economic infrastructure is becoming increasingly dependent
upon information technology, with computer and communication
technology being essential and vital components of Government
facilities, power plant systems, medical infrastructures,
financial centres and military installations to name a few.
Finding effective ways to protect information systems,
networks and sensitive data within the critical information
infrastructure is challenging even with the most advanced
technology and trained professionals.
Topics of interest include
but not limited to:
Guidelines for Contributors
JIAS publishes two types of articles: regular papers and brief papers. Review management is primarily under the direction of an associate editor, who will solicit reviews for each submission. The associate editor will ordinarily make a recommendation after receiving three independent reviews. To avoid delays in processing your paper, please follow these guidelines.
Submission of Manuscripts (New Submission System - From May 01, 2009)
All correspondence concerning submissions is between the author and the Editor-in-Chief. To submit your paper for consideration, visit the web submission system found at:http://www.mirlabs.net/jias/submissionThere you can create a new account or use an existing one if you have one, and submit a first draft of a new manuscript. JIAS is devoted primarily to archival reports of work that have not been published elsewhere. Specifically, conference records and book chapters that have been published previously are not acceptable unless and until they have been enhanced significantly. Please ensure that in the cover letter (comments to editor-in-chief)you state that the work being submitted has not been published elsewhere, nor is it under review currently by another publication. Please follow the style files given in the following links. Papers should not exceed a maximum of 20 pages.
Submitted papers must be in English and should not have been published elsewhere or being currently under consideration by any other journal. Authors should submit the electronic version of their papers in postscript or PDF formats via the journal web site. Authors should submit the electronic version of their papers in postscript or PDF formats via journal submission form. If you have any problems with the submission please send an email to the Managing Editor.
The final decision on publication is made by the Editor-in-Chief upon recommendation of an Associate Editor and / or an Editorial Board Member. If the manuscript is accepted for publication in JIAS, it must not be published in any periodical elsewhere without the permission of the Editor-in-Chief.
.Articles published in Journal of Information Assurance and Security are indexed or abstracted in: Emerging Sources Citation Index, Google Scholar, and INSPEC.
Copyright © 2005 - 2016, Dynamic Publishers Inc., USA
No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.