Journal Information
Information Management & Computer Security
http://www.emeraldinsight.com/products/journals/journals.htm?id=imcs
Publisher:
Emerald
ISSN:
0968-5227
Viewed:
5436
Tracked:
5

Advertisment
Call For Papers
Topicality

The assurance and security of information and related computer systems is now a significant concern for many organizations, as well as a problem directly facing end-users in both workplace and personal use of IT systems.  Effective methods of protection are consequently required in many contexts.

Scope

Information Management & Computer Security (IMCS) contributes to the advance of knowledge concerning the security and assurance of information and information systems. The journal provides a link between scholarly research and reflective professional practice so that both are informed and enhanced. Particular emphasis is placed on the interaction of technical and human aspects.

Editorial Criteria

IMCS publishes research and case study papers relating to new security technologies, methodological developments, empirical studies and practical applications.

Topics of interest include, but are not limited to, the following:

    Information security management
    Information assurance
    Impacts of standards and policies
    Security governance and compliance
    Risk assessment and modelling
    Awareness and education methods
    Information security culture
    Perceptions, understanding and usability of security
    User authentication and biometrics
    Internet security and online protection
    Privacy technologies, attitudes and practices
    Misuse and abuse of computer systems
    Social engineering and other human-related risks
    Computer ethics and security

In addition to technical papers, the journal is particularly interested in receiving submissions that consider human and organisational aspects of security.  Although applications of the technology may be considered, the journal does not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography.

Key journal audiences

    Academics in Information Systems and Computer Science
    Security and Information Assurance Practitioners
    Chief Information Officers and other senior executives with responsibility for business performance  
Last updated by Dou Sun in 2013-10-03
Related Publications
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
CyberSafetyInternational Workshop on Computational Methods for CyberSafety2016-08-252016-09-102016-10-28
SPASignal Processing - Algorithms, Architectures, Arrangements, and Applications2015-05-302015-07-062015-09-23
NoFInternational Conference on the Network of the Future2016-07-312016-09-232016-11-16
a2PolicyInternational Symposium on Policies for Distributed Systems and Networks2012-01-062012-03-142012-07-16
CF'Cloud Forward Conference2015-07-132015-08-022015-10-06
ICCVEInternational Conference on Connected Vehicles & Expo2014-07-312014-08-312014-11-03
ITCSInternational Conference on Information Technology and Computer Science2015-05-312015-06-152015-07-08
MirageInternational Conference on Computer Vision / Computer Graphics Collaboration Techniques and Applications2013-03-012013-04-122013-06-06
ICSPCCInternational Conference on Signal Processing, Communications and Computing2017-06-302017-07-152017-10-22
ICMIAInternational Conference on Data Mining and Intelligent Information Technology Applications2013-03-202013-04-012013-05-29
Recommendation