The Journal invites papers representing synergy between theory and practices to help policy makers and executives manage information and computer security and its related technologies. It focuses on theory, design, implementation, analysis, and application of secure information and computer systems.
Full-Time Post-Graduate Information Security Students Can Receive Up to $12,500 Apiece in Individual Awards