Peer Review—Magazines


 

ScholarOne Manuscripts: Author Center

The Author Center provides details on what IEEE Security & Privacy magazine requires when submitting a manuscript for review. Please select from the menu below for information on

 

Uploading Instructions

Detailed information on uploading manuscripts is available here. The system requires authors to proof their files before completing the uploading process.

back to top

Login Instructions

Everyone who submits a manuscript must have a ScholarOne Manuscripts account.

If authors have previously volunteered in any capacity for the IEEE Computer Society, ScholarOne Manuscripts has emailed them or will email them a login and password. On their first visit here, they should click on CHECK FOR EXISTING ACCOUNT. They should try to avoid creating a duplicate account.

If authors have not volunteered with the IEEE Computer Society or have not received a new-user email, then they should click on CREATE A NEW ACCOUNT. The bolded fields must be completed to continue the process.

If authors anticipate the need to be notified at two email addresses, they should include the second email address (CC). They may mark this email address active or inactive as needed.

If authors have technical difficulties with their account, they should contact Support by clicking the Get Help Now button in the upper right corner of the screen.

back to top

 

Submissions

We do not allow submission to more than one publication at one time. If we determine that a manuscript has been submitted to another publication before IEEE Security & Privacy's review process is completed, the manuscript will automatically be rejected.

Duplicate Submissions

We do not accept duplicate submissions of manuscripts. Authors should not attempt to enter or upload a modified version of manuscripts already in the system as a new submission.

Identical submissions will be immediately rejected.

Preliminary/Conference Version(s)

If any portion of an author's submission has appeared or will appear in a conference proceedings, the author should include a copy of the previously published manuscript along with the IEEE Security & Privacy submission and a summary of changes identifying the differences between the two.

Editors and reviewers are required to check the submitted manuscript to determine whether a sufficient amount of new material has been added to warrant publication in IEEE Security & Privacy. New results are not required, but the submission should contain expansions of key ideas, examples, elaborations, and so on. 

If authors have questions regarding this policy, they should contact the publications coordinator.

back to top

 

File Types

We accept plain text, Word, Postscript, and PDF files.  Only these file types will be converted into a PDF proof in ScholarOne Manuscripts.

Our system has size limitations on individual files. Authors should not attempt to upload a file larger than 50 Mbytes.

back to top

 

Contact Information

The system requires authors to submit their names and email addresses before advancing in ScholarOne Manuscripts. Email is our primary means of communication, so authors should verify that their information is correct. They should also update this field if any changes to the email address of the corresponding author and/or the contributing authors occur.

back to top

 

Contributing Authors

Authors should list who contributed to the manuscript. If necessary, they can change the list of contributing authors when they upload a revised version. For articles with more than one author, one person should be designated to be in contact with the publications coordinator.

back to top

 

Abstract

The abstract should be no more than 150 words and should describe the overall focus of the manuscript.

back to top

 

Illustrations

All illustrations must be cited in the text, numbered, and have descriptive captions.  Images should show only the coordinated axes (or at most the major grid lines) to avoid dense, hard-to-read illustrations. We accept illustrations in tif, eps, jpg, png, and gif formats.  Please provide high-quality, high-resolution files for best results. We often redraw line art to conform with other drawings in the magazine; submitted drawings should be clear and complete. Detailed images guidelines are available here. If an article is accepted, authors should be prepared to submit separate files for each figure. 

If authors use an image that they did not create (that is, it originally appeared elsewhere or someone else created it), the authors will need to provide permission that they are authorized to use that image to the content editor assigned to work with them on their article.

back to top

 

Keywords/Taxonomy


Keywords should closely reflect the topic and optimally characterize the manuscript. IEEE Security & Privacy provides keywords that are taken from the ACM taxonomy. (This is an extended version of the ACM Computing Classification System, Copyright ©2003 ACM, used with permission.)

We recommend that authors enter a minimum of two keywords when uploading their manuscript. Expert reviewers in the authors' topic area are linked to the manuscript by keywords.

back to top

 

Manuscript Numbers

A unique manuscript tracking number will be assigned to the manuscript and should be used when corresponding with the publications coordinator.

back to top

 

Text-Formatting Requirements

Type of Manuscript

Regular manuscripts fit within the scope of the magazine but are not submitted for a special issue. 

Special issue manuscripts cover a specific topic scheduled on our Editorial Calendar. Authors should select the appropriate issue (manuscript type) when uploading their manuscripts.

To see upcoming special issue topics, authors should look at our Editorial Calendar.

Text

Articles should be understandable to a broad audience of people interested in computing in science and engineering. The writing should be down to earth, practical, and original. Authors should avoid theory, mathematics, jargon, and abstract concepts. They should not assume that the audience will have specialized experience in a particular subfield. If acronyms must be used, each one should be defined on its first appearance.

Feature articles normally run from 4 to 12 magazine pages, including all text, the abstract, keywords, biographies, illustrations, sidebars, table text, and reference entries. Articles should be between 4,900 to 6,000 words (tables and figures count as 250 words each). Department items are usually shorter than features (roughly 3,000 words); the department guidelines have information on how to submit a department.

Any article that exceeds this word count may be rejected automatically without going through the review process.  Each manuscript should have a title page containing the submission's title and the names, affiliations, and contact information for all coauthors.

Style

IEEE Security & Privacy is a magazine, not a journal. Articles should use active voice instead of passive voice ("We discovered ..." rather than "It was discovered ..."). In the first few paragraphs, they should tell why the subject is significant in the field of security and privacy. Our staff editors will work with authors to prepare the article to meet our style requirements.

References

References should be numbered in the order in which they appear. Items referenced should be limited to material that the public can easily access, and the number of references should be limited to 15 (unless the article is a survey or tutorial in scope).

Citations must include full publication information. For articles, this means listing all authors, the article name, the publication's full name, the volume, issue number or month, year of publication, and the pages cited. For conference proceedings, we need the title of the article and the proceedings, the name of the proceedings publisher (not the conference's location), the year of publication, and the pages cited.

back to top

Review Process

Once authors receive a confirmation letter from ScholarOne Manuscripts, the publications coordinator will verify that the manuscript meets IEEE Security & Privacy's word length requirements and forward the manuscript to the editor in chief for an initial review. If the editor in chief finds the manuscript to be within magazine's scope, it will be assigned to an editor. 

We solicit peer reviews from individuals both inside and outside the manuscript's specialty. Reviews are used as the basis for acceptance and content revisions, but the Editor in Chief makes the final decision regarding publication. 

Authors can log in to ScholarOne Manuscripts and check the status of their manuscript anytime during the process. Normally, they will receive a final decision within four to six months.

back to top

 

Supplemental Material


Supplemental material includes Web-only addenda, extra images, or code in addition to the completed manuscript. We prefer that authors submit this type of material after discussion with IEEE Security & Privacy's publications coordinator.

back to top

 

Accepted Manuscripts

Authors cannot submit materials for accepted articles through ScholarOne Manuscripts. Their acceptance letter has more information. If they have questions, authors should contact the publications coordinator.

The peer-review process often generates requests for revisions or additional discussion before the article is accepted for publication. On acceptance, authors will be asked to submit final electronic copy, artwork, an abstract and keywords, short biographies, and a signed copyright form.

After an article is accepted for publication, IEEE Security & Privacy staff editors will edit it. As a magazine, IEEE Security & Privacy has a much more substantial editing process than most journals. Because the magazine's readership is broader, articles must present a streamlined story that our busy readers will be inclined to take the time to read.

Editing includes copy editing (grammar, punctuation, and capitalization), style editing (direct narrative using strong, active verbs to move the story forward), and content editing (flow, clarity, and organization). Depending on the article's length and clarity, the editing process sometimes includes significant revision. The process is iterative to ensure technical accuracy, but it is also designed to increase every article's appeal and to ensure that all usage conforms to the magazine's style.                   

Once an article is accepted for publication, staff editors will edit the manuscript to the magazine's requirements regarding length, presentation, and style. Editing is normally carried out with frequent consultation between author and editor. We will send authors a copy of the edited version for their approval; authors should point out, as soon as possible, any errors or distortions that might have been inadvertently introduced. Authors will also see a copy of the final layout of their article before it goes to press.

Copyright

We assume that articles submitted to us are for our exclusive use and will be published under the IEEE CS copyright. At least one author must sign a release form transferring copyright to the IEEE (excepting certain key rights retained by the authors).

back to top

Footnotes

IEEE Computer Society magazines do not publish footnotes. Please do not include footnotes in your submission.

back to top

How to Contact Us

Publications Coordinator
security@computer.org

back to top

Marketing Automation Platform Marketing Automation Tool