We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By closing this message, you are consenting to our use of cookies.

An Ongoing Cybersecurity Research Series

for the Journal of Organizational Computing and Electronic Commerce

Editorial Review Board

Senior Editor
Dave Chatterjee
University of Georgia

Associate Editors (Partial List)
Olga Angelopoulou
University of Hertfordshire

Mike Benz                                                
Vice President, Information Technology
Kraus-Anderson

Prof. Somnath Bhattacharya
University of Illinois at Springfield

Richard Biever
Chief Information Security Officer
Duke University

Indranil Bose
Indian Institute of Management, Kolkata

A.J. Burns
Baylor University 

Marian Carcary
Mary Immaculate College, Ireland

Lee Crump
Group Vice President
Rollins Inc.

Dr. Anne DeBeer
Former SVP and CIO
Federal Reserve Bank of Atlanta

Eileen Doherty
Dublin City University, Ireland

Ashish Kumar Jha
Trinity College, Dublin, Ireland

Brett W. Lavender
Chief Information Officer
Macon-Bibb County, Georgia

Phil Menard
University of Texas at San Antonio

Ronny Nussbaum
Chief Information Security Officer
AGCO Corporation 

Kevin Patel
Chief Information Security Officer
BitRail

Tushar Sachdev
Chief Technology Officer
Kore Wireless

Jaspal Sagoo
Chief Technology Officer
Centers for Disease Prevention and Control

Dear Prospective Authors

I am delighted to inform you that this game-changing publishing initiative for bringing the best actionable insights on cybersecurity is entering its third year. The review team of accomplished business leaders and scholars have been doing an exceptional job. Seven papers have been published over the last two years. I am looking forward to another very productive year.

Sincerely,

Dave Chatterjee
Senior Editor

Content Coverage

The following questions are representative of the desired scope of coverage by papers in the series:

  1. What are the key elements of a comprehensive and robust approach to defending against various forms of cyberattacks on public and private sector organizations and infrastructure?
  2. What are the key current and emerging technologies or techniques that we can leverage to effectively identify and respond to attacks? 
  3. What methods or approaches can organizations introduce to provide better intelligence about attacks against their networks and systems (thinking internal threat intelligence and honeypots)?
  4. What role should senior leadership play in ensuring effective and mature cybersecurity governance practices?
  5. What does it take to get senior leadership actively committed and engaged in securing sensitive data and systems?
  6. How and why does preparation for protecting against cyber-attacks differ across industries and organization types?
  7. How and why are some organizations better than others in effectively executing cybersecurity plans?
  8. What insights from prior research can guide managerial actions to secure the enterprise and its value chain partners?
  9. What are some key challenges and hurdles during the varied phases of the information security planning and implementation process? What are some effective coping strategies?
  10. Should investments in cybersecurity receive strategic priority and significance? Why or why not?

Review Process

Here is a quick overview of the manuscript review process:

  1. Upon submission, the manuscript will go through an initial round of screening to assess suitability and fit.
  2. Papers that make the first cut will go through a second round of review to assess quality of contribution and rigor of work.
  3. Papers passing the two rounds will be suitably edited for publication.
  4. The review process will not be dragged on and on. Suggestions for changes and improvements will be made only for those manuscripts with high potential and probability of addressing needed changes in a short period of time. 
  5. The target cycle time from submission to acceptance is approximately 3 months.

About The Journal

The Journal of Organizational Computing and Electronic Commerce (JOCEC) disseminates and stimulates original research about relationships between computer/communication technology and the design, operations, and performance of organizations. This includes implications of the technologies for organizational structure and dynamics, technological advances to keep pace with changes of organizations and their environments, emerging technological possibilities for improving organizational performance, and the many facets of electronic business.

Submissions Guidelines

  1. In the cover letter, authors need to make a clear case that the paper’s content is relevant to the real-world of cybersecurity practice. A set of actionable recommendations must be included in the cover letter.
  2. Authors are expected to communicate their findings in a compelling and succinct manner. The paper must flow and read well. It is strongly recommended that the manuscript is thoroughly proofread prior to submission.
  3. While no page restrictions are imposed, typical length should range between 2500 and 5000 words.
  4. Research methodology details should be provided in a separate document.
  5. All types of research are welcome as long as the focus is on providing substantive insights to positively influence thinking and action pertaining to cybersecurity.
  6. Go to the Taylor & Francis portal and follow the 'Submit an Article' link to submit your paper. Please include a statement affirming that the content is original and has not been published elsewhere.

Key Value Propositions

Practitioner Feedback - Opportunity to get feedback from practitioners. 

Possibly Enhance Research Grant Prospects - Could improve the probability of getting research grants.

Efficient Review Process - Very efficient review process; papers will not be sitting and gathering dust at the journal end. 

Top Notch Quality - The published product will be top notch with actionable recommendations.

Great Visibility - The readership will include scholars and practitioners.

Publicity within the Practitioner Community - There will be a proactive effort to promote the accepted papers and authors among the global practitioner community.