About Journal

British Journal of Cyber Criminology (BJCC) is a peer reviewed online (open access) cyber-criminal behavior, cyber victims, cyber laws and cyber investigations. BJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of Cyber-crimes in the real world, Policing Cyber space, Cyber-terrorism, International Perspectives of Cyber Crime, developing cyber safety policy, intrusion investigations, information security, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cybercrime, Cyber offender behavior, cyber-crime law, Cyber Pornography, Physical Computer Security, Privacy & Anonymity on the Net, Internet Fraud & Identity Theft, Mobile Phone Safety, Online Gambling, Copyright and Intellectual property Law, and Detection of Distributed Denial of Service Attacks. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The BJCC will be a nodal centre to develop and disseminate the knowledge of cyber-crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews.

Aim and Scope

British Journal of Cyber Criminology (BJCC) has been conceptualized for effective dissemination and promulgation of original research in all fields of Information Security and Cyber Criminology. With a relentless pursuit of excellence, it aims at providing immaculate and superior research material, thus fostering the spirit of non-conformity, experimentation and de novo intellection among researchers in different parts of the world.

Discussions of previously published papers are also welcome.

Focus & Scope

The focus and scope of British Journal of Cyber Criminology and Information Security has been categorized as follows:

 Cyber Criminology:

  • Cyber Crime
  • Cyber Victims
  • Cyber Policy
  • CybercrimeLaw
  • Cyber Pornography
  • Cyber Investigations
  • Cyber Psychopathology
  • Cyber-Criminal Behaviour
  • Cyber Offender Behaviour
  • Copyright and Intellectual Property Law
  • Developing Cyber Safety Policy
  • Detection of Distributed Denial of Service Attacks
  • Forms of Cyber Crime
  • Geographical Aspects of Cyber Crime
  • Internet Fraud and Identity Theft
  • Impact of Cyber Crimes in the Real World
  • International Perspectives of Cyber Crime
  • Mobile Phone Safety and Policy Issues
  • Online Gambling
  • Policing Cyber Space
  • Privacy &Anonymity on the Net

Information Security:

  • Access Control
  • Anti-Virus and Anti-Worms
  • Authentication and Authorization
  • Artificial Intelligence Techniques for ISS and Engineering
  • Biometric Security
  • Biometrics
  • Content Protection
  • Cyber security, Warfare, Defence and policies
  • Cryptography and Cryptanalysis
  • Clouds and Virtual Machine Security
  • Critical Information and Infrastructure Security
  • Cryptographic software and hardware for embedded systems
  • Coding theory and applications of finite fields
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Digital Forensics, Procedures, Tools & Techniques
  • Data Privacy, Privacy Theory and Engineering
  • Ethical Hacking
  • Electronic Commerce Security
  • e-Governance and e-Government Security
  • E-Sign and Public Key Infrastructure
  • Fraud Control
  • Future Directions and Challenges in ISS
  • Grid Security
  • IoT and Industry 4.0
  • Information Security Audits
  • Information Hiding and Watermarking
  • Information Privacy
  • Information Security Science (ISS) and Engineering
  • Intellectual Property Protection
  • Intrusion Detection and Prevention Systems
  • Key and Identity Management Trust Models
  • Key Management and Key Recovery
  • Language-based Security
  • M2M Security
  • Malicious Software Threats and Protection
  • Mobile Communication and Application Security
  • Network Security
  • Operating System Security
  • Public Awareness and Education for ISS
  • Penetration Tests, Tools and Techniques
  • Risk Evaluation and Security Certification
  • Social Engineering Attacks and Prevention
  • Signature and Key Agreement Protocol
  • Steganography and Steganalysis
  • Surveillance Technology
  • Software Security
  • System Security
  • Security Evaluation
  • Security for Mobile Computing
  • Security Models
  • Security Protocols
  • Security and Privacy for Social Computing
  • Security Risk Analysis, Modelling, Evaluation and Management
  • Security Weaknesses on Information and Communication
  • Secure Coding, Source Code Auditing and Review
  • Security Standards, Protocols and Policies
  • Securing Digital Rights and Management
  • Securing Mobile Networks and Devices
  • Smart Card, RFID, NFC, 3G, 4G, etc. Security
  • Trusted Computing and Trustworthy Computing Technology
  • Wireless, Ad Hoc and Sensor Network Security
  • Web and Web Application Security

Current Issue

Journal Spotlight

Media Partners and Indexing