Journal of Information Security and Technologies (JIST)

ISSN No: 3066-1285

AIM AND SCOPE

The Journal of Information Security and Technologies aims to serve as a comprehensive international platform for the publication of high-quality research, technological advancements, clinical and industrial applications, and scholarly contributions in the fields of information security, cybersecurity, and emerging digital technologies. The journal is dedicated to advancing scientific and practical understanding of secure computing systems, data protection mechanisms, cyber defense strategies, and innovative technological solutions that address modern security challenges in digital environments.

The journal seeks to bridge the gap between theoretical research and real-world implementation by encouraging interdisciplinary and translational studies that contribute to secure communication systems, resilient infrastructures, intelligent technologies, privacy preservation, and digital trust. Emphasis is placed on promoting innovative approaches that enhance the confidentiality, integrity, availability, and reliability of information systems across various domains.

The journal also aims to foster collaboration among researchers, academicians, cybersecurity professionals, engineers, policymakers, and industry experts worldwide, enabling the exchange of knowledge and technological advancements in information security and related technologies. Strong emphasis is placed on scientific rigor, ethical research practices, innovation, and the dissemination of findings that have significant technological, industrial, and societal impact.

Scope of the Journal

The journal covers a broad range of topics related to information security, cybersecurity, computer science, and advanced digital technologies. The primary areas of interest include, but are not limited to, the following:

Information security, cybersecurity, computer security, network security, cloud security, cyber defense, cyber resilience, cyber threat intelligence, digital forensics, ethical hacking, penetration testing, vulnerability assessment, malware analysis, ransomware protection, intrusion detection systems, intrusion prevention systems, cryptography, applied cryptography, quantum cryptography, blockchain security, distributed ledger technologies, authentication systems, access control mechanisms, identity management, biometric security, privacy-preserving technologies, data privacy, data protection, secure communication systems, wireless security, mobile security, IoT security, industrial IoT security, smart city security, SCADA security, critical infrastructure protection, cyber-physical systems security, embedded systems security, operating systems security, software security, secure software engineering, secure coding practices, application security, web security, database security, endpoint security, email security, digital rights management, cyber law, cyber ethics, cyber governance, information assurance, risk assessment, security auditing, compliance and regulatory frameworks, security standards, governance risk and compliance (GRC), incident response, disaster recovery, business continuity planning, security analytics, threat modeling, security architecture, security protocols, blockchain technologies, cryptocurrency security, digital identity systems, zero trust architecture, multi-factor authentication, passwordless authentication, secure computing, trusted computing, hardware security, side-channel attacks, quantum computing security, artificial intelligence in cybersecurity, machine learning for security, deep learning applications in cybersecurity, explainable AI for security systems, adversarial machine learning, big data security, secure data analytics, data mining, computational intelligence, intelligent systems, edge computing security, fog computing security, virtualization security, container security, DevSecOps, secure DevOps practices, software-defined networking security, 5G and next-generation network security, wireless sensor networks, human-computer interaction security, social engineering detection, cyber psychology, user behavior analytics, digital transformation technologies, e-governance security, fintech security, healthcare information security, banking and financial cybersecurity, e-commerce security, multimedia security, image and video authentication, steganography, watermarking, secure multimedia communication, robotics security, autonomous systems security, smart grid security, augmented reality and virtual reality security, secure digital platforms, information systems management, technology innovation, computational modeling, data science applications, internet technologies, communication technologies, parallel and distributed computing, high-performance computing security, green computing, sustainable technologies, educational technologies, and emerging trends in information security and digital technologies.

The journal also welcomes research in interdisciplinary and emerging areas that contribute to the advancement of secure digital ecosystems, intelligent computing systems, and innovative technological solutions for contemporary global challenges.

Types of Manuscripts

The journal accepts a variety of manuscript types including original research articles, review articles, systematic reviews, meta-analyses, case studies, technical reports, short communications, technical notes, survey papers, industrial reports, software and tool papers, and letters to the editor.

The topics listed above represent the primary areas of interest of the journal; however, the scope is not limited to these topics. The journal welcomes submissions from emerging, interdisciplinary, and innovative research areas that contribute to the advancement of information security, cybersecurity, and modern digital technologies.

Global Perspective and Inclusivity

The journal adopts a global perspective by encouraging submissions from researchers, academicians, engineers, and industry professionals across diverse geographic regions. Cybersecurity and information technologies affect societies worldwide, and the challenges associated with digital transformation, cyber threats, and data protection vary across technological, economic, and social environments.

By promoting international collaboration, the journal seeks to address global technological and cybersecurity challenges while reducing disparities in access to secure digital infrastructure and technological innovation. Studies highlighting regional cybersecurity concerns, policy frameworks, technological advancements, and population-specific technological applications are particularly valuable in expanding global understanding.

Ethical, Legal, and Social Considerations

Research in information security and digital technologies often raises important ethical, legal, and societal issues. The journal recognizes the significance of responsible technological innovation and encourages scholarly work addressing ethical cybersecurity practices, privacy preservation, digital rights, and responsible use of emerging technologies.

Topics such as data privacy, informed consent in digital systems, cybercrime prevention, algorithmic fairness, digital surveillance, cybersecurity governance, and equitable access to secure technologies are integral to the ethical framework of the journal. Authors are expected to adhere to established ethical standards and ensure that their research respects legal and societal responsibilities.

Education and Knowledge Dissemination

The journal is committed to advancing education and knowledge dissemination in the fields of information security and technologies. It aims to serve as a valuable resource for students, educators, researchers, cybersecurity professionals, software developers, and policymakers by publishing high-quality, informative, and impactful content.

Educational articles, tutorials, surveys, and review papers that simplify complex technological and cybersecurity concepts and provide practical insights are encouraged. By promoting continuous learning and professional development, the journal contributes to building a well-informed scientific and technological community.

Quality, Integrity, and Scientific Rigor

Maintaining high standards of quality and integrity is a central principle of the journal. All submissions are expected to demonstrate scientific rigor, methodological soundness, originality, technical relevance, and clarity of presentation. The journal supports ethical research practices and ensures that all published work adheres to internationally accepted research and publication standards.

The peer review process is designed to uphold these standards by providing thorough, objective, and unbiased evaluation of manuscripts. Authors are encouraged to present their findings transparently and accurately, contributing to the reliability and credibility of scientific and technological literature.

Encouragement of Collaborative Research

The journal promotes collaborative research efforts that bring together experts from different disciplines, institutions, industries, and countries. Interdisciplinary collaboration often leads to innovative cybersecurity frameworks, intelligent technological solutions, and comprehensive approaches to complex digital challenges.

By providing a platform for multidisciplinary collaboration, the journal aims to foster partnerships that enhance research quality, technological innovation, and scientific progress. Contributions resulting from national and international collaborative projects are highly encouraged.

Adaptability to Advancing Technology

The fields of information security and digital technologies are rapidly evolving with continuous advancements in computing, communication, artificial intelligence, and cybersecurity practices. The journal remains adaptable to these changes by expanding its scope to include emerging technologies, innovative security models, and future-oriented research directions.

Authors are encouraged to explore novel concepts and contribute to the evolving landscape of digital technologies and cybersecurity. The journal is committed to staying current with technological developments and ensuring that its content reflects the latest advancements in the field.