School of Computing and Information Technology - Journal of Information Systems and Management (SCIT-JISM)
Aim & Scope
The critical infrastructure of world economies are becoming increasingly dependent upon the interconnected information systems and the management of same using technology, with computer and communication resources used in small to medium private and public enterprises, utility systems, health care infrastructures, financial centers and security companies to name a few. Determine constructive ways to protect and manage the dissemination of data within information systems within and outside the organization is challenging despite the most advanced technology and trained persons available.
SCIT-JISM is a peer reviewed international journal with a key objective to provide the academic and industrial community a medium for presenting original research and applications related to information in small and large database environments, the development of software systems that support such large databases, a provision of assurance and security of such databases and finally the issue of managing large projects that evaluate the risk, procurement and modeling are relevant concerns. SCIT-JISM invites authors to submit their original and unpublished work that communicates current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world information systems problems.
Details
Topics include but are not limited to the following:
- Information Warfare
- Managing Information System Project Risk
- Project Procurement in Information Systems
- Advance Project Modeling
- Agile Software Architectures
- Cloud Security and Auditing
- Data protection
- Computer forensics
- Big Data Management
- Internet and www security
- Information and data integrity
- Intrusion detection
- Data and system integrity
- Authorization and access control
- Information warfare and cyber-terrorism
- Security models and architectures
- Secure software engineering
- Risk analysis and risk management
- Security verification
- Cryptography and coding
- Cryptographic protocols
- E-commerce protocols
- Agent and mobile code security
- Security in sensor networks
- Biometrics
- Key management
- Homeland security
- Wireless and ad hoc network security
- Information security management
- Database and system security
- Denial of service
- Managing Information Systems
- Computational chemistry in modeling Information Systems
VMWare Palo Alto Labs
Rearin Griffin
University of Technology, Jamaica
Nilza Smith
Arnett Campbell
Sean Thorpe
Opal Donaldson
Khalilah Burrell
Damith Wickrayamanake
Derrick Logan
University of North Carolina, Chapel Hill, USA
Fabian Monrose
Proficiency Labs International, Oregon, USA
Tyrone Grandison
University of Miami,USA
Brian Blake
Ubbo Visser
Geoff Sutcliffe
Colorado State University, USA
Indrajit Ray
Indrakshi Ray
Robert France
Sudipto Ghosh
James Bieman
Shrideep Pallicakara
Sangmi Pallicakara
North Dakota University, USA
Emmanuel Grant
IBM, York Town Heights, New York, USA
Michael Maximillian
Wayne State University, USA
Shiyong Lu
University of Illinois, Chicago, USA
Leon Stenneth
Georgia Institute of Technology, USA
Rayeem Beyah
Southern Illinois University, Carbondale ,USA
Garth Crosby
Bank of America
Abbie Barbir
University of Arkansaw
Brajendra Panda
University of North Carolina ,Wilmington
Devon Simmonds