Journal Information
International Journal of Information Security and Privacy (IJISP)
https://www.igi-global.com/journal/international-journal-information-security-privacy/1096Impact Factor: |
0.800 |
Publisher: |
Idea Group Inc |
ISSN: |
1930-1650 |
Viewed: |
31820 |
Tracked: |
42 |
Call For Papers
Description:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
Mission & Scope:
The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and multi disciplinary readership ranging from the academic and professional research communities to industry practitioners. The journal seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding information security and privacy.
Coverage:
Agents and mobile communication systems
Authentication and authorization of users, systems, and applications
Businesses models and systems with security and privacy requirements and management
Case studies in security and privacy
Civil rights and liberties
Computer worms and viruses
Consumer and business practices and trends
Cryptographic techniques and protocols
Database issues in privacy protection
Developing enterprise management of security and privacy policies and infrastructures
Development of formal models and definitions
Distributed marketplaces, auctions, and gaming
Distributed, forward, and proactive policies and procedures
Economic impact analysis
Electronic commerce, banking, and payment protocols
Encryption, authentication, and access control
Enhancements for storage area networks
E-services, e-voting, and e-government
File and file system security and privacy
Firewall technologies, policies, and trends
Global Issues
Hacking and corruptions
Hacking, cyber-terrorism, and intrusion detection
Heterogeneous and large-scale environments
Identity and privacy confidentiality
Legal, regulatory, and compliance issues
Malicious codes and attacks against networks
Multiparty communications, co-operations, and computations
Networks and security protocols
Peer-to-Peer computing
Preserving and enhancing technologies and initiatives
Relationships and trade-offs between security and privacy
Security and privacy techniques, management, and protocols
Tools, techniques, methods, and frameworks
Trends and new developments
Trust architectures and underlying infrastructures
World Wide Web authentication and authorization
Last updated by Dou Sun in 2024-08-25
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | Journal of Information Security and Applications | 3.800 | Elsevier | 2214-2126 |
| IEEE Security & Privacy | 2.900 | IEEE | 1540-7993 | |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 | |
| Journal of Information Science Theory and Practice | KISTI | 2287-9099 | ||
| c | Information Retrieval | 1.700 | Springer | 1386-4564 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| Journal of Information Security and Applications | 3.800 | Elsevier |
| IEEE Security & Privacy | 2.900 | IEEE |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd |
| EURASIP Journal on Information Security | 2.500 | Springer |
| International Journal of Information and Computer Security | Inderscience | |
| Journal of Information Science Theory and Practice | KISTI | |
| Information Retrieval | 1.700 | Springer |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| a | a* | S&P | IEEE Symposium on Security and Privacy | 2025-11-13 | 2026-03-19 | 2026-05-18 | |
| b | ISPEC | International Conference on Information Security Practice and Experience | 2024-05-13 | 2024-06-24 | 2024-10-25 | ||
| c | EuroS&P | IEEE European Symposium on Security and Privacy | 2025-11-13 | 2026-03-05 | 2026-07-06 | ||
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| c | WISTP | International Conference on Information Security Theory and Practice | 2024-01-15 | 2024-02-05 | 2024-02-29 | ||
| c | ACISP | Australasian Conference on Information Security and Privacy | 2025-02-19 | 2025-04-08 | 2025-07-14 | ||
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| Short | Full Name | Conference |
|---|---|---|
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| S&P | IEEE Symposium on Security and Privacy | 2026-05-18 |
| ISPEC | International Conference on Information Security Practice and Experience | 2024-10-25 |
| EuroS&P | IEEE European Symposium on Security and Privacy | 2026-07-06 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| WISTP | International Conference on Information Security Theory and Practice | 2024-02-29 |
| ACISP | Australasian Conference on Information Security and Privacy | 2025-07-14 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
| ISC | Information Security Conference | 2025-10-20 |