Journal of Cybersecurity and Information Management

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)
About JCIM
ISSN (Online)

2690-6775


ISSN (Print)

2769-7851


Frequency

Continuous publication


Contact Information

  ASPG Publisher, 625 Wright Ave, Gretna, LA 70056, USA

Principal Contact

Ahmed Hussain

Email: editorial@americaspg.com

Support/Production Contact

Adam Miller

Email: support@americaspg.com

 


🥇 Article Processing Charges (APC)

A publication fee of 300 USD applies to accepted manuscripts only. No fees are charged at the submission stage. The fee is applicable after final acceptance and prior to publication.


Publication Model

This journal follows an open access publishing model. All accepted articles are made immediately available online without subscription barriers. Article processing charges (APC) apply after acceptance.
 


Submission

👉 Submit Manuscript


📚 Archive

View Published Articles


⚙️ Use of Generative AI in Manuscripts

Authors are required to disclose the use of generative AI tools in the preparation of their manuscripts, where applicable, in accordance with the publisher’s ethical policies.



Description

Journal of Cybersecurity and Information Management (JCIM) is an international, peer-reviewed journal dedicated to advancing research in cybersecurity, information management, and secure digital systems. The journal provides a scholarly platform for the publication of original research articles and review papers addressing the protection, management, and resilience of modern information infrastructures.

JCIM emphasizes innovative and interdisciplinary approaches to securing current and emerging information systems, including applications in smart cities, cloud computing, IoT, and data-driven environments. The journal encourages contributions that address both theoretical advancements and practical solutions for safeguarding digital assets and ensuring reliable information management.

All submissions undergo initial editorial screening followed by a rigorous peer-review process conducted by independent experts. Further details are available in the Peer Review Process.

Authors may submit manuscripts prepared in any standard academic format. Detailed preparation instructions are provided in the Author Guidelines.

JCIM is committed to maintaining high standards of publication ethics, research integrity, and transparency. Authors must ensure compliance with the publisher’s policies as outlined in the Publication Ethics and Malpractice Statement.

Submission of a manuscript implies agreement with the publisher’s copyright and licensing terms as described in the Copyright and Licensing Policy.

 

Aim and Scope:

Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions.  Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered. 

 

Topics of Interest:

JCIM promotes research and reflects the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:

Cybersecurity: The Current Threat and Future Challenges

Secure Data Encryption Models

Secure Information Systems: Challenges and Requirements

Security Procedures for Smart Networks Applications

Security Challenges for IoT based Applications

Secure Interfaces, protocols, and associated ad-hoc/sensor networks

Security and fault tolerance for embedded or ubiquitous systems

Sensor network security issues in mobile cloud computing

Ambient intelligence and intelligent service systems in secure IoT

Secure Geo-processing, Localization, and Location Based Services

Secure spatial data techniques and tools for analytics

Secure Smart city services and applications platforms

Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment

Secure, Fast and complexity-awareness algorithms for real-time computing for network

Scientific computing and secure data management

Protecting Information Resources

Threats to Information Security

Wireless Security

Security assurance in information systems

Security procedures to ensure the integrity of information systems

Recent methodologies and techniques for security in Smart Cities Applications

Recent secure data aggregation and distribution algorithms

Key distribution algorithms

Protecting SCADA systems

Securely executing multilevel transactions

Adaptive attack mitigation for Cyber-Physical System

Data security and privacy for Cyber-Physical System

Security and privacy in industrial control systems

Smart grid security

Urban transportation system security

Secure data aggregation

Information Management and related topics

 

 

Editor in Chief 

Prof. Mohammad Hammoudeh

Professor of Cyber Security, Manchester Metropolitan University, UK

Co-Editor in Chief 

Prof. Salah-ddine KRIT

Professor of Computer Science, Ibn Zohr University, Agadir, Morocco

 

Associate Editors

Prof. Ali Kashif Bashir, Professor of Networks and Security, Manchester Metropolitan University, UK

Dr. Khan Muhammad, Sejong University, Republic of Korea 

Prof. Muhammad Sajjad, NTNU, Norway 

Dr. Amin Ullah, Oregon State University, United States 

Prof. Irfan Mehmood, University of Bradford, UK 

Dr. Ijaz Ul Haq, Sejong University, Republic of Korea 

Dr. Hamza Rafik, NICT, Japan 

Dr. SHAHAB BANDFuture Technology Research Center, College of Future, National Yunlin University of Science and Technology, Douliou, Taiwan, ROC

Dr. Zouheir TrabelsiCollege of Information Technology, UAE University, Al Ain, United Arab Emirates

Dr. Rita ZgheibFaculty of Engineering, Applied Science and Technology , Canadian University Dubai, Dubai, UAE

Dr. Zafar Ali, Southeast University, Nanjing, China 

Dr. Prayag Tiwari, Aalto University, Finland 

Dr. Ramadhan Mstafa, University of Bridgeport, USA 

Prof. Vishal Jain, Associate Professor, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), A-4, Paschim Vihar, New Delhi-63, India

Prof. Valentina Emilia Balas, Full Professor at “Aurel Vlaicu” University of Arad, Romania

Dr. Fahmi Khalifa, Mansoura University, Egypt and University of Louisville, Louisville KY 40292, USA 

Prof. Surapong Bangphan, Department of Industrial Engineering, Faculty of Engineering, Rajamangala University of Technology Lanna

Prof. Yagyanath Rimal, Faculty of Science and Technology, Department of Computing Science, Pokhara University, Pokhara Lekhnath, Nepal

Dr. Ahmed Soliman, University of Louisvile, USA

Prof. Enes Zengin, DUMPLUPINAR University, Turkey

Dr. Ahmed Salem , Department chair of Computer Science and Information Technology, Hood College, USA

Prof. Hasan Rashaideh, Applied Belqa University, Jordan

Dr. Said ELNAFFAR, Faculty of Engineering, Applied Science and Technology, Canadian University Dubai, Dubai, United Arab Emirates

Prof. Raghvendra Kumar Agrawal, Lakshmi Narain College of Technology, Bhopal

Prof. PANIGRAHI SRIKANTH, GMR Institute of Technology (GMRIT)

Prof. Rohit Sharma, SRM Institute of Science and Technology, India

Prof. Adriana Burlea-Schiopoiu, University of Craiova, Romania

Prof. Chuan-Ming Liu, Professor, Dept. of Computer Science and Information Engineering, National Taipei University of Technology (Taipei Tech), Taipei 106, TAIWAN

Prof. Krishna Kant Singh, KIET Group of Institutions, Ghaziabad, India

Dr. Akansha Singh, Associate Professor, Department of CSE, ASET, Amity University Uttar Pradesh, Noida, India

Prof. Mohamed Elhoseny, American University in the Emirates, Dubai, United Arab Emirates 

Dr. Sheng-Lung Peng, Professor, Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan

Dr. Hamed Daei Kasmaei, Computational mathematics and computer science, Islamic Azad University Central Tehran Branch, Tehran, Iran

Dr. Rabeb Touati, LR99ES10 Human Genetics Laboratory, Faculty of Medicine of Tunis, University of Tunis El Manar, Tunisia

Dr. Mohd Helmy Abd Wahab, Universiti Tun Hussein Onn Malaysia, MALAYSIA

Dr. Mohammed. I.alghamdi, Al-Baha University, Saudi Arabia

Prof. Xiaojing Yuan, University of Houston, USA

Prof. Xuan Guo, University of North Texas, USA

Prof. Baofu Fang, Hefei University of Technology, China

Dr. Saddaf Rubab, College of Computing ad Informatics, University of Sharjah, United Arab Emirates

Prof. Jianfang Shi, Taiyuan University of Technology, China

Dr. Esmeralda Kazia, Department of Applied And Computer Sciences, Barleti University, Albania

Dr. Pourya Shamsolmoali, Huawei Technologies Corporate, Shanghai, China

Prof. Matthias Weippert, Rostock University, Germany

Dr. Mohamed Abouhawwash, Michigan State University, USA

Dr. Syed Hassan Ahmed, Georgia Southern University, USA

Dr. Alaa Tharwat, Frankfurt University of Applied Sciences, Germany

Dr. Adel Ben Mnaouer, Faculty of Engineering, Canadian University Dubai, Dubai, United Arab Emirates

Sagar Sidana, Principal Software Engineer, McKinsey & Company, Dallas, USA
Dr. Rutvij H. Jhaveri, School of Technology Pandit Deendayal Energy University Gandhinagar, India

Dr. Monire Norouzi, Haliç University, Istanbul, Turkey

 Authors are invited to submit their manuscripts through the journal’s online submission system.

Manuscripts may be prepared in any standard academic format at the initial submission stage. Compliance with a specific journal template is not required prior to peer review. Upon acceptance, manuscripts will be professionally formatted in accordance with the publisher’s publication standards. Detailed preparation instructions are provided in the Author Guidelines.

All submissions undergo an initial editorial screening followed by a rigorous double-blind peer-review process conducted by independent experts. Details of the review workflow are available in the Peer Review Process page.

Authors are required to ensure that their submissions comply with the publisher’s ethical standards. For full details, please refer to the Publication Ethics and Malpractice Statement.


👉 Submit Manuscript

 

Journal of Cybersecurity and Information Management (JCIM) is indexed in the following Databases

-Scimago Journal & Country Rank

 

 

EBSCO Library, Infoscience & Technology ...

 

Getting Started with Microsoft Academic ...

 

database of library collections ...