Journal Information
Journal of Information Security and Applications (JISA)
http://www.journals.elsevier.com/journal-of-information-security-and-applications/
Impact Factor:
2.327
Publisher:
Elsevier
ISSN:
2214-2126
Viewed:
12488
Tracked:
14
Call For Papers
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.

The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA.

JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications.

Current JISA topics

    Authentication and access control
    Anonymity and privacy
    Cryptographic protection
    Digital forensics
    Human factors in security
    Multimedia security
    Network and mobile security
    Security management and policies
    Hardware and physical security
Last updated by Dou Sun in 2021-03-21
Special Issues
Special Issue on Insider Threats in Cyber Security
Submission Date: 2022-05-06

The human and technological aspects of cyber security must be simultaneously addressed to enable a secure information environment. The behavior of insiders is a recognized and significant source of incidents. Insider threats can have both intentional and unintentional origins. Therefore, building security culture, cultivating information security awareness, and effectively motivating security behaviors are important ways to reduce related risks. This special issue seeks original research and review articles relating to insider threats, contributing to theoretical development and supporting advancements in practice. Interdisciplinary contributions are welcome, recognizing that insider threats span different areas, including IT, system science, psychology, economics, and management. Manuscript submission information: Special issue on Insider Threats in Cyber Security The human and technological aspects of cyber security must be simultaneously addressed to enable a secure information environment. The behavior of insiders is a recognized and significant source of incidents. Insider threats can have both intentional and unintentional origins. Therefore, building security culture, cultivating information security awareness, and effectively motivating security behaviors are important ways to reduce related risks. This special issue seeks original research and review articles relating to insider threats, contributing to theoretical development and supporting advancements in practice. Interdisciplinary contributions are welcome, recognizing that insider threats span different areas, including IT, system science, psychology, economics, and management. Topics of interest include, but are not limited, to: - Awareness and education to target insider threat issues - Cross-cultural behavior factors - Data leakage protection - Insider security behavior analytics - Insider threat auditing and assessment - IT ethics - Misuse risks in new and emerging technologies - Policy compliance and safeguards against misuse - Responding to insider incidents - Social engineering and insider exploitation - Technology safeguards to combat insider threats - Unintentional and non-malicious insider threats
Last updated by Dou Sun in 2021-11-13
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
CISCEInternational Conference on Communications, Information System and Computer Engineering2021-04-07 2021-05-14
b43PGCICInternational Conference on P2P, Parallel, Grid, Cloud and Internet Computing2015-07-312015-08-252015-11-04
ICDMMInternational Conference on Design, Manufacturing and Mechatronics2017-05-19 2017-05-26
EMSAInternational Conference on Embedded Systems and Applications2021-12-042022-01-132022-03-26
b3FGCNInternational Conference on Future Generation Communication and Networking2015-06-302015-07-152015-11-25
CloudNetInternational Conference on Cloud Networking2021-08-022021-09-152021-11-08
WINEWorkshop on Internet & Network Economics 2012-09-162012-12-09
WIVECInternational Symposium on Wireless Vehicular Communications2012-11-202013-01-112013-06-02
CSITYInternational Conference on Computer Science, Engineering and Information Technology2021-09-042021-09-122021-09-18
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
Recommendation