International Journal of Information and Computer Security
- Editor in Chief
- Associate Prof. Raylin Tso
- ISSN online
- ISSN print
- 6 issues per year
Computer security has been a major concern since the 1950s. The ubiquity of the internet has engendered the prevalence of information sharing among networked users and organisations. This has rendered possible countless invasions of privacy/security worldwide. This risk has generated enormous concern about information and computer security among businesses, governments, legislators, academics, researchers, scientists and the public. IJICS is a double-blind refereed, authoritative reference addressing development of information/computer security in information technology, political science, informatics, sociology, engineering and science.
Topics covered include
- Assurance and integrity of service
- Computer crime prevention/detection, computer forensics and security
- Confidentiality protection, cryptography and data protection
- Database and data security, denial of service protection
- E-commerce security, e-surveillance
- Fraud/hacker/terrorism detection/prevention, information warfare, national security
- Information ethics
- Information privacy issues, information systems/information security, sharing
- Internet abuse, network intruder prevention, internet/network security
- Malicious code/unauthorised access protection, transaction security, virus/worm controls
- Risk management, safety-critical systems
- Secure communications technology and computer systems
- Security control measures, policy models and mechanisms
- Software and hardware architectures
- Wireless/mobile network security
IJICS focuses on theory, design, implementation, analysis, and application of secure information and computer systems. Emphases will also be on the related social, political and economic issues as well as emerging issues of interest to legislators, professionals, researchers, academics, and technical community.
Professionals, researchers, legislators, academics, and technical community.
IJICS publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, notes, and commentaries. Contribution may be by submission or invitation, and suggestions for special issues and publications are welcome.
IJICS is indexed in:
- Scopus (Elsevier)
- Compendex [formerly Ei] (Elsevier)
- ACM Digital Library
- Asian Digital Library
- cnpLINKer (CNPIEC)
- DBLP Computer Science Bibliography
- Google Scholar
- Inspec (Institution of Engineering and Technology)
- ProQuest Advanced Technologies Database with Aerospace
IJICS is listed in:More journal lists/directories...
Honorary Editor in Chief
- Li, Eldon Y., Chung Yuan Christian University, Taiwan
Editor in Chief
- Tso, Raylin, National Chengchi University, Taiwan
- Chen, Chien-Ming, Harbin Institute of Technology, China
- Xiong, Hu, University of Electronic Science and Technology of China, China
Editorial Board Members
- Agrawala, Ashok K., University of Maryland, USA
- Amin, Massoud, University of Minnesota, USA
- Atluri, Vijay, Rutgers University, USA
- Bertino, Elisa, Purdue University, USA
- Burmester, Michael, Florida State University, USA
- Canas, Daniel, Wake Forest University, USA
- Chapin, Steve J., Syracuse University, USA
- Chen, Hsinchun, The University of Arizona, USA
- Chen, Jinjun, Swinburne University of Technology, Australia
- Davida, George, University of Wisconsin at Milwaukee, USA
- Davis, James A., Iowa State University, USA
- Denning, Dorothy, Naval Postgraduate School, USA
- Doi, Norihisa, Chuo University, Japan
- Frincke, Deborah A., Pacific Northwest National Laboratory, USA
- Ghosh, Anup K., , USA
- Hinke, Thomas H., NASA Ames Research Center, USA
- Honavar, Vasant, Iowa State University, USA
- Imai, Hideki, Chuo University, Japan
- Irwin, J. David, Electrical and Computer Engineering Department, USA
- Jajodia, Sushil, Center for Secure Information Systems, USA
- Khosla, Pradeep, Department of Electrical and Computer Engineering and Information Networking Institute (INI), USA
- Killcrece, Georgia T., Carnegie Mellon University, USA
- Kim, Kwangjo, Information and Communications University, South Korea
- Ladd, David, Microsoft Research, USA
- Lam, Kwok-Yan, Tsinghua University, China
- Lee, Der-Tsai, Academia Sinica, Taiwan
- Lee, Ruby B., Princeton University, USA
- Lin, I-Long, Yuanpei University of Medical Technology, Taiwan
- Liu, Ximeng, Singapore Management University, Singapore & Xidian University, Singapore
- Müller, Günter, Albert-Ludwig University of Freiburg, Germany
- Manaf, Azizah Abd, Universiti Teknologi Malaysia, Malaysia
- Martella, Giancarlo, University of Milano, Italy
- Mclean, John D., Naval Research Laboratory, USA
- Micali, Silvio, Massachusetts Institute of Technology, USA
- Miller, Les, Iowa State University, USA
- Ostrovsky, Rafail, University of California at Los Angeles, USA
- Palmer, Charles C., IBM T.J. Watson Research Center, USA
- Pieprzyk, Josef, Macquarie University, Australia
- Porras, Phillip A., SRI International, USA
- Preneel, Bart, Katholieke Universiteit Leuven, Belgium
- Qing, Sihan, Chinese Academy of Sciences, China
- Reeves, Douglas, North Carolina State University, USA
- Rubin, Aviel, Johns Hopkins University, USA
- Safavi-Naini, Rei, University of Wollongong, Australia
- Samarati, Pierangela, Università degli Studi di Milano, Italy
- Shieh, Shiuhpyng, National Chiao Tung University, Taiwan
- Sibley, Edgar H., George Mason University, USA
- Smart, Nigel, University of Bristol, UK
- Spafford, Eugene, Purdue University, USA
- Staddon, Jessica, Palo Alto Research Center, USA
- Thuraisingham, Bhavani, University of Texas at Dallas, USA
- Ting, T.C., University of Connecticut, USA
- Tygar, Doug, University of California at Berkeley, USA
- Varadharajan, Vijay, Macquarie University, Australia
- Wallach, Dan S., Rice University, USA
- Warren, Mathew J., Deakin University, Australia
- Wong, Johnny, Iowa State University, USA
- Wool, Avishai, Tel Aviv University, Israel
- Wright, Rebecca, Rutgers University, USA
- Wu, Chwan-Hwa (John), Auburn University, USA
- Yang, Ming-Hour, Chung Yuan Christian University, Taiwan
- Yang, Shuang-Hua, Loughborough University, UK
- Yu, Fang, National Chengchi University, Taiwan
- Zeleznikow, John, Victoria University, Australia
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (more details available here) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- Briefs and research notes are not published in this journal.
- All our articles go through a double-blind review process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.
- There are no charges for publishing with Inderscience, unless you require your article to be Open Access (OA). You can find more information on OA here.
- All articles for this journal must be submitted using our online submissions system.
- Submit here.
Bypassing popular passwords
7 May, 2019
Every year computer security companies share their findings regarding passwords and data breaches. Again and again, they warn computer users to use complex passwords and not to use the same passwords for different accounts. And, yet, data breaches and other sources show that too many people use the same simple passwords repeatedly and that some of those passwords are ludicrously simple, the word "password" or the number "123456" really isn't a password at all given even the least-sophisticated hacking and cracking software available to malicious third parties these days [...]More details...
Honeypots could attract the lawyers too
9 May, 2019
In the context of information technology, IT, a "honeypot" is an attractive online destination usually established to attract malicious third parties who then, assuming they have reached a valuable resource unwittingly reveal details about themselves in order to access what they perceive is within the honeypot. A honeypot might also be referred to as a honeytrap. However, writing in the International Journal of Information and Computer Security, US researchers caution that the use of a honeypot to gather personal or private data albeit of a malicious third party, or hacker, may well be in breach of local and perhaps even federal laws in some situations. Use of a honeypot may also leave the operator open to issues of legal liability because of the deception that is the honeypot by definition [...]More details...