Aim and Scope
Journal of Information and Cyber Security (JICS)
Aim and Scope
Journal of Information and Cyber Security (JICS)
Aim:
The aim of the Journal of Information and Cyber Security is to serve as a leading platform for disseminating high-quality research and advancements in information security, cybersecurity, and privacy. The journal aims to publish innovative research that contributes to the understanding, developing, and implementing effective strategies, technologies, and policies to address emerging threats and challenges in the digital age.
Scope:
The scope of the Journal of Information and Cyber Security encompasses a wide range of topics related to information security, cybersecurity, and privacy, including but not limited to:
Cyber Threats and Attacks: Analysis of cyber threats, attack vectors, and vulnerabilities targeting information systems, networks, applications, and data.
Security Technologies and Tools: Development and evaluation of security technologies, tools, and mechanisms for detecting, preventing, mitigating, and responding to cyber threats and attacks.
Cryptography and Cryptographic Protocols: Advances in cryptography, cryptographic algorithms, protocols, and mechanisms for ensuring confidentiality, integrity, authenticity, and non-repudiation of digital data and communications.
Network Security: Techniques and methods for securing computer networks, including firewalls, intrusion detection and prevention systems (IDPS), secure routing protocols, and network traffic analysis.
Secure Software Development: Best practices, methodologies, and tools for building secure software applications, including secure coding practices, static and dynamic code analysis, and software security testing.
Privacy and Data Protection: Legal, ethical, and technical aspects of privacy and data protection, including privacy-enhancing technologies (PETs), data anonymization, data masking, and compliance with privacy regulations (e.g., GDPR, CCPA).
Cybersecurity Governance and Policy: Strategies, frameworks, standards, and regulations for managing cybersecurity risks, ensuring compliance, and establishing effective governance structures within organizations and across sectors.
Incident Response and Digital Forensics: Procedures, methodologies, and tools for responding to cybersecurity incidents, conducting digital investigations, and attributing cyberattacks.
Threat Intelligence and Information Sharing: Collection, analysis, and dissemination of threat intelligence for proactive defense, situational awareness, and collaborative cybersecurity efforts.
Emerging Technologies and Trends: Exploration of emerging technologies and trends in information security and cybersecurity, such as artificial intelligence (AI), machine learning (ML), blockchain, Internet of Things (IoT), cloud security, and quantum cryptography.
The Journal of Information and Cyber Security welcomes original research articles, review articles, technical notes, case studies, and perspectives from researchers, practitioners, policymakers, and industry experts. The journal aims to foster interdisciplinary collaboration, innovation, and knowledge exchange to address the complex and evolving challenges in information and cyber security.