Call For Papers: Journal of Information Security Research (JISR 2011)

Journal of Information Security Research (JISR)
ISSN 0976-4143 (Print) ISSN 0976-4151 (Online)

Editorial Board

Victor Ralevich
Sheridan Institute of Technology and Advanced Learning, Ontario,

Submissions at:
Submission Deadline: Dec 31, 2011
Notification Due: Dec 31, 2011
Final Version Due: Dec 31, 2011

Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of  the DLINE ( The journal aims to be an internationally recognized forum attracting authors and audiences from both the academic and industrial communities. Papers offering original and innovative research contributions in information  systems security and related domains are solicited for submission. The primary focus is on  original, high quality, and unpublished research- and implementation-related contributions. The Editor-in-Chief and the Editorial Board of JISR will strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide  assurance of  complete reproducibility of the experimental methods undertaken.

We also encourage submission of papers discussing industrial research and development,  as well as social and legal issues related to information security. Position papers summarizing advancements in the field are also invited. Each volume of JISR will be  published in electronic and printed formats, and will consist of: editorials and  peer-reviewed high quality research and position papers. The JISR is published four times a year, with at least one volume dedicated to some specific topic. The JISR will publish papers in the following themes.

Access Control
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance

Review Process

Each paper will be handled by the editor-in-chief, Victor Ralevich, who collects three reviews and makes the decision to (a) accept the paper with minor revisions, (b) accept the paper with major revisions, or (c) reject the paper. The editor-in-chief will communicate  with the author(s) about the decision, and provide reviews. The goal is to provide the first round of reviews within three months of the paper assignment. The authors with papers requesting major revisions should submit the major revisions within one month after they were informed about the decision. Authors who need more time are kindly requested to contact the Editor. The Editor reserves the right to reject a paper if it does not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it is inadequate in presentation.

Author Guidelines

Authors should upload full original papers in electronic format at the Journal Management Online System ( The papers should not be longer than 20-25 pages, single column, double space, 10pt font, including figures, tables and references. If the submitted papers are extensions of existing conference publications, the authors must submit a corresponding letter, specifying clearly what is new in the journal paper and how the submitted paper distinguishes itself from the published conference paper. We require in minimum 25% of new material in such a paper. Any submitted paper must not be fully or partially be submitted to another Journal, Conference, or Workshop! All paper submissions should be ONLY online at
Copyright: Authors should transfer the publication rights to the publishers.

Contact: For further information please contact

This entry was posted in Conferences and tagged , , , , , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *