posted by user: pichappan || 12629 views || tracked by 39 users: [display]

JISR 2012 : Journal of Information Security Research

FacebookTwitterLinkedInGoogle

Link: http://www.dline.info/jisr
 
When N/A
Where N/A
Submission Deadline TBD
Categories    information security   internet   data management   information processing
 

Call For Papers

Journal of Information Security Research (JISR)
ISSN 0976-4143 (Print) ISSN 0976-4151 (Online)


Editorial Board

Editor-in-Chief:
Victor Ralevich
Sheridan Institute of Technology and Advanced Learning, Ontario,
Canada

Submissions at- http://www.dline.info/jisr/submission.php


Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http://
www.dline.info). The journal aims to be an internationally recognized forum attracting authors and audiences from both
the academic and industrial communities. Papers offering original and innovative research contributions in information
systems security and related domains are solicited for submission. The primary focus is on original, high quality, and
unpublished research- and implementation-related contributions. The Editor-in-Chief and the Editorial Board of JISR will
strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of
complete reproducibility of the experimental methods undertaken.


We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to
information security. Position papers summarizing advancements in the field are also invited. Each volume of JISR will be published in
electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Access Control

Accountability
Anonymity
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Biometrics
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
E-surveillance
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance


Review Process

Each paper will be handled by the editor-in-chief, who collects three reviews and makes the decision to (a) accept the paper with minor revisions, (b) accept the paper with major revisions, or (c) reject the paper. The editor-in-chief will communicate with
the author(s) about the decision, and provide reviews. The goal is to provide the first round of reviews within three months of the paper assignment. The authors with papers requesting major revisions should submit the major revisions within one month after they were informed about the decision. Authors who need more time are kindly requested to contact the Editor. The Editor reserves the right to reject
a paper if it does not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it is inadequate
in presentation.

Author Guidelines

Authors should upload full original papers in electronic format at the Journal Management Online System (http://www.dline.info/jisr/
submission.php). The papers should not be longer than 20-25 pages, single column, double space, 10pt font, including figures, tables and
references. If the submitted papers are extensions of existing conference publications, the authors must submit a corresponding letter,
specifying clearly what is new in the journal paper and how the submitted paper distinguishes itself from the published conference paper. We
require in minimum 25% of new material in such a paper. Any submitted paper must not be fully or partially be submitted to another Journal,
Conference, or Workshop! All paper submissions should be ONLY online at http://www.dline.info/jisr/submission.php
Copyright: Authors should transfer the publication rights to the publishers. Contact: For further information please contact director@dline.info


----------------------------------------



Related Resources

ETHE Blearning 2017   Blended learning in higher education: research findings
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
eCrime 2018   13th Symposium on Electronic Crime Research
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
ICITA 2018   International Conference on Information Technology and Applications
IJDKP 2017   International Journal of Data Mining & Knowledge Management Process
Social Information Systems @ HICSS-51   Social Information Systems Minitrack - Hawaii International Conference on System Sciences (HICSS-51)