The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: June 2024
Acceptance rate: 33%
No. of scientific articles: 6
No. of total articles: 10 View IssuePlus
LINDROTH, M.,NORVANTO, E.,LATVANEN, S.,CULLEN, K.,SALMINEN, M.,MATILAINEN, T.,CANDELIN, N.,KORTESNIEMI, Y., (2024). Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime, 13(1), 15-19. Retrieve from https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., 2024. Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime 13(1), 15-19. Available from: https://www.ijisc.comM. LINDROTH, E. NORVANTO, S. LATVANEN, K. CULLEN, M. SALMINEN, T. MATILAINEN, N. CANDELIN, Y. KORTESNIEMI, "Advancing Cybersecurity through Civic Skills," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 15-19, 2024. Available: https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., 'Advancing Cybersecurity through Civic Skills', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 15-19, (2024).LINDROTH, M.,NORVANTO, E.,LATVANEN, S.,CULLEN, K.,SALMINEN, M.,MATILAINEN, T.,CANDELIN, N.,KORTESNIEMI, Y.,: Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime 13 (2024) 15-19. https://www.ijisc.comLINDROTH, M., NORVANTO, E., LATVANEN, S., CULLEN, K., SALMINEN, M., MATILAINEN, T., CANDELIN, N., KORTESNIEMI, Y., (2024), Advancing Cybersecurity through Civic Skills. International Journal of Information Security and Cybercrime, 13: 15-19. https://www.ijisc.com Citation Format :
VASILOIU, R.E. (2024). Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13(1), 20-32. Retrieve from https://www.ijisc.comVASILOIU, R.E., 2024. Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13(1), 20-32. Available from: https://www.ijisc.comR.E. VASILOIU, "Cyber Security – Current and Future Trends," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 20-32, 2024. Available: https://www.ijisc.comVASILOIU, R.E., 'Cyber Security – Current and Future Trends', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 20-32, (2024).VASILOIU, R.E.: Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13 (2024) 20-32. https://www.ijisc.comVASILOIU, R.E., (2024), Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13: 20-32. https://www.ijisc.com Citation Format :
AMIN, R. (2024). Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13(1), 33-48. Retrieve from https://www.ijisc.comAMIN, R., 2024. Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13(1), 33-48. Available from: https://www.ijisc.comR. AMIN, "Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 33-48, 2024. Available: https://www.ijisc.comAMIN, R., 'Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 33-48, (2024).AMIN, R.: Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13 (2024) 33-48. https://www.ijisc.comAMIN, R., (2024), Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13: 33-48. https://www.ijisc.com Citation Format :
STOICA, I.T. (2024). The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13(1), 49-58. Retrieve from https://www.ijisc.comSTOICA, I.T., 2024. The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13(1), 49-58. Available from: https://www.ijisc.comI.T. STOICA, "The Future Risk of Biometric Data Theft in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 49-58, 2024. Available: https://www.ijisc.comSTOICA, I.T., 'The Future Risk of Biometric Data Theft in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 49-58, (2024).STOICA, I.T.: The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13 (2024) 49-58. https://www.ijisc.comSTOICA, I.T., (2024), The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13: 49-58. https://www.ijisc.com Citation Format :
OATU, L. (2024). Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13(1), 59-65. Retrieve from https://www.ijisc.comOATU, L., 2024. Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13(1), 59-65. Available from: https://www.ijisc.comL. OATU, "Combating Man-in-the-Middle Attacks within IoT Systems," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 59-65, 2024. Available: https://www.ijisc.comOATU, L., 'Combating Man-in-the-Middle Attacks within IoT Systems', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 59-65, (2024).OATU, L.: Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13 (2024) 59-65. https://www.ijisc.comOATU, L., (2024), Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13: 59-65. https://www.ijisc.com Citation Format :
POPESCU, E.E. (2024). VoIP Security Threats. International Journal of Information Security and Cybercrime, 13(1), 66-70. Retrieve from https://www.ijisc.comPOPESCU, E.E., 2024. VoIP Security Threats. International Journal of Information Security and Cybercrime 13(1), 66-70. Available from: https://www.ijisc.comE.E. POPESCU, "VoIP Security Threats," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 66-70, 2024. Available: https://www.ijisc.comPOPESCU, E.E., 'VoIP Security Threats', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 66-70, (2024).POPESCU, E.E.: VoIP Security Threats. International Journal of Information Security and Cybercrime 13 (2024) 66-70. https://www.ijisc.comPOPESCU, E.E., (2024), VoIP Security Threats. International Journal of Information Security and Cybercrime, 13: 66-70. https://www.ijisc.com Citation Format :