Journal Navigation
International Journal of Information Security and Privacy (IJISP)
Open Access Journal
Clarivate Impact Factor 0.8

International Journal of Information Security and Privacy (IJISP)

This journal converted to Gold Open Access on January 1, 2023
Editors-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco), Ahmed A. Abd El-Latif (Menoufia University, Egypt)
Indexed In: Compendex (Elsevier Engineering Index), INSPEC, SCOPUS, Web of Science Emerging Sources Citation Index (ESCI) and 18 more indices
Published: Continuous Volume |Established: 2007
ISSN: 1930-1650|EISSN: 1930-1669|DOI: 10.4018/IJISP
Latest Published Articles
Published: Jun 7, 2024
DOI: 10.4018/IJISP.345647
Volume 18
Abdulhakim Sabur, Ahmad J. Showail
Mobile health apps are a digital era revolution, facilitating direct patient-physician communication, lab and test orders, and medication refills. Despite these benefits, security and privacy issues... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article


Sabur, Abdulhakim, and Ahmad J. Showail. "Nudging Data Privacy of Mobile Health Applications in Saudi Arabia." vol.18, no.1 2024: pp.1-19.


Sabur, A. & Showail, A. J. (2024). Nudging Data Privacy of Mobile Health Applications in Saudi Arabia. , 18(1), 1-19.


Sabur, Abdulhakim, and Ahmad J. Showail. "Nudging Data Privacy of Mobile Health Applications in Saudi Arabia," 18, no.1: 1-19.

Export Reference

Published: Jun 6, 2024
DOI: 10.4018/IJISP.345038
Volume 18
Longfei Fu, Yibin Liu, Yanjun Zhang, Ming Li
At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article


Fu, Longfei, et al. "Network Information Security Monitoring Under Artificial Intelligence Environment." vol.18, no.1 2024: pp.1-25.


Fu, L., Liu, Y., Zhang, Y., & Li, M. (2024). Network Information Security Monitoring Under Artificial Intelligence Environment. , 18(1), 1-25.


Fu, Longfei, et al. "Network Information Security Monitoring Under Artificial Intelligence Environment," 18, no.1: 1-25.

Export Reference

Published: May 7, 2024
DOI: 10.4018/IJISP.343306
Volume 18
Yuan Tian, Wendong Wang, Jingyuan He
The existing Industrial Internet of Things (IIoT) temporal data analysis methods often suffer from issues such as information loss, difficulty balancing spatial and temporal features, and being... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article


Tian, Yuan, et al. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training." vol.18, no.1 2024: pp.1-28.


Tian, Y., Wang, W., & He, J. (2024). An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. , 18(1), 1-28.


Tian, Yuan, Wendong Wang, and Jingyuan He. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training," 18, no.1: 1-28.

Export Reference

Description, Mission, Scope & Coverage
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP)... Show More
Mission & Scope:
The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and... Show More
  • Agents and mobile communication systems
  • Authentication and authorization of users, systems, and applications
  • Businesses models and systems with security and privacy requirements and management
  • Case studies in security and privacy
  • Civil rights and liberties
  • Computer worms and viruses
  • Consumer and business practices and trends
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Developing enterprise management of security and privacy policies and infrastructures
  • Development of formal models and definitions
  • Distributed marketplaces, auctions, and gaming
  • Distributed, forward, and proactive policies and procedures
  • Economic impact analysis
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • Enhancements for storage area networks
  • E-services, e-voting, and e-government
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Global Issues
  • Hacking and corruptions
  • Hacking, cyber-terrorism, and intrusion detection
  • Heterogeneous and large-scale environments
  • Identity and privacy confidentiality
  • Legal, regulatory, and compliance issues
  • Malicious codes and attacks against networks
  • Multiparty communications, co-operations, and computations
  • Networks and security protocols
  • Peer-to-Peer computing
  • Preserving and enhancing technologies and initiatives
  • Relationships and trade-offs between security and privacy
  • Security and privacy techniques, management, and protocols
  • Tools, techniques, methods, and frameworks
  • Trends and new developments
  • Trust architectures and underlying infrastructures
  • World Wide Web authentication and authorization
Editorial Policy
IGI Global holds its journals to the highest ethical practices. View Full Editorial Policy
IGI Global Open Access
When you publish under the OA model with IGI Global, you enable your work to be viewed by millions of readers worldwide immediately after publication and you are able to experience our personal support and commitment to editorial service. This includes:
  • Timely Publication: Quick Turnarounds & Prompt Peer Review (No Embargoes)
  • Continuous Support: In-House, Personalized Service Throughout the Entire Process
  • Cutting-Edge Technology: Proprietary Technologies & Integrations With Major Open Access Platforms
  • Diverse Options: Individual APCs, Platinum Funding, Institutional Open Access Agreements, & More
  • Research Advancement First: IGI Global Prioritizes Research Over Profit by Forfeiting Subscription Revenue
  • Unmatched Transparency: Comprehensive Visibility in Processes, Licensing, & More
  • Rapid Transformation: IGI Global is One of Few Publishers That Have Completed the Open Access Transition
  • Independence and Integrity: IGI Global is Committed to Maintaining its Autonomy as an Independent Publisher
  • Medium-Sized, Yet Powerful: IGI Global Offers Advantages of a Medium-Sized Publisher With the Reach of a Larger Publisher
Article Processing Charges
Article Processing Charge (APC):

Payment of the APC fee (directly to the publisher) by the author or a funding body is not required until AFTER the manuscript has gone through the full double-anonymized peer review process and the Editor(s)-in-Chief at his/her/their full discretion has/have decided to accept the manuscript based on the results of the double-anonymized peer review process. 

What Does IGI Global's Open Access APC Cover?

In the traditional subscription-based model, the cost to the publisher to produce each article is covered by the revenue generated by journal subscriptions. Under OA, all the articles are published under a Creative Commons (CC BY) license; therefore, the authors or funding body will pay a one-time article processing charge (APC) to offset the costs of all of the activities associated with the publication of the article manuscript, including:

  • Digital tools used to support the manuscript management and review process
  • Typesetting, formatting and layout
  • Online hosting
  • Submission of the journal's content to numerous abstracts, directories, and indexes
  • Third-party software (e.g. plagiarism checks)
  • Editorial support which includes manuscript tracking, communications, submission guideline checks, and communications with authors and reviewers
  • All promotional support and activities which include metadata distribution, press releases, promotional communications, web content, ads, fliers, brochures, postcards, etc. for the journal and its published contents
  • The fact that all published articles will be freely accessible and able to be posted and disseminated widely by
    the authors
  • Professional line-by-line English language copy editing and proofreading*

*This service is only performed on article manuscripts with fully paid (not discounted or waived) APC fees.

APC Subsidizing and Funding

To assist researchers in covering the costs of the APC in OA publishing, there are various sources of OA funding. Additionally, unlike many other publishers, IGI Global offers flexible subsidies, 100% Open Access APC funding, discounts, and more. Learn More

Open Access Funding Resources
IGI Global recognizes that many researchers may not know where to begin when searching for OA funding opportunities. IGI Global recently launched an Open Access Funding Resources page for researchers to browse. This page provides a comprehensive list of OA funding sources available for researchers to secure funds for their various OA publications.
Submit to This Journal
This journal is currently actively seeking new submissions. Interested authors should ensure that their article manuscript adheres to the journal's submission guidelines and before you write page, which include originality of the manuscript, APA formatting information and examples, manuscript requirements, and more. To submit an article for consideration, please begin the submission process below.
Reviews & Statements

The exponential growth of information storage has lead to a large scale of infringement of data in enterprise. The International Journal of Information Security and Privacy (IJISP) is a forum in which researchers have contributed their ideas and concepts relatedt o information security and privacy. This journal serves the important purpose of bringing together researchers and practitioners in the area of information security and privacy. The well reviewed articles are a useful resource to researchers. The journal is a definite asset to academic library.

– Latha Parameswaran, Amrita Unviersity, India

In today's world, as one starts giving more and more importance to security issues, there is every possibility that an individual's rights to privacy will be affected. The International Journal of Information Security and Privacy attempts to address both requirements by publishing articles with a quick turnaround time while maintaining the highest quality expected from it's renowned editorial board.

– Shamik Sural, IIT Kharagpur, India
Submission-Related Inquiries
All inquiries regarding IJISP should be directed to the attention of:

Dr. Yassine Maleh
Dr. Ahmed A. Abd El-Latif
International Journal of Information Security and Privacy (IJISP)
Email: &

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Ownership and Management

The International Journal of Information Security and Privacy (IJISP) is owned and published by IGI Global.

International Journal of Information Security and Privacy (IJISP) is editorially independent, with full authority of the journal's content falling to the Editor-in-Chief and the journal's Editorial Board.

The In-House Editorial Office manages the publishing operations of the journal.

IGI Global
701 East Chocolate Avenue
Hershey, PA 17033

Principal Contact
Grace Long
Managing Editor of Journal Development
IGI Global
Phone: (717) 533-8845 ext. 147

Support Contact
Marissa Massare
Development Editor - International Journal of Information Security and Privacy (IJISP)
IGI Global
Phone: 717-533-8845