Shopping Cart | Login | Register | Language: English

International Journal of Information Security and Privacy (IJISP)

Published Quarterly. Est. 2007.
Select a Format:
Institutions: Print
Subscription Year:
$725.00
In Stock. Have it as soon as Sep 1 with express shipping*.
DOI: 10.4018/IJISP, ISSN: 1930-1650, EISSN: 1930-1669
Cite Journal

MLA

Nemati, Hamid and Li Yang. "International Journal of Information Security and Privacy (IJISP)." (2007). Web. 27 Aug. 2014. doi:10.4018/IJISP

APA

Nemati, H., & Yang, L. (2007). International Journal of Information Security and Privacy (IJISP). doi:10.4018/IJISP

Chicago

Nemati, Hamid and Li Yang. "International Journal of Information Security and Privacy (IJISP)," (2007), accessed (August 27, 2014), doi:10.4018/IJISP

Export Reference

Mendeley
Favorite
International Journal of Information Security and Privacy (IJISP)
Access on Platform
Browse by Subject
Top

Description

As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.

Top

Journal Contents

Search this Journal: Reset
Volume 8: 1 Issue (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing
Top

Mission

The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and multi disciplinary readership ranging from the academic and professional research communities to industry practitioners. The journal seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding information security and privacy.
Top

Reviews and Testimonials

The exponential growth of information storage has lead to a large scale of infringement of data in enterprise. The International Journal of Information Security and Privacy (IJISP) is a forum in which researchers have contributed their ideas and concepts relatedt o information security and privacy. This journal serves the important purpose of bringing together researchers and practitioners in the area of information security and privacy. The well reviewed articles are a useful resource to researchers. The journal is a definite asset to academic library.

– Latha Parameswaran, Amrita Unviersity, India

In today's world, as one starts giving more and more importance to security issues, there is every possibility that an individual's rights to privacy will be affected. The International Journal of Information Security and Privacy attempts to address both requirements by publishing articles with a quick turnaround time while maintaining the highest quality expected from it's renowned editorial board.

– Shamik Sural, IIT Kharagpur, India
Top

Indices

Bacon's Media Directory
Compendex (Elsevier Engineering Index)
CSA Illumina
Gale Directory of Publications & Broadcast Media
GetCited
Library & Information Science Abstracts (LISA)
Norwegian Social Science Data Services (NSD)
The Index of Information Systems Journals
The Standard Periodical Directory
Ulrich's Periodicals Directory
Top

Topics Covered

  • Agents and mobile communication systems
  • Authentication and authorization of users, systems, and applications
  • Businesses models and systems with security and privacy requirements and management
  • Case studies in security and privacy
  • Civil rights and liberties
  • Computer worms and viruses
  • Consumer and business practices and trends
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Developing enterprise management of security and privacy policies and infrastructures
  • Development of formal models and definitions
  • Distributed marketplaces, auctions, and gaming
  • Distributed, forward, and proactive policies and procedures
  • Economic impact analysis
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • Enhancements for Storage Area Networks
  • E-services, e-voting, and e-government
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Global issues
  • Hacking and corruptions
  • Hacking, cyber-terrorism, and intrusion detection
  • Heterogeneous and large-scale environments
  • Identity and privacy confidentiality
  • Legal, regulatory, and compliance issues
  • Malicious codes and attacks against networks
  • Multiparty communications, co-operations, and computations
  • Networks and security protocols
  • Peer-to-Peer computing
  • Preserving and enhancing technologies and initiatives
  • Relationships and trade-offs between security and privacy
  • Security and privacy techniques, management, and protocols
  • Tools, techniques, methods, and frameworks
  • Trends and new developments
  • Trust architectures and underlying infrastructures
  • World Wide Web authentication and authorization
Top

Editor(s)-in-Chief Biography

Hamid Nemati is an associate professor of information systems in the Department of Information Systems and Operations Management at the University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from the University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He has extensive professional experience in various consulting, business intelligence, and analyst positions and has consulted for a number of major organizations. His research specialization is in the areas of decision support systems, data warehousing, data mining, knowledge management, and information privacy and security. He has presented numerous research and scholarly papers nationally and internationally. His articles have appeared in a number of premier professional and scholarly journals.
Top

Editorial Board

Associate Editors
Jen-Yao Chung, IBM T. J. Watson Research Center, USA
Tom Coffey, University of Limerick, Ireland
Jerry Fjermestad, New Jersey Institute of Technology, USA
Richard Herschel, St. Joseph's University, USA
Abbie Homaifar, North Carolina A&T State University, USA
Sushil Jajodia, George Mason University, USA
Kevin Lowe, The University of North Carolina at Greensboro, USA
Christopher Ruhm, University of Virginia, USA
Fred Sadri, The University of North Carolina at Greensboro, USA
Jeff Smith, Miami University, USA
Bhavani Thuraisingham, University of Texas at Dallas, USA
Rustam Vahidov, Concordia University, Canada
Brian Whitworth, Massey University, New Zealand

International Editorial Review Board
Moses Acquaah, The University of North Carolina at Greensboro, USA
Alessandro Acquisti, Carnegie Mellon University, USA
Pierre Balthazard, Arizona State University, USA
Christopher Barko, Laboratory Corporation of America, USA
Dieter Bartmann, University of Regensburg, Germany
Joseph Cazier, Appalachian State University, USA
Elizabeth Chang, Curtin University of Technology, Australia
John Eatman, The University of North Carolina at Greensboro, USA
Simone Fischer-Hübner, Karlstad University, Sweden
Keith Frikken, Purdue University, USA
Philippe Golle, Palo Alto Research Center, USA
Rüdiger Grimm, University Koblenz-Landau, Germany
Harry Hochheiser, University of Pittsburgh, USA
Earp Julie, North Carolina State University, USA
Chang Koh, University of North Texas, USA
Mary Jane Lenard, Meredith College, USA
Dawn Medlin, Appalachian State University, USA
Mihir Parikh, University of Central Florida, USA
Norman Pendegraft, The University of Idaho, USA
Carol Pollard, Appalachian State University, USA
Ellen Rose, Massey University, New Zealand
Alain Mohsen Sadeghi, eTechSecurity Pro, USA
Kathy Schwaig, Kennesaw State University, USA
Victoria Skoularidou, Athens University of Economics and Business, USA
William Tullar, The University of North Carolina at Greensboro, USA
Sameer Verma, San Francisco State University, USA
Liisa von Hellens, Griffith University, Australia

Book Review Editors
Peter Bearse, The University of North Carolina at Greensboro, USA

Case Study Editors
Vishal Midha, The University of North Carolina at Greensboro, USA
Thomas Van Dyke, The University of North Carolina at Greensboro, USA
Submit a paper to IJISP