtaining early feedback and further
guidance from experts and peers. TBP will be evaluated using the same academic standards as
regular research papers (except for completeness requirements). [Limit 12 Pages]
Scrutiny Tip
Scrutiny Tip (ST) is a situation for which something is pragmatic or considered as a point of view.
The purpose of VP is to share different views about the IT related products and what individual think
about that. [Limit 8 Pages]
Case Study
Case Study (CS) describes real-life experiences with CYBER that authors wish to share with fellow
practitioners and CYBER researchers. They focus on problems and solutions in specific contexts.
Their aim may be to help other practitioners facing similar problems or to solicit help and possible
solutions from other practitioners (or CYBER researchers). [Limit 10 Pages]
Biographical Note of Luminary in an area of Cyber
Biographical Memo (BM) of the celebrity in an vicinity of Cyber We as per our culture acknowledge
in every issue a great leader, Entrepreneur, Technocrats, Academician etc., who contribute a lot to a
society in an area of IS and Cyber. [Limit 2 Pages]
Research Reflection
Research Reflection (RR) can refer to the opinion or arrangement of research ideas that effect
from thinking, the act of producing thoughts on diverse interdisciplinary collaborative research areas
or tools with which researcher can formulate it’s research paper, choose a method for undertaking
a study, write up for findings and discuss the outcomes in a discussion section. In this head author
can throw a light on various research tools which can be helpful in formulating a research paper.
[Limit 5 Pages]
Scholar Research Inventiveness
Scholar Research Inventiveness (SRI) is a research initiative by a grass-root researchers and
technocrats. This head facilitate students/learners to pursue independent academic and imaginative
effort and engage in research under the supervision of a faculty mentor with an intention to heighten
student research as a means of collaborative learning, critical thinking and the establishment of
knowledge. [Limit 12 Pages]
Exposition Portrait
Exposition Portrait (EP) is an excerpt from a researcher’s own thesis or dissertation which had
been previously published or submitted in the form of research project or its own doctoral work. The
rationale is to raise the curtain on an application and thought used by researcher in a brief manner with
an intention to promote the future researchers to sequel their thoughts. [Limit 10 Pages]
Questionnaire Configure
Questionnaire Configure (QC) a new philosophy called “Questionnaire Format” had been introduced,
in which we are going to publish distinguish questionnaires that navigates the usefulness of it in
building research and how to communicate with the respondents. The rationale behind introducing this
QC is to give a glimpse about the structure and the pedagogy. QF on the other hand provides a niche
to grass-root researcher about their various thoughts related to preliminary research and facilitates
them in linking with a respective research papers which the researcher had visualize or going to plan
in a coming future. This is a new inventiveness under the CYBER Academic Social Responsibility
(CASR) and would be complementary/charitable in nature. [Limit 5 Pages]
Manuscript Assessment
Manuscript Assessment (MA) is a form of literary criticism in which a book is analyzed based on
content, style, and merit. MA can be a primary source opinion piece, summary review or scholarly
review. Books can be reviewed for printed periodicals, magazines and newspapers, as school work,
or for book websites on the internet. A book review’s length may vary from a single paragraph to a
substantial essay. Such a BR may evaluate the book on the basis of personal taste. Assessment may
use the occasion of a book review for a display of learning or to promulgate their own ideas on the
topic of a fiction or non-fiction work. [Limit 3 Pages]
Grand Venture Contribution to Society
Grand Venture Contribution to Society (GVCS) in Information System Perspectives deals with
those enterprises contributing a lot to the society, and considering themselves a wizard in the field of
Information System, we publish their profile, with the intention that their reaction/contribution would
be viewed and duly appreciated by the corporate and academics, all-around the globe. The purpose
behind this is to broadcast the most visually powerful, immersive and engaging rich media applications
on the Web. [Limit 2 Pages]
AWARD
Award is something given to a person or a group of people to identify their fineness in a definite field
especially in an area of CYBER, it is rather a certificate of excellence for their contribution in academia
or in a corporate world. This start throws a light on an entity or a gamut of researcher who had been
honored for their extraordinary input. [Limit 2 Pages]
Homage
Homage means great respect and tribute, or something done to honor a person. We in CYBERNOMICS
pay homage to our ancestor’s and say prayers in admiration to their memory which includes
academicians, technocrats and great thinkers. The special respect would be shown publicly by sharing
their achievements and contributions in writing which includes images, excerpts, testimonials, writeup,
etc. [Limit 2 Pages]
Book Review
Book Review (BR) is a literary criticism in which a book is analyzed based on content, style, and
merit. BR can be a primary source opinion piece, summary review or scholarly review. Books can be
reviewed for printed periodicals, magazines and newspapers, as school work, or for book websites on
the internet. A book review’s length may vary from a single paragraph to a substantial essay. Such a
BR may evaluate the book on the basis of personal taste. Reviewers may use the occasion of a book
review for a display of learning or to promulgate their own ideas on the topic of a fiction or non-fiction
work. [Limit 3 Pages]
Column
This is a column for the columnist who can contribute their article.
Power Point Presentation
This a new category which throws a light on a snapshot of Power point presentation.
Cyber Courses
In the era of higher education in universe course is a unit of teaching that typically lasts one academic term, is led by one or more instructors (teachers or professors), and has a fixed roster of students. A course is usually an individual subject.a course officially is the collection of all courses (in the American sense, these are often called “modules”) over a year or semester, though the American usage is common. In the Philippines, a course can be an individual subject (usually referred to by faculty and school officials) or the entire programme (usually referred to by students and outsiders).Courses are time-limited in most universities worldwide, lasting anywhere between several weeks to several semesters.
Biographical Memo
Biographical Memo (BM) of the celebrity in an vicinity of Cyber We as per our culture acknowledge in every issue a great leader, Entrepreneur, Technocrats, Academician etc., who contribute a lot to a society in an area of IS and Cyber
Copyright Notice
Privacy Statement
A GDPR privacy policy is one that clearly and comprehensively outlines your interactions with user data, and includes all the necessary information as established by the GDPR. The GDPR is a law mandating stricter data protection and user rights from companies that handle the personal information of EU citizens. One of the leading themes throughout the text of the GDPR is the need for businesses to operate with greater transparency. The names and email addresses entered in this magazine cybernomics site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.