Journal Information
Journal of Cybersecurity
https://academic.oup.com/cybersecurityImpact Factor: |
3.2 |
Publisher: |
Oxford University Press |
ISSN: |
2057-2093 |
Viewed: |
15579 |
Tracked: |
4 |
Call For Papers
About the Journal
Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary cyber domain. Journal of Cybersecurity is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the varied aspects of cybersecurity.
Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form. The journal is committed to providing quality empirical research, as well as scholarship, that is grounded in real-world implications and solutions.
Journal of Cybersecurity solicits articles adhering to the following, broadly constructed and interpreted, aspects of cybersecurity:
anthropological and cultural studies;
computer science and security;*
security and crime science;
cryptography and associated topics;*
security economics;
logical, methodological, and philosophical aspects of information security;
security modelling;
human factors and psychology;
legal aspects of information security;
political and policy perspectives;
strategy and international relations;
and privacy.
Authors should ensure that their articles can be read at both interdisciplinary and disciplinary levels. For example, a paper may require, for completely rigorous communication, a technical mathematical, statistical, or other specialized section. Authors are expected to include an introductory summary of the content of the section describing its significance, thereby allowing non-experts to skip details as necessary.
*While the Journal welcomes submissions from computer science and cryptography domains, such papers are only considered in scope when (1) the approach is interdisciplinary, (2) the research has broad societal implications that are explicitly discussed, or (3) the problem focus includes significant human, organizational, or societal challenges. Papers that do not meet these criteria may be returned without review.
Last updated by Dou Sun in 2026-01-03
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| b | IEEE Transactions on Cybernetics | 10.5 | IEEE | 2168-2267 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IEEE Transactions on Cybernetics | 10.5 | IEEE |
| Computers & Security | 5.4 | Elsevier |
| Journal of Cybersecurity | 3.2 | Oxford University Press |
| Computer Law & Security Review | 3.2 | Elsevier |
| Computer Law and Security Review | 3.2 | Elsevier |
| IEEE Security & Privacy | 3.0 | IEEE |
| ACM Transactions on Privacy and Security | 2.8 | ACM |
| International Journal of Information Security | 2.400 | Springer |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd |
| IET Information Security | 1.300 | IET |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| a | a* | a1 | CCS | ACM Conference on Computer and Communications Security | 2026-04-22 | 2026-07-17 | 2026-11-15 |
| b | a | CSF | IEEE Computer Security Foundations Symposium | 2026-01-29 | 2026-04-01 | 2026-07-26 | |
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| a | a* | S&P | IEEE Symposium on Security and Privacy | 2025-11-13 | 2026-03-19 | 2026-05-18 | |
| c | a1 | ISCAS | International Symposium on Circuits and Systems | 2025-10-12 | 2026-01-19 | 2026-05-24 | |
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | CW | International Conference on Cyberworlds | 2023-05-19 | 2023-07-26 | 2023-10-03 | ||
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 |
| Short | Full Name | Conference |
|---|---|---|
| CCS | ACM Conference on Computer and Communications Security | 2026-11-15 |
| CSF | IEEE Computer Security Foundations Symposium | 2026-07-26 |
| Security | USENIX Security Symposium | 2026-08-12 |
| S&P | IEEE Symposium on Security and Privacy | 2026-05-18 |
| ISCAS | International Symposium on Circuits and Systems | 2026-05-24 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| ISC | Information Security Conference | 2025-10-20 |
| CW | International Conference on Cyberworlds | 2023-10-03 |
| NSS | International Conference on Network and System Security | 2023-08-14 |
| IWSEC | International Workshop on Security | 2019-08-28 |