Information Systems and Security
Submission deadline: 2024-06-30
Section Collection Editors

Section Collection Information

Dear Colleagues,



The Information Systems and Security section of our journal delves into the critical intersection of technology, data management, and safeguarding against evolving cyber threats. This section serves as a platform for cutting-edge research and innovative solutions in the field of information and digital transformation security.

 

Our contributors explore a wide array of topics, ranging from the latest advancements in encryption algorithms and network security protocols to the intricacies of threat intelligence and incident response strategies. The section is dedicated to publishing high-quality, peer-reviewed papers that advance our understanding of secure information systems and digital transformation.

 

We invite submissions from researchers, practitioners, and experts in the field who are pushing the boundaries of cybersecurity. Our goal is to provide a comprehensive and diverse collection of research articles that address the challenges and opportunities in securing information systems in today's rapidly evolving technological landscape.

 

The section encourages interdisciplinary research that bridges the gap between information technology, data management, and cybersecurity practices. We welcome studies that not only propose theoretical frameworks but also present practical applications and case studies, fostering a holistic approach to information security.

 

We are committed to facilitating a dynamic and engaging community for scholars and practitioners to exchange ideas, share insights, and collaborate on cutting-edge research in information systems and security. Our rigorous peer-review process ensures that the published papers meet the highest standards of academic excellence and contribute significantly to the field.

 

We look forward to receiving your contributions.


Dr. Munir Majdalawieh

Section Editor

Keywords

Cybersecurity; Encryption Algorithms; Network Security; Threat Intelligence; Incident Response; Data Protection; Information Privacy; Access Controls; Compliance; Risk Assessment

Published Paper