posted by user: wenlynch || 5562 views || tracked by 4 users: [display]

IMCS Journal 2012 : Information Management & Computer Security Journal

FacebookTwitterLinkedInGoogle

Link: http://www.emeraldinsight.com/products/journals/author_guidelines.htm?id=imcs
 
When N/A
Where N/A
Submission Deadline TBD
Categories    computer security   computer systems   technology
 

Call For Papers

Information Management & Computer Security - Call for Papers
Edited by Prof. Steven Furnell, Plymouth University, UK


The security of information and related computer systems is now a significant concern for many organizations, as well as a problem directly facing end-users in both workplace and personal use of IT systems. Effective methods of protection are consequently required in many contexts, spanning a range of both technical and human-centric approaches.

Information Management & Computer Security contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new security technologies, methodological developments, empirical studies and practical applications.

All submissions are subject to double-blind review, drawing upon the expertise of a range academic and industry experts to ensure the validity and relevance of the resulting journal content.


Coverage

The journal welcomes papers addressing research and case studies in relation to many aspects of information and computer security. Topics of interest include, but are not limited to, the following:

 Information security management, standards and policies
 Security governance and compliance
 Risk assessment and modelling
 Security culture, awareness and education
 Perceptions, understanding and usability of security
 User-facing security technologies
 Internet security and online protection
 Privacy technologies, attitudes and practices
 Misuse and abuse of computer systems
 Social engineering and other human-related risks
 Computer ethics and security

In addition to technical papers, the journal is particularly interested in receiving submissions that consider human and organisational aspects of security. Please note that journal does not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography (although applications of the technology may be considered).

Now in it's 20th volume Information Management & Computer Security is indexed and abstracted in several services including Cabell's Directory of Publishing Opportunities' in Computer Science and Business Information Systems, LISA and ProQuest.

Further information

For further details, including submission of papers, please visit the journal homepage at:
info.emeraldinsight.com/products/journals/journals.htm?id=imcs.

If you have any queries, please contact the editor, Prof. Steven Furnell, at: sfurnell@plymouth.ac.uk.

Related Resources

IEEE-ACAI 2025   2025 IEEE 8th International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2025)
EduTeach 2025   9th Canadian Conference on Advances in Education, Teaching & Technology 2025
Ei/Scopus-MLBDM 2025   2025 5th International Conference on Machine Learning and Big Data Management (MLBDM 2025)
IEEE-ICPSET 2025   2025 4th International Conference on Power System and Energy Technology-IEEE Xplore/EI/Scopus
CSP--EI 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
IJITE 2025   International Journal on Integrating Technology in Education
ICMIP--EI 2026   2026 11th International Conference on Multimedia and Image Processing (ICMIP 2026)
AIEDCD 2025   2025 International Conference on AI - Enabled Digital Creative Design
IEEE ICBDA 2026   IEEE--2026 11th International Conference on Big Data Analytics (ICBDA 2026)
EI/Scopus-MSMMT 2025   2025 2nd International Conference on Microelectromechanical Systems Manufacturing and Materials Technology-EI/Scopus