The Journal of Homeland Security and Emergency Management (JHSEM)
Call for Papers – Special Issue on Cybersecurity Policy
Have you researched cyber security policy and other related issues? Have you worked in the cyber security field? Do you have findings and ideas that you think would help others with today’s cybersecurity challenge? You can share your research or practice experience with the wider homeland security community and publish in a prominent peer-reviewed homeland security and emergency management journal.
Important Dates
1 Oct - Deadline for paper submission
15 Oct - Notification of acceptance
20 Dec - Camera ready version of accepted papers due
January 2013 - Special Issue published
1 Oct - Deadline for paper submission
15 Oct - Notification of acceptance
20 Dec - Camera ready version of accepted papers due
January 2013 - Special Issue published
Description
Over the past decade cybersecurity has become a central concern in the homeland security policy and practice. Policy-makers, experts and practitioners have increasingly characterized cyber security as one of the most serious economic and national security challenges of our times. Growing number of cyber-attacks bring to the fore serious economic and security ramifications that may emerge from vulnerable and weak information and communication networks. Promoting cyber security awareness, knowledge and innovation through research and communication is a critical part of any strategy to counter the growing cybersecurity threat. This call for papers aims to facilitate exchange of information and ideas to contribute to the development of a safe, secure and resilient cyberspace.
There are several strong strands of research and interest that are developing in the area of cybersecurity including the understanding of threats and risks to information systems plus how they fit into the development of cybersecurity policy. We also see how the development of good doctrine and regulations can lead to a stronger cybersecurity culture. Papers are also welcome on other cybersecurity policy topics to include strategic communications, social media and perception management. New research on policy to better protect information assurance assets, including computer network defense, defensive information warfare and critical infrastructure protection are of interest. Finally, we are looking for papers that focus on cybersecurity policy from a holistic standpoint, i.e., they look at where the research will go in the future and how these efforts can be more effective in defeating the many threats that exist today.
We invite submissions from both the academic and practitioner communities. In addition to refereed scholarly research papers, we will also consider work-in-progress papers, and practitioner reports and news items Submitted papers should contain contributions based on original research or relevant operational/practical experience and observation, exhibit methodological rigor, clearly articulate their relevance, and follow the journal’s submission guidelines. Submissions will be reviewed by the guest editors, senior editors, and referees.
If interested, please contact our guest editors cited below for details.
Guest Editors
Dr. Leigh Armistead, University of Maryland University College (larmistead@gbpts.com)
Dr. Leigh Armistead, University of Maryland University College (larmistead@gbpts.com)
Dr. Clay Wilson, University of Maryland University College (clay.wilson@umuc.edu)
Instructions for Authors
Three categories of papers will be considered:
Three categories of papers will be considered:
- Research Papers: Manuscripts limited to 16 pages; anonymous peer review. (This type of paper reports the results of original research in the field of homeland security and emergency management.)
- Work-in-Progress Papers: Manuscripts limited to 10 pages; editor review. (This type of paper reports on scholarly activity not yet completed.)
- Practitioner Reports and News: Manuscripts limited to 5 pages; editor review. (This type of paper reports on news, developments, and practice considerations relevant to cybersecurity professionals and of interest to researchers.)
All manuscripts must follow JHSEM formatting requirements and must be written in English. Formatting instructions and submission guidelines can be found at: http://www.degruyter.com/jhsem
Final Manuscript Preparation Guidelines
Please find here < http://www.degruyter.com/view/j/jhsem > more details on copyediting, typesetting, and layout requirements pertaining to final manuscript submission to this journal. All manuscripts must have correct formatting to be considered ready for publication.
Journal of Homeland Security and Emergency Management (JHSEM) is the primary source of peer-reviewed research in the emerging fields of homeland security and emergency management. JHSEM features original, innovative, and timely articles on practice and research within the professional community of emergency management and risk science, engineering, political science, public policy, decision science, and public health and medicine. The electronic nature of the journal allows timeliness, easy access, and responsiveness unparalleled among other academic publications. JHSEM publishes peer-reviewed articles, news and communiqués, opinions, and media reviews from researchers and practitioners. Authors have included prominent researchers from the Centers for Disease Control and Prevention, Harvard University, Carnegie Mellon University, the Environmental Protection Agency, George Mason University, George Washington University, RAND, and Vanderbilt University.Thanks
Dr. Clay Wilson, CISSP
Director, Cyber Security Policy Program
University of Maryland University College
Room 3178 Largo
3501 University Blvd East
Adelphi, Md 20783
Ofc. 240-684-2400
Clay.Wilson@umuc.edu
No comments:
Post a Comment