Información de la Revista
International Journal of Information Security and Privacy (IJISP)
Por favor Iniciar para ver el sitio web de la revista

Factor de Impacto:
0.800
Editor:
Idea Group Inc
ISSN:
1930-1650
Vistas:
35911
Seguidores:
42
Solicitud de Artículos
Description:

As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.

Mission & Scope:

The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and multi disciplinary readership ranging from the academic and professional research communities to industry practitioners. The journal seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding information security and privacy.

Coverage:

Agents and mobile communication systems
Authentication and authorization of users, systems, and applications
Businesses models and systems with security and privacy requirements and management
Case studies in security and privacy
Civil rights and liberties
Computer worms and viruses
Consumer and business practices and trends
Cryptographic techniques and protocols
Database issues in privacy protection
Developing enterprise management of security and privacy policies and infrastructures
Development of formal models and definitions
Distributed marketplaces, auctions, and gaming
Distributed, forward, and proactive policies and procedures
Economic impact analysis
Electronic commerce, banking, and payment protocols
Encryption, authentication, and access control
Enhancements for storage area networks
E-services, e-voting, and e-government
File and file system security and privacy
Firewall technologies, policies, and trends
Global Issues
Hacking and corruptions
Hacking, cyber-terrorism, and intrusion detection
Heterogeneous and large-scale environments
Identity and privacy confidentiality
Legal, regulatory, and compliance issues
Malicious codes and attacks against networks
Multiparty communications, co-operations, and computations
Networks and security protocols
Peer-to-Peer computing
Preserving and enhancing technologies and initiatives
Relationships and trade-offs between security and privacy
Security and privacy techniques, management, and protocols
Tools, techniques, methods, and frameworks
Trends and new developments
Trust architectures and underlying infrastructures
World Wide Web authentication and authorization
Última Actualización Por Dou Sun en 2024-08-25
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
IEEE Security & Privacy3.0IEEE1540-7993
The Information Society3.0Taylor & Francis0197-2243
cEURASIP Journal on Information Security2.1Springer1687-417X
Security and Privacy1.500John Wiley & Sons Ltd2475-6725
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650
cDiscover ComputingSpringer2948-2992
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
bb3ICISSInternational Conference on Information Systems Security2026-07-102026-09-102026-12-16
cACISPAustralasian Conference on Information Security and Privacy2026-02-262026-04-162026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
bISPECInternational Conference on Information Security Practice and Experience2024-05-132024-06-242024-10-25
cWISTPInternational Conference on Information Security Theory and Practice2024-01-152024-02-052024-02-29
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25