posted by user: pichappan || 27919 views || tracked by 39 users: [display]

JISR 2012 : Journal of Information Security Research

FacebookTwitterLinkedInGoogle

Link: http://www.dline.info/jisr
 
When N/A
Where N/A
Submission Deadline TBD
Categories    information security   internet   data management   information processing
 

Call For Papers

Journal of Information Security Research (JISR)
ISSN 0976-4143 (Print) ISSN 0976-4151 (Online)


Editorial Board

Editor-in-Chief:
Victor Ralevich
Sheridan Institute of Technology and Advanced Learning, Ontario,
Canada

Submissions at- http://www.dline.info/jisr/submission.php


Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http://
www.dline.info). The journal aims to be an internationally recognized forum attracting authors and audiences from both
the academic and industrial communities. Papers offering original and innovative research contributions in information
systems security and related domains are solicited for submission. The primary focus is on original, high quality, and
unpublished research- and implementation-related contributions. The Editor-in-Chief and the Editorial Board of JISR will
strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of
complete reproducibility of the experimental methods undertaken.


We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to
information security. Position papers summarizing advancements in the field are also invited. Each volume of JISR will be published in
electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Access Control

Accountability
Anonymity
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Biometrics
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
E-surveillance
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance


Review Process

Each paper will be handled by the editor-in-chief, who collects three reviews and makes the decision to (a) accept the paper with minor revisions, (b) accept the paper with major revisions, or (c) reject the paper. The editor-in-chief will communicate with
the author(s) about the decision, and provide reviews. The goal is to provide the first round of reviews within three months of the paper assignment. The authors with papers requesting major revisions should submit the major revisions within one month after they were informed about the decision. Authors who need more time are kindly requested to contact the Editor. The Editor reserves the right to reject
a paper if it does not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it is inadequate
in presentation.

Author Guidelines

Authors should upload full original papers in electronic format at the Journal Management Online System (http://www.dline.info/jisr/
submission.php). The papers should not be longer than 20-25 pages, single column, double space, 10pt font, including figures, tables and
references. If the submitted papers are extensions of existing conference publications, the authors must submit a corresponding letter,
specifying clearly what is new in the journal paper and how the submitted paper distinguishes itself from the published conference paper. We
require in minimum 25% of new material in such a paper. Any submitted paper must not be fully or partially be submitted to another Journal,
Conference, or Workshop! All paper submissions should be ONLY online at http://www.dline.info/jisr/submission.php
Copyright: Authors should transfer the publication rights to the publishers. Contact: For further information please contact director@dline.info


----------------------------------------



Related Resources

ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACM ICCDE 2025   ACM--2025 11th International Conference on Computing and Data Engineering (ICCDE 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
IJCIS 2024   International Journal on Cryptography and Information Security
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)