IMPACT
FACTOR 1.6
Journals Detail
Journal: Information and Computer Security
Online ISSN: 2056-497X
Print ISSN: 2056-4961
Publisher Name: Emerald Publishing Limited
Starting Year: 2015
Website URL: https://www.emeraldgrouppublishing.com/journal/ics
Country: United Kingdom
Email: anixon@emeraldinsight.com
Research Discipline Cybersecurity, Information Security, Human Factors in Security
Frequency: Not Provided
Research Language: English
About Journal:
Information and Computer Security aims to cover the human aspects of security, looking at the impact of user and business behaviours when dealing with security issues. It communicates fresh ideas and cutting-edge research to academics and practitioners.
Aims and scope
Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications.
All submissions are subject to double-blind review, drawing upon the expertise of a range of academic and industry experts to ensure the validity and relevance of the resulting journal content.
The journal welcomes papers addressing research and case studies in relation to many aspects of information and computer security. Topics of interest include, but are not limited to, the following:
Information security management, standards and policies
Security governance and compliance
Risk assessment and modelling
Security awareness, education and culture
User perceptions and understanding of security
Misuse and abuse of computer systems
User-facing security technologies
Internet security and privacy
The journal is particularly interested in receiving submissions that consider the business and organisational aspects of security, and welcomes papers from both human and technical perspective on the topic. However, please note we do not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography (although relevant applications of the technology may be considered).