International Journal of Security and Privacy in Pervasive Computing (IJSPPC)

International Journal of Security and Privacy in Pervasive Computing (IJSPPC)

Formerly the International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC)
Editor-in-Chief: Tao Gao (Zionlion Group Ltd. Shanghai, China)
Published: Quarterly |Established: 2020
|DOI: 10.4018/IJSPPC

Description

The International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is an international refereed research journal that examines the growing issues of information security and privacy in a hyperconnected society. The journal integrates the disciplines of pervasive and ubiquitous computing, the Internet of Things, wireless sensor networks, automatic identification, real-time localization, information processing, cloud computing, and mass data storage. The journal provides a forum to information technology educators, researchers, and practitioners to advance the practice and understanding of pervasive and ubiquitous computing and the challenges that arise in protecting and securing data. The journal features a major emphasis on how to realize pervasive and ubiquitous computing technology and how to build the system in applications. IJSPPC publishes full-length research papers, state-of-the-art reviews, insightful research and practice notes, case studies and book reviews from all areas of information security and privacy that are selected after a rigorous blind review by experts in the field.

Topics Covered

  • Analysis of pervasive work environments
  • Applications of context sensitive and location aware
  • Applications of middleware for organizational pervasive computing environments
  • Applications of near field communication (NFC) in finance systems
  • Applications of pervasive computing in healthcare environments
  • Applications of pervasive computing in public environments
  • Applications of smart office appliance systems
  • Applications of software development in pervasive computing environments
  • Applications of XML to model smart environments
  • Banking and fraud prevention measures enabled by personal computing technical innovation
  • Data Privacy
  • Fault tolerant pervasive computing environments
  • Identification of development standard requirements in pervasive computing environments
  • Implications for data repositories in pervasive computing organizational environments
  • Implications for data warehousing and data mining in pervasive computing environments
  • Implications for governance in pervasive computing environments
  • Implications for human interface development in pervasive computing environments
  • Implications for information systems ethical and moral guidelines in pervasive computing environments
  • Implications for systems design and development practice in pervasive computing environments
  • Integration of pervasive computing work environments (RFID, MOTES, and PIC)
  • Models of accessing and using ambient information
  • New approaches to data modeling in ubiquitous computing environments
  • Pervasive computing architecture development
  • Pervasive computing architectures
  • Pervasive computing infrastructure development
  • Pervasive pheromone-based systems models
  • Role of the Internet in pervasive computing environments
  • Security implications for pervasive work environments
  • Theoretical development of pervasive computing systems
  • Theoretical development of the nomadic nature of work environments

Mission and Scope

The mission of the International Journal of Security and Privacy in Pervasive Computing (IJSPPC) is to ensure the security and privacy of personal information and data collected through combining evolving technologies and networking frameworks. Ubiquitous networking and pervasive computing are becoming more effective for solving intelligent systems–related problems, for example, intelligent security, intelligent transportation, intelligent environmental protection, intelligent logistics, and so forth. Ubiquitous computing connects not only networked terminals like mobile phones, computers, smart devices, but also daily life objects that have been considered just “un-networked things” or “inert objects”. This increasing connectiveness provides more accessibility to information, making it imperative that best practices in securing data are implemented and followed. This journal encourages the further development of tools and techniques, and discusses strategies to secure information shared across the Internet of Things, wireless networks, etc.

Table of Contents and List of Contributors

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 12: 4 Issues (2020): Forthcoming, Available for Pre-Order
View Complete Journal Contents Listing

Submission

Researchers and practitioners are invited to submit their original empirical research articles 3,000-8,000 words in length. Interested authors must consult the journal's guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted articles will be reviewed on a double-blind review basis by no fewer than 3 members of the journal's Editorial Review Board and 1 Associate Editor. Final decision regarding acceptance/revision/rejection will be based on the reviews received from the reviewers and at the sole discretion of the Editor-in-Chief.

All submissions and inquiries should be directed to the attention of:

Tao Gao
Editor-in-Chief
International Journal of Security and Privacy in Pervasive Computing (IJSPPC)
Email: gaotao@udutech.com