• Home
  • info@pubtexto.com
  • Contact Us
  • About Journal
  • Aim And Scope
  • Guidelines
    • Instructions For Authors
    • Editor Guidelines
    • Reviewer Guidelines
    • Copy Rights
  • Editorial Board
  • Submit Manuscript
  • Articles
    • Article In Press
    • Current Issue
    • Archives
  • Special Issue

British Journal of Cyber Criminology

Aim and Scope

British Journal of Cyber Criminology (BJCC) has been conceptualized for effective dissemination and promulgation of original research in all fields of Information Security and Cyber Criminology. With a relentless pursuit of excellence, it aims at providing immaculate and superior research material, thus fostering the spirit of non-conformity, experimentation and de novo intellection among researchers in different parts of the world.

Discussions of previously published papers are also welcome.

Focus & Scope

The focus and scope of British Journal of Cyber Criminology and Information Security has been categorized as follows:

 Cyber Criminology:

  • Cyber Crime
  • Cyber Victims
  • Cyber Policy
  • CybercrimeLaw
  • Cyber Pornography
  • Cyber Investigations
  • Cyber Psychopathology
  • Cyber-Criminal Behaviour
  • Cyber Offender Behaviour
  • Copyright and Intellectual Property Law
  • Developing Cyber Safety Policy
  • Detection of Distributed Denial of Service Attacks
  • Forms of Cyber Crime
  • Geographical Aspects of Cyber Crime
  • Internet Fraud and Identity Theft
  • Impact of Cyber Crimes in the Real World
  • International Perspectives of Cyber Crime
  • Mobile Phone Safety and Policy Issues
  • Online Gambling
  • Policing Cyber Space
  • Privacy &Anonymity on the Net

Information Security:

  • Access Control
  • Anti-Virus and Anti-Worms
  • Authentication and Authorization
  • Artificial Intelligence Techniques for ISS and Engineering
  • Biometric Security
  • Biometrics
  • Content Protection
  • Cyber security, Warfare, Defence and policies
  • Cryptography and Cryptanalysis
  • Clouds and Virtual Machine Security
  • Critical Information and Infrastructure Security
  • Cryptographic software and hardware for embedded systems
  • Coding theory and applications of finite fields
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Digital Forensics, Procedures, Tools & Techniques
  • Data Privacy, Privacy Theory and Engineering
  • Ethical Hacking
  • Electronic Commerce Security
  • e-Governance and e-Government Security
  • E-Sign and Public Key Infrastructure
  • Fraud Control
  • Future Directions and Challenges in ISS
  • Grid Security
  • IoT and Industry 4.0
  • Information Security Audits
  • Information Hiding and Watermarking
  • Information Privacy
  • Information Security Science (ISS) and Engineering
  • Intellectual Property Protection
  • Intrusion Detection and Prevention Systems
  • Key and Identity Management Trust Models
  • Key Management and Key Recovery
  • Language-based Security
  • M2M Security
  • Malicious Software Threats and Protection
  • Mobile Communication and Application Security
  • Network Security
  • Operating System Security
  • Public Awareness and Education for ISS
  • Penetration Tests, Tools and Techniques
  • Risk Evaluation and Security Certification
  • Social Engineering Attacks and Prevention
  • Signature and Key Agreement Protocol
  • Steganography and Steganalysis
  • Surveillance Technology
  • Software Security
  • System Security
  • Security Evaluation
  • Security for Mobile Computing
  • Security Models
  • Security Protocols
  • Security and Privacy for Social Computing
  • Security Risk Analysis, Modelling, Evaluation and Management
  • Security Weaknesses on Information and Communication
  • Secure Coding, Source Code Auditing and Review
  • Security Standards, Protocols and Policies
  • Securing Digital Rights and Management
  • Securing Mobile Networks and Devices
  • Smart Card, RFID, NFC, 3G, 4G, etc. Security
  • Trusted Computing and Trustworthy Computing Technology
  • Wireless, Ad Hoc and Sensor Network Security
  • Web and Web Application Security

For Author

  • Open Access
  • Peer Review
  • Publishing Process
  • Submit Manuscript

Quick links

  • About Us
  • Guidelines
  • Journal List
  • Contact Us

Resources

  • Editors
  • Blogs
  • Membership
  • Ethics & Policies

get in touch

Enter your E-mail and we'll send you more information.

Content of this site is available under Commons Attribution 4.0 License Copyright © 2020 Pubtexto - All Right Reserved

  • Follow us: