The Journal of Information Assurance and Security (JIAS) is dedicated to advancing the understanding and practices of information assurance and security in an increasingly interconnected and data-driven world. Our primary aim is to provide a reputable platform for researchers, practitioners, and policymakers to publish and exchange cutting-edge research findings, innovative solutions, and insights related to safeguarding information assets and ensuring the privacy, integrity, and availability of digital information.
The scope of JIAS covers a wide range of topics within the field of information assurance and security, including but not limited to:
- Cybersecurity: Research and developments in protecting computer systems, networks, and data from cyber threats, including malware, ransomware, and cyberattacks.
- Data Privacy: Strategies, techniques, and regulations for safeguarding the privacy of sensitive and personal data, including GDPR and other privacy laws.
- Information Risk Management: Approaches to identifying, assessing, and mitigating information security risks within organizations.
- Cryptographic Techniques: Advances in encryption, hashing, and cryptographic protocols to secure data in transit and at rest.
- Security Policies and Compliance: Best practices for developing and implementing security policies, compliance frameworks, and standards.
- Network Security: Measures and technologies for protecting data during transmission and within networks, including intrusion detection and prevention systems .
- Cloud Security: Security considerations and solutions for cloud computing environments, including securing cloud-based applications and data.
- Internet of Things Security: Security challenges and solutions for IoT devices and ecosystems.
Archiving
Sciendo archives the contents of this journal in Portico - digital long-term preservation service of scholarly books, journals and collections.
Plagiarism Policy
The editorial board is participating in a growing community of Similarity Check System's users in order to ensure that the content published is original and trustworthy. Similarity Check is a medium that allows for comprehensive manuscripts screening, aimed to eliminate plagiarism and provide a high standard and quality peer-review process.
Plagiarism in any form constitutes a serious violation of the most basic principles of scholarship and cannot be tolerated. Examples of plagiarism include:
- Word-for-word copying of portions of another's writing without enclosing the copied passage in quotation marks and acknowledging the source in the appropriate scholarly convention.
- The use of a particularly unique term or concept that one has come across in reading without acknowledging the author or source.
- The paraphrasing or abbreviated restatement of someone else's ideas without acknowledging that another person's text has been the basis for the paraphrasing.
- False citation: material should not be attributed to a source from which it has not been obtained.
- False data: data that has been fabricated or altered in a laboratory or experiment; although not literally plagiarism, this is clearly a form of academic fraud.
- Unacknowledged multiple submission of an article for several purposes without prior approval from the parties involved.
- Unacknowledged multiple authors or collaboration: the contributions of each author or collaborator should be made clear.
- Self-plagiarism/double submission: the submission of the same or a very similar article to two or more publications at the same time.