ZEITSCHRIFTENINFORMATIONEN
COVER HERUNTERLADEN

The Journal of Information Assurance and Security (JIAS) is dedicated to advancing the understanding and practices of information assurance and security in an increasingly interconnected and data-driven world. Our primary aim is to provide a reputable platform for researchers, practitioners, and policymakers to publish and exchange cutting-edge research findings, innovative solutions, and insights related to safeguarding information assets and ensuring the privacy, integrity, and availability of digital information.

The scope of JIAS covers a wide range of topics within the field of information assurance and security, including but not limited to:

  • Cybersecurity: Research and developments in protecting computer systems, networks, and data from cyber threats, including malware, ransomware, and cyberattacks.
  • Data Privacy: Strategies, techniques, and regulations for safeguarding the privacy of sensitive and personal data, including GDPR and other privacy laws.
  • Information Risk Management: Approaches to identifying, assessing, and mitigating information security risks within organizations.
  • Cryptographic Techniques: Advances in encryption, hashing, and cryptographic protocols to secure data in transit and at rest.
  • Security Policies and Compliance: Best practices for developing and implementing security policies, compliance frameworks, and standards.
  • Network Security: Measures and technologies for protecting data during transmission and within networks, including intrusion detection and prevention systems .
  • Cloud Security: Security considerations and solutions for cloud computing environments, including securing cloud-based applications and data.
  • Internet of Things Security: Security challenges and solutions for IoT devices and ecosystems.

Archiving

Sciendo archives the contents of this journal in Portico - digital long-term preservation service of scholarly books, journals and collections.

Plagiarism Policy

The editorial board is participating in a growing community of Similarity Check System's users in order to ensure that the content published is original and trustworthy. Similarity Check is a medium that allows for comprehensive manuscripts screening, aimed to eliminate plagiarism and provide a high standard and quality peer-review process.

Plagiarism in any form constitutes a serious violation of the most basic principles of scholarship and cannot be tolerated. Examples of plagiarism include:

  1. Word-for-word copying of portions of another's writing without enclosing the copied passage in quotation marks and acknowledging the source in the appropriate scholarly convention.
  2. The use of a particularly unique term or concept that one has come across in reading without acknowledging the author or source.
  3. The paraphrasing or abbreviated restatement of someone else's ideas without acknowledging that another person's text has been the basis for the paraphrasing.
  4. False citation: material should not be attributed to a source from which it has not been obtained.
  5. False data: data that has been fabricated or altered in a laboratory or experiment; although not literally plagiarism, this is clearly a form of academic fraud.
  6. Unacknowledged multiple submission of an article for several purposes without prior approval from the parties involved.
  7. Unacknowledged multiple authors or collaboration: the contributions of each author or collaborator should be made clear.
  8. Self-plagiarism/double submission: the submission of the same or a very similar article to two or more publications at the same time.
eISSN:
1554-1029
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
6 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Grundlagen der Informatik, Theoretische Informatik, IT-Sicherheit und Kryptologie