Information and Computer Security

IMPACT
FACTOR
1.6

Journals Detail

Journal: Information and Computer Security

Online ISSN: 2056-497X

Print ISSN: 2056-4961

Publisher Name: Emerald Publishing Limited

Starting Year: 2015

Website URL: https://www.emeraldgrouppublishing.com/journal/ics

Country: United Kingdom

Email: anixon@emeraldinsight.com

Research Discipline Cybersecurity, Information Security, Human Factors in Security

Frequency: Not Provided

Research Language: English

About Journal:

Information and Computer Security aims to cover the human aspects of security, looking at the impact of user and business behaviours when dealing with security issues. It communicates fresh ideas and cutting-edge research to academics and practitioners.
Aims and scope
Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications.

All submissions are subject to double-blind review, drawing upon the expertise of a range of academic and industry experts to ensure the validity and relevance of the resulting journal content.

The journal welcomes papers addressing research and case studies in relation to many aspects of information and computer security. Topics of interest include, but are not limited to, the following:

Information security management, standards and policies
Security governance and compliance
Risk assessment and modelling
Security awareness, education and culture
User perceptions and understanding of security
Misuse and abuse of computer systems
User-facing security technologies
Internet security and privacy
The journal is particularly interested in receiving submissions that consider the business and organisational aspects of security, and welcomes papers from both human and technical perspective on the topic. However, please note we do not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography (although relevant applications of the technology may be considered).

Scroll to Top