• Home
  • Menu
  • Aims and Scope
  • OpenAccess
  • Aims and Scope

    AIM
    Due to rapid growth and development of inter-disciplinary graduate degrees in universities and research centers around the globe, Journal of Information, Security, and Systems Management (JISSM), as a publication of the Islamic Azad University Electronic Campus, aims to serve as a platform to enhance the scientific and technical level of the researchers and practitioners in related fields.
    In this regard, the editorial board of the Journal welcomes contributions from respectful scholars, theorists, researchers, and graduate students from related areas and topics listed below. 

    OBJECTIVES
    The objectives of IJISSM are:

    • To Promote the research and practice related to information technology, management, and security;
    • To establish an effective channel of communication between national and international scientists, scholars, and academic centers;
    • To serve as a platform for integrative analysis among policy-makers, researchers, and practitioners on the broad spectrum of internal and global issues.

    READERSHIP
    The Journal is a forum to help students and scholars in various fields of information technology, industrial management, computer engineering and inter-disciplinary fields such as Internet law, cyber law, and information security.

    TOPICS
    Topics of interest include but not limited to:

     Security

    1. cyber security
    2. reverse engineering
    3. malware detection
    4. mobile security
    5. network security
    6. OS security
    7. hack
    8. network security protocols
    9. intrusion detection
    10. data mining for security applications
    11. machine learning security solutions
    12. machine learning cyber security
    13. machine learning cyber security cryptography
    14. machine learning security risks
    15. big data security and privacy
    16. data security sharing
    17. data infrastructure big security
    18. security theories big data
    19. big data era information security
    20. distributed systems security threats
    21. distributed systems security and privacy
    22. distributed systems security trust management
    23. distributed systems security protocols
    24. distributed systems security mechanisms
    25. distributed systems security vulnerabilities analysis
    26. distributed systems security methodology

    Network

    1. ad hoc network
    2. network wireless
    3. network wireless sensor
    4. cryptography
    5. cryptography security
    6. cryptography security algorithms
    7. cryptography techniques
    8. cryptography theory
    9. internet of things security
    10. cloud computing
    11. cloud security
    12. cloud security challenges risks
    13. cloud services
    14. fog computing
    15. fog computing architecture
    16. fog computing security
    17. fog computing security issues
    18. fog computing internet of things
    19. fog computing architecture
    20. fog computing cisco

    System management

    1. information system management
    2. structuring information system management
    3. information system management model
    4. system management theory
    5. system management approach
    6. system management module
    7. system management method
    8. system management functions