International Journal of Information Security and Privacy (IJISP)

International Journal of Information Security and Privacy (IJISP)

Editors-in-Chief: Li Yang (University of Tennessee at Chattanooga, USA) and Dalei Wu (University of Tennessee at Chattanooga, USA)
Published Quarterly. Est. 2007.
ISSN: 1930-1650|EISSN: 1930-1669|DOI: 10.4018/IJISP
Individual Prices for Volume 10 (2016)
Print +
Free E-Access:
$220.00
List Price: $275.00
E-Access +
Free Print Copy:
$220.00
List Price: $275.00
Free Lifetime E-Access with Print Purchase
IGI Global is now offering Free Lifetime E-Access with Print Purchase of any book or journal subscription. In addition to the print copy purchased, this unprecedented offer provides libraries and individuals alike the ability to access the purchased publication through the award winning InfoSciĀ® platform. The InfoSciĀ® platform offers unlimited simultaneous access to full HTML and PDF viewing with the ability to save, print, copy, and paste! No hidden fees! No limitations! Learn More.

Immediate e-access available to existing InfoSciĀ® customers. New customers will be provided access within 48 hours from purchase.

Description

As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.

Topics Covered

  • Agents and mobile communication systems
  • Authentication and authorization of users, systems, and applications
  • Businesses models and systems with security and privacy requirements and management
  • Case studies in security and privacy
  • Civil rights and liberties
  • Computer worms and viruses
  • Consumer and business practices and trends
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Developing enterprise management of security and privacy policies and infrastructures
  • Development of formal models and definitions
  • Distributed marketplaces, auctions, and gaming
  • Distributed, forward, and proactive policies and procedures
  • Economic impact analysis
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • Enhancements for storage area networks
  • E-services, e-voting, and e-government
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Global issues
  • Hacking and corruptions
  • Hacking, cyber-terrorism, and intrusion detection
  • Heterogeneous and large-scale environments
  • Identity and privacy confidentiality
  • Legal, regulatory, and compliance issues
  • Malicious codes and attacks against networks
  • Multiparty communications, co-operations, and computations
  • Networks and security protocols
  • Peer-to-Peer computing
  • Preserving and enhancing technologies and initiatives
  • Relationships and trade-offs between security and privacy
  • Security and privacy techniques, management, and protocols
  • Tools, techniques, methods, and frameworks
  • Trends and new developments
  • Trust architectures and underlying infrastructures
  • World Wide Web authentication and authorization

Mission

The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and multi disciplinary readership ranging from the academic and professional research communities to industry practitioners. The journal seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding information security and privacy.

Table of Contents and List of Contributors

Search this Journal:
Reset
Volume 10: 4 Issues (2016): Forthcoming, Available for Pre-Order
Volume 9: 4 Issues (2015): 3 Released, 1 Forthcoming
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing

Reviews and Testimonials

The exponential growth of information storage has lead to a large scale of infringement of data in enterprise. The International Journal of Information Security and Privacy (IJISP) is a forum in which researchers have contributed their ideas and concepts relatedt o information security and privacy. This journal serves the important purpose of bringing together researchers and practitioners in the area of information security and privacy. The well reviewed articles are a useful resource to researchers. The journal is a definite asset to academic library.

– Latha Parameswaran, Amrita Unviersity, India

In today's world, as one starts giving more and more importance to security issues, there is every possibility that an individual's rights to privacy will be affected. The International Journal of Information Security and Privacy attempts to address both requirements by publishing articles with a quick turnaround time while maintaining the highest quality expected from it's renowned editorial board.

– Shamik Sural, IIT Kharagpur, India

Indices

ACM Digital LibraryACM Digital Library
Australian Business Deans Council (ABDC)Australian Business Deans Council (ABDC)
Bacon's Media Directory
Cabell's DirectoriesCabell's Directories
Compendex (Elsevier Engineering Index)Compendex (Elsevier Engineering Index)
CSA Illumina
DBLPDBLP
Gale Directory of Publications & Broadcast Media
GetCited
Google ScholarGoogle Scholar
INSPECINSPEC
JournalTOCsJournalTOCs
Library & Information Science Abstracts (LISA)
MediaFinderMediaFinder
Norwegian Social Science Data Services (NSD)
SCOPUSSCOPUS
The Index of Information Systems Journals
The Standard Periodical Directory
Thomson ReutersThomson Reuters
Ulrich's Periodicals Directory
Web of Science

Editor(s)-in-Chief Biography

Editorial Board

International Advisory Board
Mohamed Amine Ferrag, Guelma University, Algeria
B. B. Gupta, National Institute of Technology Kurukshtra, India
Associate Editors
Jen-Yao Chung, Quanta Cloud Technology, United States
Tom Coffey, University of Limerick, Ireland
Nishant Doshi, Marwadi Education Foundation, India
Jerry Fjermestad, New Jersey Institute of Technology, United States
Abbie Homaifar, North Carolina A&T State University, United States
Sushil Jajodia, George Mason University, United States
Vishal Midha, University of North Carolina at Greensboro, United States
Fariba Sadri, Imperial College London, United Kingdom
Arunasalam Sambhanthan, Curtin University, Australia
Jeff Smith, Miami University, United States
Bhavani Thuraisingham, University of Texas at Dallas, United States
Michele Tomaiuolo, University of Parma, Italy
Rustam Vahidov, Concordia University, Canada
Thomas Van Dyke, University of North Carolina at Greensboro, United States
Dalei Wu, University of Tennessee at Chattanooga, United States
Editorial Review Board
Peter Bearse, University of North Carolina at Greensboro, United States
Sowmyarani C. N., MSRIT, India
Joseph Cazier, Appalachian State University, United States
Sebastián García, CTU University, Czech Republic, Argentina
Zhen Hu, University of Tennessee at Chattanooga, United States
Kevin Lowe, University of North Carolina at Greensboro, United States
Selva Nidhyananthan, Mepco Schlenk Engineering College, India
Siddharth Singh, University of Allahabad, India
Brian Whitworth, Massey University, New Zealand