Editorial Policies

Focus and Scope

The Journal invites original articles and not simultaneously submitted to another journal or conference.
 encompasses all aspects of the latest outstanding research and developments in the field of Computer science including but not limited to 

  • Artificial intelligence
  • Data Science, Databases
  • Computer Performance Analysis
  • Computer Security and Cryptography
  • Computer Networks
  • Parallel and Distributed Systems
  • Microcontroller
  • Internet of Things
  • Software Engineering


Section Policies


Checked Open Submissions Checked Indexed Checked Peer Reviewed

Peer Review Process

Articles submitted in BUSITI will be examined by the editorial board. If the article matches the scope and style of writing in Buletin Sistem Informasi dan Teknologi Islam, the editorial board will assign the article to the reviewer.

The reviewer's name cannot be seen by the author. The author only sees the review results from the reviewer, so the author must revise the reviewer's request.

Each article will be reviewed by two reviewers. If one of the reviewers refuses, the decision will be submitted to the editor. If all reviewers receive the article will be published. Articles that do not make revisions will not be published in the ILKOM Jurnal Ilmiah.


Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.



This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration. More...


Policy of Screening for Plagiarism

Papers submitted to Buletin Sistem Informasi & Teknologi Islam will be screened for plagiarism using CrossCheck/iThenticate plagiarism detection tools. Buletin Sistem Informasi & Teknologi Islam will immediately reject papers leading to plagiarism or self-plagiarism.

Before submitting articles to reviewers, those are first checked for similarity/plagiarism tool, by a member of the editorial team. The papers submitted to Buletin Sistem Informasi & Teknologi Islam must have similarity level less than 15%.

Plagiarism is the exposing of another person’s thoughts or words as though they were your own, without without permission, credit, or acknowledgment, or because of failing to cite the sources properly. Plagiarism can take diverse forms, from literal copying to paraphrasing the work of another. In order to properly judge whether an author has plagiarized, we emphasize the following possible situations:

  • An author can literally copy another author’s work- by copying word by word, in whole or in part, without permission, acknowledge or citing the original source. This practice can be identified through comparing the original source and the manuscript/work who is suspected of plagiarism.
  • Substantial copying implies for an author to reproduce a substantial part of another author, without permission, acknowledge or citation. The substantial term can be understood both in terms of quality as quantity, being often used in the context of Intellectual property. Quality refers to the relative value of the copied text in proportion to the work as a whole.

Paraphrasing involves taking ideas, words or phrases from a source and crafting them into new sentences within the writing. This practice becomes unethical when the author does not properly cite or does not acknowledge the original work/author. This form of plagiarism is the more difficult form to be identified.