School of Computing and Information Technology - Journal of Information Systems and Management (SCIT-JISM)

Aim & Scope

The critical infrastructure of world economies are becoming increasingly dependent upon the interconnected information systems and the management of same using technology, with computer and communication resources used in small to medium private and public enterprises, utility systems, health care infrastructures, financial centers and security companies to name a few. Determine constructive ways to protect and manage the dissemination of data within information systems within and outside the organization is challenging despite the most advanced technology and trained persons available.

SCIT-JISM is a peer reviewed international journal with a key objective to provide the academic and industrial community a medium for presenting original research and applications related to information in small and large database environments, the development of software systems that support such large databases, a provision of assurance and security of such databases and finally the issue of managing large projects that evaluate the risk, procurement and modeling are relevant concerns. SCIT-JISM invites authors to submit their original and unpublished work that communicates current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information systems problems.


Details

Topics include but are not limited to the following:
  1. Information Warfare
  2. Managing Information System Project Risk
  3. Project Procurement in Information Systems
  4. Advance Project Modeling
  5. Agile Software Architectures
  6. Cloud Security and Auditing
  7. Data protection
  8. Computer forensics
  9. Big Data Management
  10. Internet and www security
  11. Information and data integrity
  12. Intrusion detection
  13. Data and system integrity
  14. Authorization and access control
  15. Information warfare and cyber-terrorism
  16. Security models and architectures
  17. Secure software engineering
  18. Risk analysis and risk management
  19. Security verification
  20. Cryptography and coding
  21. Cryptographic protocols
  22. E-commerce protocols
  23. Agent and mobile code security
  24. Security in sensor networks
  25. Biometrics
  26. Key management
  27. Homeland security
  28. Wireless and ad hoc network security
  29. Information security management
  30. Database and system security
  31. Denial of service
  32. Managing Information Systems
  33. Computational chemistry in modeling Information Systems
VMWare Palo Alto Labs

Rearin Griffin

University of Technology, Jamaica

Nilza Smith

Arnett Campbell

Sean Thorpe

Opal Donaldson

Khalilah Burrell

Damith Wickrayamanake

Derrick Logan

University of North Carolina, Chapel Hill, USA

Fabian Monrose

Proficiency Labs International, Oregon, USA

Tyrone Grandison

University of Miami,USA

Brian Blake

Ubbo Visser

Geoff Sutcliffe

Colorado State University, USA

Indrajit Ray

Indrakshi Ray

Robert France

Sudipto Ghosh

James Bieman

Shrideep Pallicakara

Sangmi Pallicakara

North Dakota University, USA

Emmanuel Grant

IBM, York Town Heights, New York, USA

Michael Maximillian

Wayne State University, USA

Shiyong Lu

University of Illinois, Chicago, USA

Leon Stenneth

Georgia Institute of Technology, USA

Rayeem Beyah

Southern Illinois University, Carbondale ,USA

Garth Crosby

Bank of America

Abbie Barbir

University of Arkansaw

Brajendra Panda

University of North Carolina ,Wilmington

Devon Simmonds

Special Issue Call For Papers
Submission Deadline: February 10, 2014
Acceptance Notification/Rejection: April 5, 2014
Camera Ready Deadline: June 15, 2014
Publication: August 2014.
Paper Format **All paper submissions must subscribe to the IEEE template 8.5 x 11 format.
Paper Submissions

Full length papers must be ten (10) to fifteen (15) pages, double columnar format. Short papers and demonstration papers must be five (5) to six(6) pages in double columnar format. Paper submissions are not blind. Papers will be subjected to three (3) independent reviews. All papers for review consideration are to be sent to [email protected]

Registration - *There are no charges for submissions to this journal.

Chief Editor

Sean Thorpe (University of Technology, Jamaica)

Guest Editors

Tyrone Grandison (Proficiency Labs, Oregon, USA) Opal Donaldson (University of Technology, Jamaica)