Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http:///www.dline.info).
The journal aims to be an internationally recognized forum attracting authors and audiences from both the academic and industrial communities. Papers offering original and innovative research contributions in information systems security and related domains are solicited for submission. The primary focus is on original, high quality, and unpublished research- and implementation-related contributions.
The Editor-in-Chief and the Editorial Board of JISR will strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of complete reproducibility of the experimental methods undertaken.
We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to information security. Position papers summarizing advancements in the field are also invited.
Each volume of JISR will be published in electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Computer crime prevention and detection
Critical infrastructure security issues
Cryptography and data protection
Database and data security
Digital rights management
IS Security Education
e-Health for Public Health
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Information privacy issues
Information system security
Joint signal processing and encryption
Malicious code detection
Network intruder prevention
Network/Communications Infrastructures and Architectures for Healthcare
New models for healthcare delivery
Privacy and security
Privacy enhancing technologies (PETs)
Risk analysis and management
Secure communication technology
Secure computer systems
Secure electronic voting
Security control measures
Security for mobile code
Security in location services
Security in social networks
Security policy models and mechanisms
Signal processing in the encrypted domain
Steganography and steganalysis
Trust models and management
Trustworthy user devices
Unauthorised access protection
Wireless/mobile network security