International Journal of Information Privacy, Security and Integrity
- Editor in Chief
- Prof. Leon Shyue-Liang Wang
- ISSN online
- ISSN print
- 4 issues per year
Information is ubiquitous, with unprecedented rates of expansion and applicability. Its effects on privacy, security and integrity have attracted increasing attention. IJIPSI presents innovative research in the theory, application, implementation, analysis, design and evaluation of information privacy and security. It also aims to bring together researchers in relevant disciplines, exploring issues in information integrity, defined as information accuracy, consistency, reliability. Thus, IJIPSI covers up-to-date information technology in social networking, mobile computing, intelligent techniques and big/open data, with applications across multiple areas.
Topics covered include
- Privacy and security foundations
- Privacy-enhancing technologies
- Privacy-preserving computing
- Privacy policies and laws
- Management aspects
- Cyber, network and communication security
- Social network information privacy/security/integrity
- Secure computing and systems
- Database privacy and security
- Risk analysis, modelling and management
- Trustworthy computing, management, evaluation
- Theoretical foundation of information integrity
- Information integrity structure and design
- Legal, procedural, regulatory, ethical aspects
IJIPSI aims to establish an international forum for researchers and practitioners to publish scholarly articles on information privacy, security and integrity related issues.
The intended audience will include various academia, public and private sector members who are interested in and will benefit from information privacy, security and integrity.
IJIPSI publishes original papers, short papers, and review papers. Special Issues devoted to important topics in information privacy, security and integrity may also be published..
Editor in Chief
- Wang, Leon Shyue-Liang, National University of Kaohsiung, Taiwan
- Ting, I-Hsien (Derrick), National University of Kaohsiung, Taiwan
Editorial Board Members
- Atluri, Vijay, Rutgers University, USA
- Bertino, Elisa, Purdue University, USA
- Foley, Simon N., University College Cork, Ireland
- Golle, Philippe, Palo Alto Research Center, USA
- Hölbl, Marko, University of Maribor, Slovenia
- Hong, Tzung-Pei, National University of Kaohsiung, Taiwan
- Küsters, Ralf, University of Trier, Germany
- Lam, Kwok-Yan, Nanyang Technological University, Singapore
- Li, Xu, Fujian Normal University, China
- Lin, Tsay Young, San Jose State University, USA
- Memon, Nasrullah, University of Southern Denmark, Denmark
- Sakurai, Kouichi, Kyushu University, Japan
- Tygar, Doug, University of California at Berkeley, USA
- Weippl, Edgar, SBA Research, Austria
- Winslett, Marianne, University of Illinois, USA
- Wu, Felix, University of California, Davis, USA
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (more details available here) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- Briefs and research notes are not published in this journal.
- All our articles go through a double-blind review process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.
- There are no charges for publishing with Inderscience, unless you require your article to be Open Access (OA). You can find more information on OA here.
- All articles for this journal must be submitted using our online submissions system.
- View Author guidelines.
Phinding and philtering the phish
30 November, 2021
Writing in the International Journal of Information Privacy, Security and Integrity a team from China has developed a deep learning-based framework that might be used to detect phishing websites. Huanhuan Wang, Debin Cheng, and Hui Peng of the Fifth Electronic Research Institute of Ministry of Industry and Information Technology in Guangzhou, China, explain how their framework can extract descriptive and statistical features from a website and then determine whether these features are indicative of a phishing website. The detection of such sites could then be used in online security research and perhaps even be incorporated into browsers to protect unwary users from being phished [...]More details...
Detecting the malicious broadcast receivers
3 December, 2021
How might we enhance the detection of malware on the Android operating system commonly used to run mobile phones and tablets? Research published in the International Journal of Information Privacy, Security and Integrity looks to the concept of broadcaster receivers as one possible answer to that question. Halil Bisgin of the University of Michigan-Flint, in Flint, Rachael Havens of AVL Test Systems Inc., in Plymouth, Michigan, Vincent Nwobodo of the Financial Industry Regulatory Authority, in Rockville, Maryland, USA, and Fadi Mohsen of the University of Groningen in The Netherlands, explain that the Android operating system has a large share of the mobile market and as such is a target for malware creators and other third parties who would manipulate the system for personal gain [...]More details...