The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: December 2020
Acceptance rate: 42%
No. of scientific articles: 6
No. of total articles: 8 View IssuePlus
RICCI, S.,HAJNY, J.,PIESARSKAS, E.,PARKER, S.,JANOUT, V., (2020). Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime, 9(2), 7-11. Retrieve from https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., 2020. Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime 9(2), 7-11. Available from: https://www.ijisc.comS. RICCI, J. HAJNY, E. PIESARSKAS, S. PARKER, V. JANOUT, "Challenges in Cyber Security Education," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 7-11, 2020. Available: https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., 'Challenges in Cyber Security Education', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 7-11, (2020).RICCI, S.,HAJNY, J.,PIESARSKAS, E.,PARKER, S.,JANOUT, V.,: Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime 9 (2020) 7-11. https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., (2020), Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime, 9: 7-11. https://www.ijisc.com Citation Format :
ENNS-BRAY, W.S.,ROCHAT, K., (2020). Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9(2), 12-17. Retrieve from https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 2020. Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9(2), 12-17. Available from: https://www.ijisc.comW.S. ENNS-BRAY, K. ROCHAT, "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 12-17, 2020. Available: https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 'Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 12-17, (2020).ENNS-BRAY, W.S.,ROCHAT, K.,: Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9 (2020) 12-17. https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., (2020), Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9: 12-17. https://www.ijisc.com Citation Format :
NAGYFEJEO, E.,SOLMS, B.V., (2020). Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime, 9(2), 18-27. Retrieve from https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., 2020. Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime 9(2), 18-27. Available from: https://www.ijisc.comE. NAGYFEJEO, B.V. SOLMS, "Why Do National Cybersecurity Awareness Programmes Often Fail?," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 18-27, 2020. Available: https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., 'Why Do National Cybersecurity Awareness Programmes Often Fail?', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 18-27, (2020).NAGYFEJEO, E.,SOLMS, B.V.,: Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime 9 (2020) 18-27. https://www.ijisc.comNAGYFEJEO, E., SOLMS, B.V., (2020), Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime, 9: 18-27. https://www.ijisc.com Citation Format :
SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J., (2020). Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9(2), 28-32. Retrieve from https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 2020. Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9(2), 28-32. Available from: https://www.ijisc.comL.A. SHEPHERD, S. DE PAOLI, J. CONACHER, "Human-Computer Interaction Considerations When Developing Cyber Ranges," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 28-32, 2020. Available: https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., 'Human-Computer Interaction Considerations When Developing Cyber Ranges', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 28-32, (2020).SHEPHERD, L.A.,DE PAOLI, S.,CONACHER, J.,: Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime 9 (2020) 28-32. https://www.ijisc.comSHEPHERD, L.A., DE PAOLI, S., CONACHER, J., (2020), Human-Computer Interaction Considerations When Developing Cyber Ranges. International Journal of Information Security and Cybercrime, 9: 28-32. https://www.ijisc.com Citation Format :
POPESCU, E.F. (2020). Complementary Cybersecurity. International Journal of Information Security and Cybercrime, 9(2), 33-37. Retrieve from https://www.ijisc.comPOPESCU, E.F., 2020. Complementary Cybersecurity. International Journal of Information Security and Cybercrime 9(2), 33-37. Available from: https://www.ijisc.comE.F. POPESCU, "Complementary Cybersecurity," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 33-37, 2020. Available: https://www.ijisc.comPOPESCU, E.F., 'Complementary Cybersecurity', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 33-37, (2020).POPESCU, E.F.: Complementary Cybersecurity. International Journal of Information Security and Cybercrime 9 (2020) 33-37. https://www.ijisc.comPOPESCU, E.F., (2020), Complementary Cybersecurity. International Journal of Information Security and Cybercrime, 9: 33-37. https://www.ijisc.com Citation Format :
FRĂȚILĂ, A.I. (2020). Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9(2), 38-45. Retrieve from https://www.ijisc.comFRĂȚILĂ, A.I., 2020. Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9(2), 38-45. Available from: https://www.ijisc.comA.I. FRĂȚILĂ, "Analysis of Computer Malware and Common Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 38-45, 2020. Available: https://www.ijisc.comFRĂȚILĂ, A.I., 'Analysis of Computer Malware and Common Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 38-45, (2020).FRĂȚILĂ, A.I.: Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9 (2020) 38-45. https://www.ijisc.comFRĂȚILĂ, A.I., (2020), Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9: 38-45. https://www.ijisc.com Citation Format :